Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
S
system-charts
Project
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Rancher商店
system-charts
Commits
4b3e3b44
Commit
4b3e3b44
authored
May 16, 2019
by
gitlawr
Committed by
Craig Jellick
May 29, 2019
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Add unit tests for harbor chart
parent
7e3b437e
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
with
168 additions
and
0 deletions
+168
-0
addon_test.yaml
charts/harbor/v1.7.5-rancher1/tests/addon_test.yaml
+66
-0
global_test.yaml
charts/harbor/v1.7.5-rancher1/tests/global_test.yaml
+35
-0
ingress_test.yaml
charts/harbor/v1.7.5-rancher1/tests/ingress_test.yaml
+30
-0
registry_test.yaml
charts/harbor/v1.7.5-rancher1/tests/registry_test.yaml
+37
-0
No files found.
charts/harbor/v1.7.5-rancher1/tests/addon_test.yaml
0 → 100644
View file @
4b3e3b44
suite
:
Test Enable/Disable Addons
templates
:
-
clair-cm.yaml
-
clair-dpl.yaml
-
clair-svc.yaml
-
notary-cm.yaml
-
notary-server.yaml
-
notary-signer.yaml
-
notary-svc.yaml
-
core-secret.yaml
tests
:
-
it
:
should enable clair and notary by default
asserts
:
-
template
:
clair/clair-cm.yaml
hasDocuments
:
count
:
1
-
template
:
clair/clair-dpl.yaml
hasDocuments
:
count
:
1
-
template
:
clair/clair-svc.yaml
hasDocuments
:
count
:
1
-
template
:
notary/notary-cm.yaml
hasDocuments
:
count
:
1
-
template
:
notary/notary-server.yaml
hasDocuments
:
count
:
1
-
template
:
notary/notary-signer.yaml
hasDocuments
:
count
:
1
-
template
:
notary/notary-svc.yaml
hasDocuments
:
count
:
2
-
it
:
should disable clair
set
:
clair
:
enabled
:
false
asserts
:
-
template
:
clair/clair-cm.yaml
hasDocuments
:
count
:
0
-
template
:
clair/clair-dpl.yaml
hasDocuments
:
count
:
0
-
template
:
clair/clair-svc.yaml
hasDocuments
:
count
:
0
-
it
:
should disable notary
set
:
notary
:
enabled
:
false
asserts
:
-
template
:
notary/notary-cm.yaml
hasDocuments
:
count
:
0
-
template
:
notary/notary-server.yaml
hasDocuments
:
count
:
0
-
template
:
notary/notary-signer.yaml
hasDocuments
:
count
:
0
-
template
:
notary/notary-svc.yaml
hasDocuments
:
count
:
0
charts/harbor/v1.7.5-rancher1/tests/global_test.yaml
0 → 100644
View file @
4b3e3b44
suite
:
Test Global Options
templates
:
-
registry-cm.yaml
-
registry-dpl.yaml
-
registry-secret.yaml
-
jobservice-secrets.yaml
-
core-secret.yaml
tests
:
-
it
:
has no system default registry set
set
:
registry
:
registry
:
image
:
repository
:
test/registry-photon
tag
:
mytag
asserts
:
-
template
:
registry/registry-dpl.yaml
equal
:
path
:
spec.template.spec.containers[0].image
value
:
test/registry-photon:mytag
-
it
:
should use system default registry
set
:
global
:
systemDefaultRegistry
:
reg.myorg.com
registry
:
registry
:
image
:
repository
:
test/registry-photon
tag
:
mytag
asserts
:
-
template
:
registry/registry-dpl.yaml
equal
:
path
:
spec.template.spec.containers[0].image
value
:
reg.myorg.com/test/registry-photon:mytag
charts/harbor/v1.7.5-rancher1/tests/ingress_test.yaml
0 → 100644
View file @
4b3e3b44
suite
:
Test Ingress
templates
:
-
ingress.yaml
tests
:
-
it
:
should set ingress host
set
:
expose
:
ingress
:
host
:
test.myorg.com
asserts
:
-
template
:
ingress/ingress.yaml
equal
:
path
:
spec.tls[0].hosts[0]
value
:
test.myorg.com
-
template
:
ingress/ingress.yaml
equal
:
path
:
spec.rules[0].host
value
:
test.myorg.com
-
it
:
should use tls-rancher-ingress secret
set
:
expose
:
ingress
:
host
:
test.myorg.com
globalRegistryMode
:
true
asserts
:
-
template
:
ingress/ingress.yaml
equal
:
path
:
spec.tls[0].secretName
value
:
tls-rancher-ingress
charts/harbor/v1.7.5-rancher1/tests/registry_test.yaml
0 → 100644
View file @
4b3e3b44
suite
:
Test Registry Configmap
templates
:
-
registry-cm.yaml
-
registry-dpl.yaml
-
registry-secret.yaml
-
jobservice-secrets.yaml
-
core-secret.yaml
tests
:
-
it
:
should use filesystem storage backend by default
asserts
:
-
template
:
registry/registry-cm.yaml
matchRegex
:
path
:
data.config\.yml
pattern
:
"
filesystem:"
-
it
:
should use s3 storage backend
set
:
imageChartStorage
:
type
:
s3
s3
:
region
:
us-west-2
bucket
:
mybucket
accesskey
:
myaccesskey
secretkey
:
mysecretkey
asserts
:
-
template
:
registry/registry-cm.yaml
matchRegex
:
path
:
data.config\.yml
pattern
:
"
(?s)s3:.*region:
us-west-2.*bucket:
mybucket"
-
template
:
registry/registry-secret.yaml
equal
:
path
:
data.REGISTRY_STORAGE_S3_ACCESSKEY
value
:
bXlhY2Nlc3NrZXk=
-
template
:
registry/registry-secret.yaml
equal
:
path
:
data.REGISTRY_STORAGE_S3_SECRETKEY
value
:
bXlzZWNyZXRrZXk=
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment