Skip to content

Commit 0371c12

Browse files
authored
Add support for namespaces in context (#303)
Fixes #281
1 parent 054e6c1 commit 0371c12

File tree

7 files changed

+50
-13
lines changed

7 files changed

+50
-13
lines changed

.github/workflows/integration.yml

+2
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ jobs:
4444
project_id: '${{ vars.PROJECT_ID }}'
4545
cluster_name: '${{ vars.PUBLIC_CLUSTER_NAME }}'
4646
location: '${{ vars.PUBLIC_CLUSTER_LOCATION }}'
47+
namespace: 'default'
4748

4849
- name: 'kubectl'
4950
run: |-
@@ -74,6 +75,7 @@ jobs:
7475
cluster_name: '${{ vars.PRIVATE_CLUSTER_NAME }}'
7576
location: '${{ vars.PRIVATE_CLUSTER_LOCATION }}'
7677
use_connect_gateway: 'true'
78+
namespace: 'default'
7779

7880
- name: 'kubectl'
7981
run: |-

README.md

+2
Original file line numberDiff line numberDiff line change
@@ -84,6 +84,8 @@ jobs:
8484
- <a name="context_name"></a><a href="#user-content-context_name"><code>context_name</code></a>: _(Optional)_ Name to use when creating the `kubectl` context. If not specified, the
8585
default value is `gke_<project>_<location>_<cluster>`.
8686

87+
- <a name="namespace"></a><a href="#user-content-namespace"><code>namespace</code></a>: _(Optional)_ Name of the Kubernetes namespace to use within the context.
88+
8789
- <a name="use_auth_provider"></a><a href="#user-content-use_auth_provider"><code>use_auth_provider</code></a>: _(Optional, default: `false`)_ Set this to true to use the Google Cloud auth plugin in `kubectl` instead
8890
of inserting a short-lived access token.
8991

action.yml

+5
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,11 @@ inputs:
5353
default value is `gke_<project>_<location>_<cluster>`.
5454
required: false
5555

56+
namespace:
57+
description: |-
58+
Name of the Kubernetes namespace to use within the context.
59+
required: false
60+
5661
use_auth_provider:
5762
description: |-
5863
Set this to true to use the Google Cloud auth plugin in `kubectl` instead

dist/index.js

+4-4
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

src/client.ts

+6
Original file line numberDiff line numberDiff line change
@@ -358,6 +358,7 @@ export class ClusterClient {
358358
context: {
359359
cluster: cluster.data.name,
360360
user: cluster.data.name,
361+
namespace: opts.namespace,
361362
},
362363
name: contextName,
363364
},
@@ -366,6 +367,7 @@ export class ClusterClient {
366367
'current-context': contextName,
367368
'users': [{ ...{ name: cluster.data.name }, ...auth }],
368369
};
370+
369371
return YAML.stringify(kubeConfig);
370372
}
371373

@@ -393,6 +395,7 @@ type context = {
393395
context: {
394396
cluster: string;
395397
user: string;
398+
namespace?: string;
396399
};
397400
name: string;
398401
};
@@ -414,6 +417,9 @@ export type CreateKubeConfigOptions = {
414417

415418
// contextName is the name of the context.
416419
contextName: string;
420+
421+
// namespace is the name of the Kubernetes namespace.
422+
namespace?: string;
417423
};
418424

419425
export type KubeConfig = {

src/main.ts

+2
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,7 @@ export async function run(): Promise<void> {
4646
const useAuthProvider = parseBoolean(getInput('use_auth_provider'));
4747
const useInternalIP = parseBoolean(getInput('use_internal_ip'));
4848
let contextName = getInput('context_name');
49+
const namespace = presence(getInput('namespace'));
4950
const useConnectGateway = parseBoolean(getInput('use_connect_gateway'));
5051

5152
// Only one of use_connect_gateway or use_internal_ip should be provided
@@ -129,6 +130,7 @@ export async function run(): Promise<void> {
129130
connectGWEndpoint: connectGWEndpoint,
130131
clusterData: clusterData,
131132
contextName: contextName,
133+
namespace: namespace,
132134
});
133135

134136
// Write kubeconfig to disk

tests/client.test.ts

+29-9
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ import assert from 'node:assert';
2020
import crypto from 'crypto';
2121
import YAML from 'yaml';
2222

23-
import { ClusterClient, ClusterResponse } from '../src/client';
23+
import { ClusterClient, ClusterResponse, KubeConfig } from '../src/client';
2424

