Files
argo-cd/cmd/argocd/commands/admin/backup_test.go
2026-02-12 09:29:40 -05:00

490 lines
11 KiB
Go

package admin
import (
"bytes"
"testing"
"github.com/argoproj/argo-cd/v3/pkg/apis/application/v1alpha1"
"github.com/argoproj/argo-cd/v3/util/security"
"github.com/argoproj/argo-cd/gitops-engine/pkg/utils/kube"
"github.com/stretchr/testify/assert"
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
"github.com/argoproj/argo-cd/v3/common"
)
func newBackupObject(trackingValue string, trackingLabel bool, trackingAnnotation bool) *unstructured.Unstructured {
cm := corev1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: "my-configmap",
Namespace: "namespace",
},
Data: map[string]string{
"foo": "bar",
},
}
if trackingLabel {
cm.SetLabels(map[string]string{
common.LabelKeyAppInstance: trackingValue,
})
}
if trackingAnnotation {
cm.SetAnnotations(map[string]string{
common.AnnotationKeyAppInstance: trackingValue,
})
}
return kube.MustToUnstructured(&cm)
}
func newConfigmapObject() *unstructured.Unstructured {
cm := corev1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Name: common.ArgoCDConfigMapName,
Namespace: "argocd",
Labels: map[string]string{
"app.kubernetes.io/part-of": "argocd",
},
},
}
return kube.MustToUnstructured(&cm)
}
func newSecretsObject() *unstructured.Unstructured {
secret := corev1.Secret{
ObjectMeta: metav1.ObjectMeta{
Name: common.ArgoCDSecretName,
Namespace: "default",
Labels: map[string]string{
"app.kubernetes.io/part-of": "argocd",
},
},
Data: map[string][]byte{
"admin.password": nil,
"server.secretkey": nil,
},
}
return kube.MustToUnstructured(&secret)
}
func newAppProject() *unstructured.Unstructured {
appProject := v1alpha1.AppProject{
ObjectMeta: metav1.ObjectMeta{
Name: "default",
Namespace: "argocd",
},
Spec: v1alpha1.AppProjectSpec{
Destinations: []v1alpha1.ApplicationDestination{
{
Namespace: "*",
Server: "*",
},
},
ClusterResourceWhitelist: []v1alpha1.ClusterResourceRestrictionItem{
{
Group: "*",
Kind: "*",
},
},
SourceRepos: []string{"*"},
},
}
return kube.MustToUnstructured(&appProject)
}
func newApplication(namespace string) *unstructured.Unstructured {
app := v1alpha1.Application{
TypeMeta: metav1.TypeMeta{
Kind: "Application",
},
ObjectMeta: metav1.ObjectMeta{
Name: "test",
Namespace: namespace,
},
Spec: v1alpha1.ApplicationSpec{
Source: &v1alpha1.ApplicationSource{},
Project: "default",
Destination: v1alpha1.ApplicationDestination{
Server: v1alpha1.KubernetesInternalAPIServerAddr,
Namespace: "default",
},
},
}
return kube.MustToUnstructured(&app)
}
func newApplicationSet(namespace string) *unstructured.Unstructured {
appSet := v1alpha1.ApplicationSet{
TypeMeta: metav1.TypeMeta{
Kind: "ApplicationSet",
},
ObjectMeta: metav1.ObjectMeta{
Name: "test-appset",
Namespace: namespace,
},
Spec: v1alpha1.ApplicationSetSpec{
Generators: []v1alpha1.ApplicationSetGenerator{
{
Git: &v1alpha1.GitGenerator{
RepoURL: "https://github.com/org/repo",
},
},
},
},
}
return kube.MustToUnstructured(&appSet)
}
// Test_exportResources tests for the resources exported when using the `argocd admin export` command
func Test_exportResources(t *testing.T) {
tests := []struct {
name string
object *unstructured.Unstructured
namespace string
enabledNamespaces []string
expectedFileContent string
expectExport bool
}{
{
name: "ConfigMap should be in the exported manifest",
object: newConfigmapObject(),
expectExport: true,
expectedFileContent: `apiVersion: ""
kind: ""
metadata:
labels:
app.kubernetes.io/part-of: argocd
name: argocd-cm
---
`,
},
{
name: "Secret should be in the exported manifest",
object: newSecretsObject(),
expectExport: true,
expectedFileContent: `apiVersion: ""
data:
admin.password: null
server.secretkey: null
kind: ""
metadata:
labels:
app.kubernetes.io/part-of: argocd
name: argocd-secret
namespace: default
---
`,
},
{
name: "App Project should be in the exported manifest",
object: newAppProject(),
expectExport: true,
expectedFileContent: `apiVersion: ""
kind: ""
metadata:
name: default
spec:
clusterResourceWhitelist:
- group: '*'
kind: '*'
destinations:
- namespace: '*'
server: '*'
sourceRepos:
- '*'
status: {}
---
`,
},
{
name: "Application should be in the exported manifest when created in the default 'argocd' namespace",
object: newApplication("argocd"),
namespace: "argocd",
expectExport: true,
expectedFileContent: `apiVersion: ""
kind: Application
metadata:
name: test
spec:
destination:
namespace: default
server: https://kubernetes.default.svc
project: default
source:
repoURL: ""
status:
health: {}
sourceHydrator: {}
summary: {}
sync:
comparedTo:
destination: {}
source:
repoURL: ""
status: ""
---
`,
},
{
name: "Application should be in the exported manifest when created in the enabled namespaces",
object: newApplication("dev"),
namespace: "dev",
enabledNamespaces: []string{"dev", "prod"},
