#!/usr/bin/env bats load _helpers @test "client/DaemonSet: enabled by default" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | yq 'length > 0' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: enable with global.enabled false" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.enabled=false' \ --set 'client.enabled=true' \ . | tee /dev/stderr | yq 'length > 0' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: disable with client.enabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.enabled=false' \ . | tee /dev/stderr | yq 'length > 0' | tee /dev/stderr) [ "${actual}" = "false" ] } @test "client/DaemonSet: disable with global.enabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.enabled=false' \ . | tee /dev/stderr | yq 'length > 0' | tee /dev/stderr) [ "${actual}" = "false" ] } @test "client/DaemonSet: image defaults to global.image" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.image=foo' \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers[0].image' | tee /dev/stderr) [ "${actual}" = "foo" ] } @test "client/DaemonSet: image can be overridden with client.image" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.image=foo' \ --set 'client.image=bar' \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers[0].image' | tee /dev/stderr) [ "${actual}" = "bar" ] } @test "client/DaemonSet: no updateStrategy when not updating" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | yq -r '.spec.updateStrategy' | tee /dev/stderr) [ "${actual}" = "null" ] } #-------------------------------------------------------------------- # retry-join @test "client/DaemonSet: retry join gets populated" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'server.replicas=3' \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers[0].command | any(contains("-retry-join"))' | tee /dev/stderr) [ "${actual}" = "true" ] } #-------------------------------------------------------------------- # grpc @test "client/DaemonSet: grpc is enabled by default" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | yq '.spec.template.spec.containers[0].command | any(contains("grpc"))' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: grpc can be disabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.grpc=false' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[0].command | any(contains("grpc"))' | tee /dev/stderr) [ "${actual}" = "false" ] } #-------------------------------------------------------------------- # resources @test "client/DaemonSet: no resources defined by default" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers[0].resources' | tee /dev/stderr) [ "${actual}" = "null" ] } @test "client/DaemonSet: resources can be set" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.resources=foo' \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers[0].resources' | tee /dev/stderr) [ "${actual}" = "foo" ] } #-------------------------------------------------------------------- # extraVolumes @test "client/DaemonSet: adds extra volume" { cd `chart_dir` # Test that it defines it local object=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.extraVolumes[0].type=configMap' \ --set 'client.extraVolumes[0].name=foo' \ . | tee /dev/stderr | yq -r '.spec.template.spec.volumes[] | select(.name == "userconfig-foo")' | tee /dev/stderr) local actual=$(echo $object | yq -r '.configMap.name' | tee /dev/stderr) [ "${actual}" = "foo" ] local actual=$(echo $object | yq -r '.configMap.secretName' | tee /dev/stderr) [ "${actual}" = "null" ] # Test that it mounts it local object=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.extraVolumes[0].type=configMap' \ --set 'client.extraVolumes[0].name=foo' \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers[0].volumeMounts[] | select(.name == "userconfig-foo")' | tee /dev/stderr) local actual=$(echo $object | yq -r '.readOnly' | tee /dev/stderr) [ "${actual}" = "true" ] local actual=$(echo $object | yq -r '.mountPath' | tee /dev/stderr) [ "${actual}" = "/consul/userconfig/foo" ] # Doesn't load it local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.extraVolumes[0].type=configMap' \ --set 'client.extraVolumes[0].name=foo' \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers[0].command | map(select(test("userconfig"))) | length' | tee /dev/stderr) [ "${actual}" = "0" ] } @test "client/DaemonSet: adds extra secret volume" { cd `chart_dir` # Test that it defines it local object=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.extraVolumes[0].type=secret' \ --set 'client.extraVolumes[0].name=foo' \ . | tee /dev/stderr | yq -r '.spec.template.spec.volumes[] | select(.name == "userconfig-foo")' | tee /dev/stderr) local actual=$(echo $object | yq -r '.secret.name' | tee /dev/stderr) [ "${actual}" = "null" ] local actual=$(echo $object | yq -r '.secret.secretName' | tee /dev/stderr) [ "${actual}" = "foo" ] # Test that it mounts it local object=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.extraVolumes[0].type=configMap' \ --set 'client.extraVolumes[0].name=foo' \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers[0].volumeMounts[] | select(.name == "userconfig-foo")' | tee /dev/stderr) local actual=$(echo $object | yq -r '.readOnly' | tee /dev/stderr) [ "${actual}" = "true" ] local actual=$(echo $object | yq -r '.mountPath' | tee /dev/stderr) [ "${actual}" = "/consul/userconfig/foo" ] # Doesn't load it local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.extraVolumes[0].type=configMap' \ --set 'client.extraVolumes[0].name=foo' \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers[0].command | map(select(test("userconfig"))) | length' | tee /dev/stderr) [ "${actual}" = "0" ] } @test "client/DaemonSet: adds loadable volume" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.extraVolumes[0].type=configMap' \ --set 'client.extraVolumes[0].name=foo' \ --set 'client.extraVolumes[0].load=true' \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers[0].command | map(select(contains("/consul/userconfig/foo"))) | length' | tee /dev/stderr) [ "${actual}" = "1" ] } #-------------------------------------------------------------------- # nodeSelector @test "client/DaemonSet: nodeSelector is not set by default" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | yq '.spec.template.spec.nodeSelector' | tee /dev/stderr) [ "${actual}" = "null" ] } @test "client/DaemonSet: specified nodeSelector" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.nodeSelector=testing' \ . | tee /dev/stderr | yq -r '.spec.template.spec.nodeSelector' | tee /dev/stderr) [ "${actual}" = "testing" ] } #-------------------------------------------------------------------- # affinity @test "client/DaemonSet: affinity not set by default" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | yq '.spec.template.spec | .affinity? == null' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: specified affinity" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.affinity=foobar' \ . | tee /dev/stderr | yq '.spec.template.spec | .affinity == "foobar"' | tee /dev/stderr) [ "${actual}" = "true" ] } #-------------------------------------------------------------------- # priorityClassName @test "client/DaemonSet: priorityClassName is not set by default" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | yq '.spec.template.spec.priorityClassName' | tee /dev/stderr) [ "${actual}" = "null" ] } @test "client/DaemonSet: specified priorityClassName" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.priorityClassName=testing' \ . | tee /dev/stderr | yq -r '.spec.template.spec.priorityClassName' | tee /dev/stderr) [ "${actual}" = "testing" ] } #-------------------------------------------------------------------- # annotations @test "client/DaemonSet: no annotations defined by default" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | yq -r '.spec.template.metadata.annotations | del(."consul.hashicorp.com/connect-inject")' | tee /dev/stderr) [ "${actual}" = "{}" ] } @test "client/DaemonSet: annotations can be set" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.annotations=foo: bar' \ . | tee /dev/stderr | yq -r '.spec.template.metadata.annotations.foo' | tee /dev/stderr) [ "${actual}" = "bar" ] } #-------------------------------------------------------------------- # tolerations @test "client/DaemonSet: tolerations not set by default" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | yq '.spec.template.spec | .tolerations? == null' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: tolerations can be set" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.tolerations=foobar' \ . | tee /dev/stderr | yq '.spec.template.spec.tolerations == "foobar"' | tee /dev/stderr) [ "${actual}" = "true" ] } #-------------------------------------------------------------------- # gossip encryption @test "client/DaemonSet: gossip encryption disabled in client DaemonSet by default" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | yq '.spec.template.spec.containers[] | select(.name=="consul") | .env[] | select(.name == "GOSSIP_KEY") | length > 0' | tee /dev/stderr) [ "${actual}" = "" ] } @test "client/DaemonSet: gossip encryption disabled in client DaemonSet when clients are disabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.enabled=false' \ --set 'global.gossipEncryption.secretName=foo' \ --set 'global.gossipEncryption.secretKey=bar' \ . | tee /dev/stderr | yq 'length > 0' | tee /dev/stderr) [ "${actual}" = "false" ] } @test "client/DaemonSet: gossip encryption disabled in client DaemonSet when secretName is missing" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.gossipEncryption.secretKey=bar' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[] | select(.name=="consul") | .env[] | select(.name == "GOSSIP_KEY") | length > 0' | tee /dev/stderr) [ "${actual}" = "" ] } @test "client/DaemonSet: gossip encryption disabled in client DaemonSet when secretKey is