Compare commits
140 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
8dba329407 | ||
|
|
4462307983 | ||
|
|
cfc59a46ef | ||
|
|
5b4e3ab2ea | ||
|
|
0e58dde591 | ||
|
|
1809d7b133 | ||
|
|
70b2a2d0b4 | ||
|
|
03b066bfd7 | ||
|
|
fe0c874815 | ||
|
|
91d4506b37 | ||
|
|
0ab0a7fee4 | ||
|
|
0b17d929a7 | ||
|
|
3fea592040 | ||
|
|
d7a9eccb13 | ||
|
|
9e3a424a36 | ||
|
|
774bbb74db | ||
|
|
e0157d9bc2 | ||
|
|
1f2da68bbb | ||
|
|
7e2f982af7 | ||
|
|
0502d76c63 | ||
|
|
591b084970 | ||
|
|
f24a8e44ca | ||
|
|
8cb8a5d95d | ||
|
|
a4834dd4f7 | ||
|
|
8b6a8fdd4b | ||
|
|
dbcef2699e | ||
|
|
22aa1df894 | ||
|
|
8f7b481934 | ||
|
|
e843b26759 | ||
|
|
713dcd8317 | ||
|
|
18313eeb5c | ||
|
|
ee6d8d1724 | ||
|
|
fcddc6e077 | ||
|
|
c4b11795e3 | ||
|
|
ffa636ce47 | ||
|
|
c38537ac32 | ||
|
|
1f7b6bb389 | ||
|
|
79532e7635 | ||
|
|
a21848484b | ||
|
|
d8ddb79ef4 | ||
|
|
231138563c | ||
|
|
88bb8085b0 | ||
|
|
21b9d32329 | ||
|
|
588c7cb9f7 | ||
|
|
16117eea2f | ||
|
|
8a9cf23ab9 | ||
|
|
3d1a2227da | ||
|
|
a826f66425 | ||
|
|
71421fbaa5 | ||
|
|
cfd8e33995 | ||
|
|
a5342d7bac | ||
|
|
6aa1d79d56 | ||
|
|
1d1117ba49 | ||
|
|
04de280821 | ||
|
|
7cfe20db1f | ||
|
|
7fc8212451 | ||
|
|
7cb7ecec90 | ||
|
|
55017eed0f | ||
|
|
b6ba856c31 | ||
|
|
8c6c6fbfa5 | ||
|
|
e071d23fef | ||
|
|
c8b4ad4c46 | ||
|
|
971e3f17cb | ||
|
|
ee3dc9ff0e | ||
|
|
7ecfe70e3e | ||
|
|
d5bd083bf5 | ||
|
|
8d8bcf78a7 | ||
|
|
222261d931 | ||
|
|
e694d93445 | ||
|
|
eaac6dd643 | ||
|
|
c569059b87 | ||
|
|
45428a2e25 | ||
|
|
7b816ea257 | ||
|
|
3c44be059e | ||
|
|
11ffdc7210 | ||
|
|
b4a13d9971 | ||
|
|
4330728215 | ||
|
|
3ae13d4b3c | ||
|
|
17724e7015 | ||
|
|
04a2c48ece | ||
|
|
997a33fc0d | ||
|
|
280c8577a4 | ||
|
|
51058470e5 | ||
|
|
7d750f097d | ||
|
|
9c91a415b0 | ||
|
|
9e8de53f8f | ||
|
|
2893e09651 | ||
|
|
69a15a8d48 | ||
|
|
27827a2940 | ||
|
|
eb2d280d59 | ||
|
|
3bf73acb42 | ||
|
|
997f49bb8d | ||
|
|
86984bcecd | ||
|
|
c4329833f8 | ||
|
|
3fa2d71559 | ||
|
|
f919966cf0 | ||
|
|
fed4de2ed9 | ||
|
|
e641102770 | ||
|
|
51db551995 | ||
|
|
2389268fa2 | ||
|
|
fe7ee09350 | ||
|
|
680989754a | ||
|
|
7cd46bb8b1 | ||
|
|
ab7abb699a | ||
|
|
8e5a32ff85 | ||
|
|
353bd76f8f | ||
|
|
1dba561a76 | ||
|
|
ae31cf66c3 | ||
|
|
3985ec8faa | ||
|
|
499ab6877f | ||
|
|
2b802df00f | ||
|
|
48b6b3f5b3 | ||
|
|
29ee0c53ab | ||
|
|
22e30fea56 | ||
|
|
9155d5eeeb | ||
|
|
75c99683b5 | ||
|
|
eb1834df49 | ||
|
|
1b2af0b3ac | ||
|
|
0f8657b1c2 | ||
|
|
edb1fb6e27 | ||
|
|
d5a59590a1 | ||
|
|
89ec9425b0 | ||
|
|
181165cc51 | ||
|
|
354dce2e12 | ||
|
|
12c8e08d6f | ||
|
|
3b78f01b45 | ||
|
|
24060c18fc | ||
|
|
232bb5eb96 | ||
|
|
c0964ae178 | ||
|
|
818c0246fa | ||
|
|
167b53691b | ||
|
|
b1899dee56 | ||
|
|
41e9e42239 | ||
|
|
6d28b7b28a | ||
|
|
34b9ec1c4c | ||
|
|
a71bba71fd | ||
|
|
f00f6a6329 | ||
|
|
1a70a626ea | ||
|
|
4f549ddf2a | ||
|
|
4cd369b051 |
1
.github/CODEOWNERS
vendored
Normal file
1
.github/CODEOWNERS
vendored
Normal file
@@ -0,0 +1 @@
|
|||||||
|
* @erincall @grinnellian @kav @josmo
|
||||||
20
.github/ISSUE_TEMPLATE/bug_report.md
vendored
Normal file
20
.github/ISSUE_TEMPLATE/bug_report.md
vendored
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
---
|
||||||
|
name: Bug report
|
||||||
|
about: Unexpected or broken behavior
|
||||||
|
title: ''
|
||||||
|
labels: bug
|
||||||
|
assignees: ''
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
**My drone-helm3 and drone versions:**
|
||||||
|
<!-- e.g. drone-helm3 0.9.0, drone 1.6.0-->
|
||||||
|
|
||||||
|
**What I tried to do:**
|
||||||
|
<!-- e.g. run a helm installation -->
|
||||||
|
|
||||||
|
**What happened:**
|
||||||
|
<!-- describe the faulty behavior -->
|
||||||
|
|
||||||
|
**More info:**
|
||||||
|
<!-- contents of .drone.yml, etc. -->
|
||||||
11
.github/ISSUE_TEMPLATE/documentation.md
vendored
Normal file
11
.github/ISSUE_TEMPLATE/documentation.md
vendored
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
---
|
||||||
|
name: Documentation
|
||||||
|
about: Docs you'd like to see, or questions about existing docs
|
||||||
|
title: ''
|
||||||
|
labels: documentation
|
||||||
|
assignees: ''
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
**What needs explanation:**
|
||||||
|
<!-- e.g. "what happens when ____", "how do I ___", etc. -->
|
||||||
14
.github/ISSUE_TEMPLATE/feature_request.md
vendored
Normal file
14
.github/ISSUE_TEMPLATE/feature_request.md
vendored
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
---
|
||||||
|
name: Feature request
|
||||||
|
about: Suggest a new feature
|
||||||
|
title: ''
|
||||||
|
labels: enhancement
|
||||||
|
assignees: ''
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
**The problem I'm trying to solve:**
|
||||||
|
<!-- describe what you'd like to be able to accomplish -->
|
||||||
|
|
||||||
|
**How I imagine it working:**
|
||||||
|
<!-- e.g. configuration that could go in .drone.yml -->
|
||||||
10
.github/pull_request_template.md
vendored
Normal file
10
.github/pull_request_template.md
vendored
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
**Please replace this line with "fixes #ISSUE_NUMBER" (or "relates to #ISSUE_NUMBER", if it is not a complete fix)**
|
||||||
|
|
||||||
|
Pre-merge checklist:
|
||||||
|
|
||||||
|
* [ ] Code changes have tests
|
||||||
|
* [ ] Any config changes are documented:
|
||||||
|
* If the change touches _required_ config, there's a corresponding update to `README.md`
|
||||||
|
* There's a corresponding update to `docs/parameter_reference.md`
|
||||||
|
* There's a pull request to update [the parameter reference in drone-plugin-index](https://github.com/drone/drone-plugin-index/blob/master/content/pelotech/drone-helm3/index.md)
|
||||||
|
* [ ] Any large changes have been verified by running a Drone job
|
||||||
7
.gitignore
vendored
7
.gitignore
vendored
@@ -4,6 +4,9 @@
|
|||||||
*.dll
|
*.dll
|
||||||
*.so
|
*.so
|
||||||
*.dylib
|
*.dylib
|
||||||
|
*.swp
|
||||||
|
|
||||||
|
.idea
|
||||||
|
|
||||||
# Test binary, built with `go test -c`
|
# Test binary, built with `go test -c`
|
||||||
*.test
|
*.test
|
||||||
@@ -13,3 +16,7 @@
|
|||||||
|
|
||||||
# Dependency directories (remove the comment below to include it)
|
# Dependency directories (remove the comment below to include it)
|
||||||
# vendor/
|
# vendor/
|
||||||
|
.env
|
||||||
|
.secrets
|
||||||
|
|
||||||
|
build/*
|
||||||
|
|||||||
76
CODE_OF_CONDUCT.md
Normal file
76
CODE_OF_CONDUCT.md
Normal file
@@ -0,0 +1,76 @@
|
|||||||
|
# Contributor Covenant Code of Conduct
|
||||||
|
|
||||||
|
## Our Pledge
|
||||||
|
|
||||||
|
In the interest of fostering an open and welcoming environment, we as
|
||||||
|
contributors and maintainers pledge to making participation in our project and
|
||||||
|
our community a harassment-free experience for everyone, regardless of age, body
|
||||||
|
size, disability, ethnicity, sex characteristics, gender identity and expression,
|
||||||
|
level of experience, education, socio-economic status, nationality, personal
|
||||||
|
appearance, race, religion, or sexual identity and orientation.
|
||||||
|
|
||||||
|
## Our Standards
|
||||||
|
|
||||||
|
Examples of behavior that contributes to creating a positive environment
|
||||||
|
include:
|
||||||
|
|
||||||
|
* Using welcoming and inclusive language
|
||||||
|
* Being respectful of differing viewpoints and experiences
|
||||||
|
* Gracefully accepting constructive criticism
|
||||||
|
* Focusing on what is best for the community
|
||||||
|
* Showing empathy towards other community members
|
||||||
|
|
||||||
|
Examples of unacceptable behavior by participants include:
|
||||||
|
|
||||||
|
* The use of sexualized language or imagery and unwelcome sexual attention or
|
||||||
|
advances
|
||||||
|
* Trolling, insulting/derogatory comments, and personal or political attacks
|
||||||
|
* Public or private harassment
|
||||||
|
* Publishing others' private information, such as a physical or electronic
|
||||||
|
address, without explicit permission
|
||||||
|
* Other conduct which could reasonably be considered inappropriate in a
|
||||||
|
professional setting
|
||||||
|
|
||||||
|
## Our Responsibilities
|
||||||
|
|
||||||
|
Project maintainers are responsible for clarifying the standards of acceptable
|
||||||
|
behavior and are expected to take appropriate and fair corrective action in
|
||||||
|
response to any instances of unacceptable behavior.
|
||||||
|
|
||||||
|
Project maintainers have the right and responsibility to remove, edit, or
|
||||||
|
reject comments, commits, code, wiki edits, issues, and other contributions
|
||||||
|
that are not aligned to this Code of Conduct, or to ban temporarily or
|
||||||
|
permanently any contributor for other behaviors that they deem inappropriate,
|
||||||
|
threatening, offensive, or harmful.
|
||||||
|
|
||||||
|
## Scope
|
||||||
|
|
||||||
|
This Code of Conduct applies both within project spaces and in public spaces
|
||||||
|
when an individual is representing the project or its community. Examples of
|
||||||
|
representing a project or community include using an official project e-mail
|
||||||
|
address, posting via an official social media account, or acting as an appointed
|
||||||
|
representative at an online or offline event. Representation of a project may be
|
||||||
|
further defined and clarified by project maintainers.
|
||||||
|
|
||||||
|
## Enforcement
|
||||||
|
|
||||||
|
Instances of abusive, harassing, or otherwise unacceptable behavior may be
|
||||||
|
reported by contacting the project team at [workwithus@pelo.tech](mailto:workwithus@pelo.tech). All
|
||||||
|
complaints will be reviewed and investigated and will result in a response that
|
||||||
|
is deemed necessary and appropriate to the circumstances. The project team is
|
||||||
|
obligated to maintain confidentiality with regard to the reporter of an incident.
|
||||||
|
Further details of specific enforcement policies may be posted separately.
|
||||||
|
|
||||||
|
Project maintainers who do not follow or enforce the Code of Conduct in good
|
||||||
|
faith may face temporary or permanent repercussions as determined by other
|
||||||
|
members of the project's leadership.
|
||||||
|
|
||||||
|
## Attribution
|
||||||
|
|
||||||
|
This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4,
|
||||||
|
available at https://www.contributor-covenant.org/version/1/4/code-of-conduct.html
|
||||||
|
|
||||||
|
[homepage]: https://www.contributor-covenant.org
|
||||||
|
|
||||||
|
For answers to common questions about this code of conduct, see
|
||||||
|
https://www.contributor-covenant.org/faq
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
FROM alpine/helm
|
FROM alpine/helm:3.2.4
|
||||||
MAINTAINER Erin Call <erin@liffft.com>
|
MAINTAINER Erin Call <erin@liffft.com>
|
||||||
|
|
||||||
COPY build/drone-helm /bin/drone-helm
|
COPY build/drone-helm /bin/drone-helm
|
||||||
|
|||||||
202
LICENSE
Normal file
202
LICENSE
Normal file
@@ -0,0 +1,202 @@
|
|||||||
|
|
||||||
|
Apache License
|
||||||
|
Version 2.0, January 2004
|
||||||
|
http://www.apache.org/licenses/
|
||||||
|
|
||||||
|
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
||||||
|
|
||||||
|
1. Definitions.
|
||||||
|
|
||||||
|
"License" shall mean the terms and conditions for use, reproduction,
|
||||||
|
and distribution as defined by Sections 1 through 9 of this document.
|
||||||
|
|
||||||
|
"Licensor" shall mean the copyright owner or entity authorized by
|
||||||
|
the copyright owner that is granting the License.
|
||||||
|
|
||||||
|
"Legal Entity" shall mean the union of the acting entity and all
|
||||||
|
other entities that control, are controlled by, or are under common
|
||||||
|
control with that entity. For the purposes of this definition,
|
||||||
|
"control" means (i) the power, direct or indirect, to cause the
|
||||||
|
direction or management of such entity, whether by contract or
|
||||||
|
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
||||||
|
outstanding shares, or (iii) beneficial ownership of such entity.
|
||||||
|
|
||||||
|
"You" (or "Your") shall mean an individual or Legal Entity
|
||||||
|
exercising permissions granted by this License.
|
||||||
|
|
||||||
|
"Source" form shall mean the preferred form for making modifications,
|
||||||
|
including but not limited to software source code, documentation
|
||||||
|
source, and configuration files.
|
||||||
|
|
||||||
|
"Object" form shall mean any form resulting from mechanical
|
||||||
|
transformation or translation of a Source form, including but
|
||||||
|
not limited to compiled object code, generated documentation,
|
||||||
|
and conversions to other media types.
|
||||||
|
|
||||||
|
"Work" shall mean the work of authorship, whether in Source or
|
||||||
|
Object form, made available under the License, as indicated by a
|
||||||
|
copyright notice that is included in or attached to the work
|
||||||
|
(an example is provided in the Appendix below).
|
||||||
|
|
||||||
|
"Derivative Works" shall mean any work, whether in Source or Object
|
||||||
|
form, that is based on (or derived from) the Work and for which the
|
||||||
|
editorial revisions, annotations, elaborations, or other modifications
|
||||||
|
represent, as a whole, an original work of authorship. For the purposes
|
||||||
|
of this License, Derivative Works shall not include works that remain
|
||||||
|
separable from, or merely link (or bind by name) to the interfaces of,
|
||||||
|
the Work and Derivative Works thereof.
|
||||||
|
|
||||||
|
"Contribution" shall mean any work of authorship, including
|
||||||
|
the original version of the Work and any modifications or additions
|
||||||
|
to that Work or Derivative Works thereof, that is intentionally
|
||||||
|
submitted to Licensor for inclusion in the Work by the copyright owner
|
||||||
|
or by an individual or Legal Entity authorized to submit on behalf of
|
||||||
|
the copyright owner. For the purposes of this definition, "submitted"
|
||||||
|
means any form of electronic, verbal, or written communication sent
|
||||||
|
to the Licensor or its representatives, including but not limited to
|
||||||
|
communication on electronic mailing lists, source code control systems,
|
||||||
|
and issue tracking systems that are managed by, or on behalf of, the
|
||||||
|
Licensor for the purpose of discussing and improving the Work, but
|
||||||
|
excluding communication that is conspicuously marked or otherwise
|
||||||
|
designated in writing by the copyright owner as "Not a Contribution."
|
||||||
|
|
||||||
|
"Contributor" shall mean Licensor and any individual or Legal Entity
|
||||||
|
on behalf of whom a Contribution has been received by Licensor and
|
||||||
|
subsequently incorporated within the Work.
|
||||||
|
|
||||||
|
2. Grant of Copyright License. Subject to the terms and conditions of
|
||||||
|
this License, each Contributor hereby grants to You a perpetual,
|
||||||
|
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||||
|
copyright license to reproduce, prepare Derivative Works of,
|
||||||
|
publicly display, publicly perform, sublicense, and distribute the
|
||||||
|
Work and such Derivative Works in Source or Object form.
|
||||||
|
|
||||||
|
3. Grant of Patent License. Subject to the terms and conditions of
|
||||||
|
this License, each Contributor hereby grants to You a perpetual,
|
||||||
|
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||||
|
(except as stated in this section) patent license to make, have made,
|
||||||
|
use, offer to sell, sell, import, and otherwise transfer the Work,
|
||||||
|
where such license applies only to those patent claims licensable
|
||||||
|
by such Contributor that are necessarily infringed by their
|
||||||
|
Contribution(s) alone or by combination of their Contribution(s)
|
||||||
|
with the Work to which such Contribution(s) was submitted. If You
|
||||||
|
institute patent litigation against any entity (including a
|
||||||
|
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
||||||
|
or a Contribution incorporated within the Work constitutes direct
|
||||||
|
or contributory patent infringement, then any patent licenses
|
||||||
|
granted to You under this License for that Work shall terminate
|
||||||
|
as of the date such litigation is filed.
|
||||||
|
|
||||||
|
4. Redistribution. You may reproduce and distribute copies of the
|
||||||
|
Work or Derivative Works thereof in any medium, with or without
|
||||||
|
modifications, and in Source or Object form, provided that You
|
||||||
|
meet the following conditions:
|
||||||
|
|
||||||
|
(a) You must give any other recipients of the Work or
|
||||||
|
Derivative Works a copy of this License; and
|
||||||
|
|
||||||
|
(b) You must cause any modified files to carry prominent notices
|
||||||
|
stating that You changed the files; and
|
||||||
|
|
||||||
|
(c) You must retain, in the Source form of any Derivative Works
|
||||||
|
that You distribute, all copyright, patent, trademark, and
|
||||||
|
attribution notices from the Source form of the Work,
|
||||||
|
excluding those notices that do not pertain to any part of
|
||||||
|
the Derivative Works; and
|
||||||
|
|
||||||
|
(d) If the Work includes a "NOTICE" text file as part of its
|
||||||
|
distribution, then any Derivative Works that You distribute must
|
||||||
|
include a readable copy of the attribution notices contained
|
||||||
|
within such NOTICE file, excluding those notices that do not
|
||||||
|
pertain to any part of the Derivative Works, in at least one
|
||||||
|
of the following places: within a NOTICE text file distributed
|
||||||
|
as part of the Derivative Works; within the Source form or
|
||||||
|
documentation, if provided along with the Derivative Works; or,
|
||||||
|
within a display generated by the Derivative Works, if and
|
||||||
|
wherever such third-party notices normally appear. The contents
|
||||||
|
of the NOTICE file are for informational purposes only and
|
||||||
|
do not modify the License. You may add Your own attribution
|
||||||
|
notices within Derivative Works that You distribute, alongside
|
||||||
|
or as an addendum to the NOTICE text from the Work, provided
|
||||||
|
that such additional attribution notices cannot be construed
|
||||||
|
as modifying the License.
|
||||||
|
|
||||||
|
You may add Your own copyright statement to Your modifications and
|
||||||
|
may provide additional or different license terms and conditions
|
||||||
|
for use, reproduction, or distribution of Your modifications, or
|
||||||
|
for any such Derivative Works as a whole, provided Your use,
|
||||||
|
reproduction, and distribution of the Work otherwise complies with
|
||||||
|
the conditions stated in this License.
|
||||||
|
|
||||||
|
5. Submission of Contributions. Unless You explicitly state otherwise,
|
||||||
|
any Contribution intentionally submitted for inclusion in the Work
|
||||||
|
by You to the Licensor shall be under the terms and conditions of
|
||||||
|
this License, without any additional terms or conditions.
|
||||||
|
Notwithstanding the above, nothing herein shall supersede or modify
|
||||||
|
the terms of any separate license agreement you may have executed
|
||||||
|
with Licensor regarding such Contributions.
|
||||||
|
|
||||||
|
6. Trademarks. This License does not grant permission to use the trade
|
||||||
|
names, trademarks, service marks, or product names of the Licensor,
|
||||||
|
except as required for reasonable and customary use in describing the
|
||||||
|
origin of the Work and reproducing the content of the NOTICE file.
|
||||||
|
|
||||||
|
7. Disclaimer of Warranty. Unless required by applicable law or
|
||||||
|
agreed to in writing, Licensor provides the Work (and each
|
||||||
|
Contributor provides its Contributions) on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
||||||
|
implied, including, without limitation, any warranties or conditions
|
||||||
|
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
||||||
|
PARTICULAR PURPOSE. You are solely responsible for determining the
|
||||||
|
appropriateness of using or redistributing the Work and assume any
|
||||||
|
risks associated with Your exercise of permissions under this License.
|
||||||
|
|
||||||
|
8. Limitation of Liability. In no event and under no legal theory,
|
||||||
|
whether in tort (including negligence), contract, or otherwise,
|
||||||
|
unless required by applicable law (such as deliberate and grossly
|
||||||
|
negligent acts) or agreed to in writing, shall any Contributor be
|
||||||
|
liable to You for damages, including any direct, indirect, special,
|
||||||
|
incidental, or consequential damages of any character arising as a
|
||||||
|
result of this License or out of the use or inability to use the
|
||||||
|
Work (including but not limited to damages for loss of goodwill,
|
||||||
|
work stoppage, computer failure or malfunction, or any and all
|
||||||
|
other commercial damages or losses), even if such Contributor
|
||||||
|
has been advised of the possibility of such damages.
|
||||||
|
|
||||||
|
9. Accepting Warranty or Additional Liability. While redistributing
|
||||||
|
the Work or Derivative Works thereof, You may choose to offer,
|
||||||
|
and charge a fee for, acceptance of support, warranty, indemnity,
|
||||||
|
or other liability obligations and/or rights consistent with this
|
||||||
|
License. However, in accepting such obligations, You may act only
|
||||||
|
on Your own behalf and on Your sole responsibility, not on behalf
|
||||||
|
of any other Contributor, and only if You agree to indemnify,
|
||||||
|
defend, and hold each Contributor harmless for any liability
|
||||||
|
incurred by, or claims asserted against, such Contributor by reason
|
||||||
|
of your accepting any such warranty or additional liability.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
APPENDIX: How to apply the Apache License to your work.
|
||||||
|
|
||||||
|
To apply the Apache License to your work, attach the following
|
||||||
|
boilerplate notice, with the fields enclosed by brackets "[]"
|
||||||
|
replaced with your own identifying information. (Don't include
|
||||||
|
the brackets!) The text should be enclosed in the appropriate
|
||||||
|
comment syntax for the file format. We also recommend that a
|
||||||
|
file or class name and description of purpose be included on the
|
||||||
|
same "printed page" as the copyright notice for easier
|
||||||
|
identification within third-party archives.
|
||||||
|
|
||||||
|
Copyright [yyyy] [name of copyright owner]
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
46
README.md
46
README.md
@@ -1,12 +1,16 @@
|
|||||||
# Drone plugin for Helm 3
|
# Drone plugin for Helm 3
|
||||||
|
|
||||||
|
[](https://cloud.drone.io/pelotech/drone-helm3)
|
||||||
|
[](https://goreportcard.com/report/github.com/pelotech/drone-helm3)
|
||||||
|
[](https://microbadger.com/images/pelotech/drone-helm3 "Get your own image badge on microbadger.com")
|
||||||
|
|
||||||
This plugin provides an interface between [Drone](https://drone.io/) and [Helm 3](https://github.com/kubernetes/helm):
|
This plugin provides an interface between [Drone](https://drone.io/) and [Helm 3](https://github.com/kubernetes/helm):
|
||||||
|
|
||||||
* Lint your charts
|
* Lint your charts
|
||||||
* Deploy your service
|
* Deploy your service
|
||||||
* Delete your service
|
* Delete your service
|
||||||
|
|
||||||
The plugin is inpsired by [drone-helm](https://github.com/ipedrazas/drone-helm), which fills the same role for Helm 2. It provides a comparable feature-set and the configuration settings are backwards-compatible.
|
The plugin is inpsired by [drone-helm](https://github.com/ipedrazas/drone-helm), which fills the same role for Helm 2. It provides a comparable feature-set and the configuration settings are backward-compatible.
|
||||||
|
|
||||||
## Example configuration
|
## Example configuration
|
||||||
|
|
||||||
@@ -19,7 +23,7 @@ steps:
|
|||||||
- name: lint
|
- name: lint
|
||||||
image: pelotech/drone-helm3
|
image: pelotech/drone-helm3
|
||||||
settings:
|
settings:
|
||||||
helm_command: lint
|
mode: lint
|
||||||
chart: ./
|
chart: ./
|
||||||
```
|
```
|
||||||
|
|
||||||
@@ -30,12 +34,12 @@ steps:
|
|||||||
- name: deploy
|
- name: deploy
|
||||||
image: pelotech/drone-helm3
|
image: pelotech/drone-helm3
|
||||||
settings:
|
settings:
|
||||||
helm_command: upgrade
|
mode: upgrade
|
||||||
chart: ./
|
chart: ./
|
||||||
release: my-project
|
release: my-project
|
||||||
environment:
|
environment:
|
||||||
API_SERVER: https://my.kubernetes.installation/clusters/a-1234
|
KUBE_API_SERVER: https://my.kubernetes.installation/clusters/a-1234
|
||||||
KUBERNETES_TOKEN:
|
KUBE_TOKEN:
|
||||||
from_secret: kubernetes_token
|
from_secret: kubernetes_token
|
||||||
```
|
```
|
||||||
|
|
||||||
@@ -46,20 +50,23 @@ steps:
|
|||||||
- name: uninstall
|
- name: uninstall
|
||||||
image: pelotech/drone-helm3
|
image: pelotech/drone-helm3
|
||||||
settings:
|
settings:
|
||||||
helm_command: uninstall
|
mode: uninstall
|
||||||
release: my-project
|
release: my-project
|
||||||
environment:
|
environment:
|
||||||
API_SERVER: https://my.kubernetes.installation/clusters/a-1234
|
KUBE_API_SERVER: https://my.kubernetes.installation/clusters/a-1234
|
||||||
KUBERNETES_TOKEN:
|
KUBE_TOKEN:
|
||||||
from_secret: kubernetes_token
|
from_secret: kubernetes_token
|
||||||
```
|
```
|
||||||
|
|
||||||
## Upgrading from drone-helm
|
## Upgrading from drone-helm
|
||||||
|
|
||||||
drone-helm3 is largely backwards-compatible with drone-helm. There are some known differences:
|
drone-helm3 is largely backward-compatible with drone-helm. There are some known differences:
|
||||||
|
|
||||||
* `prefix` must be supplied via the `settings` block, not `environment`.
