Files
kubevela/pkg/addon/addon_test.go
2022-05-26 19:30:19 +08:00

964 lines
25 KiB
Go

/*
Copyright 2021 The KubeVela Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package addon
import (
"context"
"encoding/json"
"encoding/xml"
"errors"
"fmt"
"net/http"
"net/http/httptest"
"os"
"path"
"path/filepath"
"strings"
"testing"
"github.com/crossplane/crossplane-runtime/pkg/test"
"github.com/google/go-github/v32/github"
"github.com/stretchr/testify/assert"
corev1 "k8s.io/api/core/v1"
kerrors "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/runtime/schema"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/client/fake"
v1alpha12 "github.com/oam-dev/cluster-gateway/pkg/apis/cluster/v1alpha1"
clustercommon "github.com/oam-dev/cluster-gateway/pkg/common"
"github.com/oam-dev/kubevela/apis/core.oam.dev/common"
"github.com/oam-dev/kubevela/apis/core.oam.dev/v1beta1"
"github.com/oam-dev/kubevela/apis/types"
version2 "github.com/oam-dev/kubevela/version"
)
var paths = []string{
"example/metadata.yaml",
"example/readme.md",
"example/template.yaml",
"example/definitions/helm.yaml",
"example/resources/configmap.cue",
"example/resources/parameter.cue",
"example/resources/service/source-controller.yaml",
"terraform/metadata.yaml",
"terraform-alibaba/metadata.yaml",
"test-error-addon/metadata.yaml",
"test-error-addon/resources/parameter.cue",
"test-disable-addon/metadata.yaml",
"test-disable-addon/definitions/compDef.yaml",
"test-disable-addon/definitions/traitDef.cue",
}
var ossHandler http.HandlerFunc = func(rw http.ResponseWriter, req *http.Request) {
queryPath := strings.TrimPrefix(req.URL.Path, "/")
if strings.Contains(req.URL.RawQuery, "prefix") {
prefix := req.URL.Query().Get("prefix")
res := ListBucketResult{
Files: []File{},
Count: 0,
}
for _, p := range paths {
if strings.HasPrefix(p, prefix) {
// Size 100 is for mock a file
res.Files = append(res.Files, File{Name: p, Size: 100})
res.Count += 1
}
}
data, err := xml.Marshal(res)
if err != nil {
rw.Write([]byte(err.Error()))
}
rw.Write(data)
} else {
found := false
for _, p := range paths {
if queryPath == p {
file, err := os.ReadFile(path.Join("testdata", queryPath))
if err != nil {
rw.Write([]byte(err.Error()))
}
found = true
rw.Write(file)
break
}
}
if !found {
rw.Write([]byte("not found"))
}
}
}
var ctx = context.Background()
func testReaderFunc(t *testing.T, reader AsyncReader) {
registryMeta, err := reader.ListAddonMeta()
assert.NoError(t, err)
testAddonName := "example"
var testAddonMeta SourceMeta
for _, m := range registryMeta {
if m.Name == testAddonName {
testAddonMeta = m
break
}
}
assert.NoError(t, err)
uiData, err := GetUIDataFromReader(reader, &testAddonMeta, UIMetaOptions)
assert.NoError(t, err)
assert.Equal(t, uiData.Name, testAddonName)
assert.True(t, uiData.Parameters != "")
assert.True(t, len(uiData.Definitions) > 0)
// test get ui data
rName := "KubeVela"
uiDataList, err := ListAddonUIDataFromReader(reader, registryMeta, rName, UIMetaOptions)
assert.True(t, strings.Contains(err.Error(), "#parameter.example: preference mark not allowed at this position"))
assert.Equal(t, 4, len(uiDataList))
assert.Equal(t, uiDataList[0].RegistryName, rName)
// test get install package
installPkg, err := GetInstallPackageFromReader(reader, &testAddonMeta, uiData)
assert.NoError(t, err)