expectExport: true,
expectedFileContent: `apiVersion: ""
kind: Application
metadata:
name: test
namespace: dev
spec:
destination:
namespace: default
server: https://kubernetes.default.svc
project: default
source:
repoURL: ""
status:
health: {}
sourceHydrator: {}
summary: {}
sync:
comparedTo:
destination: {}
source:
repoURL: ""
status: ""
---
`,
},
{
name: "Application should not be in the exported manifest when it's neither created in the default argod namespace nor in enabled namespace",
object: newApplication("staging"),
namespace: "staging",
enabledNamespaces: []string{"dev", "prod"},
expectExport: false,
expectedFileContent: ``,
},
{
name: "ApplicationSet should be in the exported manifest when created in the default 'argocd' namespace",
object: newApplicationSet("argocd"),
namespace: "argocd",
expectExport: true,
expectedFileContent: `apiVersion: ""
kind: ApplicationSet
metadata:
name: test-appset
spec:
generators:
- git:
repoURL: https://github.com/org/repo
revision: ""
template:
metadata: {}
spec:
destination: {}
project: ""
template:
metadata: {}
spec:
destination: {}
project: ""
status:
health: {}
---
`,
},
{
name: "ApplicationSet should be in the exported manifest when created in the enabled namespaces",
object: newApplicationSet("dev"),
namespace: "dev",
enabledNamespaces: []string{"dev", "prod"},
expectExport: true,
expectedFileContent: `apiVersion: ""
kind: ApplicationSet
metadata:
name: test-appset
namespace: dev
spec:
generators:
- git:
repoURL: https://github.com/org/repo
revision: ""
template:
metadata: {}
spec:
destination: {}
project: ""
template:
metadata: {}
spec:
destination: {}
project: ""
status:
health: {}
---
`,
},
{
name: "ApplicationSet should not be in the exported manifest when neither created in the default 'argocd' namespace nor in enabled namespaces",
object: newApplicationSet("staging"),
namespace: "staging",
enabledNamespaces: []string{"dev", "prod"},
expectExport: false,
expectedFileContent: ``,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
var buf bytes.Buffer
kind := tt.object.GetKind()
if kind == "Application" || kind == "ApplicationSet" {
if security.IsNamespaceEnabled(tt.namespace, "argocd", tt.enabledNamespaces) {
export(&buf, *tt.object, ArgoCDNamespace)
}
} else {
export(&buf, *tt.object, ArgoCDNamespace)
}
content := buf.String()
if tt.expectExport {
assert.Equal(t, tt.expectedFileContent, content)
} else {
assert.Empty(t, content)
}
})
}
}
func Test_updateTracking(t *testing.T) {
type args struct {
bak *unstructured.Unstructured
live *unstructured.Unstructured
}
tests := []struct {
name string
args args
expected *unstructured.Unstructured
}{
{
name: "update annotation when present in live",
args: args{
bak: newBackupObject("bak", false, true),
live: newBackupObject("live", false, true),
},
expected: newBackupObject("live", false, true),
},
{
name: "update default label when present in live",
args: args{
bak: newBackupObject("bak", true, true),
live: newBackupObject("live", true, true),
},
expected: newBackupObject("live", true, true),
},
{
name: "do not update if live object does not have tracking",
args: args{
bak: newBackupObject("bak", true, true),
live: newBackupObject("live", false, false),
},
expected: newBackupObject("bak", true, true),
},
{
name: "do not update if bak object does not have tracking",
args: args{
bak: newBackupObject("bak", false, false),
live: newBackupObject("live", true, true),
},
expected: newBackupObject("bak", false, false),
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
updateTracking(tt.args.bak, tt.args.live)
assert.Equal(t, tt.expected, tt.args.bak)
})
}
}
func TestIsSkipLabelMatches(t *testing.T) {
tests := []struct {
name string
obj *unstructured.Unstructured
skipLabels string
expected bool
}{
{
name: "Label matches",
obj: &unstructured.Unstructured{
Object: map[string]any{
"metadata": map[string]any{
"labels": map[string]any{
"test-label": "value",
},
},
},
},
skipLabels: "test-label=value",
expected: true,
},
{
name: "Label does not match",
obj: &unstructured.Unstructured{
Object: map[string]any{
"metadata": map[string]any{
"labels": map[string]any{
"different-label": "value",
},
},
},
},
skipLabels: "test-label=value",
expected: false,
},
{
name: "Empty skip labels",
obj: &unstructured.Unstructured{
Object: map[string]any{
"metadata": map[string]any{
"labels": map[string]any{
"test-label": "value",
},
},
},
},
skipLabels: "",
expected: false,
},
{
name: "No labels value",
obj: &unstructured.Unstructured{
Object: map[string]any{
"metadata": map[string]any{
"labels": map[string]any{
"test-label": "value",
"another-label": "value2",
},
},
},
},
skipLabels: "test-label",
expected: false,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
result := isSkipLabelMatches(tt.obj, tt.skipLabels)
assert.Equal(t, tt.expected, result)
})
}
}