mirror of
https://github.com/jlengrand/engine.git
synced 2026-03-10 08:11:21 +00:00
1033 lines
36 KiB
Rust
1033 lines
36 KiB
Rust
extern crate test_utilities;
|
|
|
|
use self::test_utilities::common::{routers_sessions_are_sticky, Infrastructure};
|
|
use self::test_utilities::utilities::{
|
|
engine_run_test, generate_id, get_pods, get_pvc, is_pod_restarted_env, logger, FuncTestsSecrets,
|
|
};
|
|
use ::function_name::named;
|
|
use qovery_engine::build_platform::{BuildPlatform, CacheResult};
|
|
use qovery_engine::cloud_provider::Kind;
|
|
use qovery_engine::cmd::kubectl::kubernetes_get_all_pdbs;
|
|
use qovery_engine::container_registry::{ContainerRegistry, PullResult};
|
|
use qovery_engine::models::{Action, Clone2, EnvironmentAction, Port, Protocol, Storage, StorageType};
|
|
use qovery_engine::transaction::TransactionResult;
|
|
use std::collections::BTreeMap;
|
|
use std::time::SystemTime;
|
|
use test_utilities::aws::container_registry_ecr;
|
|
use test_utilities::utilities::{build_platform_local_docker, context, init, kubernetes_config_path};
|
|
use tracing::{span, Level};
|
|
|
|
// TODO:
|
|
// - Tests that applications are always restarted when receiving a CREATE action
|
|
// see: https://github.com/Qovery/engine/pull/269
|
|
|
|
#[cfg(feature = "test-aws-self-hosted")]
|
|
#[named]
|
|
#[test]
|
|
fn deploy_a_working_environment_with_no_router_on_aws_eks() {
|
|
let test_name = function_name!();
|
|
engine_run_test(|| {
|
|
init();
|
|
let span = span!(Level::INFO, "test", name = test_name);
|
|
let _enter = span.enter();
|
|
|
|
let logger = logger();
|
|
let secrets = FuncTestsSecrets::new();
|
|
let context = context(
|
|
secrets
|
|
.AWS_TEST_ORGANIZATION_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_ORGANIZATION_ID is not set")
|
|
.as_str(),
|
|
secrets
|
|
.AWS_TEST_CLUSTER_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_CLUSTER_ID is not set")
|
|
.as_str(),
|
|
);
|
|
let context_for_delete = context.clone_not_same_execution_id();
|
|
let mut environment = test_utilities::common::working_minimal_environment(
|
|
&context,
|
|
secrets
|
|
.DEFAULT_TEST_DOMAIN
|
|
.expect("DEFAULT_TEST_DOMAIN is not set in secrets")
|
|
.as_str(),
|
|
);
|
|
|
|
let mut environment_for_delete = environment.clone();
|
|
environment.routers = vec![];
|
|
environment_for_delete.routers = vec![];
|
|
environment_for_delete.action = Action::Delete;
|
|
|
|
let ea = EnvironmentAction::Environment(environment.clone());
|
|
let ea_delete = EnvironmentAction::Environment(environment_for_delete.clone());
|
|
|
|
let ret = environment.deploy_environment(Kind::Aws, &context, &ea, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
let ret = environment_for_delete.delete_environment(Kind::Aws, &context_for_delete, &ea_delete, logger);
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
return test_name.to_string();
|
|
})
|
|
}
|
|
|
|
#[cfg(feature = "test-aws-self-hosted")]
|
|
#[named]
|
|
#[test]
|
|
fn test_build_cache() {
|
|
let test_name = function_name!();
|
|
engine_run_test(|| {
|
|
init();
|
|
let span = span!(Level::INFO, "test", name = test_name);
|
|
let _enter = span.enter();
|
|
|
|
let secrets = FuncTestsSecrets::new();
|
|
let context = context(
|
|
secrets
|
|
.AWS_TEST_ORGANIZATION_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_ORGANIZATION_ID is not set")
|
|
.as_str(),
|
|
secrets
|
|
.AWS_TEST_CLUSTER_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_CLUSTER_ID is not set")
|
|
.as_str(),
|
|
);
|
|
|
|
let environment = test_utilities::common::working_minimal_environment(
|
|
&context,
|
|
secrets
|
|
.DEFAULT_TEST_DOMAIN
|
|
.expect("DEFAULT_TEST_DOMAIN is not set in secrets")
|
|
.as_str(),
|
|
);
|
|
|
|
let ecr = container_registry_ecr(&context);
|
|
let local_docker = build_platform_local_docker(&context);
|
|
let app = environment.applications.first().unwrap();
|
|
let image = app.to_image();
|
|
|
|
let app_build = app.to_build();
|
|
let _ = match local_docker.has_cache(&app_build) {
|
|
Ok(CacheResult::Hit) => assert!(false),
|
|
Ok(CacheResult::Miss(_)) => assert!(true),
|
|
Ok(CacheResult::MissWithoutParentBuild) => assert!(false),
|
|
Err(_) => assert!(false),
|
|
};
|
|
|
|
let _ = match ecr.pull(&image).unwrap() {
|
|
PullResult::Some(_) => assert!(false),
|
|
PullResult::None => assert!(true),
|
|
};
|
|
|
|
let cancel_task = || false;
|
|
let build_result = local_docker.build(app.to_build(), false, &cancel_task).unwrap();
|
|
|
|
let _ = match ecr.push(&build_result.build.image, false) {
|
|
Ok(_) => assert!(true),
|
|
Err(_) => assert!(false),
|
|
};
|
|
|
|
// TODO clean local docker cache
|
|
|
|
let start_pull_time = SystemTime::now();
|
|
let _ = match ecr.pull(&build_result.build.image).unwrap() {
|
|
PullResult::Some(_) => assert!(true),
|
|
PullResult::None => assert!(false),
|
|
};
|
|
|
|
let pull_duration = SystemTime::now().duration_since(start_pull_time).unwrap();
|
|
|
|
let _ = match local_docker.has_cache(&build_result.build) {
|
|
Ok(CacheResult::Hit) => assert!(true),
|
|
Ok(CacheResult::Miss(_)) => assert!(false),
|
|
Ok(CacheResult::MissWithoutParentBuild) => assert!(false),
|
|
Err(_) => assert!(false),
|
|
};
|
|
|
|
let start_pull_time = SystemTime::now();
|
|
let _ = match ecr.pull(&image).unwrap() {
|
|
PullResult::Some(_) => assert!(true),
|
|
PullResult::None => assert!(false),
|
|
};
|
|
|
|
let pull_duration_2 = SystemTime::now().duration_since(start_pull_time).unwrap();
|
|
|
|
if pull_duration_2.as_millis() > pull_duration.as_millis() {
|
|
assert!(false);
|
|
}
|
|
|
|
return test_name.to_string();
|
|
})
|
|
}
|
|
|
|
#[cfg(feature = "test-aws-self-hosted")]
|
|
#[named]
|
|
#[test]
|
|
fn deploy_a_working_environment_and_pause_it_eks() {
|
|
let test_name = function_name!();
|
|
engine_run_test(|| {
|
|
init();
|
|
let span = span!(Level::INFO, "test", name = test_name);
|
|
let _enter = span.enter();
|
|
|
|
let logger = logger();
|
|
let secrets = FuncTestsSecrets::new();
|
|
let context = context(
|
|
secrets
|
|
.AWS_TEST_ORGANIZATION_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_ORGANIZATION_ID is not set")
|
|
.as_str(),
|
|
secrets
|
|
.AWS_TEST_CLUSTER_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_CLUSTER_ID is not set")
|
|
.as_str(),
|
|
);
|
|
let context_for_delete = context.clone_not_same_execution_id();
|
|
let environment = test_utilities::common::working_minimal_environment(
|
|
&context,
|
|
secrets
|
|
.DEFAULT_TEST_DOMAIN
|
|
.as_ref()
|
|
.expect("DEFAULT_TEST_DOMAIN is not set in secrets")
|
|
.as_str(),
|
|
);
|
|
|
|
let ea = EnvironmentAction::Environment(environment.clone());
|
|
let selector = format!("appId={}", environment.clone().applications[0].id);
|
|
|
|
let ret = environment.deploy_environment(Kind::Aws, &context, &ea, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
let ret = get_pods(
|
|
context.clone(),
|
|
Kind::Aws,
|
|
environment.clone(),
|
|
selector.as_str(),
|
|
secrets.clone(),
|
|
);
|
|
assert_eq!(ret.is_ok(), true);
|
|
assert_eq!(ret.unwrap().items.is_empty(), false);
|
|
|
|
let ret = environment.pause_environment(Kind::Aws, &context_for_delete, &ea, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
// Check that we have actually 0 pods running for this app
|
|
let ret = get_pods(
|
|
context.clone(),
|
|
Kind::Aws,
|
|
environment.clone(),
|
|
selector.as_str(),
|
|
secrets.clone(),
|
|
);
|
|
assert_eq!(ret.is_ok(), true);
|
|
assert_eq!(ret.unwrap().items.is_empty(), true);
|
|
|
|
let kubernetes_config = kubernetes_config_path(context.clone(), Kind::Aws, "/tmp", secrets.clone());
|
|
let mut pdbs = kubernetes_get_all_pdbs(
|
|
kubernetes_config.as_ref().expect("Unable to get kubeconfig").clone(),
|
|
vec![
|
|
(
|
|
"AWS_ACCESS_KEY_ID",
|
|
secrets
|
|
.AWS_ACCESS_KEY_ID
|
|
.as_ref()
|
|
.expect("AWS_ACCESS_KEY_ID is not set")
|
|
.as_str(),
|
|
),
|
|
(
|
|
"AWS_SECRET_ACCESS_KEY",
|
|
secrets
|
|
.AWS_SECRET_ACCESS_KEY
|
|
.as_ref()
|
|
.expect("AWS_SECRET_ACCESS_KEY is not set")
|
|
.as_str(),
