2023-01-23 10:48:54 +01:00
|
|
|
package exception
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"testing"
|
|
|
|
|
2023-02-06 16:45:31 +01:00
|
|
|
"github.com/kyverno/kyverno/api/kyverno/v2alpha1"
|
2023-01-23 10:48:54 +01:00
|
|
|
"github.com/kyverno/kyverno/pkg/logging"
|
|
|
|
admissionutils "github.com/kyverno/kyverno/pkg/utils/admission"
|
|
|
|
"gotest.tools/assert"
|
|
|
|
)
|
|
|
|
|
|
|
|
func Test_Validate(t *testing.T) {
|
|
|
|
type args struct {
|
|
|
|
opts ValidationOptions
|
|
|
|
resource []byte
|
|
|
|
}
|
|
|
|
tc := []struct {
|
|
|
|
name string
|
|
|
|
args args
|
|
|
|
want int
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "PolicyExceptions disabled.",
|
|
|
|
args: args{
|
|
|
|
opts: ValidationOptions{
|
|
|
|
Enabled: false,
|
|
|
|
Namespace: "kyverno",
|
|
|
|
},
|
|
|
|
resource: []byte(`{"apiVersion":"kyverno.io/v2alpha1","kind":"PolicyException","metadata":{"name":"enforce-label-exception","namespace":"delta"},"spec":{"exceptions":[{"policyName":"enforce-label","ruleNames":["enforce-label"]}],"match":{"any":[{"resources":{"kinds":["Pod"]}}]}}}`),
|
|
|
|
},
|
|
|
|
want: 1,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "PolicyExceptions enabled. Defined namespace doesn't match namespace passed.",
|
|
|
|
args: args{
|
|
|
|
opts: ValidationOptions{
|
|
|
|
Enabled: true,
|
|
|
|
Namespace: "kyverno",
|
|
|
|
},
|
|
|
|
resource: []byte(`{"apiVersion":"kyverno.io/v2alpha1","kind":"PolicyException","metadata":{"name":"enforce-label-exception","namespace":"delta"},"spec":{"exceptions":[{"policyName":"enforce-label","ruleNames":["enforce-label"]}],"match":{"any":[{"resources":{"kinds":["Pod"]}}]}}}`),
|
|
|
|
},
|
|
|
|
want: 1,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "PolicyExceptions enabled. Defined namespace matches namespace passed",
|
|
|
|
args: args{
|
|
|
|
opts: ValidationOptions{
|
|
|
|
Enabled: true,
|
|
|
|
Namespace: "kyverno",
|
|
|
|
},
|
|
|
|
resource: []byte(`{"apiVersion":"kyverno.io/v2alpha1","kind":"PolicyException","metadata":{"name":"enforce-label-exception","namespace":"kyverno"},"spec":{"exceptions":[{"policyName":"enforce-label","ruleNames":["enforce-label"]}],"match":{"any":[{"resources":{"kinds":["Pod"]}}]}}}`),
|
|
|
|
},
|
|
|
|
want: 0,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "PolicyExceptions enabled. No namespace defined",
|
|
|
|
args: args{
|
|
|
|
opts: ValidationOptions{
|
|
|
|
Enabled: true,
|
|
|
|
Namespace: "",
|
|
|
|
},
|
|
|
|
resource: []byte(`{"apiVersion":"kyverno.io/v2alpha1","kind":"PolicyException","metadata":{"name":"enforce-label-exception","namespace":"kyverno"},"spec":{"exceptions":[{"policyName":"enforce-label","ruleNames":["enforce-label"]}],"match":{"any":[{"resources":{"kinds":["Pod"]}}]}}}`),
|
|
|
|
},
|
|
|
|
want: 0,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, c := range tc {
|
|
|
|
t.Run(c.name, func(t *testing.T) {
|
|
|
|
polex, err := admissionutils.UnmarshalPolicyException(c.args.resource)
|
|
|
|
assert.NilError(t, err)
|
|
|
|
warnings, err := Validate(context.Background(), logging.GlobalLogger(), polex, c.args.opts)
|
|
|
|
assert.NilError(t, err)
|
|
|
|
assert.Assert(t, len(warnings) == c.want)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2023-02-06 16:45:31 +01:00
|
|
|
|
|
|
|
func Test_ValidateVariables(t *testing.T) {
|
|
|
|
tc := []struct {
|
|
|
|
name string
|
|
|
|
resource []byte
|
|
|
|
error bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "Variable used.",
|
|
|
|
resource: []byte(`{"apiVersion":"kyverno.io/v2alpha1","kind":"PolicyException","metadata":{"name":"enforce-label-polex"},"spec":{"background":true,"exceptions":[{"policyName":"enforce-label","ruleNames":["enforce-label"]}],"match":{"any":[{"resources":{"kinds":["Pod"],"namespaces":["{{request.object.name}}"],"names":["{{request.userInfo.username}}"]}}]}}}`),
|
|
|
|
error: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "Variable not used.",
|
|
|
|
resource: []byte(`{"apiVersion":"kyverno.io/v2alpha1","kind":"PolicyException","metadata":{"name":"enforce-label-polex"},"spec":{"background":true,"exceptions":[{"policyName":"enforce-label","ruleNames":["enforce-label"]}],"match":{"any":[{"resources":{"kinds":["Pod"]}}]}}}`),
|
|
|
|
error: false,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, c := range tc {
|
|
|
|
t.Run(c.name, func(t *testing.T) {
|
|
|
|
polex, err := admissionutils.UnmarshalPolicyException(c.resource)
|
|
|
|
assert.NilError(t, err)
|
|
|
|
err = v2alpha1.ValidateVariables(polex)
|
|
|
|
if c.error {
|
|
|
|
assert.Assert(t, err != nil)
|
|
|
|
} else {
|
|
|
|
assert.Assert(t, err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|