|
* You'll need to migrate the deployments in the cluster [helm-v2-to-helm-v3](https://helm.sh/blog/migrate-from-helm-v2-to-helm-v3/).
|
||||||
* Several settings no longer have any effect:
|
* EKS is not supported. See [#5](https://github.com/pelotech/drone-helm3/issues/5) for more information.
|
||||||
|
* The `prefix` setting is no longer supported. If you were relying on the `prefix` setting with `secrets: [...]`, you'll need to switch to the `from_secret` syntax.
|
||||||
|
* During uninstallations, the release history is purged by default. Use `keep_history: true` to return to the old behavior.
|
||||||
|
* Several settings no longer have any effect. The plugin will produce warnings if any of these are present:
|
||||||
* `purge` -- this is the default behavior in Helm 3
|
* `purge` -- this is the default behavior in Helm 3
|
||||||
* `recreate_pods`
|
* `recreate_pods`
|
||||||
* `tiller_ns`
|
* `tiller_ns`
|
||||||
@@ -67,5 +74,22 @@ drone-helm3 is largely backwards-compatible with drone-helm. There are some know
|
|||||||
* `canary_image`
|
* `canary_image`
|
||||||
* `client_only`
|
* `client_only`
|
||||||
* `stable_repo_url`
|
* `stable_repo_url`
|
||||||
|
* Several settings have been renamed, to clarify their purpose and provide a more consistent naming scheme. For backward-compatibility, the old names are still available as aliases. If the old and new names are both present, the updated form takes priority. Conflicting settings will make your `.drone.yml` harder to understand, so we recommend updating to the new names:
|
||||||
|
* `helm_command` is now `mode`
|
||||||
|
° `helm_repos` is now `add_repos`
|
||||||
|
* `api_server` is now `kube_api_server`
|
||||||
|
* `service_account` is now `kube_service_account`
|
||||||
|
* `kubernetes_token` is now `kube_token`
|
||||||
|
* `kubernetes_certificate` is now `kube_certificate`
|
||||||
|
* `wait` is now `wait_for_upgrade`
|
||||||
|
* `force` is now `force_upgrade`
|
||||||
|
|
||||||
Since helm 3 does not require Tiller, we also recommend switching to a service account with less-expansive permissions.
|
Since helm 3 does not require Tiller, we also recommend switching to a service account with less-expansive permissions.
|
||||||
|
|
||||||
|
### [Contributing](docs/contributing.md)
|
||||||
|
|
||||||
|
This repo is setup in a way that if you enable a personal drone server to build your fork it will
|
||||||
|
build and publish your image (makes it easier to test PRs and use the image till the contributions get merged)
|
||||||
|
|
||||||
|
* Build local ```DRONE_REPO_OWNER=josmo DRONE_REPO_NAME=drone-ecs drone exec```
|
||||||
|
* on your server (or cloud.drone.io) just make sure you have DOCKER_USERNAME, DOCKER_PASSWORD, and PLUGIN_REPO set as secrets
|
||||||
|
|||||||
@@ -24,16 +24,4 @@ users:
|
|||||||
user:
|
user:
|
||||||
{{- if .Token }}
|
{{- if .Token }}
|
||||||
token: {{ .Token }}
|
token: {{ .Token }}
|
||||||
{{- else if .EKSCluster }}
|
|
||||||
exec:
|
|
||||||
apiVersion: client.authentication.k8s.io/v1alpha1
|
|
||||||
command: aws-iam-authenticator
|
|
||||||
args:
|
|
||||||
- "token"
|
|
||||||
- "-i"
|
|
||||||
- "{{ .EKSCluster }}"
|
|
||||||
{{- if .EKSRoleARN }}
|
|
||||||
- "-r"
|
|
||||||
- "{{ .EKSRoleARN }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|||||||
@@ -4,11 +4,13 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
|
|
||||||
|
_ "github.com/joho/godotenv/autoload"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
"github.com/pelotech/drone-helm3/internal/helm"
|
"github.com/pelotech/drone-helm3/internal/helm"
|
||||||
)
|
)
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
cfg, err := helm.NewConfig(os.Stdout, os.Stderr)
|
cfg, err := env.NewConfig(os.Stdout, os.Stderr)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, "%s\n", err.Error())
|
fmt.Fprintf(os.Stderr, "%s\n", err.Error())
|
||||||
@@ -27,7 +29,7 @@ func main() {
|
|||||||
|
|
||||||
// Expect the plan to go off the rails
|
// Expect the plan to go off the rails
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Fprintf(os.Stderr, err.Error())
|
fmt.Fprintf(os.Stderr, "%s\n", err.Error())
|
||||||
// Throw away the plan
|
// Throw away the plan
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
|
|||||||
48
docs/contributing.md
Normal file
48
docs/contributing.md
Normal file
@@ -0,0 +1,48 @@
|
|||||||
|
# Contributing to drone-helm3
|
||||||
|
|
||||||
|
We're glad you're interested in contributing! Here are some guidelines that will help make sure everyone has a good experience:
|
||||||
|
|
||||||
|
## Submitting a patch
|
||||||
|
|
||||||
|
Before you start working on a change, please make sure there's an associated issue. It doesn't need to be thoroughly scrutinized and dissected, but it needs to exist.
|
||||||
|
|
||||||
|
Please put the relevant issue number in the first line of your commit messages, e.g. `vorpalize the frabjulator [#42]`. Branch names do not need issue numbers, but feel free to include them if you like.
|
||||||
|
|
||||||
|
We encourage you to follow [the guidelines in Pro Git](https://git-scm.com/book/en/v2/Distributed-Git-Contributing-to-a-Project#_commit_guidelines) when making commits. In short:
|
||||||
|
|
||||||
|
* Commit early and commit often.
|
||||||
|
* Make the first line of the commit message concise--no more than 50 characters or so.
|
||||||
|
* Make the rest of the commit message verbose--information about _why_ you did what you did is particularly helpful.
|
||||||
|
|
||||||
|
Once you're satisfied with your work, send us a pull request. If you'd like, you can send the pull request _before_ you're satisfied with your work; just be sure to mark the PR a draft or put `[WIP]` in the title.
|
||||||
|
|
||||||
|
## How to run the tests
|
||||||
|
|
||||||
|
We use `go test`, `go vet`, and `golint`:
|
||||||
|
|
||||||
|
```
|
||||||
|
go test ./cmd/... ./internal/...
|
||||||
|
go vet ./cmd/... ./internal/...
|
||||||
|
golint -set_exit_status ./cmd/... ./internal/...
|
||||||
|
```
|
||||||
|
|
||||||
|
If you have [the Drone cli tool](https://docs.drone.io/cli/install/) installed, you can also use `drone exec --include test --include lint`.
|
||||||
|
|
||||||
|
## Testing the plugin end-to-end
|
||||||
|
|
||||||
|
Although we aim to make the internal tests as thorough as possible, they can't test drone-helm3's integration with drone and helm themselves. However, you can test a change manually by building an image and running it with a fixture repository.
|
||||||
|
|
||||||
|
You will need:
|
||||||
|
|
||||||
|
* Access to a docker image registry. This document assumes you'll use [Docker Hub](https://hub.docker.com).
|
||||||
|
* [The Drone cli tool](https://docs.drone.io/cli/install/).
|
||||||
|
* A fixture repository--a directory with a `.drone.yml` and a helm chart. If you don't have one handy, try adding a `.drone.yml` to a chart from [Helm's "stable" repository](https://github.com/helm/charts/tree/master/stable/).
|
||||||
|
* Access to a kubernetes cluster (unless `lint` or `dry_run` is sufficient for your purposes).
|
||||||
|
|
||||||
|
Once you have what you need, you can publish and consume an image with your changes:
|
||||||
|
|
||||||
|
1. [Create a repository on Docker Hub](https://hub.docker.com/repository/create). This document assumes you've called it drone-helm3-testing.
|
||||||
|
1. Create a `.secrets` file with your docker credentials (see [example.secrets](./example.secrets) for an example). While you can use your Docker Hub password, it's better to [generate an access token](https://hub.docker.com/settings/security) and use that instead.
|
||||||
|
1. Use Drone to build and publish an image with your changes: `drone exec --secret-file ./secrets --event push`
|
||||||
|
1. In the `.drone.yml` of your fixture repository, set the `image` for each relevant stanza to `your_dockerhub_username/drone-helm3-testing`
|
||||||
|
1. Use `drone exec` in the fixture repo to verify your changes.
|
||||||
3
docs/example.secrets
Normal file
3
docs/example.secrets
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
DOCKER_PASSWORD=your_access_token
|
||||||
|
DOCKER_USERNAME=your_dockerhub_username
|
||||||
|
PLUGIN_REPO=your_dockerhub_username/drone-helm3-testing
|
||||||
@@ -1,18 +1,19 @@
|
|||||||
# Parameter reference
|
# Parameter reference
|
||||||
|
|
||||||
## Global
|
## Global
|
||||||
| Param name | Type | Purpose |
|
| Param name | Type | Alias | Purpose |
|
||||||
|---------------------|-----------------|---------|
|
|---------------------|-----------------|--------------|---------|
|
||||||
| helm_command | string | Indicates the operation to perform. Recommended, but not required. Valid options are `upgrade`, `uninstall`, `lint`, and `help`. |
|
| mode | string | helm_command | Indicates the operation to perform. Recommended, but not required. Valid options are `upgrade`, `uninstall`, `lint`, and `help`. |
|
||||||
| update_dependencies | boolean | Calls `helm dependency update` before running the main command. **Not currently implemented**; see [#25](https://github.com/pelotech/drone-helm3/issues/25).|
|
| update_dependencies | boolean | | Calls `helm dependency update` before running the main command.|
|
||||||
| helm_repos | list\<string\> | Calls `helm repo add $repo` before running the main command. Each string should be formatted as `repo_name=https://repo.url/`. **Not currently implemented**; see [#26](https://github.com/pelotech/drone-helm3/issues/26). |
|
| add_repos | list\<string\> | helm_repos | Calls `helm repo add $repo` before running the main command. Each string should be formatted as `repo_name=https://repo.url/`. |
|
||||||
| namespace | string | Kubernetes namespace to use for this operation. |
|
| repo_certificate | string | | Base64 encoded TLS certificate for a chart repository. |
|
||||||
| prefix | string | Expect environment variables to be prefixed with the given string. For more details, see "Using the prefix setting" below. **Not currently implemented**; see [#19](https://github.com/pelotech/drone-helm3/issues/19). |
|
| repo_ca_certificate | string | | Base64 encoded TLS certificate for a chart repository certificate authority. |
|
||||||
| debug | boolean | Generate debug output within drone-helm3 and pass `--debug` to all helm commands. Use with care, since the debug output may include secrets. |
|
| namespace | string | | Kubernetes namespace to use for this operation. |
|
||||||
|
| debug | boolean | | Generate debug output within drone-helm3 and pass `--debug` to all helm commands. Use with care, since the debug output may include secrets. |
|
||||||
|
|
||||||
## Linting
|
## Linting
|
||||||
|
|
||||||
Linting is only triggered when the `helm_command` setting is "lint".
|
Linting is only triggered when the `mode` setting is "lint".
|
||||||
|
|
||||||
| Param name | Type | Required | Purpose |
|
| Param name | Type | Required | Purpose |
|
||||||
|---------------|----------------|----------|---------|
|
|---------------|----------------|----------|---------|
|
||||||
@@ -20,53 +21,65 @@ Linting is only triggered when the `helm_command` setting is "lint".
|
|||||||
| values | list\<string\> | | Chart values to use as the `--set` argument to `helm lint`. |
|
| values | list\<string\> | | Chart values to use as the `--set` argument to `helm lint`. |
|
||||||
| string_values | list\<string\> | | Chart values to use as the `--set-string` argument to `helm lint`. |
|
| string_values | list\<string\> | | Chart values to use as the `--set-string` argument to `helm lint`. |
|
||||||
| values_files | list\<string\> | | Values to use as `--values` arguments to `helm lint`. |
|
| values_files | list\<string\> | | Values to use as `--values` arguments to `helm lint`. |
|
||||||
|
| lint_strictly | boolean | | Pass `--strict` to `helm lint`, to turn warnings into errors. |
|
||||||
|
|
||||||
## Installation
|
## Installation
|
||||||
|
|
||||||
Installations are triggered when the `helm_command` setting is "upgrade." They can also be triggered when the build was triggered by a `push`, `tag`, `deployment`, `pull_request`, `promote`, or `rollback` Drone event.
|
Installations are triggered when the `mode` setting is "upgrade." They can also be triggered when the build was triggered by a `push`, `tag`, `deployment`, `pull_request`, `promote`, or `rollback` Drone event.
|
||||||
|
|
||||||
| Param name | Type | Required | Purpose |
|
| Param name | Type | Required | Alias | Purpose |
|
||||||
|------------------------|----------------|----------|---------|
|
|------------------------|----------------|----------|------------------------|---------|
|
||||||
| chart | string | yes | The chart to use for this installation. |
|
| chart | string | yes | | The chart to use for this installation. |
|
||||||
| release | string | yes | The release name for helm to use. |
|
| release | string | yes | | The release name for helm to use. |
|
||||||
| api_server | string | yes | API endpoint for the Kubernetes cluster. |
|
| skip_kubeconfig | boolean | | | Whether to skip kubeconfig file creation. |
|
||||||
| kubernetes_token | string | yes | Token for authenticating to Kubernetes. |
|
| kube_api_server | string | yes | api_server | API endpoint for the Kubernetes cluster. This is ignored if `skip_kubeconfig` is `true`. |
|
||||||
| service_account | string | | Service account for authenticating to Kubernetes. Default is `helm`. |
|
| kube_token | string | yes | kubernetes_token | Token for authenticating to Kubernetes. This is ignored if `skip_kubeconfig` is `true`. |
|
||||||
| kubernetes_certificate | string | | Base64 encoded TLS certificate used by the Kubernetes cluster's certificate authority. |
|
| kube_service_account | string | | service_account | Service account for authenticating to Kubernetes. Default is `helm`. This is ignored if `skip_kubeconfig` is `true`. |
|
||||||
| chart_version | string | | Specific chart version to install. |
|
| kube_certificate | string | | kubernetes_certificate | Base64 encoded TLS certificate used by the Kubernetes cluster's certificate authority. This is ignored if `skip_kubeconfig` is `true`. |
|
||||||
| dry_run | boolean | | Pass `--dry-run` to `helm upgrade`. |
|
| chart_version | string | | | Specific chart version to install. |
|
||||||
| wait | boolean | | Wait until kubernetes resources are in a ready state before marking the installation successful. |
|
| dry_run | boolean | | | Pass `--dry-run` to `helm upgrade`. |
|
||||||
| timeout | duration | | Timeout for any *individual* Kubernetes operation. The installation's full runtime may exceed this duration. |
|
| dependencies_action | string | | | Calls `helm dependency build` OR `helm dependency update` before running the main command. Possible values: `build`, `update`. |
|
||||||
| force | boolean | | Pass `--force` to `helm upgrade`. |
|
| wait_for_upgrade | boolean | | wait | Wait until kubernetes resources are in a ready state before marking the installation successful. |
|
||||||
| values | list\<string\> | | Chart values to use as the `--set` argument to `helm upgrade`. |
|
| timeout | duration | | | Timeout for any *individual* Kubernetes operation. The installation's full runtime may exceed this duration. |
|
||||||
| string_values | list\<string\> | | Chart values to use as the `--set-string` argument to `helm upgrade`. |
|
| force_upgrade | boolean | | force | Pass `--force` to `helm upgrade`. |
|
||||||
| values_files | list\<string\> | | Values to use as `--values` arguments to `helm upgrade`. |
|
| atomic_upgrade | boolean | | | Pass `--atomic` to `helm upgrade`. |
|
||||||
| reuse_values | boolean | | Reuse the values from a previous release. |
|
| cleanup_failed_upgrade | boolean | | | Pass `--cleanup-on-fail` to `helm upgrade`. |
|
||||||
| skip_tls_verify | boolean | | Connect to the Kubernetes cluster without checking for a valid TLS certificate. Not recommended in production. |
|
| values | list\<string\> | | | Chart values to use as the `--set` argument to `helm upgrade`. |
|
||||||
|
| string_values | list\<string\> | | | Chart values to use as the `--set-string` argument to `helm upgrade`. |
|
||||||
|
| values_files | list\<string\> | | | Values to use as `--values` arguments to `helm upgrade`. |
|
||||||
|
| reuse_values | boolean | | | Reuse the values from a previous release. |
|
||||||
|
| skip_tls_verify | boolean | | | Connect to the Kubernetes cluster without checking for a valid TLS certificate. Not recommended in production. This is ignored if `skip_kubeconfig` is `true`. |
|
||||||
|
| create_namespace | boolean | | | Pass --create-namespace to `helm upgrade`. |
|
||||||
|
|
||||||
## Uninstallation
|
## Uninstallation
|
||||||
|
|
||||||
Uninstallations are triggered when the `helm_command` setting is "uninstall" or "delete." They can also be triggered when the build was triggered by a `delete` Drone event.
|
Uninstallations are triggered when the `mode` setting is "uninstall" or "delete." They can also be triggered when the build was triggered by a `delete` Drone event.
|
||||||
|
|
||||||
| Param name | Type | Required | Purpose |
|
| Param name | Type | Required | Alias | Purpose |
|
||||||
|------------------------|----------|----------|---------|
|
|------------------------|----------|----------|------------------------|---------|
|
||||||
| release | string | yes | The release name for helm to use. |
|
| release | string | yes | | The release name for helm to use. |
|
||||||
| api_server | string | yes | API endpoint for the Kubernetes cluster. |
|
| skip_kubeconfig | boolean | | | Whether to skip kubeconfig file creation. |
|
||||||
| kubernetes_token | string | yes | Token for authenticating to Kubernetes. |
|
| kube_api_server | string | yes | api_server | API endpoint for the Kubernetes cluster. This is ignored if `skip_kubeconfig` is `true`. |
|
||||||
| service_account | string | | Service account for authenticating to Kubernetes. Default is `helm`. |
|
| kube_token | string | yes | kubernetes_token | Token for authenticating to Kubernetes. This is ignored if `skip_kubeconfig` is `true`. |
|
||||||
| kubernetes_certificate | string | | Base64 encoded TLS certificate used by the Kubernetes cluster's certificate authority. |
|
| kube_service_account | string | | service_account | Service account for authenticating to Kubernetes. Default is `helm`. This is ignored if `skip_kubeconfig` is `true`. |
|
||||||
| dry_run | boolean | | Pass `--dry-run` to `helm uninstall`. |
|
| kube_certificate | string | | kubernetes_certificate | Base64 encoded TLS certificate used by the Kubernetes cluster's certificate authority. This is ignored if `skip_kubeconfig` is `true`. |
|
||||||
| timeout | duration | | Timeout for any *individual* Kubernetes operation. The uninstallation's full runtime may exceed this duration. |
|
| keep_history | boolean | | | Pass `--keep-history` to `helm uninstall`, to retain the release history. |
|
||||||
| skip_tls_verify | boolean | | Connect to the Kubernetes cluster without checking for a valid TLS certificate. Not recommended in production. |
|
| dry_run | boolean | | | Pass `--dry-run` to `helm uninstall`. |
|
||||||
|
| timeout | duration | | | Timeout for any *individual* Kubernetes operation. The uninstallation's full runtime may exceed this duration. |
|
||||||
|
| skip_tls_verify | boolean | | | Connect to the Kubernetes cluster without checking for a valid TLS certificate. Not recommended in production. This is ignored if `skip_kubeconfig` is `true`. |
|
||||||
|
| chart | string | | | Required when the global `update_dependencies` parameter is true. No effect otherwise. |
|
||||||
|
|
||||||
### Where to put settings
|
### Where to put settings
|
||||||
|
|
||||||
Any setting (with the exception of `prefix`; [see below](#user-content-using-the-prefix-setting)), can go in either the `settings` or `environment` section.
|
Any setting can go in either the `settings` or `environment` section. If a setting exists in _both_ sections, the version in `environment` will override the version in `settings`.
|
||||||
|
|
||||||
|
We recommend putting all drone-helm3 configuration in the `settings` block and limiting the `environment` block to variables that are used when building your charts.
|
||||||
|
|
||||||
### Formatting non-string values
|
### Formatting non-string values
|
||||||
|
|
||||||
* Booleans can be yaml's `true` and `false` literals or the strings `"true"` and `"false"`.
|
* Booleans can be yaml's `true` and `false` literals or the strings `"true"` and `"false"`.
|
||||||
* Durations are strings formatted with the syntax accepted by [golang's ParseDuration function](https://golang.org/pkg/time/#ParseDuration) (e.g. 5m30s)
|
* Durations are strings formatted with the syntax accepted by [golang's ParseDuration function](https://golang.org/pkg/time/#ParseDuration) (e.g. 5m30s)
|
||||||
|
* For backward-compatibility with drone-helm, a duration can also be an integer, in which case it will be interpreted to mean seconds.
|
||||||
* List\<string\>s can be a yaml sequence or a comma-separated string.
|
* List\<string\>s can be a yaml sequence or a comma-separated string.
|
||||||
|
|
||||||
All of the following are equivalent:
|
All of the following are equivalent:
|
||||||
@@ -86,44 +99,37 @@ values_files: [ "./over_9,000.yml" ]
|
|||||||
values_files: [ "./over_9", "000.yml" ]
|
values_files: [ "./over_9", "000.yml" ]
|
||||||
```
|
```
|
||||||
|
|
||||||
### Using the `prefix` setting
|
### Interpolating secrets into the `values`, `string_values` and `add_repos` settings
|
||||||
|
|
||||||
Because the prefix setting is meta-configuration, it has some inherent edge-cases. Here is what it does in the cases we've thought of:
|
If you want to send secrets to your charts, you can use syntax similar to shell variable interpolation--either `$VARNAME` or `$${VARNAME}`. The double dollar-sign is necessary when using curly brackets; using curly brackets with a single dollar-sign will trigger Drone's string substitution (which can't use arbitrary environment variables). If an environment variable is not set, it will be treated as if it were set to the empty string.
|
||||||
|
|
||||||
Unlike the other settings, it must be declared in the `settings` block, not `environment`:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
settings:
|
|
||||||
prefix: helm # drone-helm3 will look for environment variables called HELM_VARNAME
|
|
||||||
environment:
|
environment:
|
||||||
prefix: armet # no effect
|
DB_PASSWORD:
|
||||||
|
from_secret: db_password
|
||||||
|
SESSION_KEY:
|
||||||
|
from_secret: session_key
|
||||||
|
settings:
|
||||||
|
values:
|
||||||
|
- db_password=$DB_PASSWORD # db_password will be set to the contents of the db_password secret
|
||||||
|
- db_pass=$DB_PASS # db_pass will be set to "" since $DB_PASS is not set
|
||||||
|
- session_key=$${SESSION_KEY} # session_key will be set to the contents of the session_key secret
|
||||||
|
- sess_key=${SESSION_KEY} # sess_key will be set to "" by Drone's variable substitution
|
||||||
```
|
```
|
||||||
|
|
||||||
It does not apply to configuration in the `settings` block, only in `environment`:
|
Variables intended for interpolation must be set in the `environment` section, not `settings`.
|
||||||
|
|
||||||
```yaml
|
### Backward-compatibility aliases
|
||||||
settings:
|
|
||||||
prefix: helm
|
|
||||||
helm_timeout: 5m # no effect
|
|
||||||
environment:
|
|
||||||
helm_timeout: 2m # timeout will be 2 minutes
|
|
||||||
```
|
|
||||||
|
|
||||||
If the environment contains a variable in non-prefixed form, it will still be applied:
|
Some settings have alternate names, for backward-compatibility with drone-helm. We recommend using the canonical name unless you require the backward-compatible form.
|
||||||
|
|
||||||
```yaml
|
| Canonical name | Alias |
|
||||||
settings:
|
|----------------------|-------|
|
||||||
prefix: helm
|
| mode | helm_command |
|
||||||
environment:
|
| add_repos | helm_repos |
|
||||||
timeout: 2m # timeout will be 2 minutes
|
| kube_api_server | api_server |
|
||||||
```
|
| kube_service_account | service_account |
|
||||||
|
| kube_token | kubernetes_token |
|
||||||
If the environment contains both the prefixed and non-prefixed forms, drone-helm3 will use the prefixed form:
|
| kube_certificate | kubernetes_certificate |
|
||||||
|
| wait_for_upgrade | wait |
|
||||||
```yaml
|
| force_upgrade | force |
|
||||||
settings:
|
|
||||||
prefix: helm
|
|
||||||
environment:
|
|
||||||
timeout: 5m # overridden
|
|
||||||
helm_timeout: 2m # timeout will be 2 minutes
|
|
||||||
```
|
|
||||||
|
|||||||
1
go.mod
1
go.mod
@@ -4,6 +4,7 @@ go 1.13
|
|||||||
|
|
||||||
require (
|
require (
|
||||||
github.com/golang/mock v1.3.1
|
github.com/golang/mock v1.3.1
|
||||||
|
github.com/joho/godotenv v1.3.0
|
||||||
github.com/kelseyhightower/envconfig v1.4.0
|
github.com/kelseyhightower/envconfig v1.4.0
|
||||||
github.com/stretchr/testify v1.4.0
|
github.com/stretchr/testify v1.4.0
|
||||||
golang.org/x/lint v0.0.0-20191125180803-fdd1cda4f05f // indirect
|
golang.org/x/lint v0.0.0-20191125180803-fdd1cda4f05f // indirect
|
||||||
|
|||||||
2
go.sum
2
go.sum
@@ -2,6 +2,8 @@ github.com/davecgh/go-spew v1.1.0 h1:ZDRjVQ15GmhC3fiQ8ni8+OwkZQO4DARzQgrnXU1Liz8
|
|||||||
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
github.com/golang/mock v1.3.1 h1:qGJ6qTW+x6xX/my+8YUVl4WNpX9B7+/l2tRsHGZ7f2s=
|
github.com/golang/mock v1.3.1 h1:qGJ6qTW+x6xX/my+8YUVl4WNpX9B7+/l2tRsHGZ7f2s=
|
||||||
github.com/golang/mock v1.3.1/go.mod h1:sBzyDLLjw3U8JLTeZvSv8jJB+tU5PVekmnlKIyFUx0Y=
|
github.com/golang/mock v1.3.1/go.mod h1:sBzyDLLjw3U8JLTeZvSv8jJB+tU5PVekmnlKIyFUx0Y=
|
||||||
|
github.com/joho/godotenv v1.3.0 h1:Zjp+RcGpHhGlrMbJzXTrZZPrWj+1vfm90La1wgB6Bhc=
|
||||||
|
github.com/joho/godotenv v1.3.0/go.mod h1:7hK45KPybAkOC6peb+G5yklZfMxEjkZhHbwpqxOKXbg=
|
||||||
github.com/kelseyhightower/envconfig v1.4.0 h1:Im6hONhd3pLkfDFsbRgu68RDNkGF1r3dvMUtDTo2cv8=
|
github.com/kelseyhightower/envconfig v1.4.0 h1:Im6hONhd3pLkfDFsbRgu68RDNkGF1r3dvMUtDTo2cv8=
|
||||||
github.com/kelseyhightower/envconfig v1.4.0/go.mod h1:cccZRl6mQpaq41TPp5QxidR+Sa3axMbJDNb//FQX6Gg=
|
github.com/kelseyhightower/envconfig v1.4.0/go.mod h1:cccZRl6mQpaq41TPp5QxidR+Sa3axMbJDNb//FQX6Gg=
|
||||||
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
||||||
|
|||||||
168
internal/env/config.go
vendored
Normal file
168
internal/env/config.go
vendored
Normal file
@@ -0,0 +1,168 @@
|
|||||||
|
package env
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
"regexp"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/kelseyhightower/envconfig"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
justNumbers = regexp.MustCompile(`^\d+$`)
|
||||||
|
deprecatedVars = []string{"PURGE", "RECREATE_PODS", "TILLER_NS", "UPGRADE", "CANARY_IMAGE", "CLIENT_ONLY", "STABLE_REPO_URL"}
|
||||||
|
)
|
||||||
|
|
||||||
|
// The Config struct captures the `settings` and `environment` blocks in the application's drone
|
||||||
|
// config. Configuration in drone's `settings` block arrives as uppercase env vars matching the
|
||||||
|
// config key, prefixed with `PLUGIN_`. Config from the `environment` block is uppercased, but does
|
||||||
|
// not have the `PLUGIN_` prefix.