|
|
),
|
|
(
|
|
"AWS_DEFAULT_REGION",
|
|
secrets
|
|
.AWS_DEFAULT_REGION
|
|
.as_ref()
|
|
.expect("AWS_DEFAULT_REGION is not set")
|
|
.as_str(),
|
|
),
|
|
],
|
|
None,
|
|
);
|
|
for pdb in pdbs.expect("Unable to get pdbs").items.expect("Unable to get pdbs") {
|
|
assert_eq!(pdb.metadata.name.contains(&environment.applications[0].name), false)
|
|
}
|
|
|
|
// Check we can resume the env
|
|
let ctx_resume = context.clone_not_same_execution_id();
|
|
let ret = environment.deploy_environment(Kind::Aws, &ctx_resume, &ea, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
let ret = get_pods(
|
|
context.clone(),
|
|
Kind::Aws,
|
|
environment.clone(),
|
|
selector.as_str(),
|
|
secrets.clone(),
|
|
);
|
|
assert_eq!(ret.is_ok(), true);
|
|
assert_eq!(ret.unwrap().items.is_empty(), false);
|
|
|
|
pdbs = kubernetes_get_all_pdbs(
|
|
kubernetes_config.as_ref().expect("Unable to get kubeconfig").clone(),
|
|
vec![
|
|
(
|
|
"AWS_ACCESS_KEY_ID",
|
|
secrets
|
|
.AWS_ACCESS_KEY_ID
|
|
.as_ref()
|
|
.expect("AWS_ACCESS_KEY_ID is not set")
|
|
.as_str(),
|
|
),
|
|
(
|
|
"AWS_SECRET_ACCESS_KEY",
|
|
secrets
|
|
.AWS_SECRET_ACCESS_KEY
|
|
.as_ref()
|
|
.expect("AWS_SECRET_ACCESS_KEY is not set")
|
|
.as_str(),
|
|
),
|
|
(
|
|
"AWS_DEFAULT_REGION",
|
|
secrets
|
|
.AWS_DEFAULT_REGION
|
|
.as_ref()
|
|
.expect("AWS_DEFAULT_REGION is not set")
|
|
.as_str(),
|
|
),
|
|
],
|
|
None,
|
|
);
|
|
let mut filtered_pdb = false;
|
|
for pdb in pdbs.expect("Unable to get pdbs").items.expect("Unable to get pdbs") {
|
|
if pdb.metadata.name.contains(&environment.applications[0].name) {
|
|
filtered_pdb = true;
|
|
break;
|
|
}
|
|
}
|
|
assert!(filtered_pdb);
|
|
|
|
// Cleanup
|
|
let ret = environment.delete_environment(Kind::Aws, &context_for_delete, &ea, logger);
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
return test_name.to_string();
|
|
})
|
|
}
|
|
|
|
#[cfg(feature = "test-aws-self-hosted")]
|
|
#[named]
|
|
#[test]
|
|
fn deploy_a_not_working_environment_with_no_router_on_aws_eks() {
|
|
let test_name = function_name!();
|
|
engine_run_test(|| {
|
|
init();
|
|
let span = span!(Level::INFO, "test", name = test_name);
|
|
let _enter = span.enter();
|
|
|
|
let logger = logger();
|
|
let secrets = FuncTestsSecrets::new();
|
|
let context = context(
|
|
secrets
|
|
.AWS_TEST_ORGANIZATION_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_ORGANIZATION_ID is not set")
|
|
.as_str(),
|
|
secrets
|
|
.AWS_TEST_CLUSTER_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_CLUSTER_ID is not set")
|
|
.as_str(),
|
|
);
|
|
let context_for_delete = context.clone_not_same_execution_id();
|
|
|
|
let mut environment = test_utilities::common::non_working_environment(
|
|
&context,
|
|
secrets
|
|
.DEFAULT_TEST_DOMAIN
|
|
.expect("DEFAULT_TEST_DOMAIN is not set in secrets")
|
|
.as_str(),
|
|
);
|
|
environment.routers = vec![];
|
|
|
|
let mut environment_delete = environment.clone();
|
|
environment_delete.action = Action::Delete;
|
|
|
|
let ea = EnvironmentAction::Environment(environment.clone());
|
|
let ea_delete = EnvironmentAction::Environment(environment_delete.clone());
|
|
|
|
let ret = environment.deploy_environment(Kind::Aws, &context, &ea, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::UnrecoverableError(_, _)));
|
|
|
|
let ret = environment_delete.delete_environment(Kind::Aws, &context_for_delete, &ea_delete, logger);
|
|
assert!(matches!(
|
|
ret,
|
|
TransactionResult::Ok | TransactionResult::UnrecoverableError(_, _)
|
|
));
|
|
|
|
return test_name.to_string();
|
|
})
|
|
}
|
|
|
|
#[cfg(feature = "test-aws-self-hosted")]
|
|
#[named]
|
|
#[test]
|
|
fn build_with_buildpacks_and_deploy_a_working_environment() {
|
|
let test_name = function_name!();
|
|
engine_run_test(|| {
|
|
init();
|
|
|
|
let span = span!(Level::INFO, "test", name = test_name);
|
|
let _enter = span.enter();
|
|
|
|
let logger = logger();
|
|
let secrets = FuncTestsSecrets::new();
|
|
let context = context(
|
|
secrets
|
|
