-
Notifications
You must be signed in to change notification settings - Fork 140
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat(RHTAPREL-849): add e2e test for release_to_github
- Loading branch information
Showing
2 changed files
with
178 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,177 @@ | ||
package pipelines | ||
|
||
import ( | ||
"encoding/json" | ||
"fmt" | ||
// "strings" | ||
|
||
tektonutils "github.com/redhat-appstudio/release-service/tekton/utils" | ||
"k8s.io/apimachinery/pkg/runtime" | ||
|
||
ecp "github.com/enterprise-contract/enterprise-contract-controller/api/v1alpha1" | ||
. "github.com/onsi/ginkgo/v2" | ||
. "github.com/onsi/gomega" | ||
appservice "github.com/redhat-appstudio/application-api/api/v1alpha1" | ||
// appstudioApi "github.com/redhat-appstudio/application-api/api/v1alpha1" | ||
"github.com/redhat-appstudio/e2e-tests/pkg/clients/has" | ||
"github.com/redhat-appstudio/e2e-tests/pkg/constants" | ||
"github.com/redhat-appstudio/e2e-tests/pkg/framework" | ||
"github.com/redhat-appstudio/e2e-tests/pkg/utils" | ||
"github.com/redhat-appstudio/e2e-tests/pkg/utils/contract" | ||
"github.com/redhat-appstudio/e2e-tests/pkg/utils/tekton" | ||
releasecommon "github.com/redhat-appstudio/e2e-tests/tests/release" | ||
releaseApi "github.com/redhat-appstudio/release-service/api/v1alpha1" | ||
corev1 "k8s.io/api/core/v1" | ||
) | ||
|
||
var _ = framework.ReleasePipelinesSuiteDescribe("e2e-tests for Release-to-github pipeline", Label("release-pipelines", "release-to-github"), func() { | ||
defer GinkgoRecover() | ||
|
||
var fw *framework.Framework | ||
AfterEach(framework.ReportFailure(&fw)) | ||
var err error | ||
var devNamespace, managedNamespace string | ||
|
||
var component *appservice.Component | ||
var releaseCR *releaseApi.Release | ||
|
||
BeforeAll(func() { | ||
// Initialize the tests controllers | ||
fw, err = framework.NewFramework(utils.GetGeneratedNamespace("to-github")) | ||
Expect(err).NotTo(HaveOccurred()) | ||
devNamespace = fw.UserNamespace | ||
managedNamespace = utils.GetGeneratedNamespace("to-github-managed") | ||
_, err = fw.AsKubeAdmin.CommonController.CreateTestNamespace(managedNamespace) | ||
Expect(err).NotTo(HaveOccurred(), "Error when creating managedNamespace: %v", err) | ||
|
||
gitToken := utils.GetEnv("GITHUB_TOKEN", "") | ||
Expect(gitToken).ToNot(BeEmpty()) | ||
|
||
managedServiceAccount, err := fw.AsKubeAdmin.CommonController.CreateServiceAccount(releasecommon.ReleasePipelineServiceAccountDefault, managedNamespace, releasecommon.ManagednamespaceSecret, nil) | ||
Expect(err).NotTo(HaveOccurred()) | ||
|
||
_, err = fw.AsKubeAdmin.ReleaseController.CreateReleasePipelineRoleBindingForServiceAccount(managedNamespace, managedServiceAccount) | ||
Expect(err).NotTo(HaveOccurred()) | ||
|
||
err = fw.AsKubeAdmin.CommonController.LinkSecretToServiceAccount(devNamespace, releasecommon.HacbsReleaseTestsTokenSecret, constants.DefaultPipelineServiceAccount, true) | ||
Expect(err).ToNot(HaveOccurred()) | ||
|
||
err = fw.AsKubeAdmin.CommonController.LinkSecretToServiceAccount(managedNamespace, releasecommon.RedhatAppstudioUserSecret, constants.DefaultPipelineServiceAccount, true) | ||