|
||||||
|
type Config struct {
|
||||||
|
// Configuration for drone-helm itself
|
||||||
|
Command string `envconfig:"mode"` // Helm command to run
|
||||||
|
DroneEvent string `envconfig:"drone_build_event"` // Drone event that invoked this plugin.
|
||||||
|
UpdateDependencies bool `split_words:"true"` // [Deprecated] Call `helm dependency update` before the main command (deprecated, use dependencies_action: update instead)
|
||||||
|
DependenciesAction string `split_words:"true"` // Call `helm dependency build` or `helm dependency update` before the main command
|
||||||
|
AddRepos []string `split_words:"true"` // Call `helm repo add` before the main command
|
||||||
|
RepoCertificate string `envconfig:"repo_certificate"` // The Helm chart repository's self-signed certificate (must be base64-encoded)
|
||||||
|
RepoCACertificate string `envconfig:"repo_ca_certificate"` // The Helm chart repository CA's self-signed certificate (must be base64-encoded)
|
||||||
|
Debug bool `` // Generate debug output and pass --debug to all helm commands
|
||||||
|
Values string `` // Argument to pass to --set in applicable helm commands
|
||||||
|
StringValues string `split_words:"true"` // Argument to pass to --set-string in applicable helm commands
|
||||||
|
ValuesFiles []string `split_words:"true"` // Arguments to pass to --values in applicable helm commands
|
||||||
|
Namespace string `` // Kubernetes namespace for all helm commands
|
||||||
|
CreateNamespace bool `split_words:"true"` // Pass --create-namespace to `helm upgrade`
|
||||||
|
KubeToken string `split_words:"true"` // Kubernetes authentication token to put in .kube/config
|
||||||
|
SkipKubeconfig bool `envconfig:"skip_kubeconfig"` // Skip kubeconfig creation
|
||||||
|
SkipTLSVerify bool `envconfig:"skip_tls_verify"` // Put insecure-skip-tls-verify in .kube/config
|
||||||
|
Certificate string `envconfig:"kube_certificate"` // The Kubernetes cluster CA's self-signed certificate (must be base64-encoded)
|
||||||
|
APIServer string `envconfig:"kube_api_server"` // The Kubernetes cluster's API endpoint
|
||||||
|
ServiceAccount string `envconfig:"kube_service_account"` // Account to use for connecting to the Kubernetes cluster
|
||||||
|
ChartVersion string `split_words:"true"` // Specific chart version to use in `helm upgrade`
|
||||||
|
DryRun bool `split_words:"true"` // Pass --dry-run to applicable helm commands
|
||||||
|
Wait bool `envconfig:"wait_for_upgrade"` // Pass --wait to applicable helm commands
|
||||||
|
ReuseValues bool `split_words:"true"` // Pass --reuse-values to `helm upgrade`
|
||||||
|
KeepHistory bool `split_words:"true"` // Pass --keep-history to `helm uninstall`
|
||||||
|
Timeout string `` // Argument to pass to --timeout in applicable helm commands
|
||||||
|
Chart string `` // Chart argument to use in applicable helm commands
|
||||||
|
Release string `` // Release argument to use in applicable helm commands
|
||||||
|
Force bool `envconfig:"force_upgrade"` // Pass --force to applicable helm commands
|
||||||
|
AtomicUpgrade bool `split_words:"true"` // Pass --atomic to `helm upgrade`
|
||||||
|
CleanupOnFail bool `envconfig:"cleanup_failed_upgrade"` // Pass --cleanup-on-fail to `helm upgrade`
|
||||||
|
LintStrictly bool `split_words:"true"` // Pass --strict to `helm lint`
|
||||||
|
|
||||||
|
Stdout io.Writer `ignored:"true"`
|
||||||
|
Stderr io.Writer `ignored:"true"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewConfig creates a Config and reads environment variables into it, accounting for several possible formats.
|
||||||
|
func NewConfig(stdout, stderr io.Writer) (*Config, error) {
|
||||||
|
var aliases settingAliases
|
||||||
|
if err := envconfig.Process("plugin", &aliases); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := envconfig.Process("", &aliases); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg := Config{
|
||||||
|
Command: aliases.Command,
|
||||||
|
AddRepos: aliases.AddRepos,
|
||||||
|
APIServer: aliases.APIServer,
|
||||||
|
ServiceAccount: aliases.ServiceAccount,
|
||||||
|
Wait: aliases.Wait,
|
||||||
|
Force: aliases.Force,
|
||||||
|
KubeToken: aliases.KubeToken,
|
||||||
|
Certificate: aliases.Certificate,
|
||||||
|
|
||||||
|
Stdout: stdout,
|
||||||
|
Stderr: stderr,
|
||||||
|
}
|
||||||
|
if err := envconfig.Process("plugin", &cfg); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := envconfig.Process("", &cfg); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if cfg.SkipKubeconfig {
|
||||||
|
if cfg.KubeToken != "" || cfg.Certificate != "" || cfg.APIServer != "" || cfg.ServiceAccount != "" || cfg.SkipTLSVerify {
|
||||||
|
fmt.Fprintf(cfg.Stderr, "Warning: skip_kubeconfig is set. The following kubeconfig-related settings will be ignored: kube_config, kube_certificate, kube_api_server, kube_service_account, skip_tls_verify.")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if justNumbers.MatchString(cfg.Timeout) {
|
||||||
|
cfg.Timeout = fmt.Sprintf("%ss", cfg.Timeout)
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg.loadValuesSecrets()
|
||||||
|
|
||||||
|
if cfg.Debug && cfg.Stderr != nil {
|
||||||
|
cfg.logDebug()
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg.deprecationWarn()
|
||||||
|
|
||||||
|
return &cfg, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cfg *Config) loadValuesSecrets() {
|
||||||
|
findVar := regexp.MustCompile(`\$\{?(\w+)\}?`)
|
||||||
|
|
||||||
|
replacer := func(varName string) string {
|
||||||
|
sigils := regexp.MustCompile(`[${}]`)
|
||||||
|
varName = sigils.ReplaceAllString(varName, "")
|
||||||
|
|
||||||
|
if value, ok := os.LookupEnv(varName); ok {
|
||||||
|
return value
|
||||||
|
}
|
||||||
|
|
||||||
|
if cfg.Debug {
|
||||||
|
fmt.Fprintf(cfg.Stderr, "$%s not present in environment, replaced with \"\"\n", varName)
|
||||||
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg.Values = findVar.ReplaceAllStringFunc(cfg.Values, replacer)
|
||||||
|
cfg.StringValues = findVar.ReplaceAllStringFunc(cfg.StringValues, replacer)
|
||||||
|
|
||||||
|
for i := 0; i < len(cfg.AddRepos); i++ {
|
||||||
|
cfg.AddRepos[i] = findVar.ReplaceAllStringFunc(cfg.AddRepos[i], replacer)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cfg Config) logDebug() {
|
||||||
|
if cfg.KubeToken != "" {
|
||||||
|
cfg.KubeToken = "(redacted)"
|
||||||
|
}
|
||||||
|
fmt.Fprintf(cfg.Stderr, "Generated config: %+v\n", cfg)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cfg *Config) deprecationWarn() {
|
||||||
|
for _, varname := range deprecatedVars {
|
||||||
|
_, barePresent := os.LookupEnv(varname)
|
||||||
|
_, prefixedPresent := os.LookupEnv("PLUGIN_" + varname)
|
||||||
|
if barePresent || prefixedPresent {
|
||||||
|
fmt.Fprintf(cfg.Stderr, "Warning: ignoring deprecated '%s' setting\n", strings.ToLower(varname))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// settingAliases provides alternate environment variable names for certain settings, either because
|
||||||
|
// they were renamed during drone-helm3's lifetime or for backward-compatibility with the original
|
||||||
|
// drone-helm. Most config options don't need to be included here; adding them to the main Config
|
||||||
|
// struct is sufficient.
|
||||||
|
type settingAliases struct {
|
||||||
|
Command string `envconfig:"helm_command"`
|
||||||
|
AddRepos []string `envconfig:"helm_repos"`
|
||||||
|
APIServer string `envconfig:"api_server"`
|
||||||
|
ServiceAccount string `split_words:"true"`
|
||||||
|
Wait bool ``
|
||||||
|
Force bool ``
|
||||||
|
KubeToken string `envconfig:"kubernetes_token"`
|
||||||
|
Certificate string `envconfig:"kubernetes_certificate"`
|
||||||
|
}
|
||||||
252
internal/env/config_test.go
vendored
Normal file
252
internal/env/config_test.go
vendored
Normal file
@@ -0,0 +1,252 @@
|
|||||||
|
package env
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/suite"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ConfigTestSuite struct {
|
||||||
|
suite.Suite
|
||||||
|
// These tests need to mutate the environment, so the suite.setenv and .unsetenv functions store the original contents of the
|
||||||
|
// relevant variable in this map. Its use of *string is so they can distinguish between "not set" and "set to empty string"
|
||||||
|
envBackup map[string]*string
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestConfigTestSuite(t *testing.T) {
|
||||||
|
suite.Run(t, new(ConfigTestSuite))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestNewConfigWithPluginPrefix() {
|
||||||
|
suite.unsetenv("MODE")
|
||||||
|
suite.unsetenv("UPDATE_DEPENDENCIES")
|
||||||
|
suite.unsetenv("DEBUG")
|
||||||
|
|
||||||
|
suite.setenv("PLUGIN_MODE", "iambic")
|
||||||
|
suite.setenv("PLUGIN_UPDATE_DEPENDENCIES", "true")
|
||||||
|
suite.setenv("PLUGIN_DEBUG", "true")
|
||||||
|
|
||||||
|
cfg, err := NewConfig(&strings.Builder{}, &strings.Builder{})
|
||||||
|
suite.Require().NoError(err)
|
||||||
|
|
||||||
|
suite.Equal("iambic", cfg.Command)
|
||||||
|
suite.True(cfg.UpdateDependencies)
|
||||||
|
suite.True(cfg.Debug)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestNewConfigWithNoPrefix() {
|
||||||
|
suite.unsetenv("PLUGIN_MODE")
|
||||||
|
suite.unsetenv("PLUGIN_UPDATE_DEPENDENCIES")
|
||||||
|
suite.unsetenv("PLUGIN_DEBUG")
|
||||||
|
|
||||||
|
suite.setenv("MODE", "iambic")
|
||||||
|
suite.setenv("UPDATE_DEPENDENCIES", "true")
|
||||||
|
suite.setenv("DEBUG", "true")
|
||||||
|
|
||||||
|
cfg, err := NewConfig(&strings.Builder{}, &strings.Builder{})
|
||||||
|
suite.Require().NoError(err)
|
||||||
|
|
||||||
|
suite.Equal("iambic", cfg.Command)
|
||||||
|
suite.True(cfg.UpdateDependencies)
|
||||||
|
suite.True(cfg.Debug)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestNewConfigWithConflictingVariables() {
|
||||||
|
suite.setenv("PLUGIN_MODE", "iambic")
|
||||||
|
suite.setenv("MODE", "haiku") // values from the `environment` block override those from `settings`
|
||||||
|
|
||||||
|
cfg, err := NewConfig(&strings.Builder{}, &strings.Builder{})
|
||||||
|
suite.Require().NoError(err)
|
||||||
|
|
||||||
|
suite.Equal("haiku", cfg.Command)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestNewConfigInfersNumbersAreSeconds() {
|
||||||
|
suite.setenv("PLUGIN_TIMEOUT", "42")
|
||||||
|
cfg, err := NewConfig(&strings.Builder{}, &strings.Builder{})
|
||||||
|
suite.Require().NoError(err)
|
||||||
|
suite.Equal("42s", cfg.Timeout)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestNewConfigWithAliases() {
|
||||||
|
for _, varname := range []string{
|
||||||
|
"MODE",
|
||||||
|
"ADD_REPOS",
|
||||||
|
"KUBE_API_SERVER",
|
||||||
|
"KUBE_SERVICE_ACCOUNT",
|
||||||
|
"WAIT_FOR_UPGRADE",
|
||||||
|
"FORCE_UPGRADE",
|
||||||
|
"KUBE_TOKEN",
|
||||||
|
"KUBE_CERTIFICATE",
|
||||||
|
} {
|
||||||
|
suite.unsetenv(varname)
|
||||||
|
suite.unsetenv("PLUGIN_" + varname)
|
||||||
|
}
|
||||||
|
suite.setenv("PLUGIN_HELM_COMMAND", "beware the jabberwock")
|
||||||
|
suite.setenv("PLUGIN_HELM_REPOS", "chortle=http://calloo.callay/frabjous/day")
|
||||||
|
suite.setenv("PLUGIN_API_SERVER", "http://tumtum.tree")
|
||||||
|
suite.setenv("PLUGIN_SERVICE_ACCOUNT", "tulgey")
|
||||||
|
suite.setenv("PLUGIN_WAIT", "true")
|
||||||
|
suite.setenv("PLUGIN_FORCE", "true")
|
||||||
|
suite.setenv("PLUGIN_KUBERNETES_TOKEN", "Y29tZSB0byBteSBhcm1z")
|
||||||
|
suite.setenv("PLUGIN_KUBERNETES_CERTIFICATE", "d2l0aCBpdHMgaGVhZA==")
|
||||||
|
|
||||||
|
cfg, err := NewConfig(&strings.Builder{}, &strings.Builder{})
|
||||||
|
suite.Require().NoError(err)
|
||||||
|
suite.Equal("beware the jabberwock", cfg.Command)
|
||||||
|
suite.Equal([]string{"chortle=http://calloo.callay/frabjous/day"}, cfg.AddRepos)
|
||||||
|
suite.Equal("http://tumtum.tree", cfg.APIServer)
|
||||||
|
suite.Equal("tulgey", cfg.ServiceAccount)
|
||||||
|
suite.True(cfg.Wait, "Wait should be aliased")
|
||||||
|
suite.True(cfg.Force, "Force should be aliased")
|
||||||
|
suite.Equal("Y29tZSB0byBteSBhcm1z", cfg.KubeToken, "KubeToken should be aliased")
|
||||||
|
suite.Equal("d2l0aCBpdHMgaGVhZA==", cfg.Certificate, "Certificate should be aliased")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestAliasedSettingWithoutPluginPrefix() {
|
||||||
|
suite.unsetenv("FORCE_UPGRADE")
|
||||||
|
suite.unsetenv("PLUGIN_FORCE_UPGRADE")
|
||||||
|
suite.unsetenv("PLUGIN_FORCE")
|
||||||
|
suite.setenv("FORCE", "true")
|
||||||
|
|
||||||
|
cfg, err := NewConfig(&strings.Builder{}, &strings.Builder{})
|
||||||
|
suite.Require().NoError(err)
|
||||||
|
suite.True(cfg.Force)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestNewConfigWithAliasConflicts() {
|
||||||
|
suite.unsetenv("FORCE_UPGRADE")
|
||||||
|
suite.setenv("PLUGIN_FORCE", "true")
|
||||||
|
suite.setenv("PLUGIN_FORCE_UPGRADE", "false") // should override even when set to the zero value
|
||||||
|
|
||||||
|
cfg, err := NewConfig(&strings.Builder{}, &strings.Builder{})
|
||||||
|
suite.NoError(err)
|
||||||
|
suite.False(cfg.Force, "official names should override alias names")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestNewConfigSetsWriters() {
|
||||||
|
stdout := &strings.Builder{}
|
||||||
|
stderr := &strings.Builder{}
|
||||||
|
cfg, err := NewConfig(stdout, stderr)
|
||||||
|
suite.Require().NoError(err)
|
||||||
|
|
||||||
|
suite.Equal(stdout, cfg.Stdout)
|
||||||
|
suite.Equal(stderr, cfg.Stderr)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestDeprecatedSettingWarnings() {
|
||||||
|
for _, varname := range deprecatedVars {
|
||||||
|
suite.setenv(varname, "deprecoat") // environment-block entries should cause warnings
|
||||||
|
}
|
||||||
|
|
||||||
|
suite.unsetenv("PURGE")
|
||||||
|
suite.setenv("PLUGIN_PURGE", "true") // settings-block entries should cause warnings
|
||||||
|
suite.setenv("UPGRADE", "") // entries should cause warnings even when set to empty string
|
||||||
|
|
||||||
|
stderr := &strings.Builder{}
|
||||||
|
_, err := NewConfig(&strings.Builder{}, stderr)
|
||||||
|
suite.NoError(err)
|
||||||
|
|
||||||
|
for _, varname := range deprecatedVars {
|
||||||
|
suite.Contains(stderr.String(), fmt.Sprintf("Warning: ignoring deprecated '%s' setting\n", strings.ToLower(varname)))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestLogDebug() {
|
||||||
|
suite.setenv("DEBUG", "true")
|
||||||
|
suite.setenv("MODE", "upgrade")
|
||||||
|
|
||||||
|
stderr := strings.Builder{}
|
||||||
|
stdout := strings.Builder{}
|
||||||
|
_, err := NewConfig(&stdout, &stderr)
|
||||||
|
suite.Require().NoError(err)
|
||||||
|
|
||||||
|
suite.Equal("", stdout.String())
|
||||||
|
|
||||||
|
suite.Regexp(`^Generated config: \{Command:upgrade.*\}`, stderr.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestLogDebugCensorsKubeToken() {
|
||||||
|
stderr := &strings.Builder{}
|
||||||
|
kubeToken := "I'm shy! Don't put me in your build logs!"
|
||||||
|
cfg := Config{
|
||||||
|
Debug: true,
|
||||||
|
KubeToken: kubeToken,
|
||||||
|
Stderr: stderr,
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg.logDebug()
|
||||||
|
|
||||||
|
suite.Contains(stderr.String(), "KubeToken:(redacted)")
|
||||||
|
suite.Equal(kubeToken, cfg.KubeToken) // The actual config value should be left unchanged
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestNewConfigWithValuesSecrets() {
|
||||||
|
suite.unsetenv("VALUES")
|
||||||
|
suite.unsetenv("STRING_VALUES")
|
||||||
|
suite.unsetenv("SECRET_WATER")
|
||||||
|
suite.setenv("SECRET_FIRE", "Eru_Ilúvatar")
|
||||||
|
suite.setenv("SECRET_RINGS", "1")
|
||||||
|
suite.setenv("PLUGIN_VALUES", "fire=$SECRET_FIRE,water=${SECRET_WATER}")
|
||||||
|
suite.setenv("PLUGIN_STRING_VALUES", "rings=${SECRET_RINGS}")
|
||||||
|
suite.setenv("PLUGIN_ADD_REPOS", "testrepo=https://user:${SECRET_FIRE}@testrepo.test")
|
||||||
|
|
||||||
|
cfg, err := NewConfig(&strings.Builder{}, &strings.Builder{})
|
||||||
|
suite.Require().NoError(err)
|
||||||
|
|
||||||
|
suite.Equal("fire=Eru_Ilúvatar,water=", cfg.Values)
|
||||||
|
suite.Equal("rings=1", cfg.StringValues)
|
||||||
|
suite.Equal(fmt.Sprintf("testrepo=https://user:%s@testrepo.test", os.Getenv("SECRET_FIRE")), cfg.AddRepos[0])
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestValuesSecretsWithDebugLogging() {
|
||||||
|
suite.unsetenv("VALUES")
|
||||||
|
suite.unsetenv("SECRET_WATER")
|
||||||
|
suite.setenv("SECRET_FIRE", "Eru_Ilúvatar")
|
||||||
|
suite.setenv("PLUGIN_DEBUG", "true")
|
||||||
|
suite.setenv("PLUGIN_STRING_VALUES", "fire=$SECRET_FIRE")
|
||||||
|
suite.setenv("PLUGIN_VALUES", "fire=$SECRET_FIRE,water=$SECRET_WATER")
|
||||||
|
stderr := strings.Builder{}
|
||||||
|
_, err := NewConfig(&strings.Builder{}, &stderr)
|
||||||
|
suite.Require().NoError(err)
|
||||||
|
|
||||||
|
suite.Contains(stderr.String(), "Values:fire=Eru_Ilúvatar,water=")
|
||||||
|
suite.Contains(stderr.String(), `$SECRET_WATER not present in environment, replaced with ""`)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) setenv(key, val string) {
|
||||||
|
orig, ok := os.LookupEnv(key)
|
||||||
|
if ok {
|
||||||
|
suite.envBackup[key] = &orig
|
||||||
|
} else {
|
||||||
|
suite.envBackup[key] = nil
|
||||||
|
}
|
||||||
|
os.Setenv(key, val)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) unsetenv(key string) {
|
||||||
|
orig, ok := os.LookupEnv(key)
|
||||||
|
if ok {
|
||||||
|
suite.envBackup[key] = &orig
|
||||||
|
} else {
|
||||||
|
suite.envBackup[key] = nil
|
||||||
|
}
|
||||||
|
os.Unsetenv(key)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) BeforeTest(_, _ string) {
|
||||||
|
suite.envBackup = make(map[string]*string)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) AfterTest(_, _ string) {
|
||||||
|
for key, val := range suite.envBackup {
|
||||||
|
if val == nil {
|
||||||
|
os.Unsetenv(key)
|
||||||
|
} else {
|
||||||
|
os.Setenv(key, *val)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -1,77 +0,0 @@
|
|||||||
package helm
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"github.com/kelseyhightower/envconfig"
|
|
||||||
"io"
|
|
||||||
)
|
|
||||||
|
|
||||||
// The Config struct captures the `settings` and `environment` blocks in the application's drone
|
|
||||||
// config. Configuration in drone's `settings` block arrives as uppercase env vars matching the
|
|
||||||
// config key, prefixed with `PLUGIN_`. Config from the `environment` block is uppercased, but does
|
|
||||||
// not have the `PLUGIN_` prefix. It may, however, be prefixed with the value in `$PLUGIN_PREFIX`.
|
|
||||||
type Config struct {
|
|
||||||
// Configuration for drone-helm itself
|
|
||||||
Command string `envconfig:"HELM_COMMAND"` // Helm command to run
|
|
||||||
DroneEvent string `envconfig:"DRONE_BUILD_EVENT"` // Drone event that invoked this plugin.
|
|
||||||
UpdateDependencies bool `split_words:"true"` // Call `helm dependency update` before the main command
|
|
||||||
Repos []string `envconfig:"HELM_REPOS"` // Call `helm repo add` before the main command
|
|
||||||
Prefix string `` // Prefix to use when looking up secret env vars
|
|
||||||
Debug bool `` // Generate debug output and pass --debug to all helm commands
|
|
||||||
Values string `` // Argument to pass to --set in applicable helm commands
|
|
||||||
StringValues string `split_words:"true"` // Argument to pass to --set-string in applicable helm commands
|
|
||||||
ValuesFiles []string `split_words:"true"` // Arguments to pass to --values in applicable helm commands
|
|
||||||
Namespace string `` // Kubernetes namespace for all helm commands
|
|
||||||
KubeToken string `envconfig:"KUBERNETES_TOKEN"` // Kubernetes authentication token to put in .kube/config
|
|
||||||
SkipTLSVerify bool `envconfig:"SKIP_TLS_VERIFY"` // Put insecure-skip-tls-verify in .kube/config
|
|
||||||
Certificate string `envconfig:"KUBERNETES_CERTIFICATE"` // The Kubernetes cluster CA's self-signed certificate (must be base64-encoded)
|
|
||||||
APIServer string `envconfig:"API_SERVER"` // The Kubernetes cluster's API endpoint
|
|
||||||
ServiceAccount string `split_words:"true"` // Account to use for connecting to the Kubernetes cluster
|
|
||||||
ChartVersion string `split_words:"true"` // Specific chart version to use in `helm upgrade`
|
|
||||||
DryRun bool `split_words:"true"` // Pass --dry-run to applicable helm commands
|
|
||||||
Wait bool `` // Pass --wait to applicable helm commands
|
|
||||||
ReuseValues bool `split_words:"true"` // Pass --reuse-values to `helm upgrade`
|
|
||||||
Timeout string `` // Argument to pass to --timeout in applicable helm commands
|
|
||||||
Chart string `` // Chart argument to use in applicable helm commands
|
|
||||||
Release string `` // Release argument to use in applicable helm commands
|
|
||||||
Force bool `` // Pass --force to applicable helm commands
|
|
||||||
|
|
||||||
Stdout io.Writer `ignored:"true"`
|
|
||||||
Stderr io.Writer `ignored:"true"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// NewConfig creates a Config and reads environment variables into it, accounting for several possible formats.
