From b999a3dd11869969ee14fddb5ddcf45c9130e33f Mon Sep 17 00:00:00 2001 From: Tom Chauveau Date: Fri, 18 Jun 2021 17:53:50 +0200 Subject: [PATCH 1/3] Remove old stdlib tests Signed-off-by: Tom Chauveau --- tests/stdlib.bats | 89 +------------------ .../aws/eks/.dagger/env/default/.gitignore | 2 - .../aws/eks/.dagger/env/default/plan/eks.cue | 53 ----------- .../aws/eks/.dagger/env/default/values.yaml | 26 ------ tests/stdlib/aws/eks/eks.cue | 53 ----------- tests/stdlib/docker/build/Dockerfile | 2 - tests/stdlib/docker/build/build.cue | 31 ------- tests/stdlib/docker/dockerfile/dockerfile.cue | 34 ------- .../docker/dockerfile/testdata/test.txt | 1 - tests/stdlib/kubernetes/helm/helm.cue | 54 ----------- .../helm/testdata/mychart/.helmignore | 23 ----- .../helm/testdata/mychart/Chart.yaml | 21 ----- .../helm/testdata/mychart/templates/NOTES.txt | 21 ----- .../testdata/mychart/templates/_helpers.tpl | 63 ------------- .../mychart/templates/deployment.yaml | 55 ------------ .../testdata/mychart/templates/ingress.yaml | 41 --------- .../testdata/mychart/templates/service.yaml | 15 ---- .../mychart/templates/serviceaccount.yaml | 12 --- .../templates/tests/test-connection.yaml | 15 ---- .../helm/testdata/mychart/values.yaml | 68 -------------- tests/stdlib/kubernetes/helm/verify.cue | 51 ----------- tests/stdlib/kubernetes/kubernetes.cue | 44 --------- .../stdlib/kubernetes/kustomize/kustomize.cue | 32 ------- .../kustomize/testdata/deployment.yaml | 22 ----- .../kubernetes/kustomize/testdata/pod.yaml | 12 --- tests/stdlib/kubernetes/kustomize/verify.cue | 72 --------------- tests/stdlib/kubernetes/verify.cue | 79 ---------------- tests/stdlib/terraform/s3/inputs.yaml | 24 ----- tests/stdlib/terraform/s3/main.cue | 25 ------ tests/stdlib/terraform/s3/testdata/test.tf | 34 ------- 30 files changed, 1 insertion(+), 1073 deletions(-) delete mode 100644 tests/stdlib/aws/eks/.dagger/env/default/.gitignore delete mode 100644 tests/stdlib/aws/eks/.dagger/env/default/plan/eks.cue delete mode 100644 tests/stdlib/aws/eks/.dagger/env/default/values.yaml delete mode 100644 tests/stdlib/aws/eks/eks.cue delete mode 100644 tests/stdlib/docker/build/Dockerfile delete mode 100644 tests/stdlib/docker/build/build.cue delete mode 100644 tests/stdlib/docker/dockerfile/dockerfile.cue delete mode 100644 tests/stdlib/docker/dockerfile/testdata/test.txt delete mode 100644 tests/stdlib/kubernetes/helm/helm.cue delete mode 100644 tests/stdlib/kubernetes/helm/testdata/mychart/.helmignore delete mode 100644 tests/stdlib/kubernetes/helm/testdata/mychart/Chart.yaml delete mode 100644 tests/stdlib/kubernetes/helm/testdata/mychart/templates/NOTES.txt delete mode 100644 tests/stdlib/kubernetes/helm/testdata/mychart/templates/_helpers.tpl delete mode 100644 tests/stdlib/kubernetes/helm/testdata/mychart/templates/deployment.yaml delete mode 100644 tests/stdlib/kubernetes/helm/testdata/mychart/templates/ingress.yaml delete mode 100644 tests/stdlib/kubernetes/helm/testdata/mychart/templates/service.yaml delete mode 100644 tests/stdlib/kubernetes/helm/testdata/mychart/templates/serviceaccount.yaml delete mode 100644 tests/stdlib/kubernetes/helm/testdata/mychart/templates/tests/test-connection.yaml delete mode 100644 tests/stdlib/kubernetes/helm/testdata/mychart/values.yaml delete mode 100644 tests/stdlib/kubernetes/helm/verify.cue delete mode 100644 tests/stdlib/kubernetes/kubernetes.cue delete mode 100644 tests/stdlib/kubernetes/kustomize/kustomize.cue delete mode 100644 tests/stdlib/kubernetes/kustomize/testdata/deployment.yaml delete mode 100644 tests/stdlib/kubernetes/kustomize/testdata/pod.yaml delete mode 100644 tests/stdlib/kubernetes/kustomize/verify.cue delete mode 100644 tests/stdlib/kubernetes/verify.cue delete mode 100644 tests/stdlib/terraform/s3/inputs.yaml delete mode 100644 tests/stdlib/terraform/s3/main.cue delete mode 100644 tests/stdlib/terraform/s3/testdata/test.tf diff --git a/tests/stdlib.bats b/tests/stdlib.bats index 2e9f7295..dcdd715b 100644 --- a/tests/stdlib.bats +++ b/tests/stdlib.bats @@ -6,59 +6,7 @@ setup() { # FIXME: move to universe/universe.bats # Assigned to: -@test "stdlib: kubernetes" { - skip_unless_local_kube - - "$DAGGER" init - dagger_new_with_plan kubernetes "$TESTDIR"/stdlib/kubernetes/ - - run "$DAGGER" input -e "kubernetes" text kubeconfig -f ~/.kube/config - assert_success - - run "$DAGGER" up -e "kubernetes" - assert_success -} - -# FIXME: move to universe/universe.bats -# Assigned to: -@test "stdlib: kustomize" { - "$DAGGER" compute "$TESTDIR"/stdlib/kubernetes/kustomize --input-dir TestKustomize.kustom.source="$TESTDIR"/stdlib/kubernetes/kustomize/testdata -} - -# FIXME: move to universe/universe.bats -# Assigned to: -@test "stdlib: helm" { - skip "helm is broken" - skip_unless_local_kube - - "$DAGGER" init - dagger_new_with_plan helm "$TESTDIR"/stdlib/kubernetes/helm - - run "$DAGGER" input -e "helm" text kubeconfig -f ~/.kube/config - assert_success - - cp -R "$TESTDIR"/stdlib/kubernetes/helm/testdata/mychart "$DAGGER_WORKSPACE"/testdata - run "$DAGGER" input -e "helm" dir TestHelmSimpleChart.deploy.chartSource "$DAGGER_WORKSPACE"/testdata - assert_success - - run "$DAGGER" up -e "helm" - assert_success -} - -# FIXME: move to universe/universe.bats -# Assigned to: -@test "stdlib: docker: build" { - "$DAGGER" compute "$TESTDIR"/stdlib/docker/build/ --input-dir source="$TESTDIR"/stdlib/docker/build -} - -# FIXME: move to universe/universe.bats -# Assigned to: -@test "stdlib: docker: dockerfile" { - "$DAGGER" compute "$TESTDIR"/stdlib/docker/dockerfile/ --input-dir source="$TESTDIR"/stdlib/docker/dockerfile/testdata -} - -# FIXME: move to universe/universe.bats -# Assigned to: +# Changes in https://github.com/dagger/dagger/pull/628 @test "stdlib: docker: push-and-pull" { skip_unless_secrets_available "$TESTDIR"/stdlib/docker/push-pull/inputs.yaml @@ -66,38 +14,3 @@ setup() { run "$DAGGER" compute --input-yaml "$TESTDIR"/stdlib/docker/push-pull/inputs.yaml --input-dir source="$TESTDIR"/stdlib/docker/push-pull/testdata "$TESTDIR"/stdlib/docker/push-pull/ assert_success } - -# FIXME: move to universe/universe.bats -# Assigned to: -@test "stdlib: terraform" { - skip_unless_secrets_available "$TESTDIR"/stdlib/terraform/s3/inputs.yaml - - "$DAGGER" init - dagger_new_with_plan terraform "$TESTDIR"/stdlib/terraform/s3 - - cp -R "$TESTDIR"/stdlib/terraform/s3/testdata "$DAGGER_WORKSPACE"/testdata - "$DAGGER" -e terraform input dir TestData "$DAGGER_WORKSPACE"/testdata - sops -d "$TESTDIR"/stdlib/terraform/s3/inputs.yaml | "$DAGGER" -e "terraform" input yaml "" -f - - - # it must fail because of a missing var - run "$DAGGER" up -e terraform - assert_failure - - # add the var and try again - "$DAGGER" -e terraform input text TestTerraform.apply.tfvars.input "42" - run "$DAGGER" up -e terraform - assert_success - - # ensure the tfvar was passed correctly - run "$DAGGER" query -e terraform \ - TestTerraform.apply.output.input.value -f text - assert_success - assert_output "42" - - # ensure the random value is always the same - # this proves we're effectively using the s3 backend - run "$DAGGER" query -e terraform \ - TestTerraform.apply.output.random.value -f json - assert_success - assert_output "36" -} diff --git a/tests/stdlib/aws/eks/.dagger/env/default/.gitignore b/tests/stdlib/aws/eks/.dagger/env/default/.gitignore deleted file mode 100644 index 01ec19b0..00000000 --- a/tests/stdlib/aws/eks/.dagger/env/default/.gitignore +++ /dev/null @@ -1,2 +0,0 @@ -# dagger state -state/** diff --git a/tests/stdlib/aws/eks/.dagger/env/default/plan/eks.cue b/tests/stdlib/aws/eks/.dagger/env/default/plan/eks.cue deleted file mode 100644 index d0a92e9d..00000000 --- a/tests/stdlib/aws/eks/.dagger/env/default/plan/eks.cue +++ /dev/null @@ -1,53 +0,0 @@ -package eks - -import ( - "dagger.io/aws" - "dagger.io/aws/eks" - "dagger.io/kubernetes" - "dagger.io/dagger/op" -) - -TestConfig: awsConfig: aws.#Config & { - region: "us-east-2" -} - -TestCluster: eks.#KubeConfig & { - config: TestConfig.awsConfig - clusterName: *"dagger-example-eks-cluster" | string -} - -TestEks: { - #GetPods: - """ - kubectl get pods -A - """ - - #up: [ - op.#Load & { - from: kubernetes.#Kubectl - }, - - op.#WriteFile & { - dest: "/kubeconfig" - content: TestCluster.kubeconfig - }, - - op.#WriteFile & { - dest: "/getPods.sh" - content: #GetPods - }, - - op.#Exec & { - always: true - args: [ - "/bin/bash", - "--noprofile", - "--norc", - "-eo", - "pipefail", - "/getPods.sh", - ] - env: KUBECONFIG: "/kubeconfig" - }, - ] -} diff --git a/tests/stdlib/aws/eks/.dagger/env/default/values.yaml b/tests/stdlib/aws/eks/.dagger/env/default/values.yaml deleted file mode 100644 index 0d793b24..00000000 --- a/tests/stdlib/aws/eks/.dagger/env/default/values.yaml +++ /dev/null @@ -1,26 +0,0 @@ -name: default -inputs: - TestConfig.awsConfig.accessKey: - secret: ENC[AES256_GCM,data:dzhlip9kKU8mMEycFjq6MobD5BA=,iv:LKeYUbXpnWIZneGs7DCLVKxv1W2aa/3EVGO4jnDlOgc=,tag:+TcxQahxFTweyoPaROTJSQ==,type:str] - TestConfig.awsConfig.secretKey: - secret: ENC[AES256_GCM,data:bu3AI5jODWv4ePvRKw2l/1UOuH07Z0/oB2hiY4QqrhTcfjdSbr6kBg==,iv:BqddzzXqvAv0cAj2SVhoFx/kUOnRsoevqMRujCINVv0=,tag:u0KjVnbN8h54CLFARJmJ0g==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1gxwmtwahzwdmrskhf90ppwlnze30lgpm056kuesrxzeuyclrwvpsupwtpk - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSAzV0ZXNW5qaGNJMjF5bnBO - d1Z1RXFhSnNRM1Vwa3lyWFJ6VVFDZTQ3cUhZClh0N1lxZ3dwSFhHTjRyS092OVVj - Tkw4ZlU4S3g0T1VGS1RYYnB1dGlzbVkKLS0tIEc4T1Z3SEU2NUNhd2FkSXlIUERM - UE5Cd2VwYkd1MHlTOXNJVEU3RVpqU2sK86kXU6ZaaVHTg9BuCEcOxnDrrW00+bwu - AHttbzqYVuC3YxXjOTzAZL8aYTStk14wGdI6TirZ9pX0fyaKAfzBUQ== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2021-05-27T16:01:59Z" - mac: ENC[AES256_GCM,data:T+0rcT9Xi/kJ8+EzCd7ewenDmc1cH/t2MxCpf+QXkILUC/uE8OgROizDMAiUYI2HpeBfZrmUgLMVzlTZirIbC51eWLAf6itbSIGKkVuz0uSNwhRpKGAROg6U1h39Scg6RpAvpzSTZvYOx5SwP78Uc6NQdp5yTDEb+0e9Wqzu+jU=,iv:INAN+EPwBv5dWWHQnaMr4QOBQWx3WCcohORvIPrBZN8=,tag:N4vtDowFKTDSHmMob5HgCw==,type:str] - pgp: [] - encrypted_suffix: secret - version: 3.7.1 diff --git a/tests/stdlib/aws/eks/eks.cue b/tests/stdlib/aws/eks/eks.cue deleted file mode 100644 index 1bfc98a1..00000000 --- a/tests/stdlib/aws/eks/eks.cue +++ /dev/null @@ -1,53 +0,0 @@ -package eks - -import ( - "dagger.io/aws" - "dagger.io/aws/eks" - "dagger.io/kubernetes" - "dagger.io/dagger/op" -) - -TestConfig: awsConfig: aws.#Config & { - region: "us-east-2" -} - -TestCluster: eks.#KubeConfig & { - config: TestConfig.awsConfig - clusterName: *"dagger-example-eks-cluster" | string -} - -TestEks: { - #GetPods: - """ - kubectl get pods -A - """ - - #up: [ - op.#Load & { - from: kubernetes.#Kubectl - }, - - op.#WriteFile & { - dest: "/kubeconfig" - content: TestCluster.kubeconfig - }, - - op.