Expect(err).ToNot(HaveOccurred()) | ||
|
||
publicKey, err := fw.AsKubeAdmin.TektonController.GetTektonChainsPublicKey() | ||
Expect(err).ToNot(HaveOccurred()) | ||
Expect(fw.AsKubeAdmin.TektonController.CreateOrUpdateSigningSecret( | ||
publicKey, releasecommon.PublicSecretNameAuth, managedNamespace)).To(Succeed()) | ||
|
||
defaultECP, err := fw.AsKubeAdmin.TektonController.GetEnterpriseContractPolicy("default", "enterprise-contract-service") | ||
Expect(err).NotTo(HaveOccurred()) | ||
policy := contract.PolicySpecWithSourceConfig(defaultECP.Spec, ecp.SourceConfig{Include: []string{"@minimal"}, Exclude: []string{"cve"}}) | ||
|
||
_, err = fw.AsKubeAdmin.HasController.CreateApplication(releasecommon.ApplicationNameDefault, devNamespace) | ||
Expect(err).NotTo(HaveOccurred()) | ||
|
||
GitSourceComponentUrl := "https://github.com/jinqi7/terraform-provider-rhcs" | ||
component = releasecommon.CreateComponentByCDQ(*fw, devNamespace, managedNamespace, releasecommon.ApplicationNameDefault, releasecommon.ComponentName, GitSourceComponentUrl) | ||
|
||
_, err = fw.AsKubeAdmin.ReleaseController.CreateReleasePlan(releasecommon.SourceReleasePlanName, devNamespace, releasecommon.ApplicationNameDefault, managedNamespace, "") | ||
Expect(err).NotTo(HaveOccurred()) | ||
|
||
data, err := json.Marshal(map[string]interface{}{ | ||
"mapping": map[string]interface{}{ | ||
"github": map[string]interface{}{ | ||
"githubSecret": gitToken, | ||
}, | ||
}, | ||
}) | ||
Expect(err).NotTo(HaveOccurred()) | ||
|
||
_, err = fw.AsKubeAdmin.ReleaseController.CreateReleasePlanAdmission(releasecommon.TargetReleasePlanAdmissionName, managedNamespace, "", devNamespace, releasecommon.ReleaseStrategyPolicyDefault, releasecommon.ReleasePipelineServiceAccountDefault, []string{releasecommon.ApplicationNameDefault}, true, &tektonutils.PipelineRef{ | ||
Resolver: "git", | ||
Params: []tektonutils.Param{ | ||
{Name: "url", Value: releasecommon.RelSvcCatalogURL}, | ||
{Name: "revision", Value: releasecommon.RelSvcCatalogRevision}, | ||
{Name: "pathInRepo", Value: "pipelines/release-to-github/release-to-github.yaml"}, | ||
}, | ||
}, &runtime.RawExtension{ | ||
Raw: data, | ||
}) | ||
Expect(err).NotTo(HaveOccurred()) | ||
|
||
_, err = fw.AsKubeAdmin.TektonController.CreateEnterpriseContractPolicy(releasecommon.ReleaseStrategyPolicyDefault, managedNamespace, policy) | ||
Expect(err).NotTo(HaveOccurred()) | ||
|
||
_, err = fw.AsKubeAdmin.TektonController.CreatePVCInAccessMode(releasecommon.ReleasePvcName, managedNamespace, corev1.ReadWriteOnce) | ||
Expect(err).NotTo(HaveOccurred()) | ||
|
||
_, err = fw.AsKubeAdmin.CommonController.CreateRole("role-release-service-account", managedNamespace, map[string][]string{ | ||
"apiGroupsList": {""}, | ||
"roleResources": {"secrets"}, | ||
"roleVerbs": {"get", "list", "watch"}, | ||
}) | ||
Expect(err).NotTo(HaveOccurred()) | ||
|
||
_, err = fw.AsKubeAdmin.CommonController.CreateRoleBinding("role-release-service-account-binding", managedNamespace, "ServiceAccount", releasecommon.ReleasePipelineServiceAccountDefault, managedNamespace, "Role", "role-release-service-account", "rbac.authorization.k8s.io") | ||