2525
import { skipIfMissingEnv } from '@google-github-actions/actions-utils';
2626

@@ -152,7 +152,7 @@ test(
152152
'#getToken',
153153
{
154154
concurrency: true,
155-
skip: skipIfMissingEnv('TEST_PROJECT_ID', 'TEST_CLUSTER_ID', 'TEST_CLUSTER_LOCATION'),
155+
skip: skipIfMissingEnv('TEST_PROJECT_ID', 'TEST_CLUSTER_NAME', 'TEST_CLUSTER_LOCATION'),
156156
},
157157
async (suite) => {
158158
await suite.test('can get token', async () => {
@@ -174,7 +174,7 @@ test(
174174
'#getCluster',
175175
{
176176
concurrency: true,
177-
skip: skipIfMissingEnv('TEST_PROJECT_ID', 'TEST_CLUSTER_ID', 'TEST_CLUSTER_LOCATION'),
177+
skip: skipIfMissingEnv('TEST_PROJECT_ID', 'TEST_CLUSTER_NAME', 'TEST_CLUSTER_LOCATION'),
178178
},
179179
async (suite) => {
180180
const testProjectID = process.env.TEST_PROJECT_ID!;
@@ -300,7 +300,7 @@ test(
300300
'#createKubeConfig',
301301
{
302302
concurrency: true,
303-
skip: skipIfMissingEnv('TEST_PROJECT_ID', 'TEST_CLUSTER_ID', 'TEST_CLUSTER_LOCATION'),
303+
skip: skipIfMissingEnv('TEST_PROJECT_ID', 'TEST_CLUSTER_NAME', 'TEST_CLUSTER_LOCATION'),
304304
},
305305
async (suite) => {
306306
const testProjectID = process.env.TEST_PROJECT_ID!;
@@ -345,7 +345,7 @@ test(
345345
projectID: testProjectID,
346346
location: testClusterLocation,
347347
});
348-
const kubeconfig = YAML.parse(
348+
const kubeconfig: KubeConfig = YAML.parse(
349349
await client.createKubeConfig({
350350
useAuthProvider: true,
351351
useInternalIP: false,
@@ -370,7 +370,7 @@ test(
370370
);
371371

372372
assert.deepStrictEqual(user?.name, publicCluster?.data?.name);
373-
assert.deepStrictEqual(user?.user?.['auth-provider'], 'gcp');
373+
assert.deepStrictEqual(user?.user?.['auth-provider']?.name, 'gcp');
374374
},
375375
);
376376

@@ -380,7 +380,7 @@ test(
380380
projectID: testProjectID,
381381
location: testClusterLocation,
382382
});
383-
const kubeconfig = YAML.parse(
383+
const kubeconfig: KubeConfig = YAML.parse(
384384
await client.createKubeConfig({
385385
useAuthProvider: false,
386386
useInternalIP: true,
@@ -413,7 +413,7 @@ test(
413413
projectID: testProjectID,
414414
location: testClusterLocation,
415415
});
416-
const kubeconfig = YAML.parse(
416+
const kubeconfig: KubeConfig = YAML.parse(
417417
await client.createKubeConfig({
418418
useAuthProvider: false,
419419
useInternalIP: false,
@@ -428,7 +428,27 @@ test(
428428
assert.deepStrictEqual(kubeconfig?.['current-context'], contextName);
429429

430430
assert.deepStrictEqual(cluster?.name, privateCluster.data.name);
431-
assert.deepStrictEqual(cluster?.server, 'https://foo');
431+
assert.deepStrictEqual(cluster?.cluster.server, 'https://foo');
432+
});
433+
434+
await suite.test('can set a namespace=', async () => {
435+
const contextName = crypto.randomBytes(12).toString('hex');
436+
const client = new ClusterClient({
437+
projectID: testProjectID,
438+
location: testClusterLocation,
439+
});
440+
const kubeconfig: KubeConfig = YAML.parse(
441+
await client.createKubeConfig({
442+
useAuthProvider: false,
443+
useInternalIP: false,
444+
clusterData: privateCluster,
445+
contextName: contextName,
446+
namespace: 'my-namespace',
447+
}),
448+
);
449+
450+
const context = kubeconfig?.contexts?.at(0)?.context;
451+
assert.deepStrictEqual(context?.namespace, 'my-namespace');
432452
});
433453
},
434454
);

0 commit comments

Comments
 (0)