.AWS_TEST_ORGANIZATION_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_ORGANIZATION_ID is not set")
|
|
.as_str(),
|
|
secrets
|
|
.AWS_TEST_CLUSTER_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_CLUSTER_ID is not set")
|
|
.as_str(),
|
|
);
|
|
let context_for_deletion = context.clone_not_same_execution_id();
|
|
let mut environment = test_utilities::common::working_minimal_environment(
|
|
&context,
|
|
secrets
|
|
.DEFAULT_TEST_DOMAIN
|
|
.expect("DEFAULT_TEST_DOMAIN is not set in secrets")
|
|
.as_str(),
|
|
);
|
|
environment.applications = environment
|
|
.applications
|
|
.into_iter()
|
|
.map(|mut app| {
|
|
app.ports = vec![Port {
|
|
id: "zdf7d6aad".to_string(),
|
|
long_id: Default::default(),
|
|
port: 3000,
|
|
public_port: Some(443),
|
|
name: None,
|
|
publicly_accessible: true,
|
|
protocol: Protocol::HTTP,
|
|
}];
|
|
app.commit_id = "f59237d603829636138e2f22a0549e33b5dd6e1f".to_string();
|
|
app.branch = "simple-node-app".to_string();
|
|
app.dockerfile_path = None;
|
|
app
|
|
})
|
|
.collect::<Vec<qovery_engine::models::Application>>();
|
|
|
|
let mut environment_delete = environment.clone();
|
|
environment_delete.action = Action::Delete;
|
|
|
|
let ea = EnvironmentAction::Environment(environment.clone());
|
|
let ea_delete = EnvironmentAction::Environment(environment_delete.clone());
|
|
|
|
let ret = environment.deploy_environment(Kind::Aws, &context, &ea, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
let ret = environment_delete.delete_environment(Kind::Aws, &context_for_deletion, &ea_delete, logger);
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
return test_name.to_string();
|
|
})
|
|
}
|
|
|
|
#[cfg(feature = "test-aws-self-hosted")]
|
|
#[named]
|
|
#[test]
|
|
fn build_worker_with_buildpacks_and_deploy_a_working_environment() {
|
|
let test_name = function_name!();
|
|
engine_run_test(|| {
|
|
init();
|
|
|
|
let span = span!(Level::INFO, "test", name = test_name);
|
|
let _enter = span.enter();
|
|
|
|
let logger = logger();
|
|
let secrets = FuncTestsSecrets::new();
|
|
let context = context(
|
|
secrets
|
|
.AWS_TEST_ORGANIZATION_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_ORGANIZATION_ID is not set")
|
|
.as_str(),
|
|
secrets
|
|
.AWS_TEST_CLUSTER_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_CLUSTER_ID is not set")
|
|
.as_str(),
|
|
);
|
|
let context_for_deletion = context.clone_not_same_execution_id();
|
|
let mut environment = test_utilities::common::working_minimal_environment(
|
|
&context,
|
|
secrets
|
|
.DEFAULT_TEST_DOMAIN
|
|
.expect("DEFAULT_TEST_DOMAIN is not set in secrets")
|
|
.as_str(),
|
|
);
|
|
environment.applications = environment
|
|
.applications
|
|
.into_iter()
|
|
.map(|mut app| {
|
|
app.ports = vec![Port {
|
|
id: "zdf7d6aad".to_string(),
|
|
long_id: Default::default(),
|
|
port: 3000,
|
|
public_port: Some(443),
|
|
name: None,
|
|
publicly_accessible: true,
|
|
protocol: Protocol::HTTP,
|
|
}];
|
|
app.commit_id = "f59237d603829636138e2f22a0549e33b5dd6e1f".to_string();
|
|
app.branch = "simple-node-app".to_string();
|
|
app.dockerfile_path = None;
|
|
app
|
|
})
|
|
.collect::<Vec<qovery_engine::models::Application>>();
|
|
|
|
let mut environment_delete = environment.clone();
|
|
environment_delete.action = Action::Delete;
|
|
|
|
let ea = EnvironmentAction::Environment(environment.clone());
|
|
let ea_delete = EnvironmentAction::Environment(environment_delete.clone());
|
|
|
|
let ret = environment.deploy_environment(Kind::Aws, &context, &ea, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
let ret = environment_delete.delete_environment(Kind::Aws, &context_for_deletion, &ea_delete, logger);
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
return test_name.to_string();
|
|
})
|
|
}
|
|
|
|
#[cfg(feature = "test-aws-self-hosted")]
|
|
#[named]
|
|
#[test]
|
|
fn deploy_a_working_environment_with_domain() {
|
|
let test_name = function_name!();
|
|
engine_run_test(|| {
|
|
init();
|
|
|
|
let span = span!(Level::INFO, "test", name = test_name);
