This repository has been archived by the owner on Aug 11, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 63
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add helpers for basic acceptance test
- Loading branch information
Showing
898 changed files
with
203,609 additions
and
6 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,53 @@ | ||
package provider | ||
|
||
import ( | ||
"fmt" | ||
"testing" | ||
) | ||
|
||
func TestAccKubernetesManifestBasicConfigMap(t *testing.T) { | ||
wd := helper.RequireNewWorkingDir(t) | ||
|
||
namespace := randName() | ||
createKubernetesNamespace(t, namespace) | ||
|
||
name := randName() | ||
tfconfig := testAccManifestBasicConfigMap(namespace, name) | ||
wd.RequireSetConfig(t, tfconfig) | ||
|
||
wd.RequireInit(t) | ||
wd.RequireApply(t) | ||
|
||
assertKubernetesNamespacedResourceExists(t, "v1", "configmaps", namespace, name) | ||
|
||
state := wd.RequireState(t) | ||
object := getObjectFromResourceState(t, state, "kubernetes_manifest.test") | ||
assertObjectFieldEqual(t, object, "metadata.namespace", namespace) | ||
assertObjectFieldEqual(t, object, "metadata.name", name) | ||
assertObjectFieldEqual(t, object, "data.foo", "bar") | ||
|
||
wd.Destroy() | ||
assertKubernetesNamespacedResourceNotExists(t, "v1", "configmaps", namespace, name) | ||
deleteKubernetesNamespace(t, namespace) | ||
|
||
wd.Close() | ||
} | ||
|
||
func testAccManifestBasicConfigMap(namespace, name string) string { | ||
return fmt.Sprintf(` | ||
resource "kubernetes_manifest" "test" { | ||
provider = kubernetes-alpha | ||
manifest = { | ||
"apiVersion" = "v1" | ||
"kind" = "ConfigMap" | ||
"metadata" = { | ||
"name" = %q | ||
"namespace" = %q | ||
} | ||
"data" = { | ||
"foo" = "bar" | ||
} | ||
} | ||
}`, name, namespace) | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,204 @@ | ||
package provider | ||
|
||
import ( | ||
"context" | ||
"fmt" | ||
"math/rand" | ||
"os" | ||
"strings" | ||
"testing" | ||
|
||
"github.com/stretchr/testify/assert" | ||
|
||
tfjson "github.com/hashicorp/terraform-json" | ||
tftest "github.com/hashicorp/terraform-plugin-test" | ||
|
||
"k8s.io/apimachinery/pkg/api/errors" | ||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured" | ||
"k8s.io/apimachinery/pkg/runtime/schema" | ||
"k8s.io/client-go/dynamic" | ||
_ "k8s.io/client-go/plugin/pkg/client/auth" | ||
"k8s.io/client-go/rest" | ||
"k8s.io/client-go/tools/clientcmd" | ||
) | ||
|
||
var providerName = "kubernetes-alpha" | ||
var helper *tftest.Helper | ||
var kubernetesClient dynamic.Interface | ||
|
||
func TestMain(m *testing.M) { | ||
if tftest.RunningAsPlugin() { | ||
Serve() | ||
os.Exit(0) | ||
return | ||
} | ||
|
||
sourceDir, err := os.Getwd() | ||
if err != nil { | ||
panic(err) | ||
} | ||
|
||
client, err := configureKubernetesClient() | ||
if err != nil { | ||
panic(err) | ||
} | ||
kubernetesClient = client | ||
|
||
helper = tftest.AutoInitProviderHelper(providerName, sourceDir) | ||
defer helper.Close() | ||
|
||
exitcode := m.Run() | ||
os.Exit(exitcode) | ||
} | ||
|
||
func configureKubernetesClient() (dynamic.Interface, error) { | ||
rules := clientcmd.NewDefaultClientConfigLoadingRules() | ||
overrides := &clientcmd.ConfigOverrides{} | ||
config, err := clientcmd.NewNonInteractiveDeferredLoadingClientConfig(rules, overrides).ClientConfig() | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
if config == nil { | ||
config = &rest.Config{} | ||
} | ||
|
||
client, err := dynamic.NewForConfig(config) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
return client, nil | ||
} | ||
|
||
func createGroupVersionResource(gv, resource string) schema.GroupVersionResource { | ||
var group, groupVersion string | ||
gvparts := strings.Split(gv, "/") | ||
if len(gvparts) < 2 { | ||
group = "" | ||
groupVersion = gv | ||
} else { | ||
group = gvparts[0] | ||
groupVersion = gvparts[1] | ||
} | ||
|
||
return schema.GroupVersionResource{ | ||
Group: group, | ||
Version: groupVersion, | ||
Resource: resource, | ||