Expect(err).NotTo(HaveOccurred()) | ||
}) | ||
|
||
AfterAll(func() { | ||
if !CurrentSpecReport().Failed() { | ||
Expect(fw.AsKubeAdmin.CommonController.DeleteNamespace(managedNamespace)).NotTo(HaveOccurred()) | ||
Expect(fw.SandboxController.DeleteUserSignup(fw.UserName)).To(BeTrue()) | ||
} | ||
}) | ||
|
||
var _ = Describe("Post-release verification", func() { | ||
It("verifies that a build PipelineRun is created in dev namespace and succeeds", func() { | ||
Expect(fw.AsKubeAdmin.HasController.WaitForComponentPipelineToBeFinished(component, "", | ||
fw.AsKubeAdmin.TektonController, &has.RetryOptions{Retries: 2, Always: true})).To(Succeed()) | ||
}) | ||
|
||
It("verifies that a Release CR should have been created in the dev namespace", func() { | ||
Eventually(func() error { | ||
releaseCR, err = fw.AsKubeAdmin.ReleaseController.GetFirstReleaseInNamespace(devNamespace) | ||
return err | ||
}, releasecommon.ReleaseCreationTimeout, releasecommon.DefaultInterval).Should(Succeed()) | ||
}) | ||
|
||
It("verifies that Release PipelineRun is triggered", func() { | ||
Eventually(func() error { | ||
pr, err := fw.AsKubeAdmin.ReleaseController.GetPipelineRunInNamespace(managedNamespace, releaseCR.GetName(), releaseCR.GetNamespace()) | ||
if err != nil { | ||
GinkgoWriter.Printf("release pipelineRun for release '%s' in namespace '%s' not created yet: %+v\n", releaseCR.GetName(), releaseCR.GetNamespace(), err) | ||
return err | ||
} | ||
if !pr.HasStarted() { | ||
return fmt.Errorf("pipelinerun %s/%s hasn't started yet", pr.GetNamespace(), pr.GetName()) | ||
} | ||
return nil | ||
}, releasecommon.ReleasePipelineRunCreationTimeout, releasecommon.DefaultInterval).Should(Succeed(), fmt.Sprintf("timed out waiting for a pipelinerun to start for a release %s/%s", releaseCR.GetName(), releaseCR.GetNamespace())) | ||
}) | ||
|
||
It("verifies that Release PipelineRun should eventually succeed", func() { | ||
Eventually(func() error { | ||
pr, err := fw.AsKubeAdmin.ReleaseController.GetPipelineRunInNamespace(managedNamespace, releaseCR.GetName(), releaseCR.GetNamespace()) | ||
Expect(err).ShouldNot(HaveOccurred()) | ||
if !pr.IsDone() { | ||
return fmt.Errorf("release pipelinerun %s/%s did not finish yet", pr.GetNamespace(), pr.GetName()) | ||
} | ||
Expect(tekton.HasPipelineRunSucceeded(pr)).To(BeTrue(), fmt.Sprintf("release pipelinerun %s/%s did not succeed", pr.GetNamespace(), pr.GetName())) | ||
return nil | ||
}, releasecommon.ReleasePipelineRunCompletionTimeout, releasecommon.DefaultInterval).Should(Succeed()) | ||
}) | ||
|
||
It("verifies that a Release is marked as succeeded.", func() { | ||
Eventually(func() error { | ||
releaseCR, err = fw.AsKubeAdmin.ReleaseController.GetFirstReleaseInNamespace(devNamespace) | ||
if err != nil { | ||
return err | ||
} | ||
if !releaseCR.IsReleased() { | ||
return fmt.Errorf("release %s/%s is not marked as finished yet", releaseCR.GetNamespace(), releaseCR.GetName()) | ||
} | ||
return nil | ||
}, releasecommon.ReleaseCreationTimeout, releasecommon.DefaultInterval).Should(Succeed()) | ||
}) | ||
}) | ||
}) |