#WriteFile & { - dest: "/getPods.sh" - content: #GetPods - }, - - op.#Exec & { - always: true - args: [ - "/bin/bash", - "--noprofile", - "--norc", - "-eo", - "pipefail", - "/getPods.sh", - ] - env: KUBECONFIG: "/kubeconfig" - }, - ] -} diff --git a/tests/stdlib/docker/build/Dockerfile b/tests/stdlib/docker/build/Dockerfile deleted file mode 100644 index 987ce9be..00000000 --- a/tests/stdlib/docker/build/Dockerfile +++ /dev/null @@ -1,2 +0,0 @@ -FROM alpine -RUN echo test >> /test.txt \ No newline at end of file diff --git a/tests/stdlib/docker/build/build.cue b/tests/stdlib/docker/build/build.cue deleted file mode 100644 index 58601432..00000000 --- a/tests/stdlib/docker/build/build.cue +++ /dev/null @@ -1,31 +0,0 @@ -package docker - -import ( - "dagger.io/dagger" - "dagger.io/dagger/op" - "dagger.io/docker" -) - -// Build a Docker image from source, using included Dockerfile -source: dagger.#Artifact - -TestBuild: { - image: docker.#Build & { - "source": source - } - - verify: #up: [ - op.#Load & { - from: image - }, - - op.#Exec & { - always: true - args: [ - "sh", "-c", """ - grep -q "test" /test.txt - """, - ] - }, - ] -} diff --git a/tests/stdlib/docker/dockerfile/dockerfile.cue b/tests/stdlib/docker/dockerfile/dockerfile.cue deleted file mode 100644 index 7f982ab7..00000000 --- a/tests/stdlib/docker/dockerfile/dockerfile.cue +++ /dev/null @@ -1,34 +0,0 @@ -package docker - -import ( - "dagger.io/dagger" - "dagger.io/dagger/op" - "dagger.io/docker" -) - -source: dagger.#Artifact - -TestImageFromDockerfile: { - image: docker.#ImageFromDockerfile & { - dockerfile: """ - FROM alpine - COPY test.txt /test.txt - """ - context: source - } - - verify: #up: [ - op.#Load & { - from: image - }, - - op.#Exec & { - always: true - args: [ - "sh", "-c", """ - grep -q "test" /test.txt - """, - ] - }, - ] -} diff --git a/tests/stdlib/docker/dockerfile/testdata/test.txt b/tests/stdlib/docker/dockerfile/testdata/test.txt deleted file mode 100644 index 30d74d25..00000000 --- a/tests/stdlib/docker/dockerfile/testdata/test.txt +++ /dev/null @@ -1 +0,0 @@ -test \ No newline at end of file diff --git a/tests/stdlib/kubernetes/helm/helm.cue b/tests/stdlib/kubernetes/helm/helm.cue deleted file mode 100644 index 518b0fb2..00000000 --- a/tests/stdlib/kubernetes/helm/helm.cue +++ /dev/null @@ -1,54 +0,0 @@ -package main - -import ( - "dagger.io/dagger" - "dagger.io/kubernetes/helm" - "dagger.io/random" -) - -// We assume that a kinD cluster is running locally -// To deploy a local KinD cluster, follow this link : https://kind.sigs.k8s.io/docs/user/quick-start/ -kubeconfig: string @dagger(input) - -// Deploy user local chart -TestHelmSimpleChart: { - suffix: random.#String & { - seed: "simple" - } - - // Deploy chart - deploy: helm.#Chart & { - name: "dagger-test-helm-simple-chart-\(suffix.out)" - namespace: "dagger-test" - "kubeconfig": kubeconfig - chartSource: dagger.#Artifact - } - - // Verify deployment - verify: #VerifyHelm & { - chartName: deploy.name - namespace: deploy.namespace - } -} - -// Deploy remote chart -TestHelmRepoChart: { - suffix: random.#String & { - seed: "repo" - } - - // Deploy chart - deploy: helm.#Chart & { - name: "dagger-test-helm-repository-\(suffix.out)" - namespace: "dagger-test" - "kubeconfig": kubeconfig - repository: "https://charts.bitnami.com/bitnami" - chart: "redis" - } - - // Verify deployment - verify: #VerifyHelm & { - chartName: deploy.name - namespace: deploy.namespace - } -} diff --git a/tests/stdlib/kubernetes/helm/testdata/mychart/.helmignore b/tests/stdlib/kubernetes/helm/testdata/mychart/.helmignore deleted file mode 100644 index 0e8a0eb3..00000000 --- a/tests/stdlib/kubernetes/helm/testdata/mychart/.helmignore +++ /dev/null @@ -1,23 +0,0 @@ -# Patterns to ignore when building packages. -# This supports shell glob matching, relative path matching, and -# negation (prefixed with !). Only one pattern per line. -.DS_Store -# Common VCS dirs -.git/ -.gitignore -.bzr/ -.bzrignore -.hg/ -.hgignore -.svn/ -# Common backup files -*.swp -*.bak -*.tmp -*.orig -*~ -# Various IDEs -.project -.idea/ -*.tmproj -.vscode/ diff --git a/tests/stdlib/kubernetes/helm/testdata/mychart/Chart.yaml b/tests/stdlib/kubernetes/helm/testdata/mychart/Chart.yaml deleted file mode 100644 index 1613bff5..00000000 --- a/tests/stdlib/kubernetes/helm/testdata/mychart/Chart.yaml +++ /dev/null @@ -1,21 +0,0 @@ -apiVersion: v2 -name: mychart -description: A Helm chart for Kubernetes - -# A chart can be either an 'application' or a 'library' chart. -# -# Application charts are a collection of templates that can be packaged into versioned archives -# to be deployed. -# -# Library charts provide useful utilities or functions for the chart developer. They're included as -# a dependency of application charts to inject those utilities and functions into the rendering -# pipeline. Library charts do not define any templates and therefore cannot be deployed. -type: application - -# This is the chart version. This version number should be incremented each time you make changes -# to the chart and its templates, including the app version. -version: 0.1.0 - -# This is the version number of the application being deployed. This version number should be -# incremented each time you make changes to the application. -appVersion: 1.16.0 diff --git a/tests/stdlib/kubernetes/helm/testdata/mychart/templates/NOTES.txt b/tests/stdlib/kubernetes/helm/testdata/mychart/templates/NOTES.txt deleted file mode 100644 index 8b795a8a..00000000 --- a/tests/stdlib/kubernetes/helm/testdata/mychart/templates/NOTES.txt +++ /dev/null @@ -1,21 +0,0 @@ -1. Get the application URL by running these commands: -{{- if .Values.ingress.enabled }} -{{- range $host := .Values.ingress.hosts }} - {{- range .paths }} - http{{ if $.Values.ingress.tls }}s{{ end }}://{{ $host.host }}{{ . }} - {{- end }} -{{- end }} -{{- else if contains "NodePort" .Values.service.type }} - export NODE_PORT=$(kubectl get --namespace {{ .Release.Namespace }} -o jsonpath="{.spec.ports[0].nodePort}" services {{ include "mychart.fullname" . }}) - export NODE_IP=$(kubectl get nodes --namespace {{ .Release.Namespace }} -o jsonpath="{.items[0].status.addresses[0].address}") - echo http://$NODE_IP:$NODE_PORT -{{- else if contains "LoadBalancer" .Values.service.type }} - NOTE: It may take a few minutes for the LoadBalancer IP to be available. - You can watch the status of by running 'kubectl get --namespace {{ .Release.Namespace }} svc -w {{ include "mychart.fullname" . }}' - export SERVICE_IP=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ include "mychart.fullname" . }} --template "{{"{{ range (index .status.loadBalancer.ingress 0) }}{{.}}{{ end }}"}}") - echo http://$SERVICE_IP:{{ .Values.service.port }} -{{- else if contains "ClusterIP" .Values.service.type }} - export POD_NAME=$(kubectl get pods --namespace {{ .Release.Namespace }} -l "app.kubernetes.io/name={{ include "mychart.name" . }},app.kubernetes.io/instance={{ .Release.Name }}" -o jsonpath="{.items[0].metadata.name}") - echo "Visit http://127.0.0.1:8080 to use your application" - kubectl --namespace {{ .Release.Namespace }} port-forward $POD_NAME 8080:80 -{{- end }} diff --git a/tests/stdlib/kubernetes/helm/testdata/mychart/templates/_helpers.tpl b/tests/stdlib/kubernetes/helm/testdata/mychart/templates/_helpers.tpl deleted file mode 100644 index 8479665d..00000000 --- a/tests/stdlib/kubernetes/helm/testdata/mychart/templates/_helpers.tpl +++ /dev/null @@ -1,63 +0,0 @@ -{{/* vim: set filetype=mustache: */}} -{{/* -Expand the name of the chart. -*/}} -{{- define "mychart.name" -}} -{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} -{{- end -}} - -{{/* -Create a default fully qualified app name. -We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). -If release name contains chart name it will be used as a full name. -*/}} -{{- define "mychart.fullname" -}} -{{- if .Values.fullnameOverride -}} -{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" -}} -{{- else -}} -{{- $name := default .Chart.Name .Values.nameOverride -}} -{{- if contains $name .Release.Name -}} -{{- .Release.Name | trunc 63 | trimSuffix "-" -}} -{{- else -}} -{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} -{{- end -}} -{{- end -}} -{{- end -}} - -{{/* -Create chart name and version as used by the chart label. -*/}} -{{- define "mychart.chart" -}} -{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}} -{{- end -}} - -{{/* -Common labels -*/}} -{{- define "mychart.labels" -}} -helm.sh/chart: {{ include "mychart.chart" . }} -{{ include "mychart.selectorLabels" . }} -{{- if .Chart.AppVersion }} -app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} -{{- end }} -app.kubernetes.io/managed-by: {{ .Release.Service }} -{{- end -}} - -{{/* -Selector labels -*/}} -{{- define "mychart.selectorLabels" -}} -app.kubernetes.io/name: {{ include "mychart.name" . }} -app.kubernetes.io/instance: {{ .Release.Name }} -{{- end -}} - -{{/* -Create the name of the service account to use -*/}} -{{- define "mychart.serviceAccountName" -}} -{{- if .Values.serviceAccount.create -}} - {{ default (include "mychart.fullname" .) .Values.serviceAccount.name }} -{{- else -}} - {{ default "default" .Values.serviceAccount.name }} -{{- end -}} -{{- end -}} diff --git a/tests/stdlib/kubernetes/helm/testdata/mychart/templates/deployment.yaml b/tests/stdlib/kubernetes/helm/testdata/mychart/templates/deployment.yaml deleted file mode 100644 index 38e698f8..00000000 --- a/tests/stdlib/kubernetes/helm/testdata/mychart/templates/deployment.