assert.NotNil(t, installPkg, "should get install package")
assert.Equal(t, len(installPkg.CUETemplates), 1)
}
func TestGetAddonData(t *testing.T) {
server := httptest.NewServer(ossHandler)
defer server.Close()
reader, err := NewAsyncReader(server.URL, "", "", "", "", ossType)
assert.NoError(t, err)
testReaderFunc(t, reader)
}
func TestRender(t *testing.T) {
testcases := []struct {
envs []ObservabilityEnvironment
tmpl string
expect string
err error
}{
{
envs: []ObservabilityEnvironment{
{
Cluster: "c1",
},
{
Cluster: "c2",
},
},
tmpl: ObservabilityEnvBindingEnvTmpl,
expect: `
- name: c1
placement:
clusterSelector:
name: c1
- name: c2
placement:
clusterSelector:
name: c2
`,
err: nil,
},
{
envs: []ObservabilityEnvironment{
{
Cluster: "c1",
},
{
Cluster: "c2",
},
},
tmpl: ObservabilityWorkflow4EnvBindingTmpl,
expect: `
- name: c1
type: deploy2env
properties:
policy: domain
env: c1
parallel: true
- name: c2
type: deploy2env
properties:
policy: domain
env: c2
parallel: true
`,
err: nil,
},
}
for _, tc := range testcases {
t.Run("", func(t *testing.T) {
rendered, err := render(tc.envs, tc.tmpl)
assert.Equal(t, tc.err, err)
assert.Equal(t, tc.expect, rendered)
})
}
}
func TestRenderApp(t *testing.T) {
addon := baseAddon
app, err := RenderApp(ctx, &addon, nil, map[string]interface{}{})
assert.NoError(t, err, "render app fail")
// definition should not be rendered
assert.Equal(t, len(app.Spec.Components), 1)
}
func TestRenderAppWithNeedNamespace(t *testing.T) {
addon := baseAddon
addon.NeedNamespace = append(addon.NeedNamespace, types.DefaultKubeVelaNS, "test-ns2")
app, err := RenderApp(ctx, &addon, nil, map[string]interface{}{})
assert.NoError(t, err, "render app fail")
assert.Equal(t, len(app.Spec.Components), 2)
for _, c := range app.Spec.Components {
assert.NotEqual(t, types.DefaultKubeVelaNS+"-namespace", c.Name, "namespace vela-system should not be rendered")
}
}
func TestRenderDeploy2RuntimeAddon(t *testing.T) {
addonDeployToRuntime := baseAddon
addonDeployToRuntime.Meta.DeployTo = &DeployTo{
DisableControlPlane: false,
RuntimeCluster: true,
}
defs, err := RenderDefinitions(&addonDeployToRuntime, nil)
assert.NoError(t, err)
assert.Equal(t, len(defs), 1)
def := defs[0]
assert.Equal(t, def.GetAPIVersion(), "core.oam.dev/v1beta1")
assert.Equal(t, def.GetKind(), "TraitDefinition")
app, err := RenderApp(ctx, &addonDeployToRuntime, nil, map[string]interface{}{})
assert.NoError(t, err)
steps := app.Spec.Workflow.Steps
assert.True(t, len(steps) >= 2)
assert.Equal(t, steps[len(steps)-2].Type, "apply-application")
assert.Equal(t, steps[len(steps)-1].Type, "deploy2runtime")
}
func TestRenderDefinitions(t *testing.T) {
addonDeployToRuntime := baseAddon
addonDeployToRuntime.Meta.DeployTo = &DeployTo{
DisableControlPlane: false,
RuntimeCluster: false,
}
defs, err := RenderDefinitions(&addonDeployToRuntime, nil)
assert.NoError(t, err)
assert.Equal(t, len(defs), 1)
def := defs[0]
assert.Equal(t, def.GetAPIVersion(), "core.oam.dev/v1beta1")
assert.Equal(t, def.GetKind(), "TraitDefinition")
app, err := RenderApp(ctx, &addonDeployToRuntime, nil, map[string]interface{}{})
assert.NoError(t, err)
// addon which app work on no-runtime-cluster mode workflow is nil
assert.Nil(t, app.Spec.Workflow)
}
func TestRenderK8sObjects(t *testing.T) {
addonMultiYaml := multiYamlAddon
addonMultiYaml.Meta.DeployTo = &DeployTo{
DisableControlPlane: false,
RuntimeCluster: false,
}
app, err := RenderApp(ctx, &addonMultiYaml, nil, map[string]interface{}{})
assert.NoError(t, err)
assert.Equal(t, len(app.Spec.Components), 1)
comp := app.Spec.Components[0]
assert.Equal(t, comp.Type, "k8s-objects")
}
func TestGetAddonStatus(t *testing.T) {
getFunc := test.MockGetFn(func(ctx context.Context, key client.ObjectKey, obj client.Object) error {
switch key.Name {
case "addon-disabled", "disabled":
return kerrors.NewNotFound(schema.GroupResource{Group: "apiVersion: core.oam.dev/v1beta1", Resource: "app"}, key.Name)
case "addon-suspend":
o := obj.(*v1beta1.Application)
app := &v1beta1.Application{}
app.Status.Workflow = &common.WorkflowStatus{Suspend: true}
*o = *app
case "addon-enabled":
o := obj.(*v1beta1.Application)
app := &v1beta1.Application{}
app.Status.Phase = common.ApplicationRunning
*o = *app
case "addon-disabling":
o := obj.(*v1beta1.Application)
app := &v1beta1.Application{}
app.Status.Phase = common.ApplicationDeleting
*o = *app
case "addon-secret-enabled":
o := obj.(*corev1.Secret)
secret := &corev1.Secret{}
secret.Data = map[string][]byte{
"some-key": []byte("some-value"),
}
*o = *secret
case "addon-secret-disabling", "addon-secret-enabling":
o := obj.(*corev1.Secret)
secret := &corev1.Secret{}
secret.Data = map[string][]byte{}
*o = *secret
default:
o := obj.(*v1beta1.Application)
app := &v1beta1.Application{}
app.Status.Phase = common.ApplicationRendering
*o = *app
}
return nil
})
cli := test.MockClient{
MockGet: getFunc,
}
cases := []struct {
name string
expectStatus string
expectedParameters map[string]interface{}
}{
{
name: "disabled", expectStatus: "disabled",
},
{
name: "suspend", expectStatus: "suspend",
},
{
name: "enabled", expectStatus: "enabled",
},
{
name: "disabling", expectStatus: "disabling",
},
{
name: "enabling", expectStatus: "enabling",
},
}
for _, s := range cases {
addonStatus, err := GetAddonStatus(context.Background(), &cli, s.name)
assert.NoError(t, err)
assert.Equal(t, addonStatus.AddonPhase, s.expectStatus)
}
}
func TestGetAddonStatus4Observability(t *testing.T) {
ctx := context.Background()
addonApplication := &v1beta1.Application{
ObjectMeta: metav1.ObjectMeta{
Name: "observability",
Namespace: types.DefaultKubeVelaNS,
},
Status: common.AppStatus{
Phase: common.ApplicationRunning,
},
}
addonSecret := &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: Convert2SecName(ObservabilityAddon),
Namespace: types.DefaultKubeVelaNS,
},
Data: map[string][]byte{},
}
addonService := &corev1.Service{
ObjectMeta: metav1.ObjectMeta{
Namespace: types.DefaultKubeVelaNS,
Name: ObservabilityAddonEndpointComponent,
},
Status: corev1.ServiceStatus{
LoadBalancer: corev1.LoadBalancerStatus{
Ingress: []corev1.LoadBalancerIngress{
{
IP: "1.2.3.4",
},
},
},
},
}
clusterSecret := &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: "test-secret",
Labels: map[string]string{
clustercommon.LabelKeyClusterCredentialType: string(v1alpha12.CredentialTypeX509Certificate),
},
},
Data: map[string][]byte{
"test-key": []byte("test-value"),
},
}
scheme := runtime.NewScheme()
assert.NoError(t, v1beta1.AddToScheme(scheme))
assert.NoError(t, corev1.AddToScheme(scheme))