|
|
let _enter = span.enter();
|
|
|
|
let logger = logger();
|
|
let secrets = FuncTestsSecrets::new();
|
|
let context = context(
|
|
secrets
|
|
.AWS_TEST_ORGANIZATION_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_ORGANIZATION_ID is not set")
|
|
.as_str(),
|
|
secrets
|
|
.AWS_TEST_CLUSTER_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_CLUSTER_ID is not set")
|
|
.as_str(),
|
|
);
|
|
let context_for_deletion = context.clone_not_same_execution_id();
|
|
let environment = test_utilities::common::working_minimal_environment(
|
|
&context,
|
|
secrets
|
|
.DEFAULT_TEST_DOMAIN
|
|
.expect("DEFAULT_TEST_DOMAIN is not set in secrets")
|
|
.as_str(),
|
|
);
|
|
|
|
let mut environment_delete = environment.clone();
|
|
environment_delete.action = Action::Delete;
|
|
|
|
let ea = EnvironmentAction::Environment(environment.clone());
|
|
let ea_delete = EnvironmentAction::Environment(environment_delete.clone());
|
|
|
|
let ret = environment.deploy_environment(Kind::Aws, &context, &ea, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
let ret = environment_delete.delete_environment(Kind::Aws, &context_for_deletion, &ea_delete, logger);
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
return test_name.to_string();
|
|
})
|
|
}
|
|
|
|
#[cfg(feature = "test-aws-self-hosted")]
|
|
#[named]
|
|
#[test]
|
|
fn deploy_a_working_environment_with_storage_on_aws_eks() {
|
|
let test_name = function_name!();
|
|
engine_run_test(|| {
|
|
init();
|
|
|
|
let span = span!(Level::INFO, "test", name = test_name);
|
|
let _enter = span.enter();
|
|
|
|
let secrets = FuncTestsSecrets::new();
|
|
let logger = logger();
|
|
let context = context(
|
|
secrets
|
|
.AWS_TEST_ORGANIZATION_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_ORGANIZATION_ID is not set")
|
|
.as_str(),
|
|
secrets
|
|
.AWS_TEST_CLUSTER_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_CLUSTER_ID is not set")
|
|
.as_str(),
|
|
);
|
|
let context_for_deletion = context.clone_not_same_execution_id();
|
|
|
|
let mut environment = test_utilities::common::working_minimal_environment(
|
|
&context,
|
|
secrets
|
|
.DEFAULT_TEST_DOMAIN
|
|
.as_ref()
|
|
.expect("DEFAULT_TEST_DOMAIN is not set in secrets")
|
|
.as_str(),
|
|
);
|
|
|
|
let storage_size: u16 = 10;
|
|
environment.applications = environment
|
|
.applications
|
|
.into_iter()
|
|
.map(|mut app| {
|
|
app.storage = vec![Storage {
|
|
id: generate_id(),
|
|
name: "photos".to_string(),
|
|
storage_type: StorageType::Ssd,
|
|
size_in_gib: storage_size,
|
|
mount_point: "/mnt/photos".to_string(),
|
|
snapshot_retention_in_days: 0,
|
|
}];
|
|
app
|
|
})
|
|
.collect::<Vec<qovery_engine::models::Application>>();
|
|
|
|
let mut environment_delete = environment.clone();
|
|
environment_delete.action = Action::Delete;
|
|
|
|
let ea = EnvironmentAction::Environment(environment.clone());
|
|
let ea_delete = EnvironmentAction::Environment(environment_delete.clone());
|
|
|
|
let ret = environment.deploy_environment(Kind::Aws, &context, &ea, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
match get_pvc(context.clone(), Kind::Aws, environment.clone(), secrets.clone()) {
|
|
Ok(pvc) => assert_eq!(
|
|
pvc.items.expect("No items in pvc")[0].spec.resources.requests.storage,
|
|
format!("{}Gi", storage_size)
|
|
),
|
|
Err(_) => assert!(false),
|
|
};
|
|
|
|
let ret = environment_delete.delete_environment(Kind::Aws, &context_for_deletion, &ea_delete, logger);
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
return test_name.to_string();
|
|
})
|
|
}
|
|
|
|
// to check if app redeploy or not, it shouldn't
|
|
#[cfg(feature = "test-aws-self-hosted")]
|
|
#[named]
|
|
#[test]
|
|
fn redeploy_same_app_with_ebs() {
|
|
let test_name = function_name!();
|
|
engine_run_test(|| {
|
|
init();
|
|
|
|
let span = span!(Level::INFO, "test", name = test_name);
|
|
let _enter = span.enter();
|
|
|
|
let secrets = FuncTestsSecrets::new();
|
|
let logger = logger();
|
|
let context = context(
|
|
secrets
|