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - name: {{ include "mychart.fullname" . }} - labels: - {{- include "mychart.labels" . | nindent 4 }} -spec: - replicas: {{ .Values.replicaCount }} - selector: - matchLabels: - {{- include "mychart.selectorLabels" . | nindent 6 }} - template: - metadata: - labels: - {{- include "mychart.selectorLabels" . | nindent 8 }} - spec: - {{- with .Values.imagePullSecrets }} - imagePullSecrets: - {{- toYaml . | nindent 8 }} - {{- end }} - serviceAccountName: {{ include "mychart.serviceAccountName" . }} - securityContext: - {{- toYaml .Values.podSecurityContext | nindent 8 }} - containers: - - name: {{ .Chart.Name }} - securityContext: - {{- toYaml .Values.securityContext | nindent 12 }} - image: "{{ .Values.image.repository }}:{{ .Chart.AppVersion }}" - imagePullPolicy: {{ .Values.image.pullPolicy }} - ports: - - name: http - containerPort: 80 - protocol: TCP - livenessProbe: - httpGet: - path: / - port: http - readinessProbe: - httpGet: - path: / - port: http - resources: - {{- toYaml .Values.resources | nindent 12 }} - {{- with .Values.nodeSelector }} - nodeSelector: - {{- toYaml . | nindent 8 }} - {{- end }} - {{- with .Values.affinity }} - affinity: - {{- toYaml . | nindent 8 }} - {{- end }} - {{- with .Values.tolerations }} - tolerations: - {{- toYaml . | nindent 8 }} - {{- end }} diff --git a/tests/stdlib/kubernetes/helm/testdata/mychart/templates/ingress.yaml b/tests/stdlib/kubernetes/helm/testdata/mychart/templates/ingress.yaml deleted file mode 100644 index 76d277c0..00000000 --- a/tests/stdlib/kubernetes/helm/testdata/mychart/templates/ingress.yaml +++ /dev/null @@ -1,41 +0,0 @@ -{{- if .Values.ingress.enabled -}} -{{- $fullName := include "mychart.fullname" . -}} -{{- $svcPort := .Values.service.port -}} -{{- if semverCompare ">=1.14-0" .Capabilities.KubeVersion.GitVersion -}} -apiVersion: networking.k8s.io/v1beta1 -{{- else -}} -apiVersion: extensions/v1beta1 -{{- end }} -kind: Ingress -metadata: - name: {{ $fullName }} - labels: - {{- include "mychart.labels" . | nindent 4 }} - {{- with .Values.ingress.annotations }} - annotations: - {{- toYaml . | nindent 4 }} - {{- end }} -spec: -{{- if .Values.ingress.tls }} - tls: - {{- range .Values.ingress.tls }} - - hosts: - {{- range .hosts }} - - {{ . | quote }} - {{- end }} - secretName: {{ .secretName }} - {{- end }} -{{- end }} - rules: - {{- range .Values.ingress.hosts }} - - host: {{ .host | quote }} - http: - paths: - {{- range .paths }} - - path: {{ . }} - backend: - serviceName: {{ $fullName }} - servicePort: {{ $svcPort }} - {{- end }} - {{- end }} -{{- end }} diff --git a/tests/stdlib/kubernetes/helm/testdata/mychart/templates/service.yaml b/tests/stdlib/kubernetes/helm/testdata/mychart/templates/service.yaml deleted file mode 100644 index bdceb88f..00000000 --- a/tests/stdlib/kubernetes/helm/testdata/mychart/templates/service.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: {{ include "mychart.fullname" . }} - labels: - {{- include "mychart.labels" . | nindent 4 }} -spec: - type: {{ .Values.service.type }} - ports: - - port: {{ .Values.service.port }} - targetPort: http - protocol: TCP - name: http - selector: - {{- include "mychart.selectorLabels" . | nindent 4 }} diff --git a/tests/stdlib/kubernetes/helm/testdata/mychart/templates/serviceaccount.yaml b/tests/stdlib/kubernetes/helm/testdata/mychart/templates/serviceaccount.yaml deleted file mode 100644 index 145e891e..00000000 --- a/tests/stdlib/kubernetes/helm/testdata/mychart/templates/serviceaccount.yaml +++ /dev/null @@ -1,12 +0,0 @@ -{{- if .Values.serviceAccount.create -}} -apiVersion: v1 -kind: ServiceAccount -metadata: - name: {{ include "mychart.serviceAccountName" . }} - labels: - {{- include "mychart.labels" . | nindent 4 }} - {{- with .Values.serviceAccount.annotations }} - annotations: - {{- toYaml . | nindent 4 }} - {{- end }} -{{- end -}} diff --git a/tests/stdlib/kubernetes/helm/testdata/mychart/templates/tests/test-connection.yaml b/tests/stdlib/kubernetes/helm/testdata/mychart/templates/tests/test-connection.yaml deleted file mode 100644 index 0bd46ef1..00000000 --- a/tests/stdlib/kubernetes/helm/testdata/mychart/templates/tests/test-connection.yaml +++ /dev/null @@ -1,15 +0,0 @@ -apiVersion: v1 -kind: Pod -metadata: - name: "{{ include "mychart.fullname" . }}-test-connection" - labels: - {{- include "mychart.labels" . | nindent 4 }} - annotations: - "helm.sh/hook": test-success -spec: - containers: - - name: wget - image: busybox - command: ['wget'] - args: ['{{ include "mychart.fullname" . }}:{{ .Values.service.port }}'] - restartPolicy: Never diff --git a/tests/stdlib/kubernetes/helm/testdata/mychart/values.yaml b/tests/stdlib/kubernetes/helm/testdata/mychart/values.yaml deleted file mode 100644 index dbf4257e..00000000 --- a/tests/stdlib/kubernetes/helm/testdata/mychart/values.yaml +++ /dev/null @@ -1,68 +0,0 @@ -# Default values for mychart. -# This is a YAML-formatted file. -# Declare variables to be passed into your templates. - -replicaCount: 1 - -image: - repository: nginx - pullPolicy: IfNotPresent - -imagePullSecrets: [] -nameOverride: "" -fullnameOverride: "" - -serviceAccount: - # Specifies whether a service account should be created - create: true - # Annotations to add to the service account - annotations: {} - # The name of the service account to use. - # If not set and create is true, a name is generated using the fullname template - name: - -podSecurityContext: {} - # fsGroup: 2000 - -securityContext: {} - # capabilities: - # drop: - # - ALL - # readOnlyRootFilesystem: true - # runAsNonRoot: true - # runAsUser: 1000 - -service: - type: ClusterIP - port: 80 - -ingress: - enabled: false - annotations: {} - # kubernetes.io/ingress.class: nginx - # kubernetes.io/tls-acme: "true" - hosts: - - host: chart-example.local - paths: [] - tls: [] - # - secretName: chart-example-tls - # hosts: - # - chart-example.local - -resources: {} - # We usually recommend not to specify default resources and to leave this as a conscious - # choice for the user. This also increases chances charts run on environments with little - # resources, such as Minikube. If you do want to specify resources, uncomment the following - # lines, adjust them as necessary, and remove the curly braces after 'resources:'. - # limits: - # cpu: 100m - # memory: 128Mi - # requests: - # cpu: 100m - # memory: 128Mi - -nodeSelector: {} - -tolerations: [] - -affinity: {} diff --git a/tests/stdlib/kubernetes/helm/verify.cue b/tests/stdlib/kubernetes/helm/verify.cue deleted file mode 100644 index 71615eb6..00000000 --- a/tests/stdlib/kubernetes/helm/verify.cue +++ /dev/null @@ -1,51 +0,0 @@ -package main - -import ( - "dagger.io/dagger/op" - "dagger.io/kubernetes" -) - -#VerifyHelm: { - chartName: string - - namespace: string - - // Verify that pod exist - #getHelmPods: - """ - kubectl get pods --namespace "$KUBE_NAMESPACE" | grep "\(chartName)" - """ - - #up: [ - op.#Load & { - from: kubernetes.#Kubectl - }, - - op.#WriteFile & { - dest: "/getHelmPods.sh" - content: #getHelmPods - }, - - op.#WriteFile & { - dest: "/kubeconfig" - content: kubeconfig - mode: 0o600 - }, - - op.#Exec & { - always: true - args: [ - "/bin/bash", - "--noprofile", - "--norc", - "-eo", - "pipefail", - "/getHelmPods.sh", - ] - env: { - KUBECONFIG: "/kubeconfig" - KUBE_NAMESPACE: namespace - } - }, - ] -} diff --git a/tests/stdlib/kubernetes/kubernetes.cue b/tests/stdlib/kubernetes/kubernetes.cue deleted file mode 100644 index 0f254aa3..00000000 --- a/tests/stdlib/kubernetes/kubernetes.cue +++ /dev/null @@ -1,44 +0,0 @@ -package main - -import ( - "encoding/yaml" - "dagger.io/kubernetes" - "dagger.io/random" -) - -// We assume that a kinD cluster is running locally -// To deploy a local KinD cluster, follow this link : https://kind.sigs.k8s.io/docs/user/quick-start/ -kubeconfig: string @dagger(input) - -TestKubeApply: { - suffix: random.#String & { - seed: "" - } - - // Pod spec - kubeSrc: { - apiVersion: "v1" - kind: "Pod" - metadata: name: "kube-test-\(suffix.out)" - spec: { - restartPolicy: "Never" - containers: [{ - name: "test" - image: "hello-world" - }] - } - } - - // Apply deployment - apply: kubernetes.#Resources & { - "kubeconfig": kubeconfig - namespace: "dagger-test" - manifest: yaml.Marshal(kubeSrc) - } - - // Verify deployment - verify: #VerifyApply & { - podname: kubeSrc.metadata.name - namespace: apply.namespace - } -} diff --git a/tests/stdlib/kubernetes/kustomize/kustomize.cue b/tests/stdlib/kubernetes/kustomize/kustomize.cue deleted file mode 100644 index 2ebe0682..00000000 --- a/tests/stdlib/kubernetes/kustomize/kustomize.cue +++ /dev/null @@ -1,32 +0,0 @@ -package main - -import ( - "encoding/yaml" - "dagger.io/dagger" - "dagger.io/kubernetes/kustomize" -) - -TestKustomize: { - testdata: dagger.#Artifact - - // Run Kustomize - kustom: kustomize.#Kustomize & { - source: testdata - kustomization: yaml.Marshal({ - resources: ["deployment.yaml", "pod.yaml"] - images: [{ - name: "nginx" - newTag: "v1" - }] - replicas: [{ - name: "nginx-deployment" - count: 2 - }] - }) - } - - // Verify kustomization generation - verify: #VerifyKustomize & { - source: kustom - } -} diff --git a/tests/stdlib/kubernetes/kustomize/testdata/deployment.yaml b/tests/stdlib/kubernetes/kustomize/testdata/deployment.yaml deleted file mode 100644 index e47d13ff..00000000 --- a/tests/stdlib/kubernetes/kustomize/testdata/deployment.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - name: nginx-deployment - labels: - app: nginx-deployment -spec: - replicas: 1 - template: - metadata: - name: nginx-deployment - labels: - app: nginx-deployment - spec: - containers: - - name: nginx-deployment - image: nginx - imagePullPolicy: IfNotPresent - restartPolicy: Always - selector: - matchLabels: - app: nginx-deployment diff --git a/tests/stdlib/kubernetes/kustomize/testdata/pod.yaml b/tests/stdlib/kubernetes/kustomize/testdata/pod.yaml deleted file mode 100644 index 179e8199..00000000 --- a/tests/stdlib/kubernetes/kustomize/testdata/pod.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: Pod -metadata: - name: test-pod - labels: - app: test-pod -spec: - containers: - - name: test-pod - image: nginx - imagePullPolicy: IfNotPresent - restartPolicy: Always diff --git a/tests/stdlib/kubernetes/kustomize/verify.cue b/tests/stdlib/kubernetes/kustomize/verify.cue deleted file mode 100644 index 48075413..00000000 --- a/tests/stdlib/kubernetes/kustomize/verify.cue +++ /dev/null @@ -1,72 +0,0 @@ -package main - -import ( - "dagger.io/dagger/op" - "dagger.io/dagger" - "dagger.io/alpine" -) - -#VerifyKustomize: { - source: dagger.#Artifact - - #up: [ - op.#Load & { - from: alpine.#Image & { - package: bash: "=~5.1" - } - }, - - // Check files - op.#Exec & { - always: true - args: [ - "sh", "-c", "test $(ls /source | wc -l) = 1", - ] - mount: "/source": from: source - }, - - // Check image tag kustomization - op.#Exec & { - always: true - args: [ - "sh", "-c", #""" - grep -q "\- image: nginx:v1" /source/result.yaml - """#, - ] - mount: "/source": from: source - }, - - // Check replicas kustomization - op.#Exec & { - always: true - args: [ - "sh", "-c", #""" - grep -q "replicas: 2" /source/result.yaml - """#, - ] - mount: "/source": from: source - }, - - // Check pod merge by kustomization - op.#Exec & { - always: true - args: [ - "sh", "-c", #""" - grep -q "kind: Pod" /source/result.yaml - """#, - ] - mount: "/source": from: source - }, - - // Check pod name - op.#Exec & { - always: true - args: [ - "sh", "-c", #""" - grep -q "name: test-pod" /source/result.yaml - """#, - ] - mount: "/source": from: source - }, - ] -} diff --git a/tests/stdlib/kubernetes/verify.cue b/tests/stdlib/kubernetes/verify.cue deleted file mode 100644 index 7a41cf84..00000000 --- a/tests/stdlib/kubernetes/verify.cue +++ /dev/null @@ -1,79 +0,0 @@ -package main - -import ( - "dagger.io/dagger/op" - "dagger.io/kubernetes" -) - -#VerifyApply: { - podname: string - - namespace: string - - // Verify that pod exist - #GetPods: - """ - kubectl get pods --namespace "$KUBE_NAMESPACE" \( podname ) - """ - - // Clear that pod for future test - #DeletePods: - """ - kubectl delete pods --namespace "$KUBE_NAMESPACE" \( podname ) - """ - - #up: [ - op.