Update argoCD test

Signed-off-by: Tom Chauveau <tom.chauveau@epitech.eu>
This commit is contained in:
Tom Chauveau
2021-09-09 13:03:07 +02:00
committed by Sam Alba
parent a73b34d096
commit 2a91ae1d80
5 changed files with 143 additions and 98 deletions

View File

@@ -1,87 +1,87 @@
# Instead of setup, this runs only once
setup_file() {
load 'helpers'
load 'helpers'
setup_localstack
setup_localstack
}
setup() {
load 'helpers'
load 'helpers'
common_setup
common_setup
}
@test "cue-sanity-check" {
dagger -e sanity-check up
dagger -e sanity-check up
}
@test "os" {
dagger -e os up
dagger -e os up
}
@test "go" {
dagger -e go up
dagger -e go up
}
@test "js/yarn" {
dagger -e js-yarn up
dagger -e js-yarn up
}
@test "java/maven" {
dagger -e java-maven up
dagger -e java-maven up
}
@test "alpine" {
dagger -e alpine up
dagger -e alpine up
}
@test "netlify" {
dagger -e netlify up
dagger -e netlify up
}
@test "git" {
# Fetch repo
dagger -e git-repo up
# Fetch repo
dagger -e git-repo up
# Commit & push
dagger -e git-commit up
# Commit & push
dagger -e git-commit up
}
@test "os.#Container" {
dagger -e os-container up
dagger -e os-container up
}
@test "aws: ecr" {
dagger -e aws-ecr up
dagger -e aws-ecr up
}
@test "aws: ecr/localstack" {
skip_unless_local_localstack
skip_unless_local_localstack
dagger -e aws-ecr-localstack up
dagger -e aws-ecr-localstack up
}
@test "aws: s3" {
dagger -e aws-s3 up
dagger -e aws-s3 up
}
@test "aws: s3/localstack" {
skip_unless_local_localstack
skip_unless_local_localstack
dagger -e aws-s3-localstack up
dagger -e aws-s3-localstack up
}
@test "aws: eks" {
dagger -e aws-eks up
dagger -e aws-eks up
}
@test "docker run: local" {
skip "Not implemented yet + missing inputs leading to failure"
# dagger -e docker-run-local up
skip "Not implemented yet + missing inputs leading to failure"
# dagger -e docker-run-local up
}
@test "docker build" {
dagger -e docker-build up
dagger -e docker-build up
}
@test "docker push and pull" {
@@ -96,7 +96,7 @@ setup() {
}
@test "docker push: multi registry" {
run dagger -e docker-push-multi-registry up
run dagger -e docker-push-multi-registry up
}
@test "docker push: invalid credential" {
@@ -106,117 +106,134 @@ setup() {
}
@test "docker command: ssh" {
dagger -e docker-command-ssh up
dagger -e docker-command-ssh up
}
@test "docker command: ssh with key passphrase" {
dagger -e docker-command-ssh-key-passphrase up
dagger -e docker-command-ssh-key-passphrase up
}
@test "docker command: ssh with wrong key passphrase" {
run dagger -e docker-command-ssh-wrong-key-passphrase up
assert_failure
run dagger -e docker-command-ssh-wrong-key-passphrase up
assert_failure
}
@test "docker compose" {
dagger -e docker-compose up
dagger -e docker-compose up
}
@test "docker run: ssh" {
dagger -e docker-run-ssh up
dagger -e docker-run-ssh up
}
@test "kubernetes: deployment" {
skip_unless_local_kube
skip_unless_local_kube
# Copy deployment to sandbox
copy_to_sandbox kubernetes-deployment kubernetes
# Copy deployment to sandbox
copy_to_sandbox kubernetes-deployment kubernetes
# Set kubeconfig
dagger -w "$DAGGER_SANDBOX" -e kubernetes-deployment input text TestKubeconfig -f "$HOME"/.kube/config
# Set kubeconfig
dagger -w "$DAGGER_SANDBOX" -e kubernetes-deployment input text TestKubeconfig -f "$HOME"/.kube/config
dagger -w "$DAGGER_SANDBOX" -e kubernetes-deployment up
dagger -w "$DAGGER_SANDBOX" -e kubernetes-deployment up
# Unset kubeconfig
dagger -w "$DAGGER_SANDBOX" -e kubernetes-deployment input unset TestKubeconfig
# Unset kubeconfig
dagger -w "$DAGGER_SANDBOX" -e kubernetes-deployment input unset TestKubeconfig
}
@test "kubernetes: kustomize" {
dagger -e kubernetes-kustomize up
dagger -e kubernetes-kustomize up
}
@test "kubernetes: helm" {
skip_unless_local_kube
skip_unless_local_kube
# Copy deployment to sandbox
copy_to_sandbox kubernetes-helm kubernetes