k8sClient := fake.NewClientBuilder().WithScheme(scheme).WithObjects(addonApplication, addonSecret).Build()
addonStatus, err := GetAddonStatus(context.Background(), k8sClient, ObservabilityAddon)
assert.NoError(t, err)
assert.Equal(t, addonStatus.AddonPhase, enabling)
// Addon is not installed in multiple clusters
k8sClient = fake.NewClientBuilder().WithScheme(scheme).WithObjects(addonApplication, addonSecret, addonService).Build()
addonStatus, err = GetAddonStatus(context.Background(), k8sClient, ObservabilityAddon)
assert.NoError(t, err)
assert.Equal(t, addonStatus.AddonPhase, enabled)
// Addon is installed in multiple clusters
assert.NoError(t, k8sClient.Create(ctx, clusterSecret))
addonStatus, err = GetAddonStatus(context.Background(), k8sClient, ObservabilityAddon)
assert.NoError(t, err)
assert.Equal(t, addonStatus.AddonPhase, enabled)
}
var baseAddon = InstallPackage{
Meta: Meta{
Name: "test-render-cue-definition-addon",
NeedNamespace: []string{"test-ns"},
},
CUEDefinitions: []ElementFile{
{
Data: testCueDef,
Name: "test-def",
},
},
}
var multiYamlAddon = InstallPackage{
Meta: Meta{
Name: "test-render-multi-yaml-addon",
},
YAMLTemplates: []ElementFile{
{
Data: testYamlObject1,
Name: "test-object-1",
},
{
Data: testYamlObject2,
Name: "test-object-2",
},
},
}
var testCueDef = `annotations: {
type: "trait"
annotations: {}
labels: {
"ui-hidden": "true"
}
description: "Add annotations on K8s pod for your workload which follows the pod spec in path 'spec.template'."
attributes: {
podDisruptive: true
appliesToWorkloads: ["*"]
}
}
template: {
patch: {
metadata: {
annotations: {
for k, v in parameter {
"\(k)": v
}
}
}
spec: template: metadata: annotations: {
for k, v in parameter {
"\(k)": v
}
}
}
parameter: [string]: string
}
`
var testYamlObject1 = `
apiVersion: apps/v1
kind: Deployment
metadata:
name: nginx-deployment
labels:
app: nginx
spec:
replicas: 3
selector:
matchLabels:
app: nginx
template:
metadata:
labels:
app: nginx
spec:
containers:
- name: nginx
image: nginx:1.14.2
ports:
- containerPort: 80
`
var testYamlObject2 = `
apiVersion: apps/v1
kind: Deployment
metadata:
name: nginx-deployment-2
labels:
app: nginx
spec:
replicas: 3
selector:
matchLabels:
app: nginx
template:
metadata:
labels:
app: nginx
spec:
containers:
- name: nginx
image: nginx:1.14.2
ports:
- containerPort: 80
`
func TestRenderApp4Observability(t *testing.T) {
k8sClient := fake.NewClientBuilder().Build()
testcases := []struct {
addon InstallPackage
args map[string]interface{}
application string
err error
}{
{
addon: InstallPackage{
Meta: Meta{
Name: "observability",
},
},
args: map[string]interface{}{},
application: `{"kind":"Application","apiVersion":"core.oam.dev/v1beta1","metadata":{"name":"addon-observability","namespace":"vela-system","creationTimestamp":null,"labels":{"addons.oam.dev/name":"observability","addons.oam.dev/version":""}},"spec":{"components":[],"policies":[{"name":"domain","type":"env-binding","properties":{"envs":null}}],"workflow":{"steps":[{"name":"deploy-control-plane","type":"apply-application"}]}},"status":{}}`,
},
}
for _, tc := range testcases {
t.Run("", func(t *testing.T) {
app, err := RenderApp(ctx, &tc.addon, k8sClient, tc.args)
assert.Equal(t, tc.err, err)
if app != nil {
data, err := json.Marshal(app)
assert.NoError(t, err)
assert.Equal(t, tc.application, string(data))