|
|
||||||
func NewConfig(stdout, stderr io.Writer) (*Config, error) {
|
|
||||||
cfg := Config{
|
|
||||||
Stdout: stdout,
|
|
||||||
Stderr: stderr,
|
|
||||||
}
|
|
||||||
if err := envconfig.Process("plugin", &cfg); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
prefix := cfg.Prefix
|
|
||||||
|
|
||||||
if err := envconfig.Process("", &cfg); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
if prefix != "" {
|
|
||||||
if err := envconfig.Process(cfg.Prefix, &cfg); err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if cfg.Debug && cfg.Stderr != nil {
|
|
||||||
cfg.logDebug()
|
|
||||||
}
|
|
||||||
|
|
||||||
return &cfg, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (cfg Config) logDebug() {
|
|
||||||
if cfg.KubeToken != "" {
|
|
||||||
cfg.KubeToken = "(redacted)"
|
|
||||||
}
|
|
||||||
fmt.Fprintf(cfg.Stderr, "Generated config: %+v\n", cfg)
|
|
||||||
}
|
|
||||||
@@ -1,180 +0,0 @@
|
|||||||
package helm
|
|
||||||
|
|
||||||
import (
|
|
||||||
"github.com/stretchr/testify/suite"
|
|
||||||
"os"
|
|
||||||
"strings"
|
|
||||||
"testing"
|
|
||||||
)
|
|
||||||
|
|
||||||
type ConfigTestSuite struct {
|
|
||||||
suite.Suite
|
|
||||||
// These tests need to mutate the environment, so the suite.setenv and .unsetenv functions store the original contents of the
|
|
||||||
// relevant variable in this map. Its use of *string is so they can distinguish between "not set" and "set to empty string"
|
|
||||||
envBackup map[string]*string
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestConfigTestSuite(t *testing.T) {
|
|
||||||
suite.Run(t, new(ConfigTestSuite))
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *ConfigTestSuite) TestNewConfigWithPluginPrefix() {
|
|
||||||
suite.unsetenv("PLUGIN_PREFIX")
|
|
||||||
suite.unsetenv("HELM_COMMAND")
|
|
||||||
suite.unsetenv("UPDATE_DEPENDENCIES")
|
|
||||||
suite.unsetenv("DEBUG")
|
|
||||||
|
|
||||||
suite.setenv("PLUGIN_HELM_COMMAND", "execute order 66")
|
|
||||||
suite.setenv("PLUGIN_UPDATE_DEPENDENCIES", "true")
|
|
||||||
suite.setenv("PLUGIN_DEBUG", "true")
|
|
||||||
|
|
||||||
cfg, err := NewConfig(&strings.Builder{}, &strings.Builder{})
|
|
||||||
suite.Require().NoError(err)
|
|
||||||
|
|
||||||
suite.Equal("execute order 66", cfg.Command)
|
|
||||||
suite.True(cfg.UpdateDependencies)
|
|
||||||
suite.True(cfg.Debug)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *ConfigTestSuite) TestNewConfigWithNoPrefix() {
|
|
||||||
suite.unsetenv("PLUGIN_PREFIX")
|
|
||||||
suite.unsetenv("PLUGIN_HELM_COMMAND")
|
|
||||||
suite.unsetenv("PLUGIN_UPDATE_DEPENDENCIES")
|
|
||||||
suite.unsetenv("PLUGIN_DEBUG")
|
|
||||||
|
|
||||||
suite.setenv("HELM_COMMAND", "execute order 66")
|
|
||||||
suite.setenv("UPDATE_DEPENDENCIES", "true")
|
|
||||||
suite.setenv("DEBUG", "true")
|
|
||||||
|
|
||||||
cfg, err := NewConfig(&strings.Builder{}, &strings.Builder{})
|
|
||||||
suite.Require().NoError(err)
|
|
||||||
|
|
||||||
suite.Equal("execute order 66", cfg.Command)
|
|
||||||
suite.True(cfg.UpdateDependencies)
|
|
||||||
suite.True(cfg.Debug)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *ConfigTestSuite) TestNewConfigWithConfigurablePrefix() {
|
|
||||||
suite.unsetenv("API_SERVER")
|
|
||||||
suite.unsetenv("PLUGIN_API_SERVER")
|
|
||||||
|
|
||||||
suite.setenv("PLUGIN_PREFIX", "prix_fixe")
|
|
||||||
suite.setenv("PRIX_FIXE_API_SERVER", "your waiter this evening")
|
|
||||||
|
|
||||||
cfg, err := NewConfig(&strings.Builder{}, &strings.Builder{})
|
|
||||||
suite.Require().NoError(err)
|
|
||||||
|
|
||||||
suite.Equal("prix_fixe", cfg.Prefix)
|
|
||||||
suite.Equal("your waiter this evening", cfg.APIServer)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *ConfigTestSuite) TestPrefixSettingDoesNotAffectPluginPrefix() {
|
|
||||||
suite.setenv("PLUGIN_PREFIX", "IXFREP")
|
|
||||||
suite.setenv("PLUGIN_HELM_COMMAND", "wake me up")
|
|
||||||
suite.setenv("IXFREP_PLUGIN_HELM_COMMAND", "send me to sleep inside")
|
|
||||||
|
|
||||||
cfg, err := NewConfig(&strings.Builder{}, &strings.Builder{})
|
|
||||||
suite.Require().NoError(err)
|
|
||||||
|
|
||||||
suite.Equal("wake me up", cfg.Command)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *ConfigTestSuite) TestPrefixSettingMustHavePluginPrefix() {
|
|
||||||
suite.unsetenv("PLUGIN_PREFIX")
|
|
||||||
suite.setenv("PREFIX", "refpix")
|
|
||||||
suite.setenv("HELM_COMMAND", "gimme more")
|
|
||||||
suite.setenv("REFPIX_HELM_COMMAND", "gimme less")
|
|
||||||
|
|
||||||
cfg, err := NewConfig(&strings.Builder{}, &strings.Builder{})
|
|
||||||
suite.Require().NoError(err)
|
|
||||||
|
|
||||||
suite.Equal("gimme more", cfg.Command)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *ConfigTestSuite) TestNewConfigWithConflictingVariables() {
|
|
||||||
suite.setenv("PLUGIN_HELM_COMMAND", "execute order 66")
|
|
||||||
suite.setenv("HELM_COMMAND", "defend the jedi") // values from the `environment` block override those from `settings`
|
|
||||||
|
|
||||||
suite.setenv("PLUGIN_PREFIX", "prod")
|
|
||||||
suite.setenv("TIMEOUT", "5m0s")
|
|
||||||
suite.setenv("PROD_TIMEOUT", "2m30s") // values from prefixed env vars override those from non-prefixed ones
|
|
||||||
|
|
||||||
cfg, err := NewConfig(&strings.Builder{}, &strings.Builder{})
|
|
||||||
suite.Require().NoError(err)
|
|
||||||
|
|
||||||
suite.Equal("defend the jedi", cfg.Command)
|
|
||||||
suite.Equal("2m30s", cfg.Timeout)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *ConfigTestSuite) TestNewConfigSetsWriters() {
|
|
||||||
stdout := &strings.Builder{}
|
|
||||||
stderr := &strings.Builder{}
|
|
||||||
cfg, err := NewConfig(stdout, stderr)
|
|
||||||
suite.Require().NoError(err)
|
|
||||||
|
|
||||||
suite.Equal(stdout, cfg.Stdout)
|
|
||||||
suite.Equal(stderr, cfg.Stderr)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *ConfigTestSuite) TestLogDebug() {
|
|
||||||
suite.setenv("DEBUG", "true")
|
|
||||||
suite.setenv("HELM_COMMAND", "upgrade")
|
|
||||||
|
|
||||||
stderr := strings.Builder{}
|
|
||||||
stdout := strings.Builder{}
|
|
||||||
_, err := NewConfig(&stdout, &stderr)
|
|
||||||
suite.Require().NoError(err)
|
|
||||||
|
|
||||||
suite.Equal("", stdout.String())
|
|
||||||
|
|
||||||
suite.Regexp(`^Generated config: \{Command:upgrade.*\}`, stderr.String())
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *ConfigTestSuite) TestLogDebugCensorsKubeToken() {
|
|
||||||
stderr := &strings.Builder{}
|
|
||||||
kubeToken := "I'm shy! Don't put me in your build logs!"
|
|
||||||
cfg := Config{
|
|
||||||
Debug: true,
|
|
||||||
KubeToken: kubeToken,
|
|
||||||
Stderr: stderr,
|
|
||||||
}
|
|
||||||
|
|
||||||
cfg.logDebug()
|
|
||||||
|
|
||||||
suite.Contains(stderr.String(), "KubeToken:(redacted)")
|
|
||||||
suite.Equal(kubeToken, cfg.KubeToken) // The actual config value should be left unchanged
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *ConfigTestSuite) setenv(key, val string) {
|
|
||||||
orig, ok := os.LookupEnv(key)
|
|
||||||
if ok {
|
|
||||||
suite.envBackup[key] = &orig
|
|
||||||
} else {
|
|
||||||
suite.envBackup[key] = nil
|
|
||||||
}
|
|
||||||
os.Setenv(key, val)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *ConfigTestSuite) unsetenv(key string) {
|
|
||||||
orig, ok := os.LookupEnv(key)
|
|
||||||
if ok {
|
|
||||||
suite.envBackup[key] = &orig
|
|
||||||
} else {
|
|
||||||
suite.envBackup[key] = nil
|
|
||||||
}
|
|
||||||
os.Unsetenv(key)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *ConfigTestSuite) BeforeTest(_, _ string) {
|
|
||||||
suite.envBackup = make(map[string]*string)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *ConfigTestSuite) AfterTest(_, _ string) {
|
|
||||||
for key, val := range suite.envBackup {
|
|
||||||
if val == nil {
|
|
||||||
os.Unsetenv(key)
|
|
||||||
} else {
|
|
||||||
os.Setenv(key, *val)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -6,7 +6,6 @@ package helm
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
gomock "github.com/golang/mock/gomock"
|
gomock "github.com/golang/mock/gomock"
|
||||||
run "github.com/pelotech/drone-helm3/internal/run"
|
|
||||||
reflect "reflect"
|
reflect "reflect"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -34,29 +33,29 @@ func (m *MockStep) EXPECT() *MockStepMockRecorder {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Prepare mocks base method
|
// Prepare mocks base method
|
||||||
func (m *MockStep) Prepare(arg0 run.Config) error {
|
func (m *MockStep) Prepare() error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "Prepare", arg0)
|
ret := m.ctrl.Call(m, "Prepare")
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// Prepare indicates an expected call of Prepare
|
// Prepare indicates an expected call of Prepare
|
||||||
func (mr *MockStepMockRecorder) Prepare(arg0 interface{}) *gomock.Call {
|
func (mr *MockStepMockRecorder) Prepare() *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Prepare", reflect.TypeOf((*MockStep)(nil).Prepare), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Prepare", reflect.TypeOf((*MockStep)(nil).Prepare))
|
||||||
}
|
}
|
||||||
|
|
||||||
// Execute mocks base method
|
// Execute mocks base method
|
||||||
func (m *MockStep) Execute(arg0 run.Config) error {
|
func (m *MockStep) Execute() error {
|
||||||
m.ctrl.T.Helper()
|
m.ctrl.T.Helper()
|
||||||
ret := m.ctrl.Call(m, "Execute", arg0)
|
ret := m.ctrl.Call(m, "Execute")
|
||||||
ret0, _ := ret[0].(error)
|
ret0, _ := ret[0].(error)
|
||||||
return ret0
|
return ret0
|
||||||
}
|
}
|
||||||
|
|
||||||
// Execute indicates an expected call of Execute
|
// Execute indicates an expected call of Execute
|
||||||
func (mr *MockStepMockRecorder) Execute(arg0 interface{}) *gomock.Call {
|
func (mr *MockStepMockRecorder) Execute() *gomock.Call {
|
||||||
mr.mock.ctrl.T.Helper()
|
mr.mock.ctrl.T.Helper()
|
||||||
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Execute", reflect.TypeOf((*MockStep)(nil).Execute), arg0)
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Execute", reflect.TypeOf((*MockStep)(nil).Execute))
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,7 +1,9 @@
|
|||||||
package helm
|
package helm
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
"github.com/pelotech/drone-helm3/internal/run"
|
"github.com/pelotech/drone-helm3/internal/run"
|
||||||
"os"
|
"os"
|
||||||
)
|
)
|
||||||
@@ -13,30 +15,24 @@ const (
|
|||||||
|
|
||||||
// A Step is one step in the plan.
|
// A Step is one step in the plan.
|
||||||
type Step interface {
|
type Step interface {
|
||||||
Prepare(run.Config) error
|
Prepare() error
|
||||||
Execute(run.Config) error
|
Execute() error
|
||||||
}
|
}
|
||||||
|
|
||||||
// A Plan is a series of steps to perform.
|
// A Plan is a series of steps to perform.
|
||||||
type Plan struct {
|
type Plan struct {
|
||||||
steps []Step
|
steps []Step
|
||||||
cfg Config
|
cfg env.Config
|
||||||
runCfg run.Config
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewPlan makes a plan for running a helm operation.
|
// NewPlan makes a plan for running a helm operation.
|
||||||
func NewPlan(cfg Config) (*Plan, error) {
|
func NewPlan(cfg env.Config) (*Plan, error) {
|
||||||
p := Plan{
|
p := Plan{
|
||||||
cfg: cfg,
|
cfg: cfg,
|
||||||
runCfg: run.Config{
|
}
|
||||||
Debug: cfg.Debug,
|
|
||||||
Values: cfg.Values,
|
if cfg.UpdateDependencies && cfg.DependenciesAction != "" {
|
||||||
StringValues: cfg.StringValues,
|
return nil, errors.New("update_dependencies is deprecated and cannot be provided together with dependencies_action")
|
||||||
ValuesFiles: cfg.ValuesFiles,
|
|
||||||
Namespace: cfg.Namespace,
|
|
||||||
Stdout: cfg.Stdout,
|
|
||||||
Stderr: cfg.Stderr,
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
|
|
||||||
p.steps = (*determineSteps(cfg))(cfg)
|
p.steps = (*determineSteps(cfg))(cfg)
|
||||||
@@ -46,7 +42,7 @@ func NewPlan(cfg Config) (*Plan, error) {
|
|||||||
fmt.Fprintf(os.Stderr, "calling %T.Prepare (step %d)\n", step, i)
|
fmt.Fprintf(os.Stderr, "calling %T.Prepare (step %d)\n", step, i)
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := step.Prepare(p.runCfg); err != nil {
|
if err := step.Prepare(); err != nil {
|
||||||
err = fmt.Errorf("while preparing %T step: %w", step, err)
|
err = fmt.Errorf("while preparing %T step: %w", step, err)
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
@@ -57,7 +53,7 @@ func NewPlan(cfg Config) (*Plan, error) {
|
|||||||
|
|
||||||
// determineSteps is primarily for the tests' convenience: it allows testing the "which stuff should
|
// determineSteps is primarily for the tests' convenience: it allows testing the "which stuff should
|
||||||
// we do" logic without building a config that meets all the steps' requirements.
|
// we do" logic without building a config that meets all the steps' requirements.
|
||||||
func determineSteps(cfg Config) *func(Config) []Step {
|
func determineSteps(cfg env.Config) *func(env.Config) []Step {
|
||||||
switch cfg.Command {
|
switch cfg.Command {
|
||||||
case "upgrade":
|
case "upgrade":
|
||||||
return &upgrade
|
return &upgrade
|
||||||
@@ -69,13 +65,12 @@ func determineSteps(cfg Config) *func(Config) []Step {
|
|||||||
return &help
|
return &help
|
||||||
default:
|
default:
|
||||||
switch cfg.DroneEvent {
|
switch cfg.DroneEvent {
|
||||||
// Note: These events are documented in docs/upgrade_settings.yml. Any changes here should be reflected there.
|
|
||||||
case "push", "tag", "deployment", "pull_request", "promote", "rollback":
|
case "push", "tag", "deployment", "pull_request", "promote", "rollback":
|
||||||
return &upgrade
|
return &upgrade
|
||||||
case "delete":
|
case "delete":
|
||||||
return &uninstall
|
return &uninstall
|
||||||
default:
|
default:
|
||||||
panic("not implemented")
|
return &help
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -87,7 +82,7 @@ func (p *Plan) Execute() error {
|
|||||||
fmt.Fprintf(p.cfg.Stderr, "calling %T.Execute (step %d)\n", step, i)
|
fmt.Fprintf(p.cfg.Stderr, "calling %T.Execute (step %d)\n", step, i)
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := step.Execute(p.runCfg); err != nil {
|
if err := step.Execute(); err != nil {
|
||||||
return fmt.Errorf("while executing %T step: %w", step, err)
|
return fmt.Errorf("while executing %T step: %w", step, err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -95,56 +90,53 @@ func (p *Plan) Execute() error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
var upgrade = func(cfg Config) []Step {
|
var upgrade = func(cfg env.Config) []Step {
|
||||||
steps := initKube(cfg)
|
var steps []Step
|
||||||
|
if !cfg.SkipKubeconfig {
|
||||||
|
steps = append(steps, run.NewInitKube(cfg, kubeConfigTemplate, kubeConfigFile))
|
||||||
|
}
|
||||||
|
for _, repo := range cfg.AddRepos {
|
||||||
|
steps = append(steps, run.NewAddRepo(cfg, repo))
|
||||||
|
}
|
||||||
|
|
||||||
steps = append(steps, &run.Upgrade{
|
if cfg.DependenciesAction != "" {
|
||||||
Chart: cfg.Chart,
|
steps = append(steps, run.NewDepAction(cfg))
|
||||||
Release: cfg.Release,
|
}
|
||||||
ChartVersion: cfg.ChartVersion,
|
|
||||||
DryRun: cfg.DryRun,
|
if cfg.UpdateDependencies {
|
||||||
Wait: cfg.Wait,
|
steps = append(steps, run.NewDepUpdate(cfg))
|
||||||
ReuseValues: cfg.ReuseValues,
|
}
|
||||||
Timeout: cfg.Timeout,
|
|
||||||
Force: cfg.Force,
|
steps = append(steps, run.NewUpgrade(cfg))
|
||||||
})
|
|
||||||
|
|
||||||
return steps
|
return steps
|
||||||
}
|
}
|
||||||
|
|
||||||
var uninstall = func(cfg Config) []Step {
|
var uninstall = func(cfg env.Config) []Step {
|
||||||
steps := initKube(cfg)
|
var steps []Step
|
||||||
steps = append(steps, &run.Uninstall{
|
if !cfg.SkipKubeconfig {
|
||||||
Release: cfg.Release,
|
steps = append(steps, run.NewInitKube(cfg, kubeConfigTemplate, kubeConfigFile))
|
||||||
DryRun: cfg.DryRun,
|
}
|
||||||
})
|
if cfg.UpdateDependencies {
|
||||||
|
steps = append(steps, run.NewDepUpdate(cfg))
|
||||||
|
}
|
||||||
|
steps = append(steps, run.NewUninstall(cfg))
|
||||||
|
|
||||||
return steps
|
return steps
|
||||||
}
|
}
|
||||||
|
|
||||||
var lint = func(cfg Config) []Step {
|
var lint = func(cfg env.Config) []Step {
|
||||||
lint := &run.Lint{
|
var steps []Step
|
||||||
Chart: cfg.Chart,
|
for _, repo := range cfg.AddRepos {
|
||||||
|
steps = append(steps, run.NewAddRepo(cfg, repo))
|
||||||
}
|
}
|
||||||
|
if cfg.UpdateDependencies {
|
||||||
return []Step{lint}
|
steps = append(steps, run.NewDepUpdate(cfg))
|
||||||
}
|
|
||||||
|
|
||||||
var help = func(cfg Config) []Step {
|
|
||||||
help := &run.Help{}
|
|
||||||
return []Step{help}
|
|
||||||
}
|
|
||||||
|
|
||||||
func initKube(cfg Config) []Step {
|
|
||||||
return []Step{
|
|
||||||
&run.InitKube{
|
|
||||||
SkipTLSVerify: cfg.SkipTLSVerify,
|
|
||||||
Certificate: cfg.Certificate,
|
|
||||||
APIServer: cfg.APIServer,
|
|
||||||
ServiceAccount: cfg.ServiceAccount,
|
|
||||||
Token: cfg.KubeToken,
|
|
||||||
TemplateFile: kubeConfigTemplate,
|
|
||||||
ConfigFile: kubeConfigFile,
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
|
steps = append(steps, run.NewLint(cfg))
|
||||||
|
return steps
|
||||||
|
}
|
||||||
|
|
||||||
|
var help = func(cfg env.Config) []Step {
|
||||||
|
return []Step{run.NewHelp(cfg)}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -7,6 +7,7 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
"github.com/pelotech/drone-helm3/internal/run"
|
"github.com/pelotech/drone-helm3/internal/run"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -25,43 +26,29 @@ func (suite *PlanTestSuite) TestNewPlan() {
|
|||||||
stepTwo := NewMockStep(ctrl)
|
stepTwo := NewMockStep(ctrl)
|
||||||
|
|
||||||
origHelp := help
|
origHelp := help
|
||||||
help = func(cfg Config) []Step {
|
help = func(cfg env.Config) []Step {
|
||||||
return []Step{stepOne, stepTwo}
|
return []Step{stepOne, stepTwo}
|
||||||
}
|
}
|
||||||
defer func() { help = origHelp }()
|
defer func() { help = origHelp }()
|
||||||
|
|
||||||
stdout := strings.Builder{}
|
stdout := strings.Builder{}
|
||||||
stderr := strings.Builder{}
|
stderr := strings.Builder{}
|
||||||
cfg := Config{
|
cfg := env.Config{
|
||||||
Command: "help",
|
Command: "help",
|
||||||
Debug: false,
|
Debug: false,
|
||||||
Values: "steadfastness,forthrightness",
|
|
||||||
StringValues: "tensile_strength,flexibility",
|
|
||||||
ValuesFiles: []string{"/root/price_inventory.yml"},
|
|
||||||
Namespace: "outer",
|
|
||||||
Stdout: &stdout,
|
|
||||||
Stderr: &stderr,
|
|
||||||
}
|
|
||||||
|
|
||||||
runCfg := run.Config{
|
|
||||||
Debug: false,
|
|
||||||
Values: "steadfastness,forthrightness",
|
|
||||||
StringValues: "tensile_strength,flexibility",
|
|
||||||
ValuesFiles: []string{"/root/price_inventory.yml"},
|
|
||||||
Namespace: "outer",
|
Namespace: "outer",
|
||||||
Stdout: &stdout,
|
Stdout: &stdout,
|
||||||
Stderr: &stderr,
|
Stderr: &stderr,
|
||||||
}
|
}
|
||||||
|
|
||||||
stepOne.EXPECT().
|
stepOne.EXPECT().
|
||||||
Prepare(runCfg)
|
Prepare()
|
||||||
stepTwo.EXPECT().
|
stepTwo.EXPECT().
|
||||||
Prepare(runCfg)
|
Prepare()
|
||||||
|
|
||||||
plan, err := NewPlan(cfg)
|
plan, err := NewPlan(cfg)
|
||||||
suite.Require().Nil(err)
|
suite.Require().Nil(err)
|
||||||
suite.Equal(cfg, plan.cfg)
|
suite.Equal(cfg, plan.cfg)
|
||||||
suite.Equal(runCfg, plan.runCfg)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *PlanTestSuite) TestNewPlanAbortsOnError() {
|
func (suite *PlanTestSuite) TestNewPlanAbortsOnError() {
|
||||||
@@ -71,17 +58,17 @@ func (suite *PlanTestSuite) TestNewPlanAbortsOnError() {
|
|||||||
stepTwo := NewMockStep(ctrl)
|
stepTwo := NewMockStep(ctrl)
|
||||||
|
|
||||||
origHelp := help
|
origHelp := help
|
||||||
help = func(cfg Config) []Step {
|
help = func(cfg env.Config) []Step {
|
||||||
return []Step{stepOne, stepTwo}
|
return []Step{stepOne, stepTwo}
|
||||||
}
|
}
|
||||||
defer func() { help = origHelp }()
|
defer func() { help = origHelp }()
|
||||||
|
|
||||||
cfg := Config{
|
cfg := env.Config{
|
||||||
Command: "help",
|
Command: "help",
|
||||||
}
|
}
|
||||||
|
|
||||||
stepOne.EXPECT().
|
stepOne.EXPECT().
|
||||||
Prepare(gomock.Any()).
|
Prepare().
|
||||||
Return(fmt.Errorf("I'm starry Dave, aye, cat blew that"))
|
Return(fmt.Errorf("I'm starry Dave, aye, cat blew that"))
|
||||||
|
|
||||||
_, err := NewPlan(cfg)
|
_, err := NewPlan(cfg)
|
||||||
@@ -95,18 +82,15 @@ func (suite *PlanTestSuite) TestExecute() {
|
|||||||
stepOne := NewMockStep(ctrl)
|
stepOne := NewMockStep(ctrl)
|
||||||
stepTwo := NewMockStep(ctrl)
|
stepTwo := NewMockStep(ctrl)
|
||||||
|
|
||||||
runCfg := run.Config{}
|
|
||||||
|
|
||||||
plan := Plan{
|
plan := Plan{
|
||||||
steps: []Step{stepOne, stepTwo},
|
steps: []Step{stepOne, stepTwo},
|
||||||
runCfg: runCfg,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
stepOne.EXPECT().
|
stepOne.EXPECT().
|
||||||
Execute(runCfg).
|
Execute().
|
||||||
Times(1)
|
Times(1)
|
||||||
stepTwo.EXPECT().
|
stepTwo.EXPECT().
|
||||||
Execute(runCfg).
|
Execute().
|
||||||
Times(1)
|
Times(1)
|
||||||
|
|
||||||
suite.NoError(plan.Execute())
|
suite.NoError(plan.Execute())
|
||||||
@@ -118,15 +102,12 @@ func (suite *PlanTestSuite) TestExecuteAbortsOnError() {
|
|||||||
stepOne := NewMockStep(ctrl)
|
stepOne := NewMockStep(ctrl)
|
||||||
stepTwo := NewMockStep(ctrl)
|
stepTwo := NewMockStep(ctrl)
|
||||||
|
|
||||||
runCfg := run.Config{}
|
|
||||||
|
|
||||||
plan := Plan{
|
plan := Plan{
|
||||||
steps: []Step{stepOne, stepTwo},
|
steps: []Step{stepOne, stepTwo},
|
||||||
runCfg: runCfg,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
stepOne.EXPECT().
|
stepOne.EXPECT().
|
||||||
Execute(runCfg).
|
Execute().
|
||||||
Times(1).
|
Times(1).