# Copy deployment to sandbox
copy_to_sandbox kubernetes-helm kubernetes
# Set kubeconfig
dagger -w "$DAGGER_SANDBOX" -e kubernetes-helm input text TestKubeconfig -f "$HOME"/.kube/config
# Set kubeconfig
dagger -w "$DAGGER_SANDBOX" -e kubernetes-helm input text TestKubeconfig -f "$HOME"/.kube/config
dagger -w "$DAGGER_SANDBOX" -e kubernetes-helm up
dagger -w "$DAGGER_SANDBOX" -e kubernetes-helm up
# Unset kubeconfig
dagger -w "$DAGGER_SANDBOX" -e kubernetes-helm input unset TestKubeconfig
# Unset kubeconfig
dagger -w "$DAGGER_SANDBOX" -e kubernetes-helm input unset TestKubeconfig
}
@test "google cloud: gcr" {
dagger -e google-gcr up
dagger -e google-gcr up
}
@test "google cloud: gcs" {
dagger -e google-gcs up
dagger -e google-gcs up
}
@test "google cloud: gke" {
dagger -e google-gke up
dagger -e google-gke up
}
@test "google cloud: cloudrun" {
dagger -e google-cloudrun up
dagger -e google-cloudrun up
}
@test "terraform" {
# it must fail because of a missing var
run dagger -e terraform up
assert_failure
# it must fail because of a missing var
run dagger -e terraform up
assert_failure
# Copy deployment to sandbox
copy_to_sandbox terraform terraform
# Copy deployment to sandbox
copy_to_sandbox terraform terraform
# Add the var and try again
run dagger -w "$DAGGER_SANDBOX" -e terraform input text TestTerraform.apply.tfvars.input "42"
run dagger -w "$DAGGER_SANDBOX" -e terraform up
assert_success
# Add the var and try again
run dagger -w "$DAGGER_SANDBOX" -e terraform input text TestTerraform.apply.tfvars.input "42"
run dagger -w "$DAGGER_SANDBOX" -e terraform up
assert_success
# ensure the tfvar was passed correctly
run dagger -w "$DAGGER_SANDBOX" query -e terraform TestTerraform.apply.output.input.value -f text
assert_success
assert_output "42"
# ensure the tfvar was passed correctly
run dagger -w "$DAGGER_SANDBOX" query -e terraform TestTerraform.apply.output.input.value -f text
assert_success
assert_output "42"
# ensure the random value is always the same
# this proves we're effectively using the s3 backend
run dagger -w "$DAGGER_SANDBOX" query -e terraform TestTerraform.apply.output.random.value -f json
assert_success
assert_output "36"
# ensure the random value is always the same
# this proves we're effectively using the s3 backend
run dagger -w "$DAGGER_SANDBOX" query -e terraform TestTerraform.apply.output.random.value -f json
assert_success
assert_output "36"
# Unset input
run dagger -w "$DAGGER_SANDBOX" -e terraform input unset TestTerraform.apply.tfvars.input
assert_success
# Unset input
run dagger -w "$DAGGER_SANDBOX" -e terraform input unset TestTerraform.apply.tfvars.input
assert_success
}
@test "azure-resourcegroup" {
skip "Azure CI infra not implemented yet - manually tested and working"
#dagger -e azure-resourcegroup up
skip "Azure CI infra not implemented yet - manually tested and working"
#dagger -e azure-resourcegroup up
}
@test "azure-storage" {
skip "Azure CI infra not implemented yet - manually tested and working"
#dagger -e azure-storage up
skip "Azure CI infra not implemented yet - manually tested and working"
#dagger -e azure-storage up
}
@test "argocd" {
skip "ArgoCD CI secrets not yet generated - Infra not implemented yet"
#dagger -e argocd up
skip_unless_local_kube
# Deploy argoCD infra
# dagger -e argocd-infra input text TestKubeconfig -f "$HOME"/.kube/config
#dagger -e argocd-infra up
# pid=$!
curl localhost:8080
# Kill Pid
#check_pid=$(pgrep "$pid")
#if [ "$pid" -eq "$check_pid" ]; then
# kill "$pid"
#fi
# skip "ArgoCD CI secrets not yet generated - Infra not implemented yet"
# dagger -e argocd input secret TestConfig.argocdConfig.token "$(kubectl -n argocd get secret argocd-initial-admin-secret -o jsonpath="{.data.password}" | base64 -d && echo)"
# dagger -e argocd up
# Kill forward
# >&2 echo "kill pid"
}