}
})
}
}
// TestRenderApp4ObservabilityWithEnvBinding tests the case of RenderApp for Addon Observability with some Kubernetes data
func TestRenderApp4ObservabilityWithK8sData(t *testing.T) {
k8sClient := fake.NewClientBuilder().Build()
ctx := context.Background()
secret1 := &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: "test-secret",
Labels: map[string]string{
clustercommon.LabelKeyClusterCredentialType: string(v1alpha12.CredentialTypeX509Certificate),
},
},
Data: map[string][]byte{
"test-key": []byte("test-value"),
},
}
err := k8sClient.Create(ctx, secret1)
assert.NoError(t, err)
testcases := []struct {
addon InstallPackage
args map[string]interface{}
application string
err error
}{
{
addon: InstallPackage{
Meta: Meta{
Name: "observability",
},
},
args: map[string]interface{}{},
application: `{"kind":"Application","apiVersion":"core.oam.dev/v1beta1","metadata":{"name":"addon-observability","namespace":"vela-system","creationTimestamp":null,"labels":{"addons.oam.dev/name":"observability","addons.oam.dev/version":""}},"spec":{"components":[],"policies":[{"name":"domain","type":"env-binding","properties":{"envs":[{"name":"test-secret","placement":{"clusterSelector":{"name":"test-secret"}}}]}}],"workflow":{"steps":[{"name":"deploy-control-plane","type":"apply-application-in-parallel"},{"name":"test-secret","type":"deploy2env","properties":{"env":"test-secret","parallel":true,"policy":"domain"}}]}},"status":{}}`,
},
}
for _, tc := range testcases {
t.Run("", func(t *testing.T) {
app, err := RenderApp(ctx, &tc.addon, k8sClient, tc.args)
assert.Equal(t, tc.err, err)
if app != nil {
data, err := json.Marshal(app)
assert.NoError(t, err)
assert.Equal(t, tc.application, string(data))
}
})
}
}
func TestGetPatternFromItem(t *testing.T) {
ossR, err := NewAsyncReader("http://ep.beijing", "some-bucket", "", "some-sub-path", "", ossType)
assert.NoError(t, err)
gitR, err := NewAsyncReader("https://github.com/oam-dev/catalog", "", "", "addons", "", gitType)
assert.NoError(t, err)
gitItemName := "parameter.cue"
gitItemType := FileType
gitItemPath := "addons/terraform/resources/parameter.cue"
testCases := []struct {
caseName string
item Item
root string
meetPattern string
r AsyncReader
}{
{
caseName: "OSS case",
item: OSSItem{
tp: FileType,
path: "terraform/resources/parameter.cue",
name: "parameter.cue",
},
root: "terraform",
meetPattern: "resources/parameter.cue",
r: ossR,
},
{
caseName: "git case",
item: &github.RepositoryContent{Name: &gitItemName, Type: &gitItemType, Path: &gitItemPath},
root: "terraform",
meetPattern: "resources/parameter.cue",
r: gitR,
},
}
for _, tc := range testCases {
res := GetPatternFromItem(tc.item, tc.r, tc.root)
assert.Equal(t, res, tc.meetPattern, tc.caseName)
}
}
func TestGitLabReaderNotPanic(t *testing.T) {
_, err := NewAsyncReader("https://gitlab.com/test/catalog", "", "", "addons", "", gitType)
assert.EqualError(t, err, "git type repository only support github for now")
}
func TestCheckSemVer(t *testing.T) {
testCases := []struct {
actual string
require string
nilError bool
res bool
}{
{
actual: "v1.2.1",
require: "<=v1.2.1",
res: true,
},
{
actual: "v1.2.1",
require: ">v1.2.1",
res: false,
},
{
actual: "v1.2.1",
require: "<=v1.2.3",
res: true,
},
{
actual: "v1.2",
require: "<=v1.2.3",
res: true,