|
.AWS_TEST_ORGANIZATION_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_ORGANIZATION_ID is not set")
|
|
.as_str(),
|
|
secrets
|
|
.AWS_TEST_CLUSTER_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_CLUSTER_ID is not set")
|
|
.as_str(),
|
|
);
|
|
let context_bis = context.clone_not_same_execution_id();
|
|
let context_for_deletion = context.clone_not_same_execution_id();
|
|
|
|
let mut environment = test_utilities::common::working_minimal_environment(
|
|
&context,
|
|
secrets
|
|
.DEFAULT_TEST_DOMAIN
|
|
.as_ref()
|
|
.expect("DEFAULT_TEST_DOMAIN is not set in secrets")
|
|
.as_str(),
|
|
);
|
|
|
|
let storage_size: u16 = 10;
|
|
environment.applications = environment
|
|
.applications
|
|
.into_iter()
|
|
.map(|mut app| {
|
|
app.storage = vec![Storage {
|
|
id: generate_id(),
|
|
name: "photos".to_string(),
|
|
storage_type: StorageType::Ssd,
|
|
size_in_gib: storage_size,
|
|
mount_point: "/mnt/photos".to_string(),
|
|
snapshot_retention_in_days: 0,
|
|
}];
|
|
app
|
|
})
|
|
.collect::<Vec<qovery_engine::models::Application>>();
|
|
let environment_redeploy = environment.clone();
|
|
let environment_check1 = environment.clone();
|
|
let environment_check2 = environment.clone();
|
|
let mut environment_delete = environment.clone();
|
|
environment_delete.action = Action::Delete;
|
|
|
|
let ea = EnvironmentAction::Environment(environment.clone());
|
|
let ea2 = EnvironmentAction::Environment(environment_redeploy.clone());
|
|
let ea_delete = EnvironmentAction::Environment(environment_delete.clone());
|
|
|
|
let ret = environment.deploy_environment(Kind::Aws, &context, &ea, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
match get_pvc(context.clone(), Kind::Aws, environment.clone(), secrets.clone()) {
|
|
Ok(pvc) => assert_eq!(
|
|
pvc.items.expect("No items in pvc")[0].spec.resources.requests.storage,
|
|
format!("{}Gi", storage_size)
|
|
),
|
|
Err(_) => assert!(false),
|
|
};
|
|
|
|
let app_name = format!("{}-0", &environment_check1.applications[0].name);
|
|
let (_, number) = is_pod_restarted_env(
|
|
context.clone(),
|
|
Kind::Aws,
|
|
environment_check1,
|
|
app_name.clone().as_str(),
|
|
secrets.clone(),
|
|
);
|
|
|
|
let ret = environment_redeploy.deploy_environment(Kind::Aws, &context_bis, &ea2, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
let (_, number2) = is_pod_restarted_env(
|
|
context.clone(),
|
|
Kind::Aws,
|
|
environment_check2,
|
|
app_name.as_str(),
|
|
secrets.clone(),
|
|
);
|
|
//nothing change in the app, so, it shouldn't be restarted
|
|
assert!(number.eq(&number2));
|
|
let ret = environment_delete.delete_environment(Kind::Aws, &context_for_deletion, &ea_delete, logger);
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
return test_name.to_string();
|
|
})
|
|
}
|
|
|
|
#[cfg(feature = "test-aws-self-hosted")]
|
|
#[named]
|
|
#[test]
|
|
fn deploy_a_not_working_environment_and_after_working_environment() {
|
|
let test_name = function_name!();
|
|
engine_run_test(|| {
|
|
init();
|
|
|
|
let span = span!(Level::INFO, "test", name = test_name);
|
|
let _enter = span.enter();
|
|
|
|
let logger = logger();
|
|
let secrets = FuncTestsSecrets::new();
|
|
let context = context(
|
|
secrets
|
|
.AWS_TEST_ORGANIZATION_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_ORGANIZATION_ID is not set")
|
|
.as_str(),
|
|
secrets
|
|
.AWS_TEST_CLUSTER_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_CLUSTER_ID is not set")
|
|
.as_str(),
|
|
);
|
|
let context_for_not_working = context.clone_not_same_execution_id();
|
|
let context_for_delete = context.clone_not_same_execution_id();
|
|
|
|
// env part generation
|
|
let environment = test_utilities::common::working_minimal_environment(
|
|
&context,
|
|
secrets
|
|
.DEFAULT_TEST_DOMAIN
|
|
.expect("DEFAULT_TEST_DOMAIN is not set in secrets")
|
|
.as_str(),
|
|
);
|
|
let mut environment_for_not_working = environment.clone();
|
|
// this environment is broken by container exit
|
|
environment_for_not_working.applications = environment_for_not_working