#Load & { - from: kubernetes.#Kubectl - }, - - op.#WriteFile & { - dest: "/kubeconfig" - content: kubeconfig - mode: 0o600 - }, - - op.#WriteFile & { - dest: "/getPods.sh" - content: #GetPods - }, - - // Check pods - op.#Exec & { - always: true - args: [ - "/bin/bash", - "--noprofile", - "--norc", - "-eo", - "pipefail", - "/getPods.sh", - ] - env: { - KUBECONFIG: "/kubeconfig" - KUBE_NAMESPACE: namespace - } - }, - - op.#WriteFile & { - dest: "/deletePods.sh" - content: #DeletePods - }, - - op.#Exec & { - always: true - args: [ - "/bin/bash", - "--noprofile", - "--norc", - "-eo", - "pipefail", - "/deletePods.sh", - ] - env: { - KUBECONFIG: "/kubeconfig" - KUBE_NAMESPACE: namespace - } - }, - ] -} diff --git a/tests/stdlib/terraform/s3/inputs.yaml b/tests/stdlib/terraform/s3/inputs.yaml deleted file mode 100644 index ef2355cf..00000000 --- a/tests/stdlib/terraform/s3/inputs.yaml +++ /dev/null @@ -1,24 +0,0 @@ -TestConfig: - awsConfig: - accessKey: ENC[AES256_GCM,data:cZLf9D1ymnU4A44oGiQ4fFKdEB0=,iv:rNv9rnXSvIpKeUYRqseS9aKjEG4Wim7OW0EKEbBgp+M=,tag:cOzI4KsDgCgi/w7ByFKJJw==,type:str] - secretKey: ENC[AES256_GCM,data:ZFIHfnQYYu7ZhoXogVIHbd2wakBTw9D0TiHeadSKaYAQemCun/egNg==,iv:zISyY5zGZHfe5HZJHdfIUpX6siFIgLMrwAbZRyLH9FU=,tag:uD+1eLHY/AKR9vnpyBh+GQ==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1gxwmtwahzwdmrskhf90ppwlnze30lgpm056kuesrxzeuyclrwvpsupwtpk - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBPdU5ENVpScm0yd2RXWjRJ - aSsxWTNvSHBBeU94Z2ZKNjhXdzJHZGNybXkwCk9FVW5EM21LSTRHMkE5VG1SRFpL - ZGUyOHl3MEU3M3ZXTzBqSlExTU1uVTgKLS0tIDZRVDJOaEVZVnVSalRKMUVTTytV - ZWRONHhmOEJVd1lqM1NkMFdSNHU2THMKSjtxHeq/ZSgpXrevLH4AVYyRh4jO6qjT - J301rFx0Cu5qeSIhRiG54Pse83GD+fObDhfH0nPf5HZttDZxrISUdg== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2021-05-28T20:45:06Z" - mac: ENC[AES256_GCM,data:7b6X10McAD1qvsS3ZFWeteP7zLC6IAo6NdFjvaX1iyrjoZ+fT8hNkIPVKyfPFTqZzNIZ7qEYJO2PKrTjbhf6a1LEsL9gtfoX4JwINDk66TgIsJsvdp4TRIlEKoRSKK08zc+A5YFAtD1Pj+a3+NnF32ZUsoH+jqSixH2hK51RI0U=,iv:JKeSA0bp+QBE8H/kS/eIL47k1Bsg4L0q/YU4OlJmIKU=,tag:f3gzp/Nv4p4DajNfoAicAg==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.7.1 diff --git a/tests/stdlib/terraform/s3/main.cue b/tests/stdlib/terraform/s3/main.cue deleted file mode 100644 index 244f000f..00000000 --- a/tests/stdlib/terraform/s3/main.cue +++ /dev/null @@ -1,25 +0,0 @@ -package testing - -import ( - "dagger.io/dagger" - - "dagger.io/terraform" -) - -TestData: dagger.#Artifact - -TestConfig: awsConfig: { - accessKey: string - secretkey: string - region: "us-east-2" -} - -TestTerraform: apply: terraform.#Configuration & { - source: TestData - env: { - AWS_ACCESS_KEY_ID: TestConfig.awsConfig.accessKey - AWS_SECRET_ACCESS_KEY: TestConfig.awsConfig.secretKey - AWS_DEFAULT_REGION: TestConfig.awsConfig.region - AWS_REGION: TestConfig.awsConfig.region - } -} diff --git a/tests/stdlib/terraform/s3/testdata/test.tf b/tests/stdlib/terraform/s3/testdata/test.tf deleted file mode 100644 index 878484e2..00000000 --- a/tests/stdlib/terraform/s3/testdata/test.tf +++ /dev/null @@ -1,34 +0,0 @@ -terraform { - required_providers { - random = { - source = "hashicorp/random" - version = "3.1.0" - } - } - - backend "s3" { - bucket = "dagger-ci" - key = "terraform/tfstate" - region = "us-east-2" - } -} - -provider "random" { -} - -variable "input" { - type = string -} - -resource "random_integer" "test" { - min = 1 - max = 50 -} - -output "random" { - value = random_integer.test.result -} - -output "input" { - value = var.input -} From 2e9a0d65098043d10976f273940d081de8f212c9 Mon Sep 17 00:00:00 2001 From: Tom Chauveau Date: Fri, 18 Jun 2021 18:03:59 +0200 Subject: [PATCH 2/3] Add test to universe Signed-off-by: Tom Chauveau --- stdlib/.dagger/env/aws-eks/.gitignore | 2 + stdlib/.dagger/env/aws-eks/plan/eks.cue | 53 +++++++++++++ stdlib/.dagger/env/aws-eks/values.yaml | 28 +++++++ stdlib/.dagger/env/docker-build/.gitignore | 2 + .../env/docker-build/plan/dockerfile.cue | 57 +++++++++++++ stdlib/.dagger/env/docker-build/values.yaml | 30 +++++++ stdlib/.dagger/env/git/values.yaml | 6 +- .../env/kubernetes-deployment/.gitignore | 2 + .../kubernetes-deployment/plan/kubernetes.cue | 44 +++++++++++ .../env/kubernetes-deployment/plan/verify.cue | 79 +++++++++++++++++++ .../env/kubernetes-deployment/values.yaml | 23 ++++++ stdlib/.dagger/env/kubernetes-helm/.gitignore | 2 + .../.dagger/env/kubernetes-helm/plan/helm.cue | 56 +++++++++++++ .../env/kubernetes-helm/plan/verify.cue | 51 ++++++++++++ .../.dagger/env/kubernetes-helm/values.yaml | 27 +++++++ .../env/kubernetes-kustomize/.gitignore | 2 + .../kubernetes-kustomize/plan/kustomize.cue | 32 ++++++++ .../env/kubernetes-kustomize/plan/verify.cue | 72 +++++++++++++++++ .../env/kubernetes-kustomize/values.yaml | 27 +++++++ stdlib/.dagger/env/terraform/.gitignore | 2 + .../.dagger/env/terraform/plan/terraform.cue | 74 +++++++++++++++++ stdlib/.dagger/env/terraform/values.yaml | 31 ++++++++ stdlib/docker/testdata/build/Dockerfile | 2 + stdlib/docker/testdata/dockerfile/test.txt | 1 + stdlib/helpers.bash | 11 +++ .../helm/testdata/mychart/.helmignore | 23 ++++++ .../helm/testdata/mychart/Chart.yaml | 21 +++++ .../helm/testdata/mychart/templates/NOTES.txt | 21 +++++ .../testdata/mychart/templates/_helpers.tpl | 63 +++++++++++++++ .../mychart/templates/deployment.yaml | 55 +++++++++++++ .../testdata/mychart/templates/ingress.yaml | 41 ++++++++++ .../testdata/mychart/templates/service.yaml | 15 ++++ .../mychart/templates/serviceaccount.yaml | 12 +++ .../templates/tests/test-connection.yaml | 15 ++++ .../helm/testdata/mychart/values.yaml | 68 ++++++++++++++++ .../kustomize/testdata/deployment.yaml | 22 ++++++ stdlib/kubernetes/kustomize/testdata/pod.yaml | 12 +++ stdlib/terraform/testdata/test.tf | 34 ++++++++ stdlib/universe.bats | 62 +++++++++++++++ tests/stdlib/terraform/s3/inputs.yaml | 24 ++++++ 40 files changed, 1202 insertions(+), 2 deletions(-) create mode 100644 stdlib/.dagger/env/aws-eks/.gitignore create mode 100644 stdlib/.dagger/env/aws-eks/plan/eks.cue create mode 100644 stdlib/.dagger/env/aws-eks/values.yaml create mode 100644 stdlib/.dagger/env/docker-build/.gitignore create mode 100644 stdlib/.dagger/env/docker-build/plan/dockerfile.cue create mode 100644 stdlib/.dagger/env/docker-build/values.yaml create mode 100644 stdlib/.dagger/env/kubernetes-deployment/.gitignore create mode 100644 stdlib/.dagger/env/kubernetes-deployment/plan/kubernetes.cue create mode 100644 stdlib/.dagger/env/kubernetes-deployment/plan/verify.cue create mode 100644 stdlib/.dagger/env/kubernetes-deployment/values.yaml create mode 100644 stdlib/.dagger/env/kubernetes-helm/.gitignore create mode 100644 stdlib/.dagger/env/kubernetes-helm/plan/helm.cue create mode 100644 stdlib/.dagger/env/kubernetes-helm/plan/verify.cue create mode 100644 stdlib/.dagger/env/kubernetes-helm/values.yaml create mode 100644 stdlib/.dagger/env/kubernetes-kustomize/.gitignore create mode 100644 stdlib/.dagger/env/kubernetes-kustomize/plan/kustomize.cue create mode 100644 stdlib/.dagger/env/kubernetes-kustomize/plan/verify.cue create mode 100644 stdlib/.dagger/env/kubernetes-kustomize/values.yaml create mode 100644 stdlib/.dagger/env/terraform/.gitignore create mode 100644 stdlib/.dagger/env/terraform/plan/terraform.cue create mode 100644 stdlib/.dagger/env/terraform/values.yaml create mode 100644 stdlib/docker/testdata/build/Dockerfile create mode 100644 stdlib/docker/testdata/dockerfile/test.txt create mode 100644 stdlib/kubernetes/helm/testdata/mychart/.helmignore create mode 100644 stdlib/kubernetes/helm/testdata/mychart/Chart.yaml create mode 100644 stdlib/kubernetes/helm/testdata/mychart/templates/NOTES.txt create mode 100644 stdlib/kubernetes/helm/testdata/mychart/templates/_helpers.tpl create mode 100644 stdlib/kubernetes/helm/testdata/mychart/templates/deployment.yaml create mode 100644 stdlib/kubernetes/helm/testdata/mychart/templates/ingress.yaml create mode 100644 stdlib/kubernetes/helm/testdata/mychart/templates/service.yaml create mode 100644 stdlib/kubernetes/helm/testdata/mychart/templates/serviceaccount.yaml create mode 100644 stdlib/kubernetes/helm/testdata/mychart/templates/tests/test-connection.yaml create mode 100644 stdlib/kubernetes/helm/testdata/mychart/values.yaml create mode 100644 stdlib/kubernetes/kustomize/testdata/deployment.yaml create mode 100644 stdlib/kubernetes/kustomize/testdata/pod.yaml create mode 100644 stdlib/terraform/testdata/test.tf create mode 100644 tests/stdlib/terraform/s3/inputs.yaml diff --git a/stdlib/.dagger/env/aws-eks/.gitignore b/stdlib/.dagger/env/aws-eks/.gitignore new file mode 100644 index 00000000..01ec19b0 --- /dev/null +++ b/stdlib/.dagger/env/aws-eks/.gitignore @@ -0,0 +1,2 @@ +# dagger state +state/** diff --git a/stdlib/.dagger/env/aws-eks/plan/eks.cue b/stdlib/.dagger/env/aws-eks/plan/eks.cue new file mode 100644 index 00000000..d0a92e9d --- /dev/null +++ b/stdlib/.dagger/env/aws-eks/plan/eks.cue @@ -0,0 +1,53 @@ +package eks + +import ( + "dagger.io/aws" + "dagger.io/aws/eks" + "dagger.io/kubernetes" + "dagger.io/dagger/op" +) + +TestConfig: awsConfig: aws.#Config & { + region: "us-east-2" +} + +TestCluster: eks.#KubeConfig & { + config: TestConfig.awsConfig + clusterName: *"dagger-example-eks-cluster" | string +} + +TestEks: { + #GetPods: + """ + kubectl get pods -A + """ + + #up: [ + op.#Load & { + from: kubernetes.#Kubectl + }, + + op.#WriteFile & { + dest: "/kubeconfig" + content: TestCluster.kubeconfig + }, + + op.#WriteFile & { + dest: "/getPods.sh" + content: #GetPods + }, + + op.