missing" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.gossipEncryption.secretName=foo' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[] | select(.name=="consul") | .env[] | select(.name == "GOSSIP_KEY") | length > 0' | tee /dev/stderr) [ "${actual}" = "" ] } @test "client/DaemonSet: gossip environment variable present in client DaemonSet when all config is provided" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.gossipEncryption.secretKey=foo' \ --set 'global.gossipEncryption.secretName=bar' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[] | select(.name=="consul") | .env[] | select(.name == "GOSSIP_KEY") | length > 0' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: encrypt CLI option not present in client DaemonSet when encryption disabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | yq '.spec.template.spec.containers[] | select(.name=="consul") | .command | join(" ") | contains("encrypt")' | tee /dev/stderr) [ "${actual}" = "false" ] } @test "client/DaemonSet: encrypt CLI option present in client DaemonSet when all config is provided" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.gossipEncryption.secretKey=foo' \ --set 'global.gossipEncryption.secretName=bar' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[] | select(.name=="consul") | .command | join(" ") | contains("encrypt")' | tee /dev/stderr) [ "${actual}" == "true" ] } #-------------------------------------------------------------------- # global.tls.enabled @test "client/DaemonSet: CA volume present when TLS is enabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=true' \ . | tee /dev/stderr | yq '.spec.template.spec.volumes[] | select(.name == "consul-ca-cert")' | tee /dev/stderr) [ "${actual}" != "" ] } @test "client/DaemonSet: client certificate volume present when TLS is enabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=true' \ . | tee /dev/stderr | yq '.spec.template.spec.volumes[] | select(.name == "tls-client-cert")' | tee /dev/stderr) [ "${actual}" != "" ] } @test "client/DaemonSet: port 8501 is not exposed when TLS is disabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=false' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[0].ports[] | select (.containerPort == 8501)' | tee /dev/stderr) [ "${actual}" == "" ] } @test "client/DaemonSet: port 8501 is exposed when TLS is enabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=true' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[0].ports[] | select (.containerPort == 8501)' | tee /dev/stderr) [ "${actual}" != "" ] } @test "client/DaemonSet: port 8500 is still exposed when httpsOnly is not enabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=true' \ --set 'global.tls.httpsOnly=false' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[0].ports[] | select (.containerPort == 8500)' | tee /dev/stderr) [ "${actual}" != "" ] } @test "client/DaemonSet: port 8500 is not exposed when httpsOnly is enabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=true' \ --set 'global.tls.httpsOnly=true' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[0].ports[] | select (.containerPort == 8500)' | tee /dev/stderr) [ "${actual}" == "" ] } @test "client/DaemonSet: readiness checks are over HTTP TLS is disabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=false' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[0].readinessProbe.exec.command | join(" ") | contains("http://127.0.0.1:8500")' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: readiness checks are over HTTPS when TLS is disabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=true' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[0].readinessProbe.exec.command | join(" ") | contains("https://127.0.0.1:8501")' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: readiness checks use CA certificate when TLS is enabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=true' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[0].readinessProbe.exec.command | join(" ") | contains("--cacert /consul/tls/ca/tls.crt")' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: HTTP port is disabled when global.tls.httpsOnly is enabled" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=true' \ --set 'global.tls.httpsOnly=true' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[0].command | join(" ") | contains("ports { http = -1 }")' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: init container is created when global.tls.enabled=true" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=true' \ . | tee /dev/stderr | yq '.spec.template.spec.initContainers[] | select(.name == "client-tls-init") | length > 0' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: both ACL and TLS init containers are created when global.tls.enabled=true and global.bootstrapACLs=true" { cd `chart_dir` local has_acl_init_container=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=true' \ --set 'global.bootstrapACLs=true' \ . | tee /dev/stderr | yq '.spec.template.spec.initContainers[] | select(.name == "client-acl-init") | length > 0' | tee /dev/stderr) [ "${has_acl_init_container}" = "true" ] local has_tls_init_container=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=true' \ --set 'global.bootstrapACLs=true' \ . | tee /dev/stderr | yq '.spec.template.spec.initContainers[] | select(.name == "client-acl-init") | length > 0' | tee /dev/stderr) [ "${has_tls_init_container}" = "true" ] } @test "client/DaemonSet: sets Consul environment variables when global.tls.enabled" { cd `chart_dir` local env=$(helm template \ -x templates/server-statefulset.yaml \ --set 'global.tls.enabled=true' \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers[0].env[]' | tee /dev/stderr) local actual actual=$(echo $env | jq -r '. | select(.name == "CONSUL_HTTP_ADDR") | .value' | tee /dev/stderr) [ "${actual}" = "https://localhost:8501" ] actual=$(echo $env | jq -r '. | select(.name == "CONSUL_CACERT") | .value' | tee /dev/stderr) [ "${actual}" = "/consul/tls/ca/tls.crt" ] } @test "client/DaemonSet: sets verify_* flags to true by default when global.tls.enabled" { cd `chart_dir` local command=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=true' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[0].command | join(" ")' | tee /dev/stderr) local actual actual=$(echo $command | jq -r '. | contains("verify_incoming_rpc = true")' | tee /dev/stderr) [ "${actual}" = "true" ] actual=$(echo $command | jq -r '. | contains("verify_outgoing = true")' | tee /dev/stderr) [ "${actual}" = "true" ] actual=$(echo $command | jq -r '. | contains("verify_server_hostname = true")' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: doesn't set the verify_* flags by default when global.tls.enabled and global.tls.verify is false" { cd `chart_dir` local command=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=true' \ --set 'global.tls.verify=false' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[0].command | join(" ")' | tee /dev/stderr) local actual actual=$(echo $command | jq -r '. | contains("verify_incoming_rpc = true")' | tee /dev/stderr) [ "${actual}" = "false" ] actual=$(echo $command | jq -r '. | contains("verify_outgoing = true")' | tee /dev/stderr) [ "${actual}" = "false" ] actual=$(echo $command | jq -r '. | contains("verify_server_hostname = true")' | tee /dev/stderr) [ "${actual}" = "false" ] } @test "client/DaemonSet: can overwrite CA secret with the provided one" { cd `chart_dir` local spec=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.tls.enabled=true' \ --set 'global.tls.caCert.secretName=foo-ca-cert' \ --set 'global.tls.caCert.secretKey=key' \ --set 'global.tls.caKey.secretName=foo-ca-key' \ --set 'global.tls.caKey.secretKey=key' \ . | tee /dev/stderr | yq '.spec.template.spec' | tee /dev/stderr) # check that the provided ca cert secret is attached as a volume local actual actual=$(echo $spec | jq -r '.volumes[] | select(.name=="consul-ca-cert") | .secret.secretName' | tee /dev/stderr) [ "${actual}" = "foo-ca-cert" ] # check that the provided ca key secret is attached as volume actual=$(echo $spec | jq -r '.volumes[] | select(.name=="consul-ca-key") | .secret.secretName' | tee /dev/stderr) [ "${actual}" = "foo-ca-key" ] # check that the volumes pulls the provided secret keys as a CA cert actual=$(echo $spec | jq -r '.volumes[] | select(.name=="consul-ca-cert") | .secret.items[0].key' | tee /dev/stderr) [ "${actual}" = "key" ] # check that the volumes pulls the provided secret keys as a CA key actual=$(echo $spec | jq -r '.volumes[] | select(.name=="consul-ca-key") | .secret.items[0].key' | tee /dev/stderr) [ "${actual}" = "key" ] } #-------------------------------------------------------------------- # extraEnvironmentVariables @test "client/DaemonSet: custom environment variables" { cd `chart_dir` local object=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.extraEnvironmentVars.custom_proxy=fakeproxy' \ --set 'client.extraEnvironmentVars.no_proxy=custom_no_proxy' \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers[0].env' | tee /dev/stderr) local actual=$(echo $object | yq -r '.[3].name' | tee /dev/stderr) [ "${actual}" = "custom_proxy" ] local actual=$(echo $object | yq -r '.[3].value' | tee /dev/stderr) [ "${actual}" = "fakeproxy" ] local actual=$(echo $object | yq -r '.[4].name' | tee /dev/stderr) [ "${actual}" = "no_proxy" ] local actual=$(echo $object | yq -r '.