|
||||||
Return(fmt.Errorf("oh, he'll gnaw"))
|
Return(fmt.Errorf("oh, he'll gnaw"))
|
||||||
|
|
||||||
@@ -135,118 +116,83 @@ func (suite *PlanTestSuite) TestExecuteAbortsOnError() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (suite *PlanTestSuite) TestUpgrade() {
|
func (suite *PlanTestSuite) TestUpgrade() {
|
||||||
cfg := Config{
|
steps := upgrade(env.Config{})
|
||||||
ChartVersion: "seventeen",
|
|
||||||
DryRun: true,
|
|
||||||
Wait: true,
|
|
||||||
ReuseValues: true,
|
|
||||||
Timeout: "go sit in the corner",
|
|
||||||
Chart: "billboard_top_100",
|
|
||||||
Release: "post_malone_circles",
|
|
||||||
Force: true,
|
|
||||||
}
|
|
||||||
|
|
||||||
steps := upgrade(cfg)
|
|
||||||
suite.Require().Equal(2, len(steps), "upgrade should return 2 steps")
|
suite.Require().Equal(2, len(steps), "upgrade should return 2 steps")
|
||||||
suite.Require().IsType(&run.InitKube{}, steps[0])
|
suite.IsType(&run.InitKube{}, steps[0])
|
||||||
|
suite.IsType(&run.Upgrade{}, steps[1])
|
||||||
suite.Require().IsType(&run.Upgrade{}, steps[1])
|
|
||||||
upgrade, _ := steps[1].(*run.Upgrade)
|
|
||||||
|
|
||||||
expected := &run.Upgrade{
|
|
||||||
Chart: cfg.Chart,
|
|
||||||
Release: cfg.Release,
|
|
||||||
ChartVersion: cfg.ChartVersion,
|
|
||||||
DryRun: true,
|
|
||||||
Wait: cfg.Wait,
|
|
||||||
ReuseValues: cfg.ReuseValues,
|
|
||||||
Timeout: cfg.Timeout,
|
|
||||||
Force: cfg.Force,
|
|
||||||
}
|
|
||||||
|
|
||||||
suite.Equal(expected, upgrade)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *PlanTestSuite) TestDel() {
|
func (suite *PlanTestSuite) TestUpgradeWithSkipKubeconfig() {
|
||||||
cfg := Config{
|
steps := upgrade(env.Config{SkipKubeconfig: true})
|
||||||
KubeToken: "b2YgbXkgYWZmZWN0aW9u",
|
suite.Require().Equal(1, len(steps), "upgrade should return 1 step")
|
||||||
SkipTLSVerify: true,
|
suite.IsType(&run.Upgrade{}, steps[0])
|
||||||
Certificate: "cHJvY2xhaW1zIHdvbmRlcmZ1bCBmcmllbmRzaGlw",
|
}
|
||||||
APIServer: "98.765.43.21",
|
|
||||||
ServiceAccount: "greathelm",
|
|
||||||
DryRun: true,
|
|
||||||
Timeout: "think about what you did",
|
|
||||||
Release: "jetta_id_love_to_change_the_world",
|
|
||||||
}
|
|
||||||
|
|
||||||
steps := uninstall(cfg)
|
func (suite *PlanTestSuite) TestUpgradeWithUpdateDependencies() {
|
||||||
|
cfg := env.Config{
|
||||||
|
UpdateDependencies: true,
|
||||||
|
}
|
||||||
|
steps := upgrade(cfg)
|
||||||
|
suite.Require().Equal(3, len(steps), "upgrade should have a third step when DepUpdate is true")
|
||||||
|
suite.IsType(&run.InitKube{}, steps[0])
|
||||||
|
suite.IsType(&run.DepUpdate{}, steps[1])
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *PlanTestSuite) TestUpgradeWithAddRepos() {
|
||||||
|
cfg := env.Config{
|
||||||
|
AddRepos: []string{
|
||||||
|
"machine=https://github.com/harold_finch/themachine",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
steps := upgrade(cfg)
|
||||||
|
suite.Require().True(len(steps) > 1, "upgrade should generate at least two steps")
|
||||||
|
suite.IsType(&run.AddRepo{}, steps[1])
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *PlanTestSuite) TestUninstall() {
|
||||||
|
steps := uninstall(env.Config{})
|
||||||
suite.Require().Equal(2, len(steps), "uninstall should return 2 steps")
|
suite.Require().Equal(2, len(steps), "uninstall should return 2 steps")
|
||||||
|
|
||||||
suite.Require().IsType(&run.InitKube{}, steps[0])
|
suite.IsType(&run.InitKube{}, steps[0])
|
||||||
init, _ := steps[0].(*run.InitKube)
|
suite.IsType(&run.Uninstall{}, steps[1])
|
||||||
var expected Step = &run.InitKube{
|
|
||||||
SkipTLSVerify: true,
|
|
||||||
Certificate: "cHJvY2xhaW1zIHdvbmRlcmZ1bCBmcmllbmRzaGlw",
|
|
||||||
APIServer: "98.765.43.21",
|
|
||||||
ServiceAccount: "greathelm",
|
|
||||||
Token: "b2YgbXkgYWZmZWN0aW9u",
|
|
||||||
TemplateFile: kubeConfigTemplate,
|
|
||||||
ConfigFile: kubeConfigFile,
|
|
||||||
}
|
|
||||||
|
|
||||||
suite.Equal(expected, init)
|
|
||||||
|
|
||||||
suite.Require().IsType(&run.Uninstall{}, steps[1])
|
|
||||||
actual, _ := steps[1].(*run.Uninstall)
|
|
||||||
expected = &run.Uninstall{
|
|
||||||
Release: "jetta_id_love_to_change_the_world",
|
|
||||||
DryRun: true,
|
|
||||||
}
|
|
||||||
suite.Equal(expected, actual)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *PlanTestSuite) TestInitKube() {
|
func (suite *PlanTestSuite) TestUninstallWithUpdateDependencies() {
|
||||||
cfg := Config{
|
cfg := env.Config{
|
||||||
KubeToken: "cXVlZXIgY2hhcmFjdGVyCg==",
|
UpdateDependencies: true,
|
||||||
SkipTLSVerify: true,
|
|
||||||
Certificate: "b2Ygd29rZW5lc3MK",
|
|
||||||
APIServer: "123.456.78.9",
|
|
||||||
ServiceAccount: "helmet",
|
|
||||||
}
|
}
|
||||||
|
steps := uninstall(cfg)
|
||||||
steps := initKube(cfg)
|
suite.Require().Equal(3, len(steps), "uninstall should have a third step when DepUpdate is true")
|
||||||
suite.Require().Equal(1, len(steps), "initKube should return one step")
|
suite.IsType(&run.InitKube{}, steps[0])
|
||||||
suite.Require().IsType(&run.InitKube{}, steps[0])
|
suite.IsType(&run.DepUpdate{}, steps[1])
|
||||||
init, _ := steps[0].(*run.InitKube)
|
|
||||||
|
|
||||||
expected := &run.InitKube{
|
|
||||||
SkipTLSVerify: true,
|
|
||||||
Certificate: "b2Ygd29rZW5lc3MK",
|
|
||||||
APIServer: "123.456.78.9",
|
|
||||||
ServiceAccount: "helmet",
|
|
||||||
Token: "cXVlZXIgY2hhcmFjdGVyCg==",
|
|
||||||
TemplateFile: kubeConfigTemplate,
|
|
||||||
ConfigFile: kubeConfigFile,
|
|
||||||
}
|
|
||||||
suite.Equal(expected, init)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *PlanTestSuite) TestLint() {
|
func (suite *PlanTestSuite) TestLint() {
|
||||||
cfg := Config{
|
steps := lint(env.Config{})
|
||||||
Chart: "./flow",
|
suite.Require().Equal(1, len(steps))
|
||||||
}
|
suite.IsType(&run.Lint{}, steps[0])
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *PlanTestSuite) TestLintWithUpdateDependencies() {
|
||||||
|
cfg := env.Config{
|
||||||
|
UpdateDependencies: true,
|
||||||
|
}
|
||||||
steps := lint(cfg)
|
steps := lint(cfg)
|
||||||
suite.Equal(1, len(steps))
|
suite.Require().Equal(2, len(steps), "lint should have a second step when DepUpdate is true")
|
||||||
|
suite.IsType(&run.DepUpdate{}, steps[0])
|
||||||
|
}
|
||||||
|
|
||||||
want := &run.Lint{
|
func (suite *PlanTestSuite) TestLintWithAddRepos() {
|
||||||
Chart: "./flow",
|
cfg := env.Config{
|
||||||
|
AddRepos: []string{"friendczar=https://github.com/logan_pierce/friendczar"},
|
||||||
}
|
}
|
||||||
suite.Equal(want, steps[0])
|
steps := lint(cfg)
|
||||||
|
suite.Require().True(len(steps) > 0, "lint should return at least one step")
|
||||||
|
suite.IsType(&run.AddRepo{}, steps[0])
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *PlanTestSuite) TestDeterminePlanUpgradeCommand() {
|
func (suite *PlanTestSuite) TestDeterminePlanUpgradeCommand() {
|
||||||
cfg := Config{
|
cfg := env.Config{
|
||||||
Command: "upgrade",
|
Command: "upgrade",
|
||||||
}
|
}
|
||||||
stepsMaker := determineSteps(cfg)
|
stepsMaker := determineSteps(cfg)
|
||||||
@@ -254,7 +200,7 @@ func (suite *PlanTestSuite) TestDeterminePlanUpgradeCommand() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (suite *PlanTestSuite) TestDeterminePlanUpgradeFromDroneEvent() {
|
func (suite *PlanTestSuite) TestDeterminePlanUpgradeFromDroneEvent() {
|
||||||
cfg := Config{}
|
cfg := env.Config{}
|
||||||
|
|
||||||
upgradeEvents := []string{"push", "tag", "deployment", "pull_request", "promote", "rollback"}
|
upgradeEvents := []string{"push", "tag", "deployment", "pull_request", "promote", "rollback"}
|
||||||
for _, event := range upgradeEvents {
|
for _, event := range upgradeEvents {
|
||||||
@@ -265,16 +211,16 @@ func (suite *PlanTestSuite) TestDeterminePlanUpgradeFromDroneEvent() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (suite *PlanTestSuite) TestDeterminePlanUninstallCommand() {
|
func (suite *PlanTestSuite) TestDeterminePlanUninstallCommand() {
|
||||||
cfg := Config{
|
cfg := env.Config{
|
||||||
Command: "uninstall",
|
Command: "uninstall",
|
||||||
}
|
}
|
||||||
stepsMaker := determineSteps(cfg)
|
stepsMaker := determineSteps(cfg)
|
||||||
suite.Same(&uninstall, stepsMaker)
|
suite.Same(&uninstall, stepsMaker)
|
||||||
}
|
}
|
||||||
|
|
||||||
// helm_command = delete is provided as an alias for backwards-compatibility with drone-helm
|
// helm_command = delete is provided as an alias for backward-compatibility with drone-helm
|
||||||
func (suite *PlanTestSuite) TestDeterminePlanDeleteCommand() {
|
func (suite *PlanTestSuite) TestDeterminePlanDeleteCommand() {
|
||||||
cfg := Config{
|
cfg := env.Config{
|
||||||
Command: "delete",
|
Command: "delete",
|
||||||
}
|
}
|
||||||
stepsMaker := determineSteps(cfg)
|
stepsMaker := determineSteps(cfg)
|
||||||
@@ -282,7 +228,7 @@ func (suite *PlanTestSuite) TestDeterminePlanDeleteCommand() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (suite *PlanTestSuite) TestDeterminePlanDeleteFromDroneEvent() {
|
func (suite *PlanTestSuite) TestDeterminePlanDeleteFromDroneEvent() {
|
||||||
cfg := Config{
|
cfg := env.Config{
|
||||||
DroneEvent: "delete",
|
DroneEvent: "delete",
|
||||||
}
|
}
|
||||||
stepsMaker := determineSteps(cfg)
|
stepsMaker := determineSteps(cfg)
|
||||||
@@ -290,7 +236,7 @@ func (suite *PlanTestSuite) TestDeterminePlanDeleteFromDroneEvent() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (suite *PlanTestSuite) TestDeterminePlanLintCommand() {
|
func (suite *PlanTestSuite) TestDeterminePlanLintCommand() {
|
||||||
cfg := Config{
|
cfg := env.Config{
|
||||||
Command: "lint",
|
Command: "lint",
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -299,7 +245,7 @@ func (suite *PlanTestSuite) TestDeterminePlanLintCommand() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (suite *PlanTestSuite) TestDeterminePlanHelpCommand() {
|
func (suite *PlanTestSuite) TestDeterminePlanHelpCommand() {
|
||||||
cfg := Config{
|
cfg := env.Config{
|
||||||
Command: "help",
|
Command: "help",
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
62
internal/run/addrepo.go
Normal file
62
internal/run/addrepo.go
Normal file
@@ -0,0 +1,62 @@
|
|||||||
|
package run
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
|
"strings"
|
||||||
|
)
|
||||||
|
|
||||||
|
// AddRepo is an execution step that calls `helm repo add` when executed.
|
||||||
|
type AddRepo struct {
|
||||||
|
*config
|
||||||
|
repo string
|
||||||
|
certs *repoCerts
|
||||||
|
cmd cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewAddRepo creates an AddRepo for the given repo-spec. No validation is performed at this time.
|
||||||
|
func NewAddRepo(cfg env.Config, repo string) *AddRepo {
|
||||||
|
return &AddRepo{
|
||||||
|
config: newConfig(cfg),
|
||||||
|
repo: repo,
|
||||||
|
certs: newRepoCerts(cfg),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Execute executes the `helm repo add` command.
|
||||||
|
func (a *AddRepo) Execute() error {
|
||||||
|
return a.cmd.Run()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Prepare gets the AddRepo ready to execute.
|
||||||
|
func (a *AddRepo) Prepare() error {
|
||||||
|
if a.repo == "" {
|
||||||
|
return fmt.Errorf("repo is required")
|
||||||
|
}
|
||||||
|
split := strings.SplitN(a.repo, "=", 2)
|
||||||
|
if len(split) != 2 {
|
||||||
|
return fmt.Errorf("bad repo spec '%s'", a.repo)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := a.certs.write(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
name := split[0]
|
||||||
|
url := split[1]
|
||||||
|
|
||||||
|
args := a.globalFlags()
|
||||||
|
args = append(args, "repo", "add")
|
||||||
|
args = append(args, a.certs.flags()...)
|
||||||
|
args = append(args, name, url)
|
||||||
|
|
||||||
|
a.cmd = command(helmBin, args...)
|
||||||
|
a.cmd.Stdout(a.stdout)
|
||||||
|
a.cmd.Stderr(a.stderr)
|
||||||
|
|
||||||
|
if a.debug {
|
||||||
|
fmt.Fprintf(a.stderr, "Generated command: '%s'\n", a.cmd.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
112
internal/run/addrepo_test.go
Normal file
112
internal/run/addrepo_test.go
Normal file
@@ -0,0 +1,112 @@
|
|||||||
|
package run
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/golang/mock/gomock"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
|
"github.com/stretchr/testify/suite"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
type AddRepoTestSuite struct {
|
||||||
|
suite.Suite
|
||||||
|
ctrl *gomock.Controller
|
||||||
|
mockCmd *Mockcmd
|
||||||
|
originalCommand func(string, ...string) cmd
|
||||||
|
commandPath string
|
||||||
|
commandArgs []string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *AddRepoTestSuite) BeforeTest(_, _ string) {
|
||||||
|
suite.ctrl = gomock.NewController(suite.T())
|
||||||
|
suite.mockCmd = NewMockcmd(suite.ctrl)
|
||||||
|
|
||||||
|
suite.originalCommand = command
|
||||||
|
command = func(path string, args ...string) cmd {
|
||||||
|
suite.commandPath = path
|
||||||
|
suite.commandArgs = args
|
||||||
|
return suite.mockCmd
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *AddRepoTestSuite) AfterTest(_, _ string) {
|
||||||
|
suite.ctrl.Finish()
|
||||||
|
command = suite.originalCommand
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestAddRepoTestSuite(t *testing.T) {
|
||||||
|
suite.Run(t, new(AddRepoTestSuite))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *AddRepoTestSuite) TestNewAddRepo() {
|
||||||
|
repo := NewAddRepo(env.Config{}, "picompress=https://github.com/caleb_phipps/picompress")
|
||||||
|
suite.Require().NotNil(repo)
|
||||||
|
suite.Equal("picompress=https://github.com/caleb_phipps/picompress", repo.repo)
|
||||||
|
suite.NotNil(repo.config)
|
||||||
|
suite.NotNil(repo.certs)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *AddRepoTestSuite) TestPrepareAndExecute() {
|
||||||
|
stdout := strings.Builder{}
|
||||||
|
stderr := strings.Builder{}
|
||||||
|
cfg := env.Config{
|
||||||
|
Stdout: &stdout,
|
||||||
|
Stderr: &stderr,
|
||||||
|
}
|
||||||
|
a := NewAddRepo(cfg, "edeath=https://github.com/n_marks/e-death")
|
||||||
|
|
||||||
|
suite.mockCmd.EXPECT().
|
||||||
|
Stdout(&stdout).
|
||||||
|
Times(1)
|
||||||
|
suite.mockCmd.EXPECT().
|
||||||
|
Stderr(&stderr).
|
||||||
|
Times(1)
|
||||||
|
|
||||||
|
suite.Require().NoError(a.Prepare())
|
||||||
|
suite.Equal(helmBin, suite.commandPath)
|
||||||
|
suite.Equal([]string{"repo", "add", "edeath", "https://github.com/n_marks/e-death"}, suite.commandArgs)
|
||||||
|
|
||||||
|
suite.mockCmd.EXPECT().
|
||||||
|
Run().
|
||||||
|
Times(1)
|
||||||
|
|
||||||
|
suite.Require().NoError(a.Execute())
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *AddRepoTestSuite) TestPrepareRepoIsRequired() {
|
||||||
|
// These aren't really expected, but allowing them gives clearer test-failure messages
|
||||||
|
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
||||||
|
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
||||||
|
a := NewAddRepo(env.Config{}, "")
|
||||||
|
|
||||||
|
err := a.Prepare()
|
||||||
|
suite.EqualError(err, "repo is required")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *AddRepoTestSuite) TestPrepareMalformedRepo() {
|
||||||
|
a := NewAddRepo(env.Config{}, "dwim")
|
||||||
|
err := a.Prepare()
|
||||||
|
suite.EqualError(err, "bad repo spec 'dwim'")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *AddRepoTestSuite) TestPrepareWithEqualSignInURL() {
|
||||||
|
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
||||||
|
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
||||||
|
a := NewAddRepo(env.Config{}, "samaritan=https://github.com/arthur_claypool/samaritan?version=2.1")
|
||||||
|
suite.NoError(a.Prepare())
|
||||||
|
suite.Contains(suite.commandArgs, "https://github.com/arthur_claypool/samaritan?version=2.1")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *AddRepoTestSuite) TestRepoAddFlags() {
|
||||||
|
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
||||||
|
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
||||||
|
cfg := env.Config{}
|
||||||
|
a := NewAddRepo(cfg, "machine=https://github.com/harold_finch/themachine")
|
||||||
|
|
||||||
|
// inject a ca cert filename so repoCerts won't create any files that we'd have to clean up
|
||||||
|
a.certs.caCertFilename = "./helm/reporepo.cert"
|
||||||
|
suite.NoError(a.Prepare())
|
||||||
|
suite.Equal([]string{"repo", "add", "--ca-file", "./helm/reporepo.cert",
|
||||||
|
"machine", "https://github.com/harold_finch/themachine"}, suite.commandArgs)
|
||||||
|
}
|
||||||
@@ -1,16 +1,33 @@
|
|||||||
package run
|
package run
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
"io"
|
"io"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Config contains configuration applicable to all helm commands
|
type config struct {
|
||||||
type Config struct {
|
debug bool
|
||||||
Debug bool
|
namespace string
|
||||||
Values string
|
stdout io.Writer
|
||||||
StringValues string
|
stderr io.Writer
|
||||||
ValuesFiles []string
|
}
|
||||||
Namespace string
|
|
||||||
Stdout io.Writer
|
func newConfig(cfg env.Config) *config {
|
||||||
Stderr io.Writer
|
return &config{
|
||||||
|
debug: cfg.Debug,
|
||||||
|
namespace: cfg.Namespace,
|
||||||
|
stdout: cfg.Stdout,
|
||||||
|
stderr: cfg.Stderr,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cfg *config) globalFlags() []string {
|
||||||
|
flags := []string{}
|
||||||
|
if cfg.debug {
|
||||||
|
flags = append(flags, "--debug")
|
||||||
|
}
|
||||||
|
if cfg.namespace != "" {
|
||||||
|
flags = append(flags, "--namespace", cfg.namespace)
|
||||||
|
}
|
||||||
|
return flags
|
||||||
}
|
}
|
||||||
|
|||||||
48
internal/run/config_test.go
Normal file
48
internal/run/config_test.go
Normal file
@@ -0,0 +1,48 @@
|
|||||||
|
package run
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
|
"github.com/stretchr/testify/suite"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ConfigTestSuite struct {
|
||||||
|
suite.Suite
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestConfigTestSuite(t *testing.T) {
|
||||||
|
suite.Run(t, new(ConfigTestSuite))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestNewConfig() {
|
||||||
|
stdout := &strings.Builder{}
|
||||||
|
stderr := &strings.Builder{}
|
||||||
|
envCfg := env.Config{
|
||||||
|
Namespace: "private",
|
||||||
|
Debug: true,
|
||||||
|
Stdout: stdout,
|
||||||
|
Stderr: stderr,
|
||||||
|
}
|
||||||
|
cfg := newConfig(envCfg)
|
||||||
|
suite.Require().NotNil(cfg)
|
||||||
|
suite.Equal(&config{
|
||||||
|
namespace: "private",
|
||||||
|
debug: true,
|
||||||
|
stdout: stdout,
|
||||||
|
stderr: stderr,
|
||||||
|
}, cfg)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *ConfigTestSuite) TestGlobalFlags() {
|
||||||
|
cfg := config{
|
||||||
|
debug: true,
|
||||||
|
namespace: "public",
|
||||||
|
}
|
||||||
|
flags := cfg.globalFlags()
|
||||||
|
suite.Equal([]string{"--debug", "--namespace", "public"}, flags)
|
||||||
|
|
||||||
|
cfg = config{}
|
||||||
|
flags = cfg.globalFlags()
|
||||||
|
suite.Equal([]string{}, flags)
|
||||||
|
}
|
||||||
59
internal/run/depaction.go
Normal file
59
internal/run/depaction.go
Normal file
@@ -0,0 +1,59 @@
|
|||||||
|
package run
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
actionBuild = "build"
|
||||||
|
actionUpdate = "update"
|
||||||
|
)
|
||||||
|
|
||||||
|
// DepAction is an execution step that calls `helm dependency update` or `helm dependency build` when executed.
|
||||||
|
type DepAction struct {
|
||||||
|
*config
|
||||||
|
chart string
|
||||||
|
cmd cmd
|
||||||
|
action string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewDepAction creates a DepAction using fields from the given Config. No validation is performed at this time.
|
||||||
|
func NewDepAction(cfg env.Config) *DepAction {
|
||||||
|
return &DepAction{
|
||||||
|
config: newConfig(cfg),
|
||||||
|
chart: cfg.Chart,
|
||||||
|
action: cfg.DependenciesAction,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Execute executes the `helm upgrade` command.
|
||||||
|
func (d *DepAction) Execute() error {
|
||||||
|
return d.cmd.Run()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Prepare gets the DepAction ready to execute.
|
||||||
|
func (d *DepAction) Prepare() error {
|
||||||
|
if d.chart == "" {
|
||||||
|
return fmt.Errorf("chart is required")
|
||||||
|
}
|
||||||
|
|
||||||
|
args := d.globalFlags()
|
||||||
|
|
||||||
|
if d.action != actionBuild && d.action != actionUpdate {
|
||||||
|
return errors.New("unknown dependency_action: " + d.action)
|
||||||
|
}
|
||||||
|
|
||||||
|
args = append(args, "dependency", d.action, d.chart)
|
||||||
|
|
||||||
|
d.cmd = command(helmBin, args...)
|
||||||
|
d.cmd.Stdout(d.stdout)
|
||||||
|
d.cmd.Stderr(d.stderr)
|
||||||
|
|
||||||
|
if d.debug {
|
||||||
|
fmt.Fprintf(d.stderr, "Generated command: '%s'\n", d.cmd.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
131
internal/run/depaction_test.go
Normal file
131
internal/run/depaction_test.go
Normal file
@@ -0,0 +1,131 @@
|
|||||||
|
package run
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"github.com/golang/mock/gomock"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
|
"github.com/stretchr/testify/suite"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
type DepActionTestSuite struct {
|
||||||
|
suite.Suite
|
||||||
|
ctrl *gomock.Controller
|
||||||
|
mockCmd *Mockcmd
|
||||||
|
originalCommand func(string, ...string) cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *DepActionTestSuite) BeforeTest(_, _ string) {
|
||||||
|
suite.ctrl = gomock.NewController(suite.T())
|
||||||
|
suite.mockCmd = NewMockcmd(suite.ctrl)
|
||||||
|
|
||||||
|
suite.originalCommand = command
|
||||||
|
command = func(path string, args ...string) cmd { return suite.mockCmd }
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *DepActionTestSuite) AfterTest(_, _ string) {
|
||||||
|
command = suite.originalCommand
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestDepActionTestSuite(t *testing.T) {
|
||||||
|
suite.Run(t, new(DepActionTestSuite))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *DepActionTestSuite) TestNewDepAction() {
|
||||||
|
cfg := env.Config{
|
||||||
|
Chart: "scatterplot",
|
||||||
|
}
|
||||||
|
d := NewDepAction(cfg)
|
||||||
|
suite.Equal("scatterplot", d.chart)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *DepActionTestSuite) TestPrepareAndExecuteBuild() {
|
||||||
|
defer suite.ctrl.Finish()
|
||||||
|
|
||||||
|
stdout := strings.Builder{}
|
||||||
|
stderr := strings.Builder{}
|
||||||
|
cfg := env.Config{
|
||||||
|
Chart: "your_top_songs_2019",
|
||||||
|
Stdout: &stdout,
|
||||||
|
Stderr: &stderr,
|
||||||
|
DependenciesAction: "build",
|
||||||
|
}
|
||||||
|
|
||||||
|
command = func(path string, args ...string) cmd {
|
||||||
|
suite.Equal(helmBin, path)
|
||||||
|
suite.Equal([]string{"dependency", "build", "your_top_songs_2019"}, args)
|
||||||
|
|
||||||
|
return suite.mockCmd
|
||||||
|
}
|
||||||
|
suite.mockCmd.EXPECT().
|
||||||
|
Stdout(&stdout)
|
||||||
|
suite.mockCmd.EXPECT().
|
||||||
|
Stderr(&stderr)
|
||||||
|
suite.mockCmd.EXPECT().
|
||||||
|
Run().
|
||||||
|
Times(1)
|
||||||
|
|
||||||
|
d := NewDepAction(cfg)
|
||||||
|
|
||||||
|
suite.Require().NoError(d.Prepare())
|
||||||
|
suite.NoError(d.Execute())
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *DepActionTestSuite) TestPrepareAndExecuteUpdate() {
|
||||||
|
defer suite.ctrl.Finish()
|
||||||
|
|
||||||
|
stdout := strings.Builder{}
|
||||||
|
stderr := strings.Builder{}
|
||||||
|
cfg := env.Config{
|
||||||
|
Chart: "your_top_songs_2019",
|
||||||
|
Stdout: &stdout,
|
||||||
|
Stderr: &stderr,
|
||||||
|
DependenciesAction: "update",
|
||||||
|
}
|
||||||
|
|
||||||
|
command = func(path string, args ...string) cmd {
|
||||||
|
suite.Equal(helmBin, path)
|
||||||
|
suite.Equal([]string{"dependency", "update", "your_top_songs_2019"}, args)
|
||||||
|
|
||||||
|
return suite.mockCmd
|
||||||
|
}
|
||||||
|
suite.mockCmd.EXPECT().
|
||||||
|
Stdout(&stdout)
|
||||||
|
suite.mockCmd.EXPECT().
|
||||||
|
Stderr(&stderr)
|
||||||
|
suite.mockCmd.EXPECT().
|
||||||
|
Run().
|
||||||
|
Times(1)
|
||||||
|
|
||||||
|
d := NewDepAction(cfg)
|
||||||
|
|
||||||
|
suite.Require().NoError(d.Prepare())
|
||||||
|
suite.NoError(d.Execute())
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *DepActionTestSuite) TestPrepareAndExecuteUnknown() {
|
||||||
|
defer suite.ctrl.Finish()
|
||||||
|
|
||||||
|
stdout := strings.Builder{}
|
||||||
|
stderr := strings.Builder{}
|
||||||
|
cfg := env.Config{
|
||||||
|
Chart: "your_top_songs_2019",
|
||||||
|
Stdout: &stdout,
|
||||||
|
Stderr: &stderr,
|
||||||
|
DependenciesAction: "downgrade",
|
||||||
|
}
|
||||||
|
|
||||||
|
d := NewDepAction(cfg)
|
||||||
|
suite.Require().Equal(errors.New("unknown dependency_action: downgrade"), d.Prepare())
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *DepActionTestSuite) TestPrepareChartRequired() {
|
||||||
|
d := NewDepAction(env.Config{})
|
||||||
|
|
||||||
|
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
||||||
|
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
||||||
|
|
||||||
|
err := d.Prepare()
|
||||||
|
suite.EqualError(err, "chart is required")
|
||||||
|
}
|
||||||
46
internal/run/depupdate.go
Normal file
46
internal/run/depupdate.go
Normal file
@@ -0,0 +1,46 @@
|
|||||||
|
package run
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
|
)
|
||||||
|
|
||||||
|
// DepUpdate is an execution step that calls `helm dependency update` when executed.