#Exec & { + always: true + args: [ + "/bin/bash", + "--noprofile", + "--norc", + "-eo", + "pipefail", + "/getPods.sh", + ] + env: KUBECONFIG: "/kubeconfig" + }, + ] +} diff --git a/stdlib/.dagger/env/aws-eks/values.yaml b/stdlib/.dagger/env/aws-eks/values.yaml new file mode 100644 index 00000000..7d9d9582 --- /dev/null +++ b/stdlib/.dagger/env/aws-eks/values.yaml @@ -0,0 +1,28 @@ +plan: + module: .dagger/env/aws-eks/plan +name: aws-eks +inputs: + TestConfig.awsConfig.accessKey: + secret: ENC[AES256_GCM,data:ZiNdgkTZlOyWht2CDpmYKN+ViTE=,iv:wdRiBw65BgSia9z//tUDirkkhw9O29ZoerX6eZnYx9k=,tag:S/0i/fRtQJg4Qp7tmUK4ag==,type:str] + TestConfig.awsConfig.secretKey: + secret: ENC[AES256_GCM,data:ywvQiDE4gmM6KasYWOvX1FY/Lerg5TghgoYTq1AlXDRHNGzZtY3ClQ==,iv:HCXweaSKHLwEA8Mq4up/TUaV7YDtsRpBpwYD19Jh4iw=,tag:l2hmI9BsGiRyulh4yDn/hw==,type:str] +sops: + kms: [] + gcp_kms: [] + azure_kv: [] + hc_vault: [] + age: + - recipient: age1gxwmtwahzwdmrskhf90ppwlnze30lgpm056kuesrxzeuyclrwvpsupwtpk + enc: | + -----BEGIN AGE ENCRYPTED FILE----- + YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBVdWE4VlRMWGJ3WDExWkNl + S1dqU21uVXFjaXU5eWdKRmRCUXFCd2ZaTjNrCjlkNXI3WUdnRGVibmZkbXJYaEV4 + SXIveGNDNnZ6dDM4SjdrMmZIZVhyVzAKLS0tIGkzK0tMTTdHU2lacmtvakUwbGFE + M3U4UFV5REQzYko3QjlXVE02Z0J4WUkK8uHC67Mutls4drXbCi8AwuFqbRXeb69P + ZnOFZEB4NoayoOojr1mY9ssDTywHF4KwR4E9ZmJ3V3hlEAgMkqfvSA== + -----END AGE ENCRYPTED FILE----- + lastmodified: "2021-06-17T18:46:34Z" + mac: ENC[AES256_GCM,data:B+WtEMOKXy8AT/YTUaKZ9aA8fQRt2pJp3IaABpj0oYI1vCG953MnDCIxj0j2bTQN5gyaFPF8UQ1o/pRJzCKhm26wbCByUrVdHxHTwoJ7arDqQGwcNKYAuQjLtMG7gsl0BqjCg0oKO5YEa24BqHVf1dEo9AcXd6LBwqvxVjmd98g=,iv:aWxj1Oq6wmUYuWnGOc2zIpzOYJVyXV9qSzBgF+iGsHI=,tag:Bx1A8UxghYq97wEdUxbmdg==,type:str] + pgp: [] + encrypted_suffix: secret + version: 3.7.1 diff --git a/stdlib/.dagger/env/docker-build/.gitignore b/stdlib/.dagger/env/docker-build/.gitignore new file mode 100644 index 00000000..01ec19b0 --- /dev/null +++ b/stdlib/.dagger/env/docker-build/.gitignore @@ -0,0 +1,2 @@ +# dagger state +state/** diff --git a/stdlib/.dagger/env/docker-build/plan/dockerfile.cue b/stdlib/.dagger/env/docker-build/plan/dockerfile.cue new file mode 100644 index 00000000..70b021f2 --- /dev/null +++ b/stdlib/.dagger/env/docker-build/plan/dockerfile.cue @@ -0,0 +1,57 @@ +package docker + +import ( + "dagger.io/dagger" + "dagger.io/dagger/op" + "dagger.io/docker" +) + +TestSourceBuild: dagger.#Artifact @dagger(input) + +TestBuild: { + image: docker.#Build & { + source: TestSourceBuild + } + + verify: #up: [ + op.#Load & { + from: image + }, + + op.#Exec & { + always: true + args: [ + "sh", "-c", """ + grep -q "test" /test.txt + """, + ] + }, + ] +} + +TestSourceImageFromDockerfile: dagger.#Artifact @dagger(input) + +TestImageFromDockerfile: { + image: docker.#ImageFromDockerfile & { + dockerfile: """ + FROM alpine + COPY test.txt /test.txt + """ + context: TestSourceImageFromDockerfile + } + + verify: #up: [ + op.#Load & { + from: image + }, + + op.#Exec & { + always: true + args: [ + "sh", "-c", """ + grep -q "test" /test.txt + """, + ] + }, + ] +} diff --git a/stdlib/.dagger/env/docker-build/values.yaml b/stdlib/.dagger/env/docker-build/values.yaml new file mode 100644 index 00000000..e876cc46 --- /dev/null +++ b/stdlib/.dagger/env/docker-build/values.yaml @@ -0,0 +1,30 @@ +plan: + module: .dagger/env/docker-build/plan +name: docker-build +inputs: + TestSourceBuild: + dir: + path: ./docker/testdata/build + TestSourceImageFromDockerfile: + dir: + path: ./docker/testdata/dockerfile +sops: + kms: [] + gcp_kms: [] + azure_kv: [] + hc_vault: [] + age: + - recipient: age1gxwmtwahzwdmrskhf90ppwlnze30lgpm056kuesrxzeuyclrwvpsupwtpk + enc: | + -----BEGIN AGE ENCRYPTED FILE----- + YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSA0TXlFYWNvUldMdlRtWkEz + SlBEYUY1Q0thbFdSZGpaT00xQ2Jkc1J2WkdJClBXUGVTamdmZU1KNUdjam9HN0Zl + RjRQbVRHVjR6S3RCWlJLaElaM2ZWVG8KLS0tIDJJejFkQkxYeDdHcWdPS0p0QmJ0 + Mm5vT1dHbFViK2ZIakNnVkZTd2lhUHMK63jJsJVLJMbQE2NkAB8qv8JnPHpvcNes + z17EJgl0lCLqeNHtfrTfSiIP4wq8gNLK4avCKK+WGDOIMsXPzK6RNw== + -----END AGE ENCRYPTED FILE----- + lastmodified: "2021-06-17T20:14:11Z" + mac: ENC[AES256_GCM,data:hlc0Bnfeoor/WKMbQRgTalkxngL0YXTwHAys/moXZ4ZMGd2lt+j4l4EkKSjb3QrJfPllCeqroohLKtN+lP4K9fSCMcfYzic2DTEP68rPwufmrgxys1snOHHgIEfqogL8p55fJdXn91x+WHhPNkbWaaH0WcboYsy0zemUIkjb+xc=,iv:8oUeR1dfT4lrVWyJpGPPFa/jlPgWA/ld3UM9Cw2znxk=,tag:59RyiXwzJ5j+c5faxs9U3w==,type:str] + pgp: [] + encrypted_suffix: secret + version: 3.7.1 diff --git a/stdlib/.dagger/env/git/values.yaml b/stdlib/.dagger/env/git/values.yaml index 2fd0d4a4..c209a8bd 100644 --- a/stdlib/.dagger/env/git/values.yaml +++ b/stdlib/.dagger/env/git/values.yaml @@ -1,3 +1,5 @@ +plan: + module: .dagger/env/git/plan name: git sops: kms: [] @@ -14,8 +16,8 @@ sops: TmhJNisyamw3d244aGVJSEVFVUVLZGsKvd+nowA0CLXQbdvyI4J0lBjs9vdISWlo gGvR49uul3Z8raVWXFUzsyQ8xTvYNg0ovynFG2KdagSKr1DlhKMBEQ== -----END AGE ENCRYPTED FILE----- - lastmodified: "2021-06-15T14:34:51Z" - mac: ENC[AES256_GCM,data:phQpRQlHv9c3VRcqZ7OkSfW4a9oPnTD2ucsB8TJatgzLrbP1+erj9x2jrPex0T2MExIFFzNynSAiWwueLYqCzUvuG2DfIokvM9erNfdpbIBTtJeWO9+hVIkzoQ6xeKg1wLb0q3U7Cbbe6GBFA3oabPN2kyzGbgS2LO2Ou77NMLk=,iv:sS0MRNEGBWos6XNAQEYK2UmaK9g0rd+Nx1xBNeh6w+M=,tag:DIcqzBvChde/C7T/yAhn+w==,type:str] + lastmodified: "2021-06-18T16:23:23Z" + mac: ENC[AES256_GCM,data:AdTUEx0RIrJU6aZZNn9iIrl0eM2eParknCVIQL7k1arLRfYH4WyMf9lUa03+Qy83r4miNh4a9kFpNWyodbOR/j7OiLgAxWGXc08XAnIU51F2H7b55cSW9yNJj5kfos2e1pS356MoSaswg4fH8EYVUNgWC6mdBcXzC1m7uiqTS0E=,iv:mK9sjOCd7ePWR4xe5qNwmPuIyNR1nE3Ql65cF15SovI=,tag:DPUTnGTF+Ve+A7ShACNrnQ==,type:str] pgp: [] encrypted_suffix: secret version: 3.7.1 diff --git a/stdlib/.dagger/env/kubernetes-deployment/.gitignore b/stdlib/.dagger/env/kubernetes-deployment/.gitignore new file mode 100644 index 00000000..01ec19b0 --- /dev/null +++ b/stdlib/.dagger/env/kubernetes-deployment/.gitignore @@ -0,0 +1,2 @@ +# dagger state +state/** diff --git a/stdlib/.dagger/env/kubernetes-deployment/plan/kubernetes.cue b/stdlib/.dagger/env/kubernetes-deployment/plan/kubernetes.cue new file mode 100644 index 00000000..35f7caee --- /dev/null +++ b/stdlib/.dagger/env/kubernetes-deployment/plan/kubernetes.cue @@ -0,0 +1,44 @@ +package main + +import ( + "encoding/yaml" + "dagger.io/kubernetes" + "dagger.io/random" +) + +// We assume that a kinD cluster is running locally +// To deploy a local KinD cluster, follow this link : https://kind.sigs.k8s.io/docs/user/quick-start/ +TestKubeconfig: string @dagger(input) + +TestKubeApply: { + suffix: random.#String & { + seed: "" + } + + // Pod spec + kubeSrc: { + apiVersion: "v1" + kind: "Pod" + metadata: name: "kube-test-\(suffix.out)" + spec: { + restartPolicy: "Never" + containers: [{ + name: "test" + image: "hello-world" + }] + } + } + + // Apply deployment + apply: kubernetes.#Resources & { + kubeconfig: TestKubeconfig + namespace: "dagger-test" + manifest: yaml.Marshal(kubeSrc) + } + + // Verify deployment + verify: #VerifyApply & { + podname: kubeSrc.metadata.name + namespace: apply.namespace + } +} diff --git a/stdlib/.dagger/env/kubernetes-deployment/plan/verify.cue b/stdlib/.dagger/env/kubernetes-deployment/plan/verify.cue new file mode 100644 index 00000000..0150b5f3 --- /dev/null +++ b/stdlib/.dagger/env/kubernetes-deployment/plan/verify.cue @@ -0,0 +1,79 @@ +package main + +import ( + "dagger.io/dagger/op" + "dagger.io/kubernetes" +) + +#VerifyApply: { + podname: string + + namespace: string + + // Verify that pod exist + #GetPods: + """ + kubectl get pods --namespace "$KUBE_NAMESPACE" \( podname ) + """ + + // Clear that pod for future test + #DeletePods: + """ + kubectl delete pods --namespace "$KUBE_NAMESPACE" \( podname ) + """ + + #up: [ + op.#Load & { + from: kubernetes.#Kubectl + }, + + op.#WriteFile & { + dest: "/kubeconfig" + content: TestKubeconfig + mode: 0o600 + }, + + op.#WriteFile & { + dest: "/getPods.sh" + content: #GetPods + }, + + // Check pods + op.#Exec & { + always: true + args: [ + "/bin/bash", + "--noprofile", + "--norc", + "-eo", + "pipefail", + "/getPods.sh", + ] + env: { + KUBECONFIG: "/kubeconfig" + KUBE_NAMESPACE: namespace + } + }, + + op.#WriteFile & { + dest: "/deletePods.sh" + content: #DeletePods + }, + + op.#Exec & { + always: true + args: [ + "/bin/bash", + "--noprofile", + "--norc", + "-eo", + "pipefail", + "/deletePods.sh", + ] + env: { + KUBECONFIG: "/kubeconfig" + KUBE_NAMESPACE: namespace + } + }, + ] +} diff --git a/stdlib/.dagger/env/kubernetes-deployment/values.yaml b/stdlib/.dagger/env/kubernetes-deployment/values.yaml new file mode 100644 index 00000000..59be15cd --- /dev/null +++ b/stdlib/.dagger/env/kubernetes-deployment/values.yaml @@ -0,0 +1,23 @@ +plan: + module: .dagger/env/kubernetes-deployment/plan +name: kubernetes-deployment +sops: + kms: [] + gcp_kms: [] + azure_kv: [] + hc_vault: [] + age: + - recipient: age1gxwmtwahzwdmrskhf90ppwlnze30lgpm056kuesrxzeuyclrwvpsupwtpk + enc: | + -----BEGIN AGE ENCRYPTED FILE----- + YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBIQ2hZZ3ZRVzRseXZyVW1h + L01WYkNrTzdHSEN5WTlyQzVDTm9FbzRENzFFCjdrcVhKa1ZwaGNyYmo3ditDR1hC + cStzcmVjUXY3V3FUZElRNUIzQlQzL0UKLS0tIHlmWTlUdFVOczM0TTF5RHFTUXps + SVVkOUtuWTJneE45em5iQ3JvbnIwWlkKgdJC5IzvVDxbWSfU41Xg/UGPxuVBSOGY + eqenr07uWppNaHuLuo9A+znQa2RQ0L2clcB2d+ka+6z5tQyHOfx1nA== + -----END AGE ENCRYPTED FILE----- + lastmodified: "2021-06-18T15:41:02Z" + mac: ENC[AES256_GCM,data:R3DuHLEyfehKe1nCWHdKB9jyOs5TXI+r2BmQDMiwI8v0xfZdOZWfwGw3NAFGDZHbaLNTajQkzviDsMhaXg5bxvmK7P8PiJOOmnm/LnDRfnJirGRGpWA7bmsHH/QZL1lb75+cwUrwRZflkKoPy2bQyoC5Rze6/oNhPIUTCwQWaMo=,iv:73ZjXAcazCND3JhC94TjUOlcMbwfTz8YDFP1BPo8yUw=,tag:wUVcfyjtf4KzpU0jDrxleQ==,type:str] + pgp: [] + encrypted_suffix: secret + version: 3.7.1 diff --git a/stdlib/.dagger/env/kubernetes-helm/.gitignore b/stdlib/.dagger/env/kubernetes-helm/.gitignore new file mode 100644 index 00000000..01ec19b0 --- /dev/null +++ b/stdlib/.dagger/env/kubernetes-helm/.gitignore @@ -0,0 +1,2 @@ +# dagger state +state/** diff --git a/stdlib/.dagger/env/kubernetes-helm/plan/helm.cue b/stdlib/.dagger/env/kubernetes-helm/plan/helm.cue new file mode 100644 index 00000000..6d1c5485 --- /dev/null +++ b/stdlib/.dagger/env/kubernetes-helm/plan/helm.cue @@ -0,0 +1,56 @@ +package main + +import ( + "dagger.io/kubernetes/helm" + "dagger.io/random" + "dagger.io/dagger" +) + +// We assume that a kinD cluster is running locally +// To deploy a local KinD cluster, follow this link : https://kind.sigs.k8s.io/docs/user/quick-start/ +TestKubeconfig: string @dagger(input) + +TestChartSource: dagger.#Artifact @dagger(input) + +// Deploy user local chart +TestHelmSimpleChart: { + suffix: random.#String & { + seed: "simple" + } + + // Deploy chart + deploy: helm.#Chart & { + name: "dagger-test-inline-chart-\(suffix.out)" + namespace: "dagger-test" + kubeconfig: TestKubeconfig + chartSource: TestChartSource + } + + // Verify deployment + verify: #VerifyHelm & { + chartName: deploy.name + namespace: deploy.namespace + } +} + +// Deploy remote chart +TestHelmRepoChart: { + suffix: random.#String & { + seed: "repo" + } + + // Deploy chart + deploy: helm.#Chart & { + name: "dagger-test-repository-\(suffix.out)" + namespace: "dagger-test" + kubeconfig: TestKubeconfig + repository: "https://charts.bitnami.com/bitnami" + chart: "redis" + } + + // Verify deployment + verify: #VerifyHelm & { + chartName: deploy.name + namespace: deploy.namespace + } +} diff --git a/stdlib/.dagger/env/kubernetes-helm/plan/verify.cue b/stdlib/.dagger/env/kubernetes-helm/plan/verify.cue new file mode 100644 index 00000000..581c1121 --- /dev/null +++ b/stdlib/.dagger/env/kubernetes-helm/plan/verify.cue @@ -0,0 +1,51 @@ +package main + +import ( + "dagger.io/dagger/op" + "dagger.io/kubernetes" +) + +#VerifyHelm: { + chartName: string + + namespace: string + + // Verify that pod exist + #getHelmPods: + """ + kubectl get pods --namespace "$KUBE_NAMESPACE" | grep "\(chartName)" + """ + + #up: [ + op.