[4].value' | tee /dev/stderr) [ "${actual}" = "custom_no_proxy" ] } #-------------------------------------------------------------------- # global.bootstrapACLs @test "client/DaemonSet: aclconfig volume is created when global.bootstrapACLs=true" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.bootstrapACLs=true' \ . | tee /dev/stderr | yq '.spec.template.spec.volumes[2].name == "aclconfig"' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: aclconfig volumeMount is created when global.bootstrapACLs=true" { cd `chart_dir` local object=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.bootstrapACLs=true' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[0].volumeMounts[2]' | tee /dev/stderr) local actual=$(echo $object | yq -r '.name' | tee /dev/stderr) [ "${actual}" = "aclconfig" ] local actual=$(echo $object | yq -r '.mountPath' | tee /dev/stderr) [ "${actual}" = "/consul/aclconfig" ] } @test "client/DaemonSet: command includes aclconfig dir when global.bootstrapACLs=true" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.bootstrapACLs=true' \ . | tee /dev/stderr | yq '.spec.template.spec.containers[0].command | any(contains("/consul/aclconfig"))' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: init container is created when global.bootstrapACLs=true" { cd `chart_dir` local object=$(helm template \ -x templates/client-daemonset.yaml \ --set 'global.bootstrapACLs=true' \ . | tee /dev/stderr | yq '.spec.template.spec.initContainers[] | select(.name == "client-acl-init")' | tee /dev/stderr) local actual=$(echo $object | yq -r '.command | any(contains("consul-k8s acl-init"))' | tee /dev/stderr) [ "${actual}" = "true" ] } #-------------------------------------------------------------------- # client.exposeGossipPorts @test "client/DaemonSet: client uses podIP when client.exposeGossipPorts=false" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.enabled=true' \ --set 'client.exposeGossipPorts=false' \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers | map(select(.name=="consul")) | .[0].env | map(select(.name=="ADVERTISE_IP")) | .[0] | .valueFrom.fieldRef.fieldPath' | tee /dev/stderr) [ "${actual}" = "status.podIP" ] } @test "client/DaemonSet: client uses hostIP when client.exposeGossipPorts=true" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.enabled=true' \ --set 'client.exposeGossipPorts=true' \ . | tee /dev/stderr | yq -r '.spec.template.spec.containers | map(select(.name=="consul")) | .[0].env | map(select(.name=="ADVERTISE_IP")) | .[0] | .valueFrom.fieldRef.fieldPath' | tee /dev/stderr) [ "${actual}" = "status.hostIP" ] } @test "client/DaemonSet: client doesn't expose hostPorts when client.exposeGossipPorts=false" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'server.enabled=true' \ --set 'client.enabled=true' \ . | tee /dev/stderr | yq '.spec.template.spec.containers | map(select(.name=="consul")) | .[0].ports | map(select(.containerPort==8301)) | .[0].hostPort' | tee /dev/stderr) [ "${actual}" = "null" ] } @test "client/DaemonSet: client exposes hostPorts when client.exposeGossipPorts=true" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.enabled=true' \ --set 'client.exposeGossipPorts=true' \ . | tee /dev/stderr | yq '.spec.template.spec.containers | map(select(.name=="consul")) | .[0].ports | map(select(.containerPort==8301)) | .[0].hostPort' | tee /dev/stderr) [ "${actual}" = "8301" ] } #-------------------------------------------------------------------- # dataDirectoryHostPath @test "client/DaemonSet: data directory is emptyDir by defaut" { cd `chart_dir` # Test that hostPath is set to null. local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | yq '.spec.template.spec.volumes[0].hostPath == null' | tee /dev/stderr ) [ "${actual}" = "true" ] # Test that emptyDir is set instead. local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | yq '.spec.template.spec.volumes[0].emptyDir == {}' | tee /dev/stderr ) [ "${actual}" = "true" ] } @test "client/DaemonSet: hostPath data directory can be set" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.dataDirectoryHostPath=/opt/consul' \ . | tee /dev/stderr | yq '.spec.template.spec.volumes[0].hostPath.path == "/opt/consul"' | tee /dev/stderr) [ "${actual}" = "true" ] } #-------------------------------------------------------------------- # dnsPolicy @test "client/DaemonSet: dnsPolicy not set by default" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | yq '.spec.template.spec.dnsPolicy == null' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: dnsPolicy can be set" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set 'client.dnsPolicy=ClusterFirstWithHostNet' \ . | tee /dev/stderr | yq '.spec.template.spec.dnsPolicy == "ClusterFirstWithHostNet"' | tee /dev/stderr) [ "${actual}" = "true" ] } #-------------------------------------------------------------------- # updateStrategy @test "client/DaemonSet: updateStrategy not set by default" { cd `chart_dir` local actual=$(helm template \ -x templates/client-daemonset.yaml \ . | tee /dev/stderr | \ yq '.spec.updateStrategy == null' | tee /dev/stderr) [ "${actual}" = "true" ] } @test "client/DaemonSet: updateStrategy can be set" { cd `chart_dir` local updateStrategy="type: RollingUpdate rollingUpdate: maxUnavailable: 5 " local actual=$(helm template \ -x templates/client-daemonset.yaml \ --set "client.updateStrategy=${updateStrategy}" \ . | tee /dev/stderr | \ yq -c '.spec.updateStrategy == {"type":"RollingUpdate","rollingUpdate":{"maxUnavailable":5}}' | tee /dev/stderr) [ "${actual}" = "true" ] }