|
|
.applications
|
|
.into_iter()
|
|
.map(|mut app| {
|
|
app.git_url = "https://github.com/Qovery/engine-testing.git".to_string();
|
|
app.branch = "1app_fail_deploy".to_string();
|
|
app.commit_id = "5b89305b9ae8a62a1f16c5c773cddf1d12f70db1".to_string();
|
|
app.environment_vars = BTreeMap::default();
|
|
app
|
|
})
|
|
.collect::<Vec<qovery_engine::models::Application>>();
|
|
let mut environment_for_delete = environment.clone();
|
|
environment_for_delete.action = Action::Delete;
|
|
|
|
// environment actions
|
|
let ea = EnvironmentAction::Environment(environment.clone());
|
|
let ea_not_working = EnvironmentAction::Environment(environment_for_not_working.clone());
|
|
let ea_delete = EnvironmentAction::Environment(environment_for_delete.clone());
|
|
|
|
let ret = environment_for_not_working.deploy_environment(
|
|
Kind::Aws,
|
|
&context_for_not_working,
|
|
&ea_not_working,
|
|
logger.clone(),
|
|
);
|
|
assert!(matches!(ret, TransactionResult::UnrecoverableError(_, _)));
|
|
|
|
let ret = environment.deploy_environment(Kind::Aws, &context, &ea, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
let ret = environment_for_delete.delete_environment(Kind::Aws, &context_for_delete, &ea_delete, logger);
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
return test_name.to_string();
|
|
})
|
|
}
|
|
|
|
#[cfg(feature = "test-aws-self-hosted")]
|
|
#[test]
|
|
#[ignore]
|
|
#[named]
|
|
#[allow(dead_code)] // todo: make it work and remove the next line
|
|
#[allow(unused_attributes)]
|
|
fn deploy_ok_fail_fail_ok_environment() {
|
|
let test_name = function_name!();
|
|
engine_run_test(|| {
|
|
init();
|
|
|
|
let span = span!(Level::INFO, "test", name = "deploy_ok_fail_fail_ok_environment");
|
|
let _enter = span.enter();
|
|
|
|
// working env
|
|
let logger = logger();
|
|
let secrets = FuncTestsSecrets::new();
|
|
let context = context(
|
|
secrets
|
|
.AWS_TEST_ORGANIZATION_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_ORGANIZATION_ID is not set")
|
|
.as_str(),
|
|
secrets
|
|
.AWS_TEST_CLUSTER_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_CLUSTER_ID is not set")
|
|
.as_str(),
|
|
);
|
|
let environment = test_utilities::common::working_minimal_environment(
|
|
&context,
|
|
secrets
|
|
.DEFAULT_TEST_DOMAIN
|
|
.expect("DEFAULT_TEST_DOMAIN is not set in secrets")
|
|
.as_str(),
|
|
);
|
|
|
|
// not working 1
|
|
let context_for_not_working_1 = context.clone_not_same_execution_id();
|
|
let mut not_working_env_1 = environment.clone();
|
|
not_working_env_1.applications = not_working_env_1
|
|
.applications
|
|
.into_iter()
|
|
.map(|mut app| {
|
|
app.git_url = "https://gitlab.com/maathor/my-exit-container".to_string();
|
|
app.branch = "master".to_string();
|
|
app.commit_id = "55bc95a23fbf91a7699c28c5f61722d4f48201c9".to_string();
|
|
app.environment_vars = BTreeMap::default();
|
|
app
|
|
})
|
|
.collect::<Vec<qovery_engine::models::Application>>();
|
|
|
|
// not working 2
|
|
let context_for_not_working_2 = context.clone_not_same_execution_id();
|
|
let not_working_env_2 = not_working_env_1.clone();
|
|
|
|
// work for delete
|
|
let context_for_delete = context.clone_not_same_execution_id();
|
|
let mut delete_env = environment.clone();
|
|
delete_env.action = Action::Delete;
|
|
|
|
let ea = EnvironmentAction::Environment(environment.clone());
|
|
let ea_not_working_1 = EnvironmentAction::Environment(not_working_env_1.clone());
|
|
let ea_not_working_2 = EnvironmentAction::Environment(not_working_env_2.clone());
|
|
let ea_delete = EnvironmentAction::Environment(delete_env.clone());
|
|
|
|
// OK
|
|
let ret = environment.deploy_environment(Kind::Aws, &context, &ea, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
// FAIL and rollback
|
|
let ret = not_working_env_1.deploy_environment(
|
|
Kind::Aws,
|
|
&context_for_not_working_1,
|
|
&ea_not_working_1,
|
|
logger.clone(),
|
|
);
|
|
assert!(matches!(
|
|
ret,
|
|
TransactionResult::Rollback(_) | TransactionResult::UnrecoverableError(_, _)