},
{
actual: "v1.2.1",
require: ">v1.2.3",
res: false,
},
{
actual: "v1.2.1",
require: "=v1.2.1",
res: true,
},
{
actual: "1.2.1",
require: "=v1.2.1",
res: true,
},
{
actual: "1.2.1",
require: "",
res: true,
},
{
actual: "v1.2.2",
require: "<=v1.2.3, >=v1.2.1",
res: true,
},
{
actual: "v1.2.0",
require: "v1.2.0, <=v1.2.3",
res: true,
},
{
actual: "1.2.2",
require: "v1.2.2",
res: true,
},
{
actual: "1.2.02",
require: "v1.2.2",
res: true,
},
{
actual: "1.3.0-beta.1",
require: ">=v1.3.0-alpha.1",
res: true,
},
{
actual: "1.3.0-alpha.2",
require: ">=v1.3.0-alpha.1",
res: true,
},
{
actual: "1.2.3",
require: ">=v1.3.0-alpha.1",
res: false,
},
{
actual: "v1.4.0-alpha.3",
require: ">=v1.3.0-beta.2",
res: true,
},
{
actual: "v1.4.0-beta.1",
require: ">=v1.3.0",
res: true,
},
{
actual: "v1.4.0",
require: ">=v1.3.0-beta.2",
res: true,
},
{
actual: "1.2.4-beta.2",
require: ">=v1.2.4-beta.3",
res: false,
},
}
for _, testCase := range testCases {
result, err := checkSemVer(testCase.actual, testCase.require)
assert.NoError(t, err)
assert.Equal(t, result, testCase.res)
}
}
func TestCheckAddonVersionMeetRequired(t *testing.T) {
k8sClient := &test.MockClient{
MockGet: test.NewMockGetFn(nil, func(obj client.Object) error {
return nil
}),
}
ctx := context.Background()
assert.NoError(t, checkAddonVersionMeetRequired(ctx, &SystemRequirements{VelaVersion: ">=1.2.4"}, k8sClient, nil))
version2.VelaVersion = "v1.2.3"
if err := checkAddonVersionMeetRequired(ctx, &SystemRequirements{VelaVersion: ">=1.2.4"}, k8sClient, nil); err == nil {
assert.Error(t, fmt.Errorf("should meet error"))
}
version2.VelaVersion = "v1.2.4"
assert.NoError(t, checkAddonVersionMeetRequired(ctx, &SystemRequirements{VelaVersion: ">=1.2.4"}, k8sClient, nil))
}
var testUnmarshalToContent1 = `
{
"type": "file",
"encoding": "",
"size": 651,
"name": "metadata.yaml",
"path": "example/metadata.yaml",
"content": "name: example\r\nversion: 1.0.0\r\ndescription: Extended workload to do continuous and progressive delivery\r\nicon: https://raw.githubusercontent.com/fluxcd/flux/master/docs/_files/weave-flux.png\r\nurl: https://fluxcd.io\r\n\r\ntags:\r\n - extended_workload\r\n - gitops\r\n - only_example\r\n\r\ndeployTo:\r\n control_plane: true\r\n runtime_cluster: false\r\n\r\ndependencies: []\r\n#- name: addon_name\r\n\r\n# set invisible means this won't be list and will be enabled when depended on\r\n# for example, terraform-alibaba depends on terraform which is invisible,\r\n# when terraform-alibaba is enabled, terraform will be enabled automatically\r\n# default: false\r\ninvisible: false\r\n"
}`
var testUnmarshalToContent2 = `
[
{
"type": "dir",
"name": "example",
"path": "example"
},
{
"type": "dir",
"name": "local",
"path": "local"
},
{
"type": "dir",
"name": "terraform",
"path": "terraform"
},
{
"type": "dir",
"name": "terraform-alibaba",
"path": "terraform-alibaba"
},
{
"type": "dir",
"name": "test-error-addon",
"path": "test-error-addon"
}
]`
var testUnmarshalToContent3 = `
[
{
"type": "dir",
"name": "example",
},
{
"type": "dir",
"name": "local",
"path": "local"
}
]`
var testUnmarshalToContent4 = ``
func TestUnmarshalToContent(t *testing.T) {
_, _, err1 := unmarshalToContent([]byte(testUnmarshalToContent1))
assert.NoError(t, err1)
_, _, err2 := unmarshalToContent([]byte(testUnmarshalToContent2))