|
||||||
|
type DepUpdate struct {
|
||||||
|
*config
|
||||||
|
chart string
|
||||||
|
cmd cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewDepUpdate creates a DepUpdate using fields from the given Config. No validation is performed at this time.
|
||||||
|
func NewDepUpdate(cfg env.Config) *DepUpdate {
|
||||||
|
return &DepUpdate{
|
||||||
|
config: newConfig(cfg),
|
||||||
|
chart: cfg.Chart,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Execute executes the `helm upgrade` command.
|
||||||
|
func (d *DepUpdate) Execute() error {
|
||||||
|
return d.cmd.Run()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Prepare gets the DepUpdate ready to execute.
|
||||||
|
func (d *DepUpdate) Prepare() error {
|
||||||
|
if d.chart == "" {
|
||||||
|
return fmt.Errorf("chart is required")
|
||||||
|
}
|
||||||
|
|
||||||
|
args := d.globalFlags()
|
||||||
|
args = append(args, "dependency", "update", d.chart)
|
||||||
|
|
||||||
|
d.cmd = command(helmBin, args...)
|
||||||
|
d.cmd.Stdout(d.stdout)
|
||||||
|
d.cmd.Stderr(d.stderr)
|
||||||
|
|
||||||
|
if d.debug {
|
||||||
|
fmt.Fprintf(d.stderr, "Generated command: '%s'\n", d.cmd.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
81
internal/run/depupdate_test.go
Normal file
81
internal/run/depupdate_test.go
Normal file
@@ -0,0 +1,81 @@
|
|||||||
|
package run
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/golang/mock/gomock"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
|
"github.com/stretchr/testify/suite"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
type DepUpdateTestSuite struct {
|
||||||
|
suite.Suite
|
||||||
|
ctrl *gomock.Controller
|
||||||
|
mockCmd *Mockcmd
|
||||||
|
originalCommand func(string, ...string) cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *DepUpdateTestSuite) BeforeTest(_, _ string) {
|
||||||
|
suite.ctrl = gomock.NewController(suite.T())
|
||||||
|
suite.mockCmd = NewMockcmd(suite.ctrl)
|
||||||
|
|
||||||
|
suite.originalCommand = command
|
||||||
|
command = func(path string, args ...string) cmd { return suite.mockCmd }
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *DepUpdateTestSuite) AfterTest(_, _ string) {
|
||||||
|
command = suite.originalCommand
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestDepUpdateTestSuite(t *testing.T) {
|
||||||
|
suite.Run(t, new(DepUpdateTestSuite))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *DepUpdateTestSuite) TestNewDepUpdate() {
|
||||||
|
cfg := env.Config{
|
||||||
|
Chart: "scatterplot",
|
||||||
|
}
|
||||||
|
d := NewDepUpdate(cfg)
|
||||||
|
suite.Equal("scatterplot", d.chart)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *DepUpdateTestSuite) TestPrepareAndExecute() {
|
||||||
|
defer suite.ctrl.Finish()
|
||||||
|
|
||||||
|
stdout := strings.Builder{}
|
||||||
|
stderr := strings.Builder{}
|
||||||
|
cfg := env.Config{
|
||||||
|
Chart: "your_top_songs_2019",
|
||||||
|
Stdout: &stdout,
|
||||||
|
Stderr: &stderr,
|
||||||
|
}
|
||||||
|
|
||||||
|
command = func(path string, args ...string) cmd {
|
||||||
|
suite.Equal(helmBin, path)
|
||||||
|
suite.Equal([]string{"dependency", "update", "your_top_songs_2019"}, args)
|
||||||
|
|
||||||
|
return suite.mockCmd
|
||||||
|
}
|
||||||
|
suite.mockCmd.EXPECT().
|
||||||
|
Stdout(&stdout)
|
||||||
|
suite.mockCmd.EXPECT().
|
||||||
|
Stderr(&stderr)
|
||||||
|
suite.mockCmd.EXPECT().
|
||||||
|
Run().
|
||||||
|
Times(1)
|
||||||
|
|
||||||
|
d := NewDepUpdate(cfg)
|
||||||
|
|
||||||
|
suite.Require().NoError(d.Prepare())
|
||||||
|
suite.NoError(d.Execute())
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *DepUpdateTestSuite) TestPrepareChartRequired() {
|
||||||
|
d := NewDepUpdate(env.Config{})
|
||||||
|
|
||||||
|
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
||||||
|
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
||||||
|
|
||||||
|
err := d.Prepare()
|
||||||
|
suite.EqualError(err, "chart is required")
|
||||||
|
}
|
||||||
@@ -2,31 +2,47 @@ package run
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Help is a step in a helm Plan that calls `helm help`.
|
// Help is a step in a helm Plan that calls `helm help`.
|
||||||
type Help struct {
|
type Help struct {
|
||||||
|
*config
|
||||||
|
helmCommand string
|
||||||
cmd cmd
|
cmd cmd
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NewHelp creates a Help using fields from the given Config. No validation is performed at this time.
|
||||||
|
func NewHelp(cfg env.Config) *Help {
|
||||||
|
return &Help{
|
||||||
|
config: newConfig(cfg),
|
||||||
|
helmCommand: cfg.Command,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Execute executes the `helm help` command.
|
// Execute executes the `helm help` command.
|
||||||
func (h *Help) Execute(_ Config) error {
|
func (h *Help) Execute() error {
|
||||||
return h.cmd.Run()
|
if err := h.cmd.Run(); err != nil {
|
||||||
|
return fmt.Errorf("while running '%s': %w", h.cmd.String(), err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if h.helmCommand == "help" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return fmt.Errorf("unknown command '%s'", h.helmCommand)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Prepare gets the Help ready to execute.
|
// Prepare gets the Help ready to execute.
|
||||||
func (h *Help) Prepare(cfg Config) error {
|
func (h *Help) Prepare() error {
|
||||||
args := []string{"help"}
|
args := h.globalFlags()
|
||||||
if cfg.Debug {
|
args = append(args, "help")
|
||||||
args = append([]string{"--debug"}, args...)
|
|
||||||
}
|
|
||||||
|
|
||||||
h.cmd = command(helmBin, args...)
|
h.cmd = command(helmBin, args...)
|
||||||
h.cmd.Stdout(cfg.Stdout)
|
h.cmd.Stdout(h.stdout)
|
||||||
h.cmd.Stderr(cfg.Stderr)
|
h.cmd.Stderr(h.stderr)
|
||||||
|
|
||||||
if cfg.Debug {
|
if h.debug {
|
||||||
fmt.Fprintf(cfg.Stderr, "Generated command: '%s'\n", h.cmd.String())
|
fmt.Fprintf(h.stderr, "Generated command: '%s'\n", h.cmd.String())
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
|
|||||||
@@ -1,8 +1,8 @@
|
|||||||
package run
|
package run
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"github.com/golang/mock/gomock"
|
"github.com/golang/mock/gomock"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
"github.com/stretchr/testify/assert"
|
"github.com/stretchr/testify/assert"
|
||||||
"github.com/stretchr/testify/suite"
|
"github.com/stretchr/testify/suite"
|
||||||
"strings"
|
"strings"
|
||||||
@@ -17,6 +17,15 @@ func TestHelpTestSuite(t *testing.T) {
|
|||||||
suite.Run(t, new(HelpTestSuite))
|
suite.Run(t, new(HelpTestSuite))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (suite *HelpTestSuite) TestNewHelp() {
|
||||||
|
cfg := env.Config{
|
||||||
|
Command: "everybody dance NOW!!",
|
||||||
|
}
|
||||||
|
help := NewHelp(cfg)
|
||||||
|
suite.Require().NotNil(help)
|
||||||
|
suite.Equal("everybody dance NOW!!", help.helmCommand)
|
||||||
|
}
|
||||||
|
|
||||||
func (suite *HelpTestSuite) TestPrepare() {
|
func (suite *HelpTestSuite) TestPrepare() {
|
||||||
ctrl := gomock.NewController(suite.T())
|
ctrl := gomock.NewController(suite.T())
|
||||||
defer ctrl.Finish()
|
defer ctrl.Finish()
|
||||||
@@ -38,35 +47,30 @@ func (suite *HelpTestSuite) TestPrepare() {
|
|||||||
Stdout(&stdout)
|
Stdout(&stdout)
|
||||||
mCmd.EXPECT().
|
mCmd.EXPECT().
|
||||||
Stderr(&stderr)
|
Stderr(&stderr)
|
||||||
|
|
||||||
|
cfg := env.Config{
|
||||||
|
Stdout: &stdout,
|
||||||
|
Stderr: &stderr,
|
||||||
|
}
|
||||||
|
|
||||||
|
h := NewHelp(cfg)
|
||||||
|
err := h.Prepare()
|
||||||
|
suite.NoError(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *HelpTestSuite) TestExecute() {
|
||||||
|
ctrl := gomock.NewController(suite.T())
|
||||||
|
defer ctrl.Finish()
|
||||||
|
mCmd := NewMockcmd(ctrl)
|
||||||
|
|
||||||
mCmd.EXPECT().
|
mCmd.EXPECT().
|
||||||
Run().
|
Run().
|
||||||
Times(1)
|
Times(2)
|
||||||
|
|
||||||
cfg := Config{
|
help := NewHelp(env.Config{Command: "help"})
|
||||||
Stdout: &stdout,
|
help.cmd = mCmd
|
||||||
Stderr: &stderr,
|
suite.NoError(help.Execute())
|
||||||
}
|
|
||||||
|
|
||||||
h := Help{}
|
help.helmCommand = "get down on friday"
|
||||||
err := h.Prepare(cfg)
|
suite.EqualError(help.Execute(), "unknown command 'get down on friday'")
|
||||||
suite.Require().Nil(err)
|
|
||||||
h.Execute(cfg)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *HelpTestSuite) TestPrepareDebugFlag() {
|
|
||||||
help := Help{}
|
|
||||||
|
|
||||||
stdout := strings.Builder{}
|
|
||||||
stderr := strings.Builder{}
|
|
||||||
cfg := Config{
|
|
||||||
Debug: true,
|
|
||||||
Stdout: &stdout,
|
|
||||||
Stderr: &stderr,
|
|
||||||
}
|
|
||||||
|
|
||||||
help.Prepare(cfg)
|
|
||||||
|
|
||||||
want := fmt.Sprintf("Generated command: '%s --debug help'\n", helmBin)
|
|
||||||
suite.Equal(want, stderr.String())
|
|
||||||
suite.Equal("", stdout.String())
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,6 +3,7 @@ package run
|
|||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
"io"
|
"io"
|
||||||
"os"
|
"os"
|
||||||
"text/template"
|
"text/template"
|
||||||
@@ -10,14 +11,9 @@ import (
|
|||||||
|
|
||||||
// InitKube is a step in a helm Plan that initializes the kubernetes config file.
|
// InitKube is a step in a helm Plan that initializes the kubernetes config file.
|
||||||
type InitKube struct {
|
type InitKube struct {
|
||||||
SkipTLSVerify bool
|
*config
|
||||||
Certificate string
|
templateFilename string
|
||||||
APIServer string
|
configFilename string
|
||||||
ServiceAccount string
|
|
||||||
Token string
|
|
||||||
TemplateFile string
|
|
||||||
ConfigFile string
|
|
||||||
|
|
||||||
template *template.Template
|
template *template.Template
|
||||||
configFile io.WriteCloser
|
configFile io.WriteCloser
|
||||||
values kubeValues
|
values kubeValues
|
||||||
@@ -32,58 +28,66 @@ type kubeValues struct {
|
|||||||
Token string
|
Token string
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NewInitKube creates a InitKube using the given Config and filepaths. No validation is performed at this time.
|
||||||
|
func NewInitKube(cfg env.Config, templateFile, configFile string) *InitKube {
|
||||||
|
return &InitKube{
|
||||||
|
config: newConfig(cfg),
|
||||||
|
values: kubeValues{
|
||||||
|
SkipTLSVerify: cfg.SkipTLSVerify,
|
||||||
|
Certificate: cfg.Certificate,
|
||||||
|
APIServer: cfg.APIServer,
|
||||||
|
Namespace: cfg.Namespace,
|
||||||
|
ServiceAccount: cfg.ServiceAccount,
|
||||||
|
Token: cfg.KubeToken,
|
||||||
|
},
|
||||||
|
templateFilename: templateFile,
|
||||||
|
configFilename: configFile,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Execute generates a kubernetes config file from drone-helm3's template.
|
// Execute generates a kubernetes config file from drone-helm3's template.
|
||||||
func (i *InitKube) Execute(cfg Config) error {
|
func (i *InitKube) Execute() error {
|
||||||
if cfg.Debug {
|
if i.debug {
|
||||||
fmt.Fprintf(cfg.Stderr, "writing kubeconfig file to %s\n", i.ConfigFile)
|
fmt.Fprintf(i.stderr, "writing kubeconfig file to %s\n", i.configFilename)
|
||||||
}
|
}
|
||||||
defer i.configFile.Close()
|
defer i.configFile.Close()
|
||||||
return i.template.Execute(i.configFile, i.values)
|
return i.template.Execute(i.configFile, i.values)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Prepare ensures all required configuration is present and that the config file is writable.
|
// Prepare ensures all required configuration is present and that the config file is writable.
|
||||||
func (i *InitKube) Prepare(cfg Config) error {
|
func (i *InitKube) Prepare() error {
|
||||||
var err error
|
var err error
|
||||||
|
|
||||||
if i.APIServer == "" {
|
if i.values.APIServer == "" {
|
||||||
return errors.New("an API Server is needed to deploy")
|
return errors.New("an API Server is needed to deploy")
|
||||||
}
|
}
|
||||||
if i.Token == "" {
|
if i.values.Token == "" {
|
||||||
return errors.New("token is needed to deploy")
|
return errors.New("token is needed to deploy")
|
||||||
}
|
}
|
||||||
|
|
||||||
if i.ServiceAccount == "" {
|
if i.values.ServiceAccount == "" {
|
||||||
i.ServiceAccount = "helm"
|
i.values.ServiceAccount = "helm"
|
||||||
}
|
}
|
||||||
|
|
||||||
if cfg.Debug {
|
if i.debug {
|
||||||
fmt.Fprintf(cfg.Stderr, "loading kubeconfig template from %s\n", i.TemplateFile)
|
fmt.Fprintf(i.stderr, "loading kubeconfig template from %s\n", i.templateFilename)
|
||||||
}
|
}
|
||||||
i.template, err = template.ParseFiles(i.TemplateFile)
|
i.template, err = template.ParseFiles(i.templateFilename)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("could not load kubeconfig template: %w", err)
|
return fmt.Errorf("could not load kubeconfig template: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
i.values = kubeValues{
|
if i.debug {
|
||||||
SkipTLSVerify: i.SkipTLSVerify,
|
if _, err := os.Stat(i.configFilename); err != nil {
|
||||||
Certificate: i.Certificate,
|
|
||||||
APIServer: i.APIServer,
|
|
||||||
ServiceAccount: i.ServiceAccount,
|
|
||||||
Token: i.Token,
|
|
||||||
Namespace: cfg.Namespace,
|
|
||||||
}
|
|
||||||
|
|
||||||
if cfg.Debug {
|
|
||||||
if _, err := os.Stat(i.ConfigFile); err != nil {
|
|
||||||
// non-nil err here isn't an actual error state; the kubeconfig just doesn't exist
|
// non-nil err here isn't an actual error state; the kubeconfig just doesn't exist
|
||||||
fmt.Fprint(cfg.Stderr, "creating ")
|
fmt.Fprint(i.stderr, "creating ")
|
||||||
} else {
|
} else {
|
||||||
fmt.Fprint(cfg.Stderr, "truncating ")
|
fmt.Fprint(i.stderr, "truncating ")
|
||||||
}
|
}
|
||||||
fmt.Fprintf(cfg.Stderr, "kubeconfig file at %s\n", i.ConfigFile)
|
fmt.Fprintf(i.stderr, "kubeconfig file at %s\n", i.configFilename)
|
||||||
}
|
}
|
||||||
|
|
||||||
i.configFile, err = os.Create(i.ConfigFile)
|
i.configFile, err = os.Create(i.configFilename)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("could not open kubeconfig file for writing: %w", err)
|
return fmt.Errorf("could not open kubeconfig file for writing: %w", err)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,10 +1,13 @@
|
|||||||
package run
|
package run
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"fmt"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
"github.com/stretchr/testify/suite"
|
"github.com/stretchr/testify/suite"
|
||||||
yaml "gopkg.in/yaml.v2"
|
yaml "gopkg.in/yaml.v2"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"os"
|
"os"
|
||||||
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
"text/template"
|
"text/template"
|
||||||
)
|
)
|
||||||
@@ -17,6 +20,30 @@ func TestInitKubeTestSuite(t *testing.T) {
|
|||||||
suite.Run(t, new(InitKubeTestSuite))
|
suite.Run(t, new(InitKubeTestSuite))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (suite *InitKubeTestSuite) TestNewInitKube() {
|
||||||
|
cfg := env.Config{
|
||||||
|
SkipTLSVerify: true,
|
||||||
|
Certificate: "cHJvY2xhaW1zIHdvbmRlcmZ1bCBmcmllbmRzaGlw",
|
||||||
|
APIServer: "98.765.43.21",
|
||||||
|
ServiceAccount: "greathelm",
|
||||||
|
KubeToken: "b2YgbXkgYWZmZWN0aW9u",
|
||||||
|
Stderr: &strings.Builder{},
|
||||||
|
Debug: true,
|
||||||
|
}
|
||||||
|
|
||||||
|
init := NewInitKube(cfg, "conf.tpl", "conf.yml")
|
||||||
|
suite.Equal(kubeValues{
|
||||||
|
SkipTLSVerify: true,
|
||||||
|
Certificate: "cHJvY2xhaW1zIHdvbmRlcmZ1bCBmcmllbmRzaGlw",
|
||||||
|
APIServer: "98.765.43.21",
|
||||||
|
ServiceAccount: "greathelm",
|
||||||
|
Token: "b2YgbXkgYWZmZWN0aW9u",
|
||||||
|
}, init.values)
|
||||||
|
suite.Equal("conf.tpl", init.templateFilename)
|
||||||
|
suite.Equal("conf.yml", init.configFilename)
|
||||||
|
suite.NotNil(init.config)
|
||||||
|
}
|
||||||
|
|
||||||
func (suite *InitKubeTestSuite) TestPrepareExecute() {
|
func (suite *InitKubeTestSuite) TestPrepareExecute() {
|
||||||
templateFile, err := tempfile("kubeconfig********.yml.tpl", `
|
templateFile, err := tempfile("kubeconfig********.yml.tpl", `
|
||||||
certificate: {{ .Certificate }}
|
certificate: {{ .Certificate }}
|
||||||
@@ -29,23 +56,20 @@ namespace: {{ .Namespace }}
|
|||||||
defer os.Remove(configFile.Name())
|
defer os.Remove(configFile.Name())
|
||||||
suite.Require().Nil(err)
|
suite.Require().Nil(err)
|
||||||
|
|
||||||
init := InitKube{
|
cfg := env.Config{
|
||||||
APIServer: "Sysadmin",
|
APIServer: "Sysadmin",
|
||||||
Certificate: "CCNA",
|
Certificate: "CCNA",
|
||||||
Token: "Aspire virtual currency",
|
KubeToken: "Aspire virtual currency",
|
||||||
TemplateFile: templateFile.Name(),
|
|
||||||
ConfigFile: configFile.Name(),
|
|
||||||
}
|
|
||||||
cfg := Config{
|
|
||||||
Namespace: "Cisco",
|
Namespace: "Cisco",
|
||||||
}
|
}
|
||||||
err = init.Prepare(cfg)
|
init := NewInitKube(cfg, templateFile.Name(), configFile.Name())
|
||||||
|
err = init.Prepare()
|
||||||
suite.Require().Nil(err)
|
suite.Require().Nil(err)
|
||||||
|
|
||||||
suite.IsType(&template.Template{}, init.template)
|
suite.IsType(&template.Template{}, init.template)
|
||||||
suite.NotNil(init.configFile)
|
suite.NotNil(init.configFile)
|
||||||
|
|
||||||
err = init.Execute(cfg)
|
err = init.Execute()
|
||||||
suite.Require().Nil(err)
|
suite.Require().Nil(err)
|
||||||
|
|
||||||
conf, err := ioutil.ReadFile(configFile.Name())
|
conf, err := ioutil.ReadFile(configFile.Name())
|
||||||
@@ -63,19 +87,16 @@ func (suite *InitKubeTestSuite) TestExecuteGeneratesConfig() {
|
|||||||
defer os.Remove(configFile.Name())
|
defer os.Remove(configFile.Name())
|
||||||
suite.Require().NoError(err)
|
suite.Require().NoError(err)
|
||||||
|
|
||||||
cfg := Config{
|
cfg := env.Config{
|
||||||
Namespace: "marshmallow",
|
|
||||||
}
|
|
||||||
init := InitKube{
|
|
||||||
ConfigFile: configFile.Name(),
|
|
||||||
TemplateFile: "../../assets/kubeconfig.tpl", // the actual kubeconfig template
|
|
||||||
APIServer: "https://kube.cluster/peanut",
|
APIServer: "https://kube.cluster/peanut",
|
||||||
ServiceAccount: "chef",
|
ServiceAccount: "chef",
|
||||||
Token: "eWVhaCB3ZSB0b2tpbic=",
|
KubeToken: "eWVhaCB3ZSB0b2tpbic=",
|
||||||
Certificate: "d293LCB5b3UgYXJlIHNvIGNvb2wgZm9yIHNtb2tpbmcgd2VlZCDwn5mE",
|
Certificate: "d293LCB5b3UgYXJlIHNvIGNvb2wgZm9yIHNtb2tpbmcgd2VlZCDwn5mE",
|
||||||
|
Namespace: "marshmallow",
|
||||||
}
|
}
|
||||||
suite.Require().NoError(init.Prepare(cfg))
|
init := NewInitKube(cfg, "../../assets/kubeconfig.tpl", configFile.Name()) // the actual kubeconfig template
|
||||||
suite.Require().NoError(init.Execute(cfg))
|
suite.Require().NoError(init.Prepare())
|
||||||
|
suite.Require().NoError(init.Execute())
|
||||||
|
|
||||||
contents, err := ioutil.ReadFile(configFile.Name())
|
contents, err := ioutil.ReadFile(configFile.Name())
|
||||||
suite.Require().NoError(err)
|
suite.Require().NoError(err)
|
||||||
@@ -98,11 +119,11 @@ func (suite *InitKubeTestSuite) TestExecuteGeneratesConfig() {
|
|||||||
suite.NoError(yaml.UnmarshalStrict(contents, &conf))
|
suite.NoError(yaml.UnmarshalStrict(contents, &conf))
|
||||||
|
|
||||||
// test the other branch of the certificate/SkipTLSVerify conditional
|
// test the other branch of the certificate/SkipTLSVerify conditional
|
||||||
init.SkipTLSVerify = true
|
init.values.SkipTLSVerify = true
|
||||||
init.Certificate = ""
|
init.values.Certificate = ""
|
||||||
|
|
||||||
suite.Require().NoError(init.Prepare(cfg))
|
suite.Require().NoError(init.Prepare())
|
||||||
suite.Require().NoError(init.Execute(cfg))
|
suite.Require().NoError(init.Execute())
|
||||||
contents, err = ioutil.ReadFile(configFile.Name())
|
contents, err = ioutil.ReadFile(configFile.Name())
|
||||||
suite.Require().NoError(err)
|
suite.Require().NoError(err)
|
||||||
suite.Contains(string(contents), "insecure-skip-tls-verify: true")
|
suite.Contains(string(contents), "insecure-skip-tls-verify: true")
|
||||||
@@ -116,25 +137,25 @@ func (suite *InitKubeTestSuite) TestPrepareParseError() {
|
|||||||
defer os.Remove(templateFile.Name())
|
defer os.Remove(templateFile.Name())
|
||||||
suite.Require().Nil(err)
|
suite.Require().Nil(err)
|
||||||
|
|
||||||
init := InitKube{
|
cfg := env.Config{
|
||||||
APIServer: "Sysadmin",
|
APIServer: "Sysadmin",
|
||||||
Certificate: "CCNA",
|
Certificate: "CCNA",
|
||||||
Token: "Aspire virtual currency",
|
KubeToken: "Aspire virtual currency",
|
||||||
TemplateFile: templateFile.Name(),
|
|
||||||
}
|
}
|
||||||
err = init.Prepare(Config{})
|
init := NewInitKube(cfg, templateFile.Name(), "")
|
||||||
|
err = init.Prepare()
|
||||||
suite.Error(err)
|
suite.Error(err)
|
||||||
suite.Regexp("could not load kubeconfig .* function .* not defined", err)
|
suite.Regexp("could not load kubeconfig .* function .* not defined", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *InitKubeTestSuite) TestPrepareNonexistentTemplateFile() {
|
func (suite *InitKubeTestSuite) TestPrepareNonexistentTemplateFile() {
|
||||||
init := InitKube{
|
cfg := env.Config{
|
||||||
APIServer: "Sysadmin",
|
APIServer: "Sysadmin",
|
||||||
Certificate: "CCNA",
|
Certificate: "CCNA",
|
||||||
Token: "Aspire virtual currency",
|
KubeToken: "Aspire virtual currency",
|
||||||
TemplateFile: "/usr/foreign/exclude/kubeprofig.tpl",
|
|
||||||
}
|
}
|
||||||
err := init.Prepare(Config{})
|
init := NewInitKube(cfg, "/usr/foreign/exclude/kubeprofig.tpl", "")
|
||||||
|
err := init.Prepare()
|
||||||
suite.Error(err)
|
suite.Error(err)
|
||||||
suite.Regexp("could not load kubeconfig .* no such file or directory", err)
|
suite.Regexp("could not load kubeconfig .* no such file or directory", err)
|
||||||
}
|
}
|
||||||
@@ -143,16 +164,14 @@ func (suite *InitKubeTestSuite) TestPrepareCannotOpenDestinationFile() {
|
|||||||
templateFile, err := tempfile("kubeconfig********.yml.tpl", "hurgity burgity")
|
templateFile, err := tempfile("kubeconfig********.yml.tpl", "hurgity burgity")
|
||||||
defer os.Remove(templateFile.Name())
|
defer os.Remove(templateFile.Name())
|
||||||
suite.Require().Nil(err)
|
suite.Require().Nil(err)
|
||||||
init := InitKube{
|
cfg := env.Config{
|
||||||
APIServer: "Sysadmin",
|
APIServer: "Sysadmin",
|
||||||
Certificate: "CCNA",
|
Certificate: "CCNA",
|
||||||
Token: "Aspire virtual currency",
|
KubeToken: "Aspire virtual currency",
|
||||||
TemplateFile: templateFile.Name(),
|
|
||||||
ConfigFile: "/usr/foreign/exclude/kubeprofig",
|
|
||||||
}
|
}
|
||||||
|
init := NewInitKube(cfg, templateFile.Name(), "/usr/foreign/exclude/kubeprofig")
|
||||||
|
|
||||||
cfg := Config{}
|
err = init.Prepare()
|
||||||
err = init.Prepare(cfg)
|
|
||||||
suite.Error(err)
|
suite.Error(err)
|
||||||
suite.Regexp("could not open .* for writing: .* no such file or directory", err)
|
suite.Regexp("could not open .* for writing: .* no such file or directory", err)
|
||||||
}
|
}
|
||||||
@@ -167,24 +186,21 @@ func (suite *InitKubeTestSuite) TestPrepareRequiredConfig() {
|
|||||||
suite.Require().Nil(err)
|
suite.Require().Nil(err)
|
||||||
|
|
||||||
// initial config with all required fields present
|
// initial config with all required fields present
|
||||||
init := InitKube{
|
cfg := env.Config{
|
||||||
APIServer: "Sysadmin",
|
APIServer: "Sysadmin",
|
||||||
Certificate: "CCNA",
|
Certificate: "CCNA",
|
||||||
Token: "Aspire virtual currency",
|
KubeToken: "Aspire virtual currency",
|
||||||
TemplateFile: templateFile.Name(),
|
|
||||||
ConfigFile: configFile.Name(),
|
|
||||||
}
|
}
|
||||||
|
|
||||||
cfg := Config{}
|
init := NewInitKube(cfg, templateFile.Name(), configFile.Name())
|
||||||
|
suite.NoError(init.Prepare()) // consistency check; we should be starting in a happy state
|
||||||
|
|
||||||
suite.NoError(init.Prepare(cfg)) // consistency check; we should be starting in a happy state
|
init.values.APIServer = ""
|
||||||
|
suite.Error(init.Prepare(), "APIServer should be required.")
|
||||||
|
|
||||||
init.APIServer = ""
|
init.values.APIServer = "Sysadmin"
|
||||||
suite.Error(init.Prepare(cfg), "APIServer should be required.")
|
init.values.Token = ""
|
||||||
|
suite.Error(init.Prepare(), "Token should be required.")
|
||||||
init.APIServer = "Sysadmin"
|
|
||||||
init.Token = ""
|
|
||||||
suite.Error(init.Prepare(cfg), "Token should be required.")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *InitKubeTestSuite) TestPrepareDefaultsServiceAccount() {
|
func (suite *InitKubeTestSuite) TestPrepareDefaultsServiceAccount() {
|
||||||
@@ -196,18 +212,43 @@ func (suite *InitKubeTestSuite) TestPrepareDefaultsServiceAccount() {
|
|||||||
defer os.Remove(configFile.Name())
|
defer os.Remove(configFile.Name())
|
||||||
suite.Require().Nil(err)
|
suite.Require().Nil(err)
|
||||||
|
|
||||||
init := InitKube{
|
cfg := env.Config{
|
||||||
APIServer: "Sysadmin",
|
APIServer: "Sysadmin",
|
||||||
Certificate: "CCNA",
|
Certificate: "CCNA",
|
||||||
Token: "Aspire virtual currency",
|
KubeToken: "Aspire virtual currency",
|
||||||
TemplateFile: templateFile.Name(),
|
|
||||||
ConfigFile: configFile.Name(),
|
|
||||||
}
|
}
|
||||||
|
init := NewInitKube(cfg, templateFile.Name(), configFile.Name())
|
||||||
|
|
||||||
cfg := Config{}
|
init.Prepare()
|
||||||
|
suite.Equal("helm", init.values.ServiceAccount)
|
||||||
|
}
|
||||||
|
|
||||||
init.Prepare(cfg)
|
func (suite *InitKubeTestSuite) TestDebugOutput() {
|
||||||
suite.Equal("helm", init.ServiceAccount)
|
templateFile, err := tempfile("kubeconfig********.yml.tpl", "hurgity burgity")
|
||||||
|
defer os.Remove(templateFile.Name())
|
||||||
|
suite.Require().Nil(err)
|
||||||
|
|
||||||
|
configFile, err := tempfile("kubeconfig********.yml", "")
|
||||||
|
defer os.Remove(configFile.Name())
|
||||||
|
suite.Require().Nil(err)
|
||||||
|
|
||||||
|
stdout := &strings.Builder{}
|
||||||
|
stderr := &strings.Builder{}
|
||||||
|
cfg := env.Config{
|
||||||
|
APIServer: "http://my.kube.server/",
|
||||||
|
KubeToken: "QSBzaW5nbGUgcm9zZQ==",
|
||||||
|
Debug: true,
|
||||||
|
Stdout: stdout,
|
||||||
|
Stderr: stderr,
|
||||||
|
}
|
||||||
|
init := NewInitKube(cfg, templateFile.Name(), configFile.Name())
|
||||||
|
suite.NoError(init.Prepare())
|
||||||
|
|
||||||
|
suite.Contains(stderr.String(), fmt.Sprintf("loading kubeconfig template from %s\n", templateFile.Name()))
|
||||||
|
suite.Contains(stderr.String(), fmt.Sprintf("truncating kubeconfig file at %s\n", configFile.Name()))
|
||||||
|
|
||||||
|
suite.NoError(init.Execute())
|
||||||
|
suite.Contains(stderr.String(), fmt.Sprintf("writing kubeconfig file to %s\n", configFile.Name()))
|
||||||
}
|
}
|
||||||
|
|
||||||
func tempfile(name, contents string) (*os.File, error) {
|
func tempfile(name, contents string) (*os.File, error) {
|
||||||
|
|||||||
@@ -2,56 +2,67 @@ package run
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Lint is an execution step that calls `helm lint` when executed.
|
// Lint is an execution step that calls `helm lint` when executed.
|
||||||
type Lint struct {
|
type Lint struct {
|
||||||
Chart string
|
*config
|
||||||
|
chart string
|
||||||
|
values string
|
||||||
|
stringValues string
|
||||||
|
valuesFiles []string
|
||||||
|
strict bool
|
||||||
cmd cmd
|
cmd cmd
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NewLint creates a Lint using fields from the given Config. No validation is performed at this time.
|
||||||
|
func NewLint(cfg env.Config) *Lint {
|
||||||
|
return &Lint{
|
||||||
|
config: newConfig(cfg),
|
||||||
|
chart: cfg.Chart,
|
||||||
|
values: cfg.Values,
|
||||||
|
stringValues: cfg.StringValues,
|
||||||
|
valuesFiles: cfg.ValuesFiles,
|
||||||
|
strict: cfg.LintStrictly,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Execute executes the `helm lint` command.
|
// Execute executes the `helm lint` command.
|
||||||
func (l *Lint) Execute(_ Config) error {
|
func (l *Lint) Execute() error {
|
||||||
return l.cmd.Run()
|
return l.cmd.Run()
|
||||||
}
|
}
|
||||||
|
|
||||||
// Prepare gets the Lint ready to execute.
|
// Prepare gets the Lint ready to execute.
|
||||||
// Note: mandatory settings are documented in README.md, and the full list of settings is in docs/lint_settings.yml.
|
func (l *Lint) Prepare() error {
|
||||||
// Any additions or deletions here should be reflected there.
|
if l.chart == "" {
|
||||||
func (l *Lint) Prepare(cfg Config) error {
|
|
||||||
if l.Chart == "" {
|
|
||||||
return fmt.Errorf("chart is required")
|
return fmt.Errorf("chart is required")
|
||||||
}
|
}
|
||||||
|
|
||||||
args := make([]string, 0)
|
args := l.globalFlags()
|
||||||
|
|
||||||
if cfg.Namespace != "" {
|
|
||||||
args = append(args, "--namespace", cfg.Namespace)
|
|
||||||
}
|
|
||||||
if cfg.Debug {
|
|
||||||
args = append(args, "--debug")
|
|
||||||
}
|
|
||||||
|
|
||||||
args = append(args, "lint")
|
args = append(args, "lint")
|
||||||
|
|
||||||
if cfg.Values != "" {
|
if l.values != "" {
|
||||||
args = append(args, "--set", cfg.Values)
|
args = append(args, "--set", l.values)
|
||||||
}
|
}
|
||||||
if cfg.StringValues != "" {
|
if l.stringValues != "" {
|
||||||
args = append(args, "--set-string", cfg.StringValues)
|
args = append(args, "--set-string", l.stringValues)
|
||||||
}
|
}
|
||||||
for _, vFile := range cfg.ValuesFiles {
|
for _, vFile := range l.valuesFiles {
|
||||||
args = append(args, "--values", vFile)
|
args = append(args, "--values", vFile)
|
||||||
}
|
}
|
||||||
|
if l.strict {
|
||||||
|
args = append(args, "--strict")
|
||||||
|
}
|
||||||
|
|
||||||
args = append(args, l.Chart)
|
args = append(args, l.chart)
|
||||||
|
|
||||||
l.cmd = command(helmBin, args...)
|
l.cmd = command(helmBin, args...)
|
||||||
l.cmd.Stdout(cfg.Stdout)
|
l.cmd.Stdout(l.stdout)
|
||||||
l.cmd.Stderr(cfg.Stderr)
|
l.cmd.Stderr(l.stderr)
|
||||||
|
|
||||||
if cfg.Debug {
|
if l.debug {
|
||||||
fmt.Fprintf(cfg.Stderr, "Generated command: '%s'\n", l.cmd.String())
|
fmt.Fprintf(l.stderr, "Generated command: '%s'\n", l.cmd.String())
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
|
|||||||
@@ -1,8 +1,8 @@
|
|||||||
package run
|
package run
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"github.com/golang/mock/gomock"
|
"github.com/golang/mock/gomock"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
"github.com/stretchr/testify/suite"
|
"github.com/stretchr/testify/suite"
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
@@ -31,19 +31,36 @@ func TestLintTestSuite(t *testing.T) {
|
|||||||
suite.Run(t, new(LintTestSuite))
|
suite.Run(t, new(LintTestSuite))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (suite *LintTestSuite) TestNewLint() {
|
||||||
|
cfg := env.Config{
|
||||||
|
Chart: "./flow",
|
||||||
|
Values: "steadfastness,forthrightness",
|
||||||
|
StringValues: "tensile_strength,flexibility",
|
||||||
|
ValuesFiles: []string{"/root/price_inventory.yml"},
|
||||||
|
LintStrictly: true,
|
||||||
|
}
|
||||||
|
lint := NewLint(cfg)
|
||||||
|
suite.Require().NotNil(lint)
|
||||||
|
suite.Equal("./flow", lint.chart)
|
||||||
|
suite.Equal("steadfastness,forthrightness", lint.values)
|
||||||
|
suite.Equal("tensile_strength,flexibility", lint.stringValues)
|
||||||
|
suite.Equal([]string{"/root/price_inventory.yml"}, lint.valuesFiles)
|
||||||
|
suite.Equal(true, lint.strict)
|
||||||
|
suite.NotNil(lint.config)
|
||||||
|
}
|
||||||
|
|
||||||
func (suite *LintTestSuite) TestPrepareAndExecute() {
|
func (suite *LintTestSuite) TestPrepareAndExecute() {
|
||||||
defer suite.ctrl.Finish()
|
defer suite.ctrl.Finish()
|
||||||
|
|
||||||
stdout := strings.Builder{}
|
stdout := strings.Builder{}
|
||||||
stderr := strings.Builder{}
|
stderr := strings.Builder{}
|
||||||
|
|
||||||
l := Lint{
|
cfg := env.Config{
|
||||||
Chart: "./epic/mychart",
|
Chart: "./epic/mychart",
|
||||||
}
|
|
||||||
cfg := Config{
|
|
||||||
Stdout: &stdout,
|
Stdout: &stdout,
|
||||||
Stderr: &stderr,
|
Stderr: &stderr,
|
||||||
}
|
}
|
||||||
|
l := NewLint(cfg)
|
||||||
|
|
||||||
command = func(path string, args ...string) cmd {
|
command = func(path string, args ...string) cmd {
|
||||||
suite.Equal(helmBin, path)
|
suite.Equal(helmBin, path)
|
||||||
@@ -52,6 +69,7 @@ func (suite *LintTestSuite) TestPrepareAndExecute() {
|
|||||||
return suite.mockCmd
|
return suite.mockCmd
|
||||||
}
|
}
|
||||||
|
|
||||||
|
suite.mockCmd.EXPECT().String().AnyTimes()
|
||||||
suite.mockCmd.EXPECT().
|
suite.mockCmd.EXPECT().
|
||||||
Stdout(&stdout)
|
Stdout(&stdout)
|
||||||
suite.mockCmd.EXPECT().
|
suite.mockCmd.EXPECT().
|
||||||
@@ -60,9 +78,9 @@ func (suite *LintTestSuite) TestPrepareAndExecute() {
|
|||||||
Run().
|
Run().
|
||||||
Times(1)
|
Times(1)
|
||||||
|
|
||||||
err := l.Prepare(cfg)
|
err := l.Prepare()
|
||||||
suite.Require().Nil(err)
|
suite.Require().Nil(err)
|
||||||
l.Execute(cfg)
|
l.Execute()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *LintTestSuite) TestPrepareRequiresChart() {
|
func (suite *LintTestSuite) TestPrepareRequiresChart() {
|
||||||
@@ -70,25 +88,22 @@ func (suite *LintTestSuite) TestPrepareRequiresChart() {
|
|||||||
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
||||||
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
||||||
|
|
||||||
cfg := Config{}
|
l := NewLint(env.Config{})
|
||||||
l := Lint{}
|
err := l.Prepare()
|
||||||
|
|
||||||
err := l.Prepare(cfg)
|
|
||||||
suite.EqualError(err, "chart is required", "Chart should be mandatory")
|
suite.EqualError(err, "chart is required", "Chart should be mandatory")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *LintTestSuite) TestPrepareWithLintFlags() {
|
func (suite *LintTestSuite) TestPrepareWithLintFlags() {
|
||||||
defer suite.ctrl.Finish()
|
defer suite.ctrl.Finish()
|
||||||
|
|
||||||
cfg := Config{
|
cfg := env.Config{
|
||||||
|
Chart: "./uk/top_40",
|
||||||
Values: "width=5",
|
Values: "width=5",
|
||||||
StringValues: "version=2.0",
|
StringValues: "version=2.0",
|
||||||
ValuesFiles: []string{"/usr/local/underrides", "/usr/local/overrides"},
|
ValuesFiles: []string{"/usr/local/underrides", "/usr/local/overrides"},
|
||||||
|
LintStrictly: true,
|
||||||
}
|
}
|
||||||
|
l := NewLint(cfg)
|
||||||
l := Lint{
|
|
||||||
Chart: "./uk/top_40",
|
|
||||||
}
|
|
||||||
|
|
||||||
command = func(path string, args ...string) cmd {
|
command = func(path string, args ...string) cmd {
|
||||||
suite.Equal(helmBin, path)
|
suite.Equal(helmBin, path)
|
||||||
@@ -97,6 +112,7 @@ func (suite *LintTestSuite) TestPrepareWithLintFlags() {
|
|||||||
"--set-string", "version=2.0",
|
"--set-string", "version=2.0",
|
||||||
"--values", "/usr/local/underrides",
|
"--values", "/usr/local/underrides",
|
||||||
"--values", "/usr/local/overrides",
|
"--values", "/usr/local/overrides",
|
||||||
|
"--strict",
|
||||||
"./uk/top_40"}, args)
|
"./uk/top_40"}, args)
|
||||||
|
|
||||||
return suite.mockCmd
|
return suite.mockCmd
|
||||||
@@ -104,66 +120,8 @@ func (suite *LintTestSuite) TestPrepareWithLintFlags() {
|
|||||||
|
|
||||||
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
||||||
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
||||||
|
suite.mockCmd.EXPECT().String().AnyTimes()
|
||||||
|
|
||||||
err := l.Prepare(cfg)
|
err := l.Prepare()
|
||||||
suite.Require().Nil(err)
|
suite.Require().Nil(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *LintTestSuite) TestPrepareWithDebugFlag() {
|
|
||||||
defer suite.ctrl.Finish()
|
|
||||||
|
|
||||||
stderr := strings.Builder{}
|
|
||||||
|
|
||||||
cfg := Config{
|
|
||||||
Debug: true,
|
|
||||||
Stderr: &stderr,
|
|
||||||
}
|
|
||||||
|
|
||||||
l := Lint{
|
|
||||||
Chart: "./scotland/top_40",
|
|
||||||
}
|
|
||||||
|
|
||||||
command = func(path string, args ...string) cmd {
|
|
||||||
suite.mockCmd.EXPECT().
|
|
||||||
String().
|
|
||||||
Return(fmt.Sprintf("%s %s", path, strings.Join(args, " ")))
|
|
||||||
|
|
||||||
return suite.mockCmd
|
|
||||||
}
|
|
||||||
|
|
||||||
suite.mockCmd.EXPECT().Stdout(gomock.Any())
|
|
||||||
suite.mockCmd.EXPECT().Stderr(&stderr)
|
|
||||||
|
|
||||||
err := l.Prepare(cfg)
|
|
||||||
suite.Require().Nil(err)
|
|
||||||
|
|
||||||
want := fmt.Sprintf("Generated command: '%s --debug lint ./scotland/top_40'\n", helmBin)
|
|
||||||
suite.Equal(want, stderr.String())
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *LintTestSuite) TestPrepareWithNamespaceFlag() {
|
|
||||||
defer suite.ctrl.Finish()
|
|
||||||
|
|
||||||
cfg := Config{
|
|
||||||
Namespace: "table-service",
|
|
||||||
}
|
|
||||||
|
|
||||||
l := Lint{
|
|
||||||
Chart: "./wales/top_40",
|
|
||||||
}
|
|
||||||
|
|
||||||
actual := []string{}
|
|
||||||
command = func(path string, args ...string) cmd {
|
|
||||||
actual = args
|
|
||||||
return suite.mockCmd
|
|
||||||
}
|
|
||||||
|
|
||||||
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
|
||||||
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
|
||||||
|
|
||||||
err := l.Prepare(cfg)
|
|
||||||
suite.Require().Nil(err)
|
|
||||||
|
|
||||||
expected := []string{"--namespace", "table-service", "lint", "./wales/top_40"}
|
|
||||||
suite.Equal(expected, actual)
|
|
||||||
}
|
|
||||||
|
|||||||
77
internal/run/repocerts.go
Normal file
77
internal/run/repocerts.go
Normal file
@@ -0,0 +1,77 @@
|
|||||||
|
package run
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/base64"
|
||||||
|
"fmt"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
|
"io/ioutil"
|
||||||
|
)
|
||||||
|
|
||||||
|
type repoCerts struct {
|
||||||
|
*config
|
||||||
|
cert string
|
||||||
|
certFilename string
|
||||||
|
caCert string
|
||||||
|
caCertFilename string
|
||||||
|
}
|
||||||
|
|
||||||
|
func newRepoCerts(cfg env.Config) *repoCerts {
|
||||||
|
return &repoCerts{
|
||||||
|
config: newConfig(cfg),
|
||||||
|
cert: cfg.RepoCertificate,
|
||||||
|
caCert: cfg.RepoCACertificate,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (rc *repoCerts) write() error {
|
||||||
|
if rc.cert != "" {
|
||||||
|
file, err := ioutil.TempFile("", "repo********.cert")
|
||||||
|
defer file.Close()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create certificate file: %w", err)
|
||||||
|
}
|
||||||
|
rc.certFilename = file.Name()
|
||||||
|
rawCert, err := base64.StdEncoding.DecodeString(rc.cert)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to base64-decode certificate string: %w", err)
|
||||||
|
}
|
||||||
|
if rc.debug {
|
||||||
|
fmt.Fprintf(rc.stderr, "writing repo certificate to %s\n", rc.certFilename)
|
||||||
|
}
|
||||||
|
if _, err := file.Write(rawCert); err != nil {
|
||||||
|
return fmt.Errorf("failed to write certificate file: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if rc.caCert != "" {
|
||||||
|
file, err := ioutil.TempFile("", "repo********.ca.cert")
|
||||||
|
defer file.Close()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create CA certificate file: %w", err)
|
||||||
|
}
|
||||||
|
rc.caCertFilename = file.Name()
|
||||||
|
rawCert, err := base64.StdEncoding.DecodeString(rc.caCert)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to base64-decode CA certificate string: %w", err)
|
||||||
|
}
|
||||||
|
if rc.debug {
|
||||||
|
fmt.Fprintf(rc.stderr, "writing repo ca certificate to %s\n", rc.caCertFilename)
|
||||||
|
}
|
||||||
|
if _, err := file.Write(rawCert); err != nil {
|
||||||
|
return fmt.Errorf("failed to write CA certificate file: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (rc *repoCerts) flags() []string {
|
||||||
|
flags := make([]string, 0)
|
||||||
|
if rc.certFilename != "" {
|
||||||
|
flags = append(flags, "--cert-file", rc.certFilename)
|
||||||
|
}
|
||||||
|
if rc.caCertFilename != "" {
|
||||||
|
flags = append(flags, "--ca-file", rc.caCertFilename)
|
||||||
|
}
|
||||||
|
|
||||||
|
return flags
|
||||||
|
}
|
||||||
80
internal/run/repocerts_test.go
Normal file
80
internal/run/repocerts_test.go
Normal file
@@ -0,0 +1,80 @@
|
|||||||
|
package run
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
|
"github.com/stretchr/testify/suite"
|
||||||
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
type RepoCertsTestSuite struct {
|
||||||
|
suite.Suite
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestRepoCertsTestSuite(t *testing.T) {
|
||||||
|
suite.Run(t, new(RepoCertsTestSuite))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *RepoCertsTestSuite) TestNewRepoCerts() {
|
||||||
|
cfg := env.Config{
|
||||||
|
RepoCertificate: "bGljZW5zZWQgYnkgdGhlIFN0YXRlIG9mIE9yZWdvbiB0byBwZXJmb3JtIHJlcG9zc2Vzc2lvbnM=",
|
||||||
|
RepoCACertificate: "T3JlZ29uIFN0YXRlIExpY2Vuc3VyZSBib2FyZA==",
|
||||||
|
}
|
||||||
|
rc := newRepoCerts(cfg)
|
||||||
|
suite.Require().NotNil(rc)
|
||||||
|
suite.Equal("bGljZW5zZWQgYnkgdGhlIFN0YXRlIG9mIE9yZWdvbiB0byBwZXJmb3JtIHJlcG9zc2Vzc2lvbnM=", rc.cert)
|
||||||
|
suite.Equal("T3JlZ29uIFN0YXRlIExpY2Vuc3VyZSBib2FyZA==", rc.caCert)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *RepoCertsTestSuite) TestWrite() {
|
||||||
|
cfg := env.Config{
|
||||||
|
RepoCertificate: "bGljZW5zZWQgYnkgdGhlIFN0YXRlIG9mIE9yZWdvbiB0byBwZXJmb3JtIHJlcG9zc2Vzc2lvbnM=",
|
||||||
|
RepoCACertificate: "T3JlZ29uIFN0YXRlIExpY2Vuc3VyZSBib2FyZA==",
|
||||||
|
}
|
||||||
|
rc := newRepoCerts(cfg)
|
||||||
|
suite.Require().NotNil(rc)
|
||||||
|
|
||||||
|
suite.NoError(rc.write())
|
||||||
|
defer os.Remove(rc.certFilename)
|
||||||
|
defer os.Remove(rc.caCertFilename)
|
||||||
|
suite.NotEqual("", rc.certFilename)
|
||||||
|
suite.NotEqual("", rc.caCertFilename)
|
||||||
|
|
||||||
|
cert, err := ioutil.ReadFile(rc.certFilename)
|
||||||
|
suite.Require().NoError(err)
|
||||||
|
caCert, err := ioutil.ReadFile(rc.caCertFilename)
|
||||||
|
suite.Require().NoError(err)
|
||||||
|
suite.Equal("licensed by the State of Oregon to perform repossessions", string(cert))
|
||||||
|
suite.Equal("Oregon State Licensure board", string(caCert))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *RepoCertsTestSuite) TestFlags() {
|
||||||
|
rc := newRepoCerts(env.Config{})
|
||||||
|
suite.Equal([]string{}, rc.flags())
|
||||||
|
rc.certFilename = "hurgityburgity"
|
||||||
|
suite.Equal([]string{"--cert-file", "hurgityburgity"}, rc.flags())
|
||||||
|
rc.caCertFilename = "honglydongly"
|
||||||
|
suite.Equal([]string{"--cert-file", "hurgityburgity", "--ca-file", "honglydongly"}, rc.flags())
|
||||||
|
}
|
||||||
|
|
||||||
|
func (suite *RepoCertsTestSuite) TestDebug() {
|
||||||
|
stderr := strings.Builder{}
|
||||||
|
cfg := env.Config{
|
||||||
|
RepoCertificate: "bGljZW5zZWQgYnkgdGhlIFN0YXRlIG9mIE9yZWdvbiB0byBwZXJmb3JtIHJlcG9zc2Vzc2lvbnM=",
|
||||||
|
RepoCACertificate: "T3JlZ29uIFN0YXRlIExpY2Vuc3VyZSBib2FyZA==",
|
||||||
|
Stderr: &stderr,
|
||||||
|
Debug: true,
|
||||||
|
}
|
||||||
|
rc := newRepoCerts(cfg)
|
||||||
|
suite.Require().NotNil(rc)
|
||||||
|
|
||||||
|
suite.NoError(rc.write())
|
||||||
|
defer os.Remove(rc.certFilename)
|
||||||
|
defer os.Remove(rc.caCertFilename)
|
||||||
|
|
||||||
|
suite.Contains(stderr.String(), fmt.Sprintf("writing repo certificate to %s", rc.certFilename))
|
||||||
|
suite.Contains(stderr.String(), fmt.Sprintf("writing repo ca certificate to %s", rc.caCertFilename))
|
||||||
|
}
|
||||||
@@ -2,49 +2,57 @@ package run
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Uninstall is an execution step that calls `helm uninstall` when executed.
|
// Uninstall is an execution step that calls `helm uninstall` when executed.
|
||||||
type Uninstall struct {
|
type Uninstall struct {
|
||||||
Release string
|
*config
|
||||||
DryRun bool
|
release string
|
||||||
|
dryRun bool
|
||||||
|
keepHistory bool
|
||||||
cmd cmd
|
cmd cmd
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NewUninstall creates an Uninstall using fields from the given Config. No validation is performed at this time.
|
||||||
|
func NewUninstall(cfg env.Config) *Uninstall {
|
||||||
|
return &Uninstall{
|
||||||
|
config: newConfig(cfg),
|
||||||
|
release: cfg.Release,
|
||||||
|
dryRun: cfg.DryRun,
|
||||||
|
keepHistory: cfg.KeepHistory,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Execute executes the `helm uninstall` command.
|
// Execute executes the `helm uninstall` command.
|
||||||
func (u *Uninstall) Execute(_ Config) error {
|
func (u *Uninstall) Execute() error {
|
||||||
return u.cmd.Run()
|
return u.cmd.Run()
|
||||||
}
|
}
|
||||||
|
|
||||||
// Prepare gets the Uninstall ready to execute.
|
// Prepare gets the Uninstall ready to execute.
