-
Notifications
You must be signed in to change notification settings - Fork 22
Expand file tree
/
Copy pathenvexpander_test.go
More file actions
113 lines (100 loc) · 2.66 KB
/
envexpander_test.go
File metadata and controls
113 lines (100 loc) · 2.66 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
// Copyright 2025 Redpanda Data, Inc.
//
// Use of this software is governed by the Business Source License
// included in the file licenses/BSL.md
//
// As of the Change Date specified in that file, in accordance with
// the Business Source License, use of this software will be governed
// by the Apache License, Version 2.0
package kube
import (
"context"
"testing"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"sigs.k8s.io/controller-runtime/pkg/client"
"sigs.k8s.io/controller-runtime/pkg/envtest"
)
func TestEnvExpander(t *testing.T) {
ctx := context.Background()
var env envtest.Environment
cfg, err := env.Start()
require.NoError(t, err)
t.Cleanup(func() { _ = env.Stop() })
c, err := client.New(cfg, client.Options{})
require.NoError(t, err)
require.NoError(t, c.Create(ctx, &corev1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: "configs",
Namespace: "default",
},
Data: map[string]string{
"NODE_ENV": "PROD",
"KEY": "Value!",
},
}))
require.NoError(t, c.Create(ctx, &corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: "secrets",
Namespace: "default",
},
Data: map[string][]byte{
"ACCESS_KEY": []byte(`super!s3cret1`),
},
}))
cases := []struct {
In string
Out string
Err error
Env []corev1.EnvVar
EnvFrom []corev1.EnvFromSource
}{
{In: "${FOO}", Out: ""},
{
In: "$BAR",
Out: "Hello!",
Env: []corev1.EnvVar{
{
Name: "BAR",
Value: "Hello!",
},
},
},
{
In: "$NODE_ENV uses ${ACCESS_KEY}",
Out: "PROD uses super!s3cret1",
Env: []corev1.EnvVar{
{
Name: "BAR",
Value: "Hello!",
},
},
EnvFrom: []corev1.EnvFromSource{
{ConfigMapRef: &corev1.ConfigMapEnvSource{LocalObjectReference: corev1.LocalObjectReference{Name: "configs"}}},
{SecretRef: &corev1.SecretEnvSource{LocalObjectReference: corev1.LocalObjectReference{Name: "secrets"}}},
},
},
{
In: "Precedence is LIFO: ${ACCESS_KEY}",
Out: "Precedence is LIFO: Value!",
Env: []corev1.EnvVar{},
EnvFrom: []corev1.EnvFromSource{
{SecretRef: &corev1.SecretEnvSource{LocalObjectReference: corev1.LocalObjectReference{Name: "secrets"}}},
{Prefix: "ACCESS_", ConfigMapRef: &corev1.ConfigMapEnvSource{LocalObjectReference: corev1.LocalObjectReference{Name: "configs"}}},
},
},
}
for _, tc := range cases {
expander := EnvExpander{
Client: c,
Namespace: "default",
Env: tc.Env,
EnvFrom: tc.EnvFrom,
}
expanded, err := expander.Expand(ctx, tc.In)
assert.NoError(t, err)
assert.Equal(t, tc.Out, expanded)
}
}