assert.NoError(t, err2)
_, _, err3 := unmarshalToContent([]byte(testUnmarshalToContent3))
assert.Error(t, err3, "unmarshalling failed for both file and directory content: invalid character '}' looking for beginnin")
_, _, err4 := unmarshalToContent([]byte(testUnmarshalToContent4))
assert.Error(t, err4, "unmarshalling failed for both file and directory content: unexpected end of JSON input and unexpecte")
}
// Test readResFile, only accept .cue and .yaml/.yml
func TestReadResFile(t *testing.T) {
// setup test data
testAddonName := "example"
testAddonDir := fmt.Sprintf("./testdata/%s", testAddonName)
reader := localReader{dir: testAddonDir, name: testAddonName}
metas, err := reader.ListAddonMeta()
testAddonMeta := metas[testAddonName]
assert.NoError(t, err)
// run test
var addon = &InstallPackage{}
ptItems := ClassifyItemByPattern(&testAddonMeta, reader)
items := ptItems[ResourcesDirName]
for _, it := range items {
err := readResFile(addon, reader, reader.RelativePath(it))
assert.NoError(t, err)
}
// verify
assert.True(t, len(addon.YAMLTemplates) == 1)
}
// Test readDefFile only accept .cue and .yaml/.yml
func TestReadDefFile(t *testing.T) {
// setup test data
testAddonName := "example"
testAddonDir := fmt.Sprintf("./testdata/%s", testAddonName)
reader := localReader{dir: testAddonDir, name: testAddonName}
metas, err := reader.ListAddonMeta()
testAddonMeta := metas[testAddonName]
assert.NoError(t, err)
// run test
var uiData = &UIData{}
ptItems := ClassifyItemByPattern(&testAddonMeta, reader)
items := ptItems[DefinitionsDirName]
for _, it := range items {
err := readDefFile(uiData, reader, reader.RelativePath(it))
if err != nil {
assert.Error(t, fmt.Errorf("Something wrong."))
}
}
// verify
assert.True(t, len(uiData.Definitions) == 1)
}
func TestRenderCUETemplate(t *testing.T) {
fileDate, err := os.ReadFile("./testdata/example/resources/configmap.cue")
assert.NoError(t, err)
component, err := renderCUETemplate(ElementFile{Data: string(fileDate), Name: "configmap.cue"}, "{\"example\": \"\"}", map[string]interface{}{
"example": "render",
}, Meta{
Version: "1.0.1",
})
assert.NoError(t, err)
assert.True(t, component.Type == "raw")
var config = make(map[string]interface{})
err = json.Unmarshal(component.Properties.Raw, &config)
assert.NoError(t, err)
assert.True(t, component.Type == "raw")
assert.True(t, config["metadata"].(map[string]interface{})["labels"].(map[string]interface{})["version"] == "1.0.1")
}
func TestCheckEnableAddonErrorWhenMissMatch(t *testing.T) {
version2.VelaVersion = "v1.3.0"
i := InstallPackage{Meta: Meta{SystemRequirements: &SystemRequirements{VelaVersion: ">=1.4.0"}}}
installer := &Installer{}
err := installer.enableAddon(&i)
assert.Equal(t, errors.As(err, &VersionUnMatchError{}), true)
}
func TestPackageAddon(t *testing.T) {
pwd, _ := os.Getwd()
validAddonDict := "./testdata/example"
archiver, err := PackageAddon(validAddonDict)
assert.NoError(t, err)
assert.Equal(t, filepath.Join(pwd, "example-1.0.1.tgz"), archiver)
invalidAddonDict := "./testdata"
archiver, err = PackageAddon(invalidAddonDict)
assert.NotNil(t, err)
assert.Equal(t, "", archiver)
invalidAddonMetadata := "./testdata/invalid-metadata"
archiver, err = PackageAddon(invalidAddonMetadata)
assert.NotNil(t, err)
assert.Equal(t, "", archiver)
}