forked from traefik/traefik-helm-chart
-
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathnotes_test.yaml
88 lines (75 loc) · 2.91 KB
/
notes_test.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
suite: NOTES.txt output
templates:
- NOTES.txt
chart:
appVersion: 2.3.0
capabilities:
majorVersion: 1
minorVersion: 16
tests:
- it: should use helm managed namespace in release notes output
set:
rbac:
namespaced: true
asserts:
- equalRaw:
value: |2
RELEASE-NAME with docker.io/traefik:2.3.0 has been deployed successfully on NAMESPACE namespace !
- it: should use helm managed namespace in release notes output
set:
namespaceOverride: "traefik-ns-override"
asserts:
- equalRaw:
value: |2
RELEASE-NAME with docker.io/traefik:2.3.0 has been deployed successfully on traefik-ns-override namespace !
- it: should use tag version in release notes output if set
set:
image:
tag: v3.0
asserts:
- equalRaw:
value: |2
RELEASE-NAME with docker.io/traefik:v3.0 has been deployed successfully on NAMESPACE namespace !
- it: should not display a warning when persistence and initContainer are enabled
set:
persistence:
enabled: true
deployment:
initContainer:
- name: volume-permissions
image: busybox:1.35
command: ["sh", "-c", "touch /data/acme.json && chmod -Rv 600 /data/* && chown 65532:65532 /data/acme.json"]
volumeMounts:
- name: data
mountPath: /data
asserts:
- equalRaw:
value: |2
RELEASE-NAME with docker.io/traefik:2.3.0 has been deployed successfully on NAMESPACE namespace !
- it: should display warning when enabling persistence without initContainer
set:
persistence:
enabled: true
asserts:
- equalRaw:
value: |
RELEASE-NAME with docker.io/traefik:2.3.0 has been deployed successfully on NAMESPACE namespace !
🚨 When enabling persistence for certificates, permissions on acme.json can be
lost when Traefik restarts. You can ensure correct permissions with an
initContainer. See https://github.com/traefik/traefik-helm-chart/blob/master/EXAMPLES.md#use-traefik-native-lets-encrypt-integration-without-cert-manager
for more info. 🚨
- it: should display warning when enabling labelSelector without applying it
set:
commonLabels:
is: here
providers:
kubernetesCRD:
labelSelector: not_here=CRD,is=here
kubernetesIngress:
labelSelector: not_here=Ingress,is=here
asserts:
- equalRaw:
value: |
RELEASE-NAME with docker.io/traefik:2.3.0 has been deployed successfully on NAMESPACE namespace !
🚨 Resources populated with this chart don't match with labelSelector `not_here=CRD` applied on kubernetesCRD provider 🚨
🚨 Resources populated with this chart don't match with labelSelector `not_here=Ingress` applied on kubernetesIngress provider 🚨