|
||||||
func (u *Uninstall) Prepare(cfg Config) error {
|
func (u *Uninstall) Prepare() error {
|
||||||
if u.Release == "" {
|
if u.release == "" {
|
||||||
return fmt.Errorf("release is required")
|
return fmt.Errorf("release is required")
|
||||||
}
|
}
|
||||||
|
|
||||||
args := make([]string, 0)
|
args := u.globalFlags()
|
||||||
|
|
||||||
if cfg.Namespace != "" {
|
|
||||||
args = append(args, "--namespace", cfg.Namespace)
|
|
||||||
}
|
|
||||||
if cfg.Debug {
|
|
||||||
args = append(args, "--debug")
|
|
||||||
}
|
|
||||||
|
|
||||||
args = append(args, "uninstall")
|
args = append(args, "uninstall")
|
||||||
|
|
||||||
if u.DryRun {
|
if u.dryRun {
|
||||||
args = append(args, "--dry-run")
|
args = append(args, "--dry-run")
|
||||||
}
|
}
|
||||||
|
if u.keepHistory {
|
||||||
|
args = append(args, "--keep-history")
|
||||||
|
}
|
||||||
|
|
||||||
args = append(args, u.Release)
|
args = append(args, u.release)
|
||||||
|
|
||||||
u.cmd = command(helmBin, args...)
|
u.cmd = command(helmBin, args...)
|
||||||
u.cmd.Stdout(cfg.Stdout)
|
u.cmd.Stdout(u.stdout)
|
||||||
u.cmd.Stderr(cfg.Stderr)
|
u.cmd.Stderr(u.stderr)
|
||||||
|
|
||||||
if cfg.Debug {
|
if u.debug {
|
||||||
fmt.Fprintf(cfg.Stderr, "Generated command: '%s'\n", u.cmd.String())
|
fmt.Fprintf(u.stderr, "Generated command: '%s'\n", u.cmd.String())
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
|
|||||||
@@ -1,10 +1,9 @@
|
|||||||
package run
|
package run
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"github.com/golang/mock/gomock"
|
"github.com/golang/mock/gomock"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
"github.com/stretchr/testify/suite"
|
"github.com/stretchr/testify/suite"
|
||||||
"strings"
|
|
||||||
"testing"
|
"testing"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -35,12 +34,26 @@ func TestUninstallTestSuite(t *testing.T) {
|
|||||||
suite.Run(t, new(UninstallTestSuite))
|
suite.Run(t, new(UninstallTestSuite))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (suite *UninstallTestSuite) TestNewUninstall() {
|
||||||
|
cfg := env.Config{
|
||||||
|
DryRun: true,
|
||||||
|
Release: "jetta_id_love_to_change_the_world",
|
||||||
|
KeepHistory: true,
|
||||||
|
}
|
||||||
|
u := NewUninstall(cfg)
|
||||||
|
suite.Equal("jetta_id_love_to_change_the_world", u.release)
|
||||||
|
suite.Equal(true, u.dryRun)
|
||||||
|
suite.Equal(true, u.keepHistory)
|
||||||
|
suite.NotNil(u.config)
|
||||||
|
}
|
||||||
|
|
||||||
func (suite *UninstallTestSuite) TestPrepareAndExecute() {
|
func (suite *UninstallTestSuite) TestPrepareAndExecute() {
|
||||||
defer suite.ctrl.Finish()
|
defer suite.ctrl.Finish()
|
||||||
|
|
||||||
u := Uninstall{
|
cfg := env.Config{
|
||||||
Release: "zayde_wølf_king",
|
Release: "zayde_wølf_king",
|
||||||
}
|
}
|
||||||
|
u := NewUninstall(cfg)
|
||||||
|
|
||||||
actual := []string{}
|
actual := []string{}
|
||||||
command = func(path string, args ...string) cmd {
|
command = func(path string, args ...string) cmd {
|
||||||
@@ -58,77 +71,49 @@ func (suite *UninstallTestSuite) TestPrepareAndExecute() {
|
|||||||
Run().
|
Run().
|
||||||
Times(1)
|
Times(1)
|
||||||
|
|
||||||
cfg := Config{}
|
suite.NoError(u.Prepare())
|
||||||
suite.NoError(u.Prepare(cfg))
|
|
||||||
expected := []string{"uninstall", "zayde_wølf_king"}
|
expected := []string{"uninstall", "zayde_wølf_king"}
|
||||||
suite.Equal(expected, actual)
|
suite.Equal(expected, actual)
|
||||||
|
|
||||||
u.Execute(cfg)
|
u.Execute()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *UninstallTestSuite) TestPrepareDryRunFlag() {
|
func (suite *UninstallTestSuite) TestPrepareDryRunFlag() {
|
||||||
u := Uninstall{
|
cfg := env.Config{
|
||||||
Release: "firefox_ak_wildfire",
|
Release: "firefox_ak_wildfire",
|
||||||
DryRun: true,
|
DryRun: true,
|
||||||
}
|
}
|
||||||
cfg := Config{}
|
u := NewUninstall(cfg)
|
||||||
|
|
||||||
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
||||||
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
||||||
|
|
||||||
suite.NoError(u.Prepare(cfg))
|
suite.NoError(u.Prepare())
|
||||||
expected := []string{"uninstall", "--dry-run", "firefox_ak_wildfire"}
|
expected := []string{"uninstall", "--dry-run", "firefox_ak_wildfire"}
|
||||||
suite.Equal(expected, suite.actualArgs)
|
suite.Equal(expected, suite.actualArgs)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *UninstallTestSuite) TestPrepareNamespaceFlag() {
|
func (suite *UninstallTestSuite) TestPrepareKeepHistoryFlag() {
|
||||||
u := Uninstall{
|
cfg := env.Config{
|
||||||
Release: "carly_simon_run_away_with_me",
|
Release: "perturbator_sentient",
|
||||||
}
|
KeepHistory: true,
|
||||||
cfg := Config{
|
|
||||||
Namespace: "emotion",
|
|
||||||
}
|
}
|
||||||
|
u := NewUninstall(cfg)
|
||||||
|
|
||||||
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
||||||
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
||||||
|
|
||||||
suite.NoError(u.Prepare(cfg))
|
suite.NoError(u.Prepare())
|
||||||
expected := []string{"--namespace", "emotion", "uninstall", "carly_simon_run_away_with_me"}
|
expected := []string{"uninstall", "--keep-history", "perturbator_sentient"}
|
||||||
suite.Equal(expected, suite.actualArgs)
|
suite.Equal(expected, suite.actualArgs)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *UninstallTestSuite) TestPrepareDebugFlag() {
|
|
||||||
u := Uninstall{
|
|
||||||
Release: "just_a_band_huff_and_puff",
|
|
||||||
}
|
|
||||||
stderr := strings.Builder{}
|
|
||||||
cfg := Config{
|
|
||||||
Debug: true,
|
|
||||||
Stderr: &stderr,
|
|
||||||
}
|
|
||||||
|
|
||||||
command = func(path string, args ...string) cmd {
|
|
||||||
suite.mockCmd.EXPECT().
|
|
||||||
String().
|
|
||||||
Return(fmt.Sprintf("%s %s", path, strings.Join(args, " ")))
|
|
||||||
|
|
||||||
return suite.mockCmd
|
|
||||||
}
|
|
||||||
|
|
||||||
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
|
||||||
suite.mockCmd.EXPECT().Stderr(&stderr).AnyTimes()
|
|
||||||
|
|
||||||
suite.NoError(u.Prepare(cfg))
|
|
||||||
suite.Equal(fmt.Sprintf("Generated command: '%s --debug "+
|
|
||||||
"uninstall just_a_band_huff_and_puff'\n", helmBin), stderr.String())
|
|
||||||
}
|
|
||||||
|
|
||||||
func (suite *UninstallTestSuite) TestPrepareRequiresRelease() {
|
func (suite *UninstallTestSuite) TestPrepareRequiresRelease() {
|
||||||
// These aren't really expected, but allowing them gives clearer test-failure messages
|
// These aren't really expected, but allowing them gives clearer test-failure messages
|
||||||
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
||||||
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
||||||
|
|
||||||
u := Uninstall{}
|
u := NewUninstall(env.Config{})
|
||||||
err := u.Prepare(Config{})
|
err := u.Prepare()
|
||||||
suite.EqualError(err, "release is required", "Uninstall.Release should be mandatory")
|
suite.EqualError(err, "release is required", "Uninstall.Release should be mandatory")
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -2,85 +2,116 @@ package run
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Upgrade is an execution step that calls `helm upgrade` when executed.
|
// Upgrade is an execution step that calls `helm upgrade` when executed.
|
||||||
type Upgrade struct {
|
type Upgrade struct {
|
||||||
Chart string
|
*config
|
||||||
Release string
|
chart string
|
||||||
|
release string
|
||||||
|
|
||||||
ChartVersion string
|
chartVersion string
|
||||||
DryRun bool
|
dryRun bool
|
||||||
Wait bool
|
wait bool
|
||||||
ReuseValues bool
|
values string
|
||||||
Timeout string
|
stringValues string
|
||||||
Force bool
|
valuesFiles []string
|
||||||
|
reuseValues bool
|
||||||
|
timeout string
|
||||||
|
force bool
|
||||||
|
atomic bool
|
||||||
|
cleanupOnFail bool
|
||||||
|
certs *repoCerts
|
||||||
|
createNamespace bool
|
||||||
|
|
||||||
cmd cmd
|
cmd cmd
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NewUpgrade creates an Upgrade using fields from the given Config. No validation is performed at this time.
|
||||||
|
func NewUpgrade(cfg env.Config) *Upgrade {
|
||||||
|
return &Upgrade{
|
||||||
|
config: newConfig(cfg),
|
||||||
|
chart: cfg.Chart,
|
||||||
|
release: cfg.Release,
|
||||||
|
chartVersion: cfg.ChartVersion,
|
||||||
|
dryRun: cfg.DryRun,
|
||||||
|
wait: cfg.Wait,
|
||||||
|
values: cfg.Values,
|
||||||
|
stringValues: cfg.StringValues,
|
||||||
|
valuesFiles: cfg.ValuesFiles,
|
||||||
|
reuseValues: cfg.ReuseValues,
|
||||||
|
timeout: cfg.Timeout,
|
||||||
|
force: cfg.Force,
|
||||||
|
atomic: cfg.AtomicUpgrade,
|
||||||
|
cleanupOnFail: cfg.CleanupOnFail,
|
||||||
|
certs: newRepoCerts(cfg),
|
||||||
|
createNamespace: cfg.CreateNamespace,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Execute executes the `helm upgrade` command.
|
// Execute executes the `helm upgrade` command.
|
||||||
func (u *Upgrade) Execute(_ Config) error {
|
func (u *Upgrade) Execute() error {
|
||||||
return u.cmd.Run()
|
return u.cmd.Run()
|
||||||
}
|
}
|
||||||
|
|
||||||
// Prepare gets the Upgrade ready to execute.
|
// Prepare gets the Upgrade ready to execute.
|
||||||
// Note: mandatory settings are documented in README.md, and the full list of settings is in docs/upgrade_settings.yml.
|
func (u *Upgrade) Prepare() error {
|
||||||
// Any additions or deletions here should be reflected there.
|
if u.chart == "" {
|
||||||
func (u *Upgrade) Prepare(cfg Config) error {
|
|
||||||
if u.Chart == "" {
|
|
||||||
return fmt.Errorf("chart is required")
|
return fmt.Errorf("chart is required")
|
||||||
}
|
}
|
||||||
if u.Release == "" {
|
if u.release == "" {
|
||||||
return fmt.Errorf("release is required")
|
return fmt.Errorf("release is required")
|
||||||
}
|
}
|
||||||
|
|
||||||
args := make([]string, 0)
|
args := u.globalFlags()
|
||||||
|
|
||||||
if cfg.Namespace != "" {
|
|
||||||
args = append(args, "--namespace", cfg.Namespace)
|
|
||||||
}
|
|
||||||
if cfg.Debug {
|
|
||||||
args = append(args, "--debug")
|
|
||||||
}
|
|
||||||
|
|
||||||
args = append(args, "upgrade", "--install")
|
args = append(args, "upgrade", "--install")
|
||||||
|
|
||||||
if u.ChartVersion != "" {
|
if u.chartVersion != "" {
|
||||||
args = append(args, "--version", u.ChartVersion)
|
args = append(args, "--version", u.chartVersion)
|
||||||
}
|
}
|
||||||
if u.DryRun {
|
if u.dryRun {
|
||||||
args = append(args, "--dry-run")
|
args = append(args, "--dry-run")
|
||||||
}
|
}
|
||||||
if u.Wait {
|
if u.wait {
|
||||||
args = append(args, "--wait")
|
args = append(args, "--wait")
|
||||||
}
|
}
|
||||||
if u.ReuseValues {
|
if u.reuseValues {
|
||||||
args = append(args, "--reuse-values")
|
args = append(args, "--reuse-values")
|
||||||
}
|
}
|
||||||
if u.Timeout != "" {
|
if u.timeout != "" {
|
||||||
args = append(args, "--timeout", u.Timeout)
|
args = append(args, "--timeout", u.timeout)
|
||||||
}
|
}
|
||||||
if u.Force {
|
if u.force {
|
||||||
args = append(args, "--force")
|
args = append(args, "--force")
|
||||||
}
|
}
|
||||||
if cfg.Values != "" {
|
if u.atomic {
|
||||||
args = append(args, "--set", cfg.Values)
|
args = append(args, "--atomic")
|
||||||
}
|
}
|
||||||
if cfg.StringValues != "" {
|
if u.cleanupOnFail {
|
||||||
args = append(args, "--set-string", cfg.StringValues)
|
args = append(args, "--cleanup-on-fail")
|
||||||
}
|
}
|
||||||
for _, vFile := range cfg.ValuesFiles {
|
if u.values != "" {
|
||||||
|
args = append(args, "--set", u.values)
|
||||||
|
}
|
||||||
|
if u.stringValues != "" {
|
||||||
|
args = append(args, "--set-string", u.stringValues)
|
||||||
|
}
|
||||||
|
if u.createNamespace {
|
||||||
|
args = append(args, "--create-namespace")
|
||||||
|
}
|
||||||
|
for _, vFile := range u.valuesFiles {
|
||||||
args = append(args, "--values", vFile)
|
args = append(args, "--values", vFile)
|
||||||
}
|
}
|
||||||
|
args = append(args, u.certs.flags()...)
|
||||||
|
|
||||||
args = append(args, u.Release, u.Chart)
|
args = append(args, u.release, u.chart)
|
||||||
u.cmd = command(helmBin, args...)
|
u.cmd = command(helmBin, args...)
|
||||||
u.cmd.Stdout(cfg.Stdout)
|
u.cmd.Stdout(u.stdout)
|
||||||
u.cmd.Stderr(cfg.Stderr)
|
u.cmd.Stderr(u.stderr)
|
||||||
|
|
||||||
if cfg.Debug {
|
if u.debug {
|
||||||
fmt.Fprintf(cfg.Stderr, "Generated command: '%s'\n", u.cmd.String())
|
fmt.Fprintf(u.stderr, "Generated command: '%s'\n", u.cmd.String())
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
|
|||||||
@@ -3,6 +3,7 @@ package run
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"github.com/golang/mock/gomock"
|
"github.com/golang/mock/gomock"
|
||||||
|
"github.com/pelotech/drone-helm3/internal/env"
|
||||||
"github.com/stretchr/testify/suite"
|
"github.com/stretchr/testify/suite"
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
@@ -31,13 +32,49 @@ func TestUpgradeTestSuite(t *testing.T) {
|
|||||||
suite.Run(t, new(UpgradeTestSuite))
|
suite.Run(t, new(UpgradeTestSuite))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (suite *UpgradeTestSuite) TestNewUpgrade() {
|
||||||
|
cfg := env.Config{
|
||||||
|
ChartVersion: "seventeen",
|
||||||
|
DryRun: true,
|
||||||
|
Wait: true,
|
||||||
|
Values: "steadfastness,forthrightness",
|
||||||
|
StringValues: "tensile_strength,flexibility",
|
||||||
|
ValuesFiles: []string{"/root/price_inventory.yml"},
|
||||||
|
ReuseValues: true,
|
||||||
|
Timeout: "go sit in the corner",
|
||||||
|
Chart: "billboard_top_100",
|
||||||
|
Release: "post_malone_circles",
|
||||||
|
Force: true,
|
||||||
|
AtomicUpgrade: true,
|
||||||
|
CleanupOnFail: true,
|
||||||
|
}
|
||||||
|
|
||||||
|
up := NewUpgrade(cfg)
|
||||||
|
suite.Equal(cfg.Chart, up.chart)
|
||||||
|
suite.Equal(cfg.Release, up.release)
|
||||||
|
suite.Equal(cfg.ChartVersion, up.chartVersion)
|
||||||
|
suite.Equal(true, up.dryRun)
|
||||||
|
suite.Equal(cfg.Wait, up.wait)
|
||||||
|
suite.Equal("steadfastness,forthrightness", up.values)
|
||||||
|
suite.Equal("tensile_strength,flexibility", up.stringValues)
|
||||||
|
suite.Equal([]string{"/root/price_inventory.yml"}, up.valuesFiles)
|
||||||
|
suite.Equal(cfg.ReuseValues, up.reuseValues)
|
||||||
|
suite.Equal(cfg.Timeout, up.timeout)
|
||||||
|
suite.Equal(cfg.Force, up.force)
|
||||||
|
suite.Equal(true, up.atomic)
|
||||||
|
suite.Equal(true, up.cleanupOnFail)
|
||||||
|
suite.NotNil(up.config)
|
||||||
|
suite.NotNil(up.certs)
|
||||||
|
}
|
||||||
|
|
||||||
func (suite *UpgradeTestSuite) TestPrepareAndExecute() {
|
func (suite *UpgradeTestSuite) TestPrepareAndExecute() {
|
||||||
defer suite.ctrl.Finish()
|
defer suite.ctrl.Finish()
|
||||||
|
|
||||||
u := Upgrade{
|
cfg := env.Config{
|
||||||
Chart: "at40",
|
Chart: "at40",
|
||||||
Release: "jonas_brothers_only_human",
|
Release: "jonas_brothers_only_human",
|
||||||
}
|
}
|
||||||
|
u := NewUpgrade(cfg)
|
||||||
|
|
||||||
command = func(path string, args ...string) cmd {
|
command = func(path string, args ...string) cmd {
|
||||||
suite.Equal(helmBin, path)
|
suite.Equal(helmBin, path)
|
||||||
@@ -54,19 +91,20 @@ func (suite *UpgradeTestSuite) TestPrepareAndExecute() {
|
|||||||
Run().
|
Run().
|
||||||
Times(1)
|
Times(1)
|
||||||
|
|
||||||
cfg := Config{}
|
err := u.Prepare()
|
||||||
err := u.Prepare(cfg)
|
|
||||||
suite.Require().Nil(err)
|
suite.Require().Nil(err)
|
||||||
u.Execute(cfg)
|
u.Execute()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *UpgradeTestSuite) TestPrepareNamespaceFlag() {
|
func (suite *UpgradeTestSuite) TestPrepareNamespaceFlag() {
|
||||||
defer suite.ctrl.Finish()
|
defer suite.ctrl.Finish()
|
||||||
|
|
||||||
u := Upgrade{
|
cfg := env.Config{
|
||||||
|
Namespace: "melt",
|
||||||
Chart: "at40",
|
Chart: "at40",
|
||||||
Release: "shaed_trampoline",
|
Release: "shaed_trampoline",
|
||||||
}
|
}
|
||||||
|
u := NewUpgrade(cfg)
|
||||||
|
|
||||||
command = func(path string, args ...string) cmd {
|
command = func(path string, args ...string) cmd {
|
||||||
suite.Equal(helmBin, path)
|
suite.Equal(helmBin, path)
|
||||||
@@ -78,32 +116,31 @@ func (suite *UpgradeTestSuite) TestPrepareNamespaceFlag() {
|
|||||||
suite.mockCmd.EXPECT().Stdout(gomock.Any())
|
suite.mockCmd.EXPECT().Stdout(gomock.Any())
|
||||||
suite.mockCmd.EXPECT().Stderr(gomock.Any())
|
suite.mockCmd.EXPECT().Stderr(gomock.Any())
|
||||||
|
|
||||||
cfg := Config{
|
err := u.Prepare()
|
||||||
Namespace: "melt",
|
|
||||||
}
|
|
||||||
err := u.Prepare(cfg)
|
|
||||||
suite.Require().Nil(err)
|
suite.Require().Nil(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *UpgradeTestSuite) TestPrepareWithUpgradeFlags() {
|
func (suite *UpgradeTestSuite) TestPrepareWithUpgradeFlags() {
|
||||||
defer suite.ctrl.Finish()
|
defer suite.ctrl.Finish()
|
||||||
|
|
||||||
u := Upgrade{
|
cfg := env.Config{
|
||||||
Chart: "hot_ac",
|
Chart: "hot_ac",
|
||||||
Release: "maroon_5_memories",
|
Release: "maroon_5_memories",
|
||||||
ChartVersion: "radio_edit", //-version
|
ChartVersion: "radio_edit",
|
||||||
DryRun: true, //-run
|
DryRun: true,
|
||||||
Wait: true, //-wait
|
Wait: true,
|
||||||
ReuseValues: true, //-values
|
|
||||||
Timeout: "sit_in_the_corner", //-timeout
|
|
||||||
Force: true, //-force
|
|
||||||
}
|
|
||||||
|
|
||||||
cfg := Config{
|
|
||||||
Values: "age=35",
|
Values: "age=35",
|
||||||
StringValues: "height=5ft10in",
|
StringValues: "height=5ft10in",
|
||||||
ValuesFiles: []string{"/usr/local/stats", "/usr/local/grades"},
|
ValuesFiles: []string{"/usr/local/stats", "/usr/local/grades"},
|
||||||
|
ReuseValues: true,
|
||||||
|
Timeout: "sit_in_the_corner",
|
||||||
|
Force: true,
|
||||||
|
AtomicUpgrade: true,
|
||||||
|
CleanupOnFail: true,
|
||||||
}
|
}
|
||||||
|
u := NewUpgrade(cfg)
|
||||||
|
// inject a ca cert filename so repoCerts won't create any files that we'd have to clean up
|
||||||
|
u.certs.caCertFilename = "local_ca.cert"
|
||||||
|
|
||||||
command = func(path string, args ...string) cmd {
|
command = func(path string, args ...string) cmd {
|
||||||
suite.Equal(helmBin, path)
|
suite.Equal(helmBin, path)
|
||||||
@@ -114,10 +151,13 @@ func (suite *UpgradeTestSuite) TestPrepareWithUpgradeFlags() {
|
|||||||
"--reuse-values",
|
"--reuse-values",
|
||||||
"--timeout", "sit_in_the_corner",
|
"--timeout", "sit_in_the_corner",
|
||||||
"--force",
|
"--force",
|
||||||
|
"--atomic",
|
||||||
|
"--cleanup-on-fail",
|
||||||
"--set", "age=35",
|
"--set", "age=35",
|
||||||
"--set-string", "height=5ft10in",
|
"--set-string", "height=5ft10in",
|
||||||
"--values", "/usr/local/stats",
|
"--values", "/usr/local/stats",
|
||||||
"--values", "/usr/local/grades",
|
"--values", "/usr/local/grades",
|
||||||
|
"--ca-file", "local_ca.cert",
|
||||||
"maroon_5_memories", "hot_ac"}, args)
|
"maroon_5_memories", "hot_ac"}, args)
|
||||||
|
|
||||||
return suite.mockCmd
|
return suite.mockCmd
|
||||||
@@ -126,7 +166,7 @@ func (suite *UpgradeTestSuite) TestPrepareWithUpgradeFlags() {
|
|||||||
suite.mockCmd.EXPECT().Stdout(gomock.Any())
|
suite.mockCmd.EXPECT().Stdout(gomock.Any())
|
||||||
suite.mockCmd.EXPECT().Stderr(gomock.Any())
|
suite.mockCmd.EXPECT().Stderr(gomock.Any())
|
||||||
|
|
||||||
err := u.Prepare(cfg)
|
err := u.Prepare()
|
||||||
suite.Require().Nil(err)
|
suite.Require().Nil(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -135,34 +175,30 @@ func (suite *UpgradeTestSuite) TestRequiresChartAndRelease() {
|
|||||||
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
suite.mockCmd.EXPECT().Stdout(gomock.Any()).AnyTimes()
|
||||||
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
suite.mockCmd.EXPECT().Stderr(gomock.Any()).AnyTimes()
|
||||||
|
|
||||||
u := Upgrade{
|
u := NewUpgrade(env.Config{})
|
||||||
Release: "seth_everman_unskippable_cutscene",
|
u.release = "seth_everman_unskippable_cutscene"
|
||||||
}
|
|
||||||
|
|
||||||
err := u.Prepare(Config{})
|
err := u.Prepare()
|
||||||
suite.EqualError(err, "chart is required", "Chart should be mandatory")
|
suite.EqualError(err, "chart is required", "Chart should be mandatory")
|
||||||
|
|
||||||
u = Upgrade{
|
u.release = ""
|
||||||
Chart: "billboard_top_zero",
|
u.chart = "billboard_top_zero"
|
||||||
}
|
|
||||||
|
|
||||||
err = u.Prepare(Config{})
|
err = u.Prepare()
|
||||||
suite.EqualError(err, "release is required", "Release should be mandatory")
|
suite.EqualError(err, "release is required", "Release should be mandatory")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (suite *UpgradeTestSuite) TestPrepareDebugFlag() {
|
func (suite *UpgradeTestSuite) TestPrepareDebugFlag() {
|
||||||
u := Upgrade{
|
|
||||||
Chart: "at40",
|
|
||||||
Release: "lewis_capaldi_someone_you_loved",
|
|
||||||
}
|
|
||||||
|
|
||||||
stdout := strings.Builder{}
|
stdout := strings.Builder{}
|
||||||
stderr := strings.Builder{}
|
stderr := strings.Builder{}
|
||||||
cfg := Config{
|
cfg := env.Config{
|
||||||
|
Chart: "at40",
|
||||||
|
Release: "lewis_capaldi_someone_you_loved",
|
||||||
Debug: true,
|
Debug: true,
|
||||||
Stdout: &stdout,
|
Stdout: &stdout,
|
||||||
Stderr: &stderr,
|
Stderr: &stderr,
|
||||||
}
|
}
|
||||||
|
u := NewUpgrade(cfg)
|
||||||
|
|
||||||
command = func(path string, args ...string) cmd {
|
command = func(path string, args ...string) cmd {
|
||||||
suite.mockCmd.EXPECT().
|
suite.mockCmd.EXPECT().
|
||||||
@@ -177,7 +213,7 @@ func (suite *UpgradeTestSuite) TestPrepareDebugFlag() {
|
|||||||
suite.mockCmd.EXPECT().
|
suite.mockCmd.EXPECT().
|
||||||
Stderr(&stderr)
|
Stderr(&stderr)
|
||||||
|
|
||||||
u.Prepare(cfg)
|
u.Prepare()
|
||||||
|
|
||||||
want := fmt.Sprintf("Generated command: '%s --debug upgrade "+
|
want := fmt.Sprintf("Generated command: '%s --debug upgrade "+
|
||||||
"--install lewis_capaldi_someone_you_loved at40'\n", helmBin)
|
"--install lewis_capaldi_someone_you_loved at40'\n", helmBin)
|
||||||
|
|||||||
Reference in New Issue
Block a user