mirror of
https://github.com/mariadb-operator/mariadb-operator.git
synced 2025-07-28 07:14:28 +00:00
141 lines
3.7 KiB
Go
141 lines
3.7 KiB
Go
package v1alpha1
|
|
|
|
import (
|
|
"context"
|
|
"crypto/tls"
|
|
"fmt"
|
|
"net"
|
|
"path/filepath"
|
|
"testing"
|
|
"time"
|
|
|
|
. "github.com/onsi/ginkgo/v2"
|
|
. "github.com/onsi/gomega"
|
|
monitoringv1 "github.com/prometheus-operator/prometheus-operator/pkg/apis/monitoring/v1"
|
|
"go.uber.org/zap/zapcore"
|
|
admissionv1 "k8s.io/api/admission/v1"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/utils/ptr"
|
|
ctrl "sigs.k8s.io/controller-runtime"
|
|
"sigs.k8s.io/controller-runtime/pkg/client"
|
|
"sigs.k8s.io/controller-runtime/pkg/envtest"
|
|
log "sigs.k8s.io/controller-runtime/pkg/log"
|
|
"sigs.k8s.io/controller-runtime/pkg/log/zap"
|
|
metricsserver "sigs.k8s.io/controller-runtime/pkg/metrics/server"
|
|
"sigs.k8s.io/controller-runtime/pkg/webhook"
|
|
//+kubebuilder:scaffold:imports
|
|
)
|
|
|
|
var (
|
|
testCtx = context.Background()
|
|
testNamespace = "default"
|
|
k8sClient client.Client
|
|
)
|
|
|
|
func TestAPIs(t *testing.T) {
|
|
RegisterFailHandler(Fail)
|
|
|
|
RunSpecs(t, "API Suite")
|
|
}
|
|
|
|
var _ = BeforeSuite(func() {
|
|
log.SetLogger(zap.New(
|
|
zap.WriteTo(GinkgoWriter),
|
|
zap.UseDevMode(true),
|
|
zap.Level(zapcore.InfoLevel),
|
|
))
|
|
|
|
var err error
|
|
scheme := runtime.NewScheme()
|
|
err = AddToScheme(scheme)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
err = admissionv1.AddToScheme(scheme)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
err = monitoringv1.AddToScheme(scheme)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
//+kubebuilder:scaffold:scheme
|
|
|
|
By("Bootstrapping test environment")
|
|
testEnv := &envtest.Environment{
|
|
CRDDirectoryPaths: []string{filepath.Join("..", "..", "config", "crd", "bases")},
|
|
ErrorIfCRDPathMissing: false,
|
|
WebhookInstallOptions: envtest.WebhookInstallOptions{
|
|
Paths: []string{filepath.Join("..", "..", "config", "webhook")},
|
|
},
|
|
UseExistingCluster: ptr.To(false),
|
|
}
|
|
cfg, err := testEnv.Start()
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(cfg).NotTo(BeNil())
|
|
DeferCleanup(testEnv.Stop)
|
|
|
|
k8sClient, err = client.New(cfg, client.Options{Scheme: scheme})
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(k8sClient).NotTo(BeNil())
|
|
|
|
webhookInstallOptions := &testEnv.WebhookInstallOptions
|
|
mgr, err := ctrl.NewManager(cfg, ctrl.Options{
|
|
Scheme: scheme,
|
|
LeaderElection: false,
|
|
Metrics: metricsserver.Options{
|
|
BindAddress: "0",
|
|
},
|
|
WebhookServer: webhook.NewServer(webhook.Options{
|
|
Host: webhookInstallOptions.LocalServingHost,
|
|
Port: webhookInstallOptions.LocalServingPort,
|
|
CertDir: webhookInstallOptions.LocalServingCertDir,
|
|
}),
|
|
})
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
err = (&MariaDB{}).SetupWebhookWithManager(mgr)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
err = (&MaxScale{}).SetupWebhookWithManager(mgr)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
err = (&Restore{}).SetupWebhookWithManager(mgr)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
err = (&Backup{}).SetupWebhookWithManager(mgr)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
err = (&Database{}).SetupWebhookWithManager(mgr)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
err = (&Grant{}).SetupWebhookWithManager(mgr)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
err = (&User{}).SetupWebhookWithManager(mgr)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
err = (&Connection{}).SetupWebhookWithManager(mgr)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
err = (&SqlJob{}).SetupWebhookWithManager(mgr)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
//+kubebuilder:scaffold:webhook
|
|
|
|
go func() {
|
|
defer GinkgoRecover()
|
|
err = mgr.Start(testCtx)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
}()
|
|
|
|
// wait for the webhook server to get ready
|
|
dialer := &net.Dialer{Timeout: time.Second}
|
|
addrPort := fmt.Sprintf("%s:%d", webhookInstallOptions.LocalServingHost, webhookInstallOptions.LocalServingPort)
|
|
Eventually(func() error {
|
|
conn, err := tls.DialWithDialer(dialer, "tcp", addrPort, &tls.Config{InsecureSkipVerify: true})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
conn.Close()
|
|
return nil
|
|
}).Should(Succeed())
|
|
})
|