#Load & { + from: kubernetes.#Kubectl + }, + + op.#WriteFile & { + dest: "/getHelmPods.sh" + content: #getHelmPods + }, + + op.#WriteFile & { + dest: "/kubeconfig" + content: TestKubeconfig + mode: 0o600 + }, + + op.#Exec & { + always: true + args: [ + "/bin/bash", + "--noprofile", + "--norc", + "-eo", + "pipefail", + "/getHelmPods.sh", + ] + env: { + KUBECONFIG: "/kubeconfig" + KUBE_NAMESPACE: namespace + } + }, + ] +} diff --git a/stdlib/.dagger/env/kubernetes-helm/values.yaml b/stdlib/.dagger/env/kubernetes-helm/values.yaml new file mode 100644 index 00000000..3f79c0d5 --- /dev/null +++ b/stdlib/.dagger/env/kubernetes-helm/values.yaml @@ -0,0 +1,27 @@ +plan: + module: .dagger/env/kubernetes-helm/plan +name: kubernetes-helm +inputs: + TestChartSource: + dir: + path: ./kubernetes/helm/testdata/mychart +sops: + kms: [] + gcp_kms: [] + azure_kv: [] + hc_vault: [] + age: + - recipient: age1gxwmtwahzwdmrskhf90ppwlnze30lgpm056kuesrxzeuyclrwvpsupwtpk + enc: | + -----BEGIN AGE ENCRYPTED FILE----- + YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBud1hMc0dTZTlIQ3lZVEQ5 + WjA2UlAvTm15ZEgycXlKKzhjTmU0Ui9xZHcwCkRxclFUTUE0aXRvaElkc3diV2Ix + N2VZZVIzS2t3cVl3UmtXOC9PY1VObzAKLS0tIG9ydkFzak1SaUo2NGxET3ZiNklZ + VHlGUExaMzcwM0pOM2VDY280UWZXSzQKAm7ZV1agxbla3Yrc7vrwJosSjQtWhdac + ZFyQ6Gi+9H7qHZM89yVjAaIg1lwr68HcjYgDzpvvhJO9YPfzwoLyHw== + -----END AGE ENCRYPTED FILE----- + lastmodified: "2021-06-18T15:42:52Z" + mac: ENC[AES256_GCM,data:SzHFZpgiv+h1vRjq0GP+4nzj9az6pAwQwstxYz10yBGPQXnZv/VtJm071oouiK7pgD4i7cTvTKgIOaX9K74PiWSiTjWI5F9sGHvt9ZoGyU08OHM6zwGMDiYygBN2+5dd5jBvT4Xy6efa0IOMxSqhp69+VoJRWesAFsN6IfDcIEY=,iv:Af2WeB2eVk5hnWFWaQij7hz2wjXgNWDJTWDm13iKNvA=,tag:uvR1ruMc69ZhDJRtYCFQBw==,type:str] + pgp: [] + encrypted_suffix: secret + version: 3.7.1 diff --git a/stdlib/.dagger/env/kubernetes-kustomize/.gitignore b/stdlib/.dagger/env/kubernetes-kustomize/.gitignore new file mode 100644 index 00000000..01ec19b0 --- /dev/null +++ b/stdlib/.dagger/env/kubernetes-kustomize/.gitignore @@ -0,0 +1,2 @@ +# dagger state +state/** diff --git a/stdlib/.dagger/env/kubernetes-kustomize/plan/kustomize.cue b/stdlib/.dagger/env/kubernetes-kustomize/plan/kustomize.cue new file mode 100644 index 00000000..2ebe0682 --- /dev/null +++ b/stdlib/.dagger/env/kubernetes-kustomize/plan/kustomize.cue @@ -0,0 +1,32 @@ +package main + +import ( + "encoding/yaml" + "dagger.io/dagger" + "dagger.io/kubernetes/kustomize" +) + +TestKustomize: { + testdata: dagger.#Artifact + + // Run Kustomize + kustom: kustomize.#Kustomize & { + source: testdata + kustomization: yaml.Marshal({ + resources: ["deployment.yaml", "pod.yaml"] + images: [{ + name: "nginx" + newTag: "v1" + }] + replicas: [{ + name: "nginx-deployment" + count: 2 + }] + }) + } + + // Verify kustomization generation + verify: #VerifyKustomize & { + source: kustom + } +} diff --git a/stdlib/.dagger/env/kubernetes-kustomize/plan/verify.cue b/stdlib/.dagger/env/kubernetes-kustomize/plan/verify.cue new file mode 100644 index 00000000..48075413 --- /dev/null +++ b/stdlib/.dagger/env/kubernetes-kustomize/plan/verify.cue @@ -0,0 +1,72 @@ +package main + +import ( + "dagger.io/dagger/op" + "dagger.io/dagger" + "dagger.io/alpine" +) + +#VerifyKustomize: { + source: dagger.#Artifact + + #up: [ + op.#Load & { + from: alpine.#Image & { + package: bash: "=~5.1" + } + }, + + // Check files + op.#Exec & { + always: true + args: [ + "sh", "-c", "test $(ls /source | wc -l) = 1", + ] + mount: "/source": from: source + }, + + // Check image tag kustomization + op.#Exec & { + always: true + args: [ + "sh", "-c", #""" + grep -q "\- image: nginx:v1" /source/result.yaml + """#, + ] + mount: "/source": from: source + }, + + // Check replicas kustomization + op.#Exec & { + always: true + args: [ + "sh", "-c", #""" + grep -q "replicas: 2" /source/result.yaml + """#, + ] + mount: "/source": from: source + }, + + // Check pod merge by kustomization + op.#Exec & { + always: true + args: [ + "sh", "-c", #""" + grep -q "kind: Pod" /source/result.yaml + """#, + ] + mount: "/source": from: source + }, + + // Check pod name + op.#Exec & { + always: true + args: [ + "sh", "-c", #""" + grep -q "name: test-pod" /source/result.yaml + """#, + ] + mount: "/source": from: source + }, + ] +} diff --git a/stdlib/.dagger/env/kubernetes-kustomize/values.yaml b/stdlib/.dagger/env/kubernetes-kustomize/values.yaml new file mode 100644 index 00000000..a9b6f70e --- /dev/null +++ b/stdlib/.dagger/env/kubernetes-kustomize/values.yaml @@ -0,0 +1,27 @@ +plan: + module: .dagger/env/kubernetes-kustomize/plan +name: kubernetes-kustomize +inputs: + TestKustomize.testdata: + dir: + path: ./kubernetes/kustomize/testdata +sops: + kms: [] + gcp_kms: [] + azure_kv: [] + hc_vault: [] + age: + - recipient: age1gxwmtwahzwdmrskhf90ppwlnze30lgpm056kuesrxzeuyclrwvpsupwtpk + enc: | + -----BEGIN AGE ENCRYPTED FILE----- + YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBTL2Jyczk3QXZiUVkyd3cw + TlYzQ2NyR2ZGZnhSRmowSGRmbFBodFRPc2dnCnJpYjdCdUpEUE10d3I4clh1eDVV + MmVqbmxiNmRvSUNqZEY3clZnci9pRkkKLS0tIGVLSVFwTy9TSElFUkdjOVlWb3Yy + OFllMEh3cVJZZnFxbW4xS1RtcFQzcFUKo/1WcYp4nPBXba8wQBe3DMt6pYQJGoSu + ja5BiCffN5wOoW9WT0j8Clx21w7BXcl46+T5GYpXDQDcqf6nCv1kYQ== + -----END AGE ENCRYPTED FILE----- + lastmodified: "2021-06-17T20:48:00Z" + mac: ENC[AES256_GCM,data:SCWiSiDccPkZApOcc8RsYP7WPZUqUyYVB0UgivLhIsNSY5q3kCdenPLTUp2zLOcwaWzTPGmj++QtZjoNobcIhdVt1aJ9uXLLKRUXaRGIO3Jmhg3wj7kSPNjbDLZEB6uyA9h3edQGVVivNlNGpo91tg35QcFPPSG7UiowFnsD0zM=,iv:44hkujM/ZWjtYHau8BFMdOIeBj5jF/WnW4OOK7oSw1Y=,tag:mtJdUR+sA0tjIyAWDpXQlA==,type:str] + pgp: [] + encrypted_suffix: secret + version: 3.7.1 diff --git a/stdlib/.dagger/env/terraform/.gitignore b/stdlib/.dagger/env/terraform/.gitignore new file mode 100644 index 00000000..01ec19b0 --- /dev/null +++ b/stdlib/.dagger/env/terraform/.gitignore @@ -0,0 +1,2 @@ +# dagger state +state/** diff --git a/stdlib/.dagger/env/terraform/plan/terraform.cue b/stdlib/.dagger/env/terraform/plan/terraform.cue new file mode 100644 index 00000000..e34ea405 --- /dev/null +++ b/stdlib/.dagger/env/terraform/plan/terraform.cue @@ -0,0 +1,74 @@ +package terraform + +import ( + "dagger.io/dagger" + "dagger.io/dagger/op" + "dagger.io/alpine" + "dagger.io/terraform" +) + +TestData: dagger.#Artifact @dagger(input) + +TestConfig: awsConfig: { + accessKey: dagger.#Secret @dagger(input) + secretKey: dagger.#Secret @dagger(input) + region: "us-east-2" +} + +#TestGetConfig: { + accessKey: dagger.#Secret + + secretKey: dagger.#Secret + + visibleAccessKey: string + + visibleSecretKey: string + + #up: [ + op.#Load & {from: alpine.#Image & { + package: { + bash: true + jq: true + } + }}, + + op.#Exec & { + always: true + args: ["/bin/bash", "-c", #""" + export ACCESS_KEY=$(cat /accessKey) + export SECRET_KEY=$(cat /secretKey) + + jq --arg key0 'visibleAccessKey' --arg value0 "$ACCESS_KEY" \ + --arg key1 'visibleSecretKey' --arg value1 "$SECRET_KEY" \ + '. | .[$key0]=$value0 | .[$key1]=$value1' <<< '{}' > /out + """#, + ] + mount: { + "/accessKey": secret: accessKey + "/secretKey": secret: secretKey + } + }, + + op.#Export & { + source: "/out" + format: "json" + }, + ] +} + +TestTerraform: { + config: #TestGetConfig & { + accessKey: TestConfig.awsConfig.accessKey + secretKey: TestConfig.awsConfig.secretKey + } + + apply: terraform.#Configuration & { + source: TestData + env: { + AWS_ACCESS_KEY_ID: config.visibleAccessKey + AWS_SECRET_ACCESS_KEY: config.visibleSecretKey + AWS_DEFAULT_REGION: TestConfig.awsConfig.region + AWS_REGION: TestConfig.awsConfig.region + } + } +} diff --git a/stdlib/.dagger/env/terraform/values.yaml b/stdlib/.dagger/env/terraform/values.yaml new file mode 100644 index 00000000..fb5e132f --- /dev/null +++ b/stdlib/.dagger/env/terraform/values.yaml @@ -0,0 +1,31 @@ +plan: + module: .dagger/env/terraform/plan +name: terraform +inputs: + TestConfig.awsConfig.accessKey: + secret: ENC[AES256_GCM,data:V/p84nLbgjrytefnsfItiY71ikQ=,iv:i1x3UYP+sctwY9LrRp/rfeJ8/JPWOfiiJSG0NWUiXW0=,tag:IynKh1fQEhExmmR3qGx/zQ==,type:str] + TestConfig.awsConfig.secretKey: + secret: ENC[AES256_GCM,data:cBYaVhbeV9D6acJWNU7uL8AsEtpnY0wHM8td9ZAJ9ebGB+BY4iBZLQ==,iv:SDkRKQQKBSz/cRQlW65sIjF0PhHhhKkGUEgZe9CV7Ek=,tag:OCUQmgjP2p57YoLts9Dh4w==,type:str] + TestData: + dir: + path: ./terraform/testdata +sops: + kms: [] + gcp_kms: [] + azure_kv: [] + hc_vault: [] + age: + - recipient: age1gxwmtwahzwdmrskhf90ppwlnze30lgpm056kuesrxzeuyclrwvpsupwtpk + enc: | + -----BEGIN AGE ENCRYPTED FILE----- + YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBkOTJpQWJWY3dnM2hDdXZG + bVJEN0dNUzQ0VGhneWtHVG1hUHA5ZjdhdHdvClR0ZVpKb1RYRnc3dy9wSjVuSHBn + c2RMbzE0Y2EzN2FVak9CMk9CK0hOTFkKLS0tIG9Fdi9xWWc0TU5WY1ZsVUdZM2lw + cC9LSiswbFRKaTNXUGNIWVZVbGJqV1UK3/wsgPwR5P2fzs80wcz1dM/8sbBWMR+B + dmhP99OQisIgcwGATy0nh726pYKtosDpSLIJkLZDAUq9qRKm9bch1w== + -----END AGE ENCRYPTED FILE----- + lastmodified: "2021-06-18T16:01:11Z" + mac: ENC[AES256_GCM,data:XznDGqfZkC6vsv696qWVxbBCUgsyU/zPZg0NCULCXAfO08Hsteb0c93Y8DA3CV8flQW3cgn5XLugNnQADJ6luTXHbqIVMVMUSe1q41Kxl7exr/dn0robqaRm5MnloG823s9X3sAOcPzyTSxy1YVZfYaYbG23w9IeNmVTyaUttkU=,iv:kEQs7+bx+7j2v5b6Bx0r+ZVtp7rj/8mgX4oRUP7cruc=,tag:oQEfCPO/0V11rmkc0yaz3Q==,type:str] + pgp: [] + encrypted_suffix: secret + version: 3.7.1 diff --git a/stdlib/docker/testdata/build/Dockerfile b/stdlib/docker/testdata/build/Dockerfile new file mode 100644 index 00000000..987ce9be --- /dev/null +++ b/stdlib/docker/testdata/build/Dockerfile @@ -0,0 +1,2 @@ +FROM alpine +RUN echo test >> /test.txt \ No newline at end of file diff --git a/stdlib/docker/testdata/dockerfile/test.txt b/stdlib/docker/testdata/dockerfile/test.txt new file mode 100644 index 00000000..30d74d25 --- /dev/null +++ b/stdlib/docker/testdata/dockerfile/test.txt @@ -0,0 +1 @@ +test \ No newline at end of file diff --git a/stdlib/helpers.bash b/stdlib/helpers.bash index 76a7f46f..0bddf106 100644 --- a/stdlib/helpers.bash +++ b/stdlib/helpers.bash @@ -46,3 +46,14 @@ copy_to_sandbox() { cp -a "$source" "$target" } + +# Check if there is a local kubernetes cluster. +# +# This is need to do kubernetes test in the CI. +skip_unless_local_kube() { + if [ -f ~/.kube/config ] && grep -q "user: kind-kind" ~/.kube/config &> /dev/null && grep -q "127.0.0.1" ~/.kube/config &> /dev/null; then + echo "Kubernetes available" + else + skip "local kubernetes cluster not available" + fi +} \ No newline at end of file diff --git a/stdlib/kubernetes/helm/testdata/mychart/.helmignore b/stdlib/kubernetes/helm/testdata/mychart/.helmignore new file mode 100644 index 00000000..0e8a0eb3 --- /dev/null +++ b/stdlib/kubernetes/helm/testdata/mychart/.helmignore @@ -0,0 +1,23 @@ +# Patterns to ignore when building packages. +# This supports shell glob matching, relative path matching, and +# negation (prefixed with !). Only one pattern per line. +.DS_Store +# Common VCS dirs +.git/ +.gitignore +.bzr/ +.bzrignore +.hg/ +.hgignore +.svn/ +# Common backup files +*.swp +*.bak +*.tmp +*.orig +*~ +# Various IDEs +.project +.idea/ +*.tmproj +.vscode/ diff --git a/stdlib/kubernetes/helm/testdata/mychart/Chart.yaml b/stdlib/kubernetes/helm/testdata/mychart/Chart.yaml new file mode 100644 index 00000000..1613bff5 --- /dev/null +++ b/stdlib/kubernetes/helm/testdata/mychart/Chart.yaml @@ -0,0 +1,21 @@ +apiVersion: v2 +name: mychart +description: A Helm chart for Kubernetes + +# A chart can be either an 'application' or a 'library' chart. +# +# Application charts are a collection of templates that can be packaged into versioned archives +# to be deployed. +# +# Library charts provide useful utilities or functions for the chart developer. They're included as +# a dependency of application charts to inject those utilities and functions into the rendering +# pipeline. Library charts do not define any templates and therefore cannot be deployed. +type: application + +# This is the chart version. This version number should be incremented each time you make changes +# to the chart and its templates, including the app version. +version: 0.1.0 + +# This is the version number of the application being deployed. This version number should be +# incremented each time you make changes to the application. +appVersion: 1.16.0 diff --git a/stdlib/kubernetes/helm/testdata/mychart/templates/NOTES.txt b/stdlib/kubernetes/helm/testdata/mychart/templates/NOTES.txt new file mode 100644 index 00000000..8b795a8a --- /dev/null +++ b/stdlib/kubernetes/helm/testdata/mychart/templates/NOTES.txt @@ -0,0 +1,21 @@ +1. Get the application URL by running these commands: +{{- if .Values.ingress.enabled }} +{{- range $host := .Values.ingress.hosts }} + {{- range .paths }} + http{{ if $.Values.ingress.tls }}s{{ end }}://{{ $host.host }}{{ . }} + {{- end }} +{{- end }} +{{- else if contains "NodePort" .Values.service.type }} + export NODE_PORT=$(kubectl get --namespace {{ .Release.Namespace }} -o jsonpath="{.spec.ports[0].nodePort}" services {{ include "mychart.fullname" . }}) + export NODE_IP=$(kubectl get nodes --namespace {{ .Release.Namespace }} -o jsonpath="{.items[0].status.addresses[0].address}") + echo http://$NODE_IP:$NODE_PORT +{{- else if contains "LoadBalancer" .Values.service.type }} + NOTE: It may take a few minutes for the LoadBalancer IP to be available. + You can watch the status of by running 'kubectl get --namespace {{ .Release.Namespace }} svc -w {{ include "mychart.fullname" . }}' + export SERVICE_IP=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ include "mychart.fullname" . }} --template "{{"{{ range (index .status.loadBalancer.ingress 0) }}{{.}}{{ end }}"}}") + echo http://$SERVICE_IP:{{ .Values.service.port }} +{{- else if contains "ClusterIP" .Values.service.type }} + export POD_NAME=$(kubectl get pods --namespace {{ .Release.Namespace }} -l "app.kubernetes.io/name={{ include "mychart.name" . }},app.kubernetes.io/instance={{ .Release.Name }}" -o jsonpath="{.items[0].metadata.name}") + echo "Visit http://127.0.0.1:8080 to use your application" + kubectl --namespace {{ .Release.Namespace }} port-forward $POD_NAME 8080:80 +{{- end }} diff --git a/stdlib/kubernetes/helm/testdata/mychart/templates/_helpers.tpl b/stdlib/kubernetes/helm/testdata/mychart/templates/_helpers.tpl new file mode 100644 index 00000000..8479665d --- /dev/null +++ b/stdlib/kubernetes/helm/testdata/mychart/templates/_helpers.tpl @@ -0,0 +1,63 @@ +{{/* vim: set filetype=mustache: */}} +{{/* +Expand the name of the chart. +*/}} +{{- define "mychart.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +If release name contains chart name it will be used as a full name. +*/}} +{{- define "mychart.fullname" -}} +{{- if .Values.fullnameOverride -}} +{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- $name := default .Chart.Name .Values.nameOverride -}} +{{- if contains $name .Release.Name -}} +{{- .Release.Name | trunc 63 | trimSuffix "-" -}} +{{- else -}} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" -}} +{{- end -}} +{{- end -}} +{{- end -}} + +{{/* +Create chart name and version as used by the chart label. +*/}} +{{- define "mychart.chart" -}} +{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" -}} +{{- end -}} + +{{/* +Common labels +*/}} +{{- define "mychart.labels" -}} +helm.sh/chart: {{ include "mychart.chart" . }} +{{ include "mychart.selectorLabels" . }} +{{- if .Chart.AppVersion }} +app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} +{{- end }} +app.kubernetes.io/managed-by: {{ .Release.Service }} +{{- end -}} + +{{/* +Selector labels +*/}} +{{- define "mychart.selectorLabels" -}} +app.kubernetes.io/name: {{ include "mychart.name" . }} +app.kubernetes.io/instance: {{ .Release.Name }} +{{- end -}} + +{{/* +Create the name of the service account to use +*/}} +{{- define "mychart.serviceAccountName" -}} +{{- if .Values.serviceAccount.create -}} + {{ default (include "mychart.fullname" .) .Values.serviceAccount.name }} +{{- else -}} + {{ default "default" .Values.serviceAccount.name }} +{{- end -}} +{{- end -}} diff --git a/stdlib/kubernetes/helm/testdata/mychart/templates/deployment.yaml b/stdlib/kubernetes/helm/testdata/mychart/templates/deployment.yaml new file mode 100644 index 00000000..38e698f8 --- /dev/null +++ b/stdlib/kubernetes/helm/testdata/mychart/templates/deployment.yaml @@ -0,0 +1,55 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: {{ include "mychart.fullname" . }} + labels: + {{- include "mychart.labels" . | nindent 4 }} +spec: + replicas: {{ .Values.replicaCount }} + selector: + matchLabels: + {{- include "mychart.selectorLabels" . | nindent 6 }} + template: + metadata: + labels: + {{- include "mychart.selectorLabels" . | nindent 8 }} + spec: + {{- with .Values.imagePullSecrets }} + imagePullSecrets: + {{- toYaml . | nindent 8 }} + {{- end }} + serviceAccountName: {{ include "mychart.serviceAccountName" . }} + securityContext: + {{- toYaml .Values.podSecurityContext | nindent 8 }} + containers: + - name: {{ .Chart.Name }} + securityContext: + {{- toYaml .Values.securityContext | nindent 12 }} + image: "{{ .Values.image.repository }}:{{ .Chart.AppVersion }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + ports: + - name: http + containerPort: 80 + protocol: TCP + livenessProbe: + httpGet: + path: / + port: http + readinessProbe: + httpGet: + path: / + port: http + resources: + {{- toYaml .Values.resources | nindent 12 }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.affinity }} + affinity: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 8 }} + {{- end }} diff --git a/stdlib/kubernetes/helm/testdata/mychart/templates/ingress.yaml b/stdlib/kubernetes/helm/testdata/mychart/templates/ingress.yaml new file mode 100644 index 00000000..76d277c0 --- /dev/null +++ b/stdlib/kubernetes/helm/testdata/mychart/templates/ingress.yaml @@ -0,0 +1,41 @@ +{{- if .Values.ingress.enabled -}} +{{- $fullName := include "mychart.fullname" . -}} +{{- $svcPort := .Values.service.port -}} +{{- if semverCompare ">=1.14-0" .Capabilities.KubeVersion.GitVersion -}} +apiVersion: networking.k8s.io/v1beta1 +{{- else -}} +apiVersion: extensions/v1beta1 +{{- end }} +kind: Ingress +metadata: + name: {{ $fullName }} + labels: + {{- include "mychart.labels" . | nindent 4 }} + {{- with .Values.ingress.annotations }} + annotations: + {{- toYaml . | nindent 4 }} + {{- end }} +spec: +{{- if .Values.ingress.tls }} + tls: + {{- range .Values.ingress.tls }} + - hosts: + {{- range .hosts }} + - {{ . | quote }} + {{- end }} + secretName: {{ .secretName }} + {{- end }} +{{- end }} + rules: + {{- range .Values.ingress.hosts }} + - host: {{ .host | quote }} + http: + paths: + {{- range .paths }} + - path: {{ . }} + backend: + serviceName: {{ $fullName }} + servicePort: {{ $svcPort }} + {{- end }} + {{- end }} +{{- end }} diff --git a/stdlib/kubernetes/helm/testdata/mychart/templates/service.yaml b/stdlib/kubernetes/helm/testdata/mychart/templates/service.yaml new file mode 100644 index 00000000..bdceb88f --- /dev/null +++ b/stdlib/kubernetes/helm/testdata/mychart/templates/service.yaml @@ -0,0 +1,15 @@ +apiVersion: v1 +kind: Service +metadata: + name: {{ include "mychart.fullname" . }} + labels: + {{- include "mychart.labels" . | nindent 4 }} +spec: + type: {{ .Values.service.type }} + ports: + - port: {{ .Values.service.port }} + targetPort: http + protocol: TCP + name: http + selector: + {{- include "mychart.selectorLabels" . | nindent 4 }} diff --git a/stdlib/kubernetes/helm/testdata/mychart/templates/serviceaccount.yaml b/stdlib/kubernetes/helm/testdata/mychart/templates/serviceaccount.yaml new file mode 100644 index 00000000..145e891e --- /dev/null +++ b/stdlib/kubernetes/helm/testdata/mychart/templates/serviceaccount.yaml @@ -0,0 +1,12 @@ +{{- if .Values.serviceAccount.create -}} +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ include "mychart.serviceAccountName" . }} + labels: + {{- include "mychart.labels" . | nindent 4 }} + {{- with .Values.serviceAccount.annotations }} + annotations: + {{- toYaml . | nindent 4 }} + {{- end }} +{{- end -}} diff --git a/stdlib/kubernetes/helm/testdata/mychart/templates/tests/test-connection.yaml b/stdlib/kubernetes/helm/testdata/mychart/templates/tests/test-connection.yaml new file mode 100644 index 00000000..0bd46ef1 --- /dev/null +++ b/stdlib/kubernetes/helm/testdata/mychart/templates/tests/test-connection.yaml @@ -0,0 +1,15 @@ +apiVersion: v1 +kind: Pod +metadata: + name: "{{ include "mychart.fullname" . }}-test-connection" + labels: + {{- include "mychart.labels" . | nindent 4 }} + annotations: + "helm.sh/hook": test-success +spec: + containers: + - name: wget + image: busybox + command: ['wget'] + args: ['{{ include "mychart.fullname" . }}:{{ .Values.service.port }}'] + restartPolicy: Never diff --git a/stdlib/kubernetes/helm/testdata/mychart/values.yaml b/stdlib/kubernetes/helm/testdata/mychart/values.yaml new file mode 100644 index 00000000..dbf4257e --- /dev/null +++ b/stdlib/kubernetes/helm/testdata/mychart/values.yaml @@ -0,0 +1,68 @@ +# Default values for mychart. +# This is a YAML-formatted file. +# Declare variables to be passed into your templates. + +replicaCount: 1 + +image: + repository: nginx + pullPolicy: IfNotPresent + +imagePullSecrets: [] +nameOverride: "" +fullnameOverride: "" + +serviceAccount: + # Specifies whether a service account should be created + create: true + # Annotations to add to the service account + annotations: {} + # The