} | ||
} | ||
|
||
func assertKubernetesNamespacedResourceExists(t *testing.T, gv, resource, namespace, name string) { | ||
gvr := createGroupVersionResource(gv, resource) | ||
_, err := kubernetesClient.Resource(gvr).Namespace(namespace).Get(context.TODO(), name, metav1.GetOptions{}) | ||
if errors.IsNotFound(err) { | ||
t.Errorf("Resource %s/%s does not exist", namespace, name) | ||
return | ||
} | ||
|
||
if err != nil { | ||
t.Errorf("Error when trying to get resource %s/%s: %v", namespace, name, err) | ||
} | ||
} | ||
|
||
func assertKubernetesNamespacedResourceNotExists(t *testing.T, gv, resource, namespace, name string) { | ||
gvr := createGroupVersionResource(gv, resource) | ||
_, err := kubernetesClient.Resource(gvr).Namespace(namespace).Get(context.TODO(), name, metav1.GetOptions{}) | ||
if errors.IsNotFound(err) { | ||
return | ||
} | ||
|
||
if err != nil { | ||
t.Errorf("Error when trying to get resource %s/%s: %v", namespace, name, err) | ||
return | ||
} | ||
|
||
t.Errorf("Resource %s/%s still exists", namespace, name) | ||
} | ||
|
||
func createKubernetesNamespace(t *testing.T, name string) { | ||
namespace := &unstructured.Unstructured{ | ||
Object: map[string]interface{}{ | ||
"apiVersion": "v1", | ||
"kind": "Namespace", | ||
"metadata": map[string]interface{}{ | ||
"name": name, | ||
}, | ||
}, | ||
} | ||
gvr := createGroupVersionResource("v1", "namespaces") | ||
_, err := kubernetesClient.Resource(gvr).Create(context.TODO(), namespace, metav1.CreateOptions{}) | ||
if err != nil { | ||
t.Errorf("Failed to create namespace %q: %v", name, err) | ||
} | ||
} | ||
|
||
func deleteKubernetesNamespace(t *testing.T, name string) { | ||
gvr := createGroupVersionResource("v1", "namespaces") | ||
err := kubernetesClient.Resource(gvr).Delete(context.TODO(), name, metav1.DeleteOptions{}) | ||
if err != nil { | ||
t.Errorf("Failed to delete namespace %q: %v", name, err) | ||
} | ||
} | ||
|
||
var letters = []rune("abcdefghijklmnopqrstuvwxyz") | ||
|
||
func randName() string { | ||
b := make([]rune, 10) | ||
for i := range b { | ||
b[i] = letters[rand.Intn(len(letters))] | ||
} | ||
return fmt.Sprintf("tf-acc-test-%s", string(b)) | ||
} | ||
|
||
// getObjectFromResourceState will pull out the value of the `object` attribute of the resource and return it | ||
// as a map[string]interface{}. | ||
func getObjectFromResourceState(t *testing.T, state *tfjson.State, resourceAddr string) map[string]interface{} { | ||
for _, r := range state.Values.RootModule.Resources { | ||
if r.Address == resourceAddr { | ||
value, ok := r.AttributeValues["object"].(map[string]interface{}) | ||
if !ok { | ||
t.Errorf("Could not find get `object` attribute from %q", resourceAddr) | ||
} | ||
return value | ||
} | ||
} | ||
|
||
t.Errorf("Could not find resource %q in state", resourceAddr) | ||
return nil | ||
} | ||
|
||
// findFieldValue will return the value of a field in the object using dot notation | ||
func findFieldValue(object map[string]interface{}, fieldPath string) (interface{}, error) { | ||
pathKeys := strings.Split(fieldPath, ".") | ||
fieldKey := pathKeys[len(pathKeys)-1] | ||
parentFieldPathKeys := pathKeys[:len(pathKeys)-1] | ||
|
||
m := object | ||
for _, key := range parentFieldPathKeys { | ||
// FIXME need to handle arrays like: spec.containers.0.name | ||
v, ok := m[key].(map[string]interface{}) | ||
if !ok { | ||
return nil, fmt.Errorf("Field %q does not exist", fieldPath) | ||
} | ||
m = v | ||
} | ||
|
||
value, ok := m[fieldKey].(interface{}) | ||
if !ok { | ||
return nil, fmt.Errorf("Field %q does not exist", fieldPath) | ||
} | ||
|
||
return value, nil | ||
} | ||
|
||
func assertObjectFieldEqual(t *testing.T, object map[string]interface{}, fieldPath string, expectedValue interface{}) { | ||
actualValue, err := findFieldValue(object, fieldPath) | ||
if err != nil { | ||
t.Errorf(err.Error()) | ||
} | ||
|
||
assert.Equal(t, expectedValue, actualValue) | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.