|
|
));
|
|
|
|
// FAIL and Rollback again
|
|
let ret = not_working_env_2.deploy_environment(
|
|
Kind::Aws,
|
|
&context_for_not_working_2,
|
|
&ea_not_working_2,
|
|
logger.clone(),
|
|
);
|
|
assert!(matches!(
|
|
ret,
|
|
TransactionResult::Rollback(_) | TransactionResult::UnrecoverableError(_, _)
|
|
));
|
|
|
|
// Should be working
|
|
let ret = environment.deploy_environment(Kind::Aws, &context, &ea, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
let ret = delete_env.delete_environment(Kind::Aws, &context_for_delete, &ea_delete, logger);
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
return test_name.to_string();
|
|
})
|
|
}
|
|
|
|
#[cfg(feature = "test-aws-self-hosted")]
|
|
#[named]
|
|
#[test]
|
|
fn deploy_a_non_working_environment_with_no_failover_on_aws_eks() {
|
|
let test_name = function_name!();
|
|
engine_run_test(|| {
|
|
init();
|
|
|
|
let span = span!(Level::INFO, "test", name = test_name);
|
|
let _enter = span.enter();
|
|
|
|
let secrets = FuncTestsSecrets::new();
|
|
let logger = logger();
|
|
let context = context(
|
|
secrets
|
|
.AWS_TEST_ORGANIZATION_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_ORGANIZATION_ID is not set")
|
|
.as_str(),
|
|
secrets
|
|
.AWS_TEST_CLUSTER_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_CLUSTER_ID is not set")
|
|
.as_str(),
|
|
);
|
|
let environment = test_utilities::common::non_working_environment(
|
|
&context,
|
|
secrets
|
|
.DEFAULT_TEST_DOMAIN
|
|
.expect("DEFAULT_TEST_DOMAIN is not set in secrets")
|
|
.as_str(),
|
|
);
|
|
|
|
let context_for_delete = context.clone_not_same_execution_id();
|
|
let mut delete_env = environment.clone();
|
|
delete_env.action = Action::Delete;
|
|
|
|
let ea = EnvironmentAction::Environment(environment.clone());
|
|
let ea_delete = EnvironmentAction::Environment(delete_env.clone());
|
|
|
|
let ret = environment.deploy_environment(Kind::Aws, &context, &ea, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::UnrecoverableError(_, _)));
|
|
|
|
let ret = delete_env.delete_environment(Kind::Aws, &context_for_delete, &ea_delete, logger);
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
return test_name.to_string();
|
|
})
|
|
}
|
|
|
|
#[cfg(feature = "test-aws-self-hosted")]
|
|
#[named]
|
|
#[test]
|
|
fn aws_eks_deploy_a_working_environment_with_sticky_session() {
|
|
let test_name = function_name!();
|
|
engine_run_test(|| {
|
|
init();
|
|
|
|
let span = span!(Level::INFO, "test", name = test_name);
|
|
let _enter = span.enter();
|
|
|
|
let logger = logger();
|
|
let secrets = FuncTestsSecrets::new();
|
|
let context = context(
|
|
secrets
|
|
.AWS_TEST_ORGANIZATION_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_ORGANIZATION_ID in secrets")
|
|
.as_str(),
|
|
secrets
|
|
.AWS_TEST_CLUSTER_ID
|
|
.as_ref()
|
|
.expect("AWS_TEST_CLUSTER_ID is not set in secrets")
|
|
.as_str(),
|
|
);
|
|
let context_for_delete = context.clone_not_same_execution_id();
|
|
let environment = test_utilities::common::environment_only_http_server_router_with_sticky_session(
|
|
&context,
|
|
secrets
|
|
.DEFAULT_TEST_DOMAIN
|
|
.as_ref()
|
|
.expect("DEFAULT_TEST_DOMAIN is not set in secrets")
|
|
.as_str(),
|
|
);
|
|
|
|
let mut environment_for_delete = environment.clone();
|
|
environment_for_delete.action = Action::Delete;
|
|
|
|
let env_action = EnvironmentAction::Environment(environment.clone());
|
|
let env_action_for_delete = EnvironmentAction::Environment(environment_for_delete.clone());
|
|
|
|
let ret = environment.deploy_environment(Kind::Aws, &context, &env_action, logger.clone());
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
// checking if cookie is properly set on the app
|
|
assert!(routers_sessions_are_sticky(environment.routers.clone()));
|
|
|
|
let ret =
|
|
environment_for_delete.delete_environment(Kind::Aws, &context_for_delete, &env_action_for_delete, logger);
|
|
assert!(matches!(ret, TransactionResult::Ok));
|
|
|
|
test_name.to_string()
|
|
})
|
|
}
|