name of the service account to use. + # If not set and create is true, a name is generated using the fullname template + name: + +podSecurityContext: {} + # fsGroup: 2000 + +securityContext: {} + # capabilities: + # drop: + # - ALL + # readOnlyRootFilesystem: true + # runAsNonRoot: true + # runAsUser: 1000 + +service: + type: ClusterIP + port: 80 + +ingress: + enabled: false + annotations: {} + # kubernetes.io/ingress.class: nginx + # kubernetes.io/tls-acme: "true" + hosts: + - host: chart-example.local + paths: [] + tls: [] + # - secretName: chart-example-tls + # hosts: + # - chart-example.local + +resources: {} + # We usually recommend not to specify default resources and to leave this as a conscious + # choice for the user. This also increases chances charts run on environments with little + # resources, such as Minikube. If you do want to specify resources, uncomment the following + # lines, adjust them as necessary, and remove the curly braces after 'resources:'. + # limits: + # cpu: 100m + # memory: 128Mi + # requests: + # cpu: 100m + # memory: 128Mi + +nodeSelector: {} + +tolerations: [] + +affinity: {} diff --git a/stdlib/kubernetes/kustomize/testdata/deployment.yaml b/stdlib/kubernetes/kustomize/testdata/deployment.yaml new file mode 100644 index 00000000..e47d13ff --- /dev/null +++ b/stdlib/kubernetes/kustomize/testdata/deployment.yaml @@ -0,0 +1,22 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: nginx-deployment + labels: + app: nginx-deployment +spec: + replicas: 1 + template: + metadata: + name: nginx-deployment + labels: + app: nginx-deployment + spec: + containers: + - name: nginx-deployment + image: nginx + imagePullPolicy: IfNotPresent + restartPolicy: Always + selector: + matchLabels: + app: nginx-deployment diff --git a/stdlib/kubernetes/kustomize/testdata/pod.yaml b/stdlib/kubernetes/kustomize/testdata/pod.yaml new file mode 100644 index 00000000..179e8199 --- /dev/null +++ b/stdlib/kubernetes/kustomize/testdata/pod.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +kind: Pod +metadata: + name: test-pod + labels: + app: test-pod +spec: + containers: + - name: test-pod + image: nginx + imagePullPolicy: IfNotPresent + restartPolicy: Always diff --git a/stdlib/terraform/testdata/test.tf b/stdlib/terraform/testdata/test.tf new file mode 100644 index 00000000..878484e2 --- /dev/null +++ b/stdlib/terraform/testdata/test.tf @@ -0,0 +1,34 @@ +terraform { + required_providers { + random = { + source = "hashicorp/random" + version = "3.1.0" + } + } + + backend "s3" { + bucket = "dagger-ci" + key = "terraform/tfstate" + region = "us-east-2" + } +} + +provider "random" { +} + +variable "input" { + type = string +} + +resource "random_integer" "test" { + min = 1 + max = 50 +} + +output "random" { + value = random_integer.test.result +} + +output "input" { + value = var.input +} diff --git a/stdlib/universe.bats b/stdlib/universe.bats index 2bceeac2..16681b0e 100644 --- a/stdlib/universe.bats +++ b/stdlib/universe.bats @@ -32,10 +32,18 @@ setup() { dagger -e aws-s3 up } +@test "aws: eks" { + dagger -e aws-eks up +} + @test "docker run: local" { dagger -e docker-run-local up } +@test "docker build" { + dagger -e docker-build up +} + @test "docker command: ssh" { dagger -e docker-command-ssh up } @@ -53,6 +61,34 @@ setup() { dagger -e docker-run-ssh up } +@test "kubernetes: deployment" { + skip_unless_local_kube + + # Set kubeconfig + dagger -e kubernetes-deployment input text TestKubeconfig -f "$HOME"/.kube/config + + dagger -e kubernetes-deployment up + + # Unset kubeconfig + dagger -e kubernetes-deployment input unset TestKubeconfig +} + +@test "kubernetes: kustomize" { + dagger -e kubernetes-kustomize up +} + +@test "kubernetes: helm" { + skip_unless_local_kube + + # Set kubeconfig + dagger -e kubernetes-helm input text TestKubeconfig -f "$HOME"/.kube/config + + dagger -e kubernetes-helm up + + # Unset kubeconfig + dagger -e kubernetes-helm input unset TestKubeconfig +} + @test "google cloud: gcr" { dagger -e google-gcr up } @@ -60,3 +96,29 @@ setup() { @test "google cloud: gke" { dagger -e google-gke up } + +@test "terraform" { + # it must fail because of a missing var + run dagger -e terraform up + assert_failure + + # Add the var and try again + run dagger -e terraform input text TestTerraform.apply.tfvars.input "42" + run dagger -e terraform up + assert_success + + # ensure the tfvar was passed correctly + run dagger query -e terraform TestTerraform.apply.output.input.value -f text + assert_success + assert_output "42" + + # ensure the random value is always the same + # this proves we're effectively using the s3 backend + run dagger query -e terraform TestTerraform.apply.output.random.value -f json + assert_success + assert_output "36" + + # Unset input + run dagger -e terraform input unset TestTerraform.apply.tfvars.input + assert_success +} \ No newline at end of file diff --git a/tests/stdlib/terraform/s3/inputs.yaml b/tests/stdlib/terraform/s3/inputs.yaml new file mode 100644 index 00000000..ef2355cf --- /dev/null +++ b/tests/stdlib/terraform/s3/inputs.yaml @@ -0,0 +1,24 @@ +TestConfig: + awsConfig: + accessKey: ENC[AES256_GCM,data:cZLf9D1ymnU4A44oGiQ4fFKdEB0=,iv:rNv9rnXSvIpKeUYRqseS9aKjEG4Wim7OW0EKEbBgp+M=,tag:cOzI4KsDgCgi/w7ByFKJJw==,type:str] + secretKey: ENC[AES256_GCM,data:ZFIHfnQYYu7ZhoXogVIHbd2wakBTw9D0TiHeadSKaYAQemCun/egNg==,iv:zISyY5zGZHfe5HZJHdfIUpX6siFIgLMrwAbZRyLH9FU=,tag:uD+1eLHY/AKR9vnpyBh+GQ==,type:str] +sops: + kms: [] + gcp_kms: [] + azure_kv: [] + hc_vault: [] + age: + - recipient: age1gxwmtwahzwdmrskhf90ppwlnze30lgpm056kuesrxzeuyclrwvpsupwtpk + enc: | + -----BEGIN AGE ENCRYPTED FILE----- + YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBPdU5ENVpScm0yd2RXWjRJ + aSsxWTNvSHBBeU94Z2ZKNjhXdzJHZGNybXkwCk9FVW5EM21LSTRHMkE5VG1SRFpL + ZGUyOHl3MEU3M3ZXTzBqSlExTU1uVTgKLS0tIDZRVDJOaEVZVnVSalRKMUVTTytV + ZWRONHhmOEJVd1lqM1NkMFdSNHU2THMKSjtxHeq/ZSgpXrevLH4AVYyRh4jO6qjT + J301rFx0Cu5qeSIhRiG54Pse83GD+fObDhfH0nPf5HZttDZxrISUdg== + -----END AGE ENCRYPTED FILE----- + lastmodified: "2021-05-28T20:45:06Z" + mac: ENC[AES256_GCM,data:7b6X10McAD1qvsS3ZFWeteP7zLC6IAo6NdFjvaX1iyrjoZ+fT8hNkIPVKyfPFTqZzNIZ7qEYJO2PKrTjbhf6a1LEsL9gtfoX4JwINDk66TgIsJsvdp4TRIlEKoRSKK08zc+A5YFAtD1Pj+a3+NnF32ZUsoH+jqSixH2hK51RI0U=,iv:JKeSA0bp+QBE8H/kS/eIL47k1Bsg4L0q/YU4OlJmIKU=,tag:f3gzp/Nv4p4DajNfoAicAg==,type:str] + pgp: [] + unencrypted_suffix: _unencrypted + version: 3.7.1 From 9c20c45453e5ba89bdc58eb5a0d2af2660cf7352 Mon Sep 17 00:00:00 2001 From: Tom Chauveau Date: Fri, 18 Jun 2021 19:15:48 +0200 Subject: [PATCH 3/3] Use sandbox in tests Signed-off-by: Tom Chauveau --- .../.dagger/env/kubernetes-helm/plan/helm.cue | 2 +- stdlib/helpers.bash | 12 +++++++ stdlib/universe.bats | 35 ++++++++++++------- 3 files changed, 35 insertions(+), 14 deletions(-) diff --git a/stdlib/.dagger/env/kubernetes-helm/plan/helm.cue b/stdlib/.dagger/env/kubernetes-helm/plan/helm.cue index 6d1c5485..ab06eb13 100644 --- a/stdlib/.dagger/env/kubernetes-helm/plan/helm.cue +++ b/stdlib/.dagger/env/kubernetes-helm/plan/helm.cue @@ -39,7 +39,7 @@ TestHelmRepoChart: { seed: "repo" } - // Deploy chart + // Deploy remote chart deploy: helm.#Chart & { name: "dagger-test-repository-\(suffix.out)" namespace: "dagger-test" diff --git a/stdlib/helpers.bash b/stdlib/helpers.bash index 0bddf106..f2f4b4c7 100644 --- a/stdlib/helpers.bash +++ b/stdlib/helpers.bash @@ -39,12 +39,24 @@ dagger() { # copy_to_sandbox myenv # dagger input secret -w "$DAGGER_SANDBOX" -e myenv "temporary change" # dagger up -w "$DAGGER_SANDBOX" -e myenv +# +# To use testdata directory in tests, add the package name as second flag +# Usage: +# copy_to_sandbox myenv mypackage copy_to_sandbox() { local name="$1" local source="$DAGGER_WORKSPACE"/.dagger/env/"$name" local target="$DAGGER_SANDBOX"/.dagger/env/"$name" cp -a "$source" "$target" + + if [ -d "$2" ]; then + local package="$2" + local source_package="$DAGGER_WORKSPACE"/"$package" + local target_package="$DAGGER_SANDBOX"/ + + cp -a "$source_package" "$target_package" + fi } # Check if there is a local kubernetes cluster. diff --git a/stdlib/universe.bats b/stdlib/universe.bats index 16681b0e..66d6a965 100644 --- a/stdlib/universe.bats +++ b/stdlib/universe.bats @@ -64,13 +64,16 @@ setup() { @test "kubernetes: deployment" { skip_unless_local_kube - # Set kubeconfig - dagger -e kubernetes-deployment input text TestKubeconfig -f "$HOME"/.kube/config + # Copy deployment to sandbox + copy_to_sandbox kubernetes-deployment - dagger -e kubernetes-deployment up + # Set kubeconfig + dagger -w "$DAGGER_SANDBOX" -e kubernetes-deployment input text TestKubeconfig -f "$HOME"/.kube/config + + dagger -w "$DAGGER_SANDBOX" -e kubernetes-deployment up # Unset kubeconfig - dagger -e kubernetes-deployment input unset TestKubeconfig + dagger -w "$DAGGER_SANDBOX" -e kubernetes-deployment input unset TestKubeconfig } @test "kubernetes: kustomize" { @@ -80,13 +83,16 @@ setup() { @test "kubernetes: helm" { skip_unless_local_kube - # Set kubeconfig - dagger -e kubernetes-helm input text TestKubeconfig -f "$HOME"/.kube/config + # Copy deployment to sandbox + copy_to_sandbox kubernetes-helm kubernetes - dagger -e kubernetes-helm up + # Set kubeconfig + dagger -w "$DAGGER_SANDBOX" -e kubernetes-helm input text TestKubeconfig -f "$HOME"/.kube/config + + dagger -w "$DAGGER_SANDBOX" -e kubernetes-helm up # Unset kubeconfig - dagger -e kubernetes-helm input unset TestKubeconfig + dagger -w "$DAGGER_SANDBOX" -e kubernetes-helm input unset TestKubeconfig } @test "google cloud: gcr" { @@ -102,23 +108,26 @@ setup() { run dagger -e terraform up assert_failure + # Copy deployment to sandbox + copy_to_sandbox terraform terraform + # Add the var and try again - run dagger -e terraform input text TestTerraform.apply.tfvars.input "42" - run dagger -e terraform up + run dagger -w "$DAGGER_SANDBOX" -e terraform input text TestTerraform.apply.tfvars.input "42" + run dagger -w "$DAGGER_SANDBOX" -e terraform up assert_success # ensure the tfvar was passed correctly - run dagger query -e terraform TestTerraform.apply.output.input.value -f text + run dagger -w "$DAGGER_SANDBOX" query -e terraform TestTerraform.apply.output.input.value -f text assert_success assert_output "42" # ensure the random value is always the same # this proves we're effectively using the s3 backend - run dagger query -e terraform TestTerraform.apply.output.random.value -f json + run dagger -w "$DAGGER_SANDBOX" query -e terraform TestTerraform.apply.output.random.value -f json assert_success assert_output "36" # Unset input - run dagger -e terraform input unset TestTerraform.apply.tfvars.input + run dagger -w "$DAGGER_SANDBOX" -e terraform input unset TestTerraform.apply.tfvars.input assert_success } \ No newline at end of file