1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-31 03:45:17 +00:00

refactor: generate e2e tests (#4068)

* refactor: use t.Cleanup in e2e tests

Signed-off-by: Charles-Edouard Brétéché <charled.breteche@gmail.com>

* refactor: generate e2e tests

Signed-off-by: Charles-Edouard Brétéché <charled.breteche@gmail.com>

* helpers

Signed-off-by: Charles-Edouard Brétéché <charled.breteche@gmail.com>
This commit is contained in:
Charles-Edouard Brétéché 2022-06-03 21:08:27 +02:00 committed by GitHub
parent fe3c12628c
commit 0b7b2458eb
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
3 changed files with 375 additions and 487 deletions

View file

@ -1,63 +1,106 @@
package generate
import (
"github.com/kyverno/kyverno/test/e2e"
"k8s.io/apimachinery/pkg/runtime/schema"
)
var (
// Cluster Policy GVR
clPolGVR = e2e.GetGVR("kyverno.io", "v1", "clusterpolicies")
// Namespace GVR
nsGVR = e2e.GetGVR("", "v1", "namespaces")
// ClusterRole GVR
crGVR = e2e.GetGVR("rbac.authorization.k8s.io", "v1", "clusterroles")
// ClusterRoleBinding GVR
crbGVR = e2e.GetGVR("rbac.authorization.k8s.io", "v1", "clusterrolebindings")
// Role GVR
rGVR = e2e.GetGVR("rbac.authorization.k8s.io", "v1", "roles")
// RoleBinding GVR
rbGVR = e2e.GetGVR("rbac.authorization.k8s.io", "v1", "rolebindings")
// ConfigMap GVR
cmGVR = e2e.GetGVR("", "v1", "configmaps")
// NetworkPolicy GVR
npGVR = e2e.GetGVR("networking.k8s.io", "v1", "networkpolicies")
// ClusterPolicy Namespace
clPolNS = ""
// NetworkPolicy Namespace
npPolNS = ""
)
type resource struct {
gvr schema.GroupVersionResource
ns string
raw []byte
}
func clusteredResource(gvr schema.GroupVersionResource, raw []byte) resource {
return resource{gvr, "", raw}
}
func namespacedResource(gvr schema.GroupVersionResource, ns string, raw []byte) resource {
return resource{gvr, ns, raw}
}
type expectedResource struct {
gvr schema.GroupVersionResource
ns string
name string
}
// RoleTests is E2E Test Config for Role and RoleBinding
// TODO:- Clone for Role and RoleBinding
var RoleTests = []struct {
// TestName - Name of the Test
TestName string
// RoleName - Name of the Role to be Created
RoleName string
// RoleBindingName - Name of the RoleBindingName
RoleBindingName string
// ResourceNamespace - Namespace for which Role and ReleBinding are Created
ResourceNamespace string
// Clone - Set Clone Value
Clone bool
// CloneSourceRoleData - Source Role Name from which Role is Cloned
CloneSourceRoleData []byte
// CloneSourceRoleBindingData - Source RoleBinding Name from which RoleBinding is Cloned
CloneSourceRoleBindingData []byte
// CloneNamespace - Namespace where Roles are Cloned
CloneNamespace string
// Sync - Set Synchronize
Sync bool
// Data - The Yaml file of the ClusterPolicy of the ROle and RoleBinding - ([]byte{})
Data []byte
// PolicyName - Name of the Policy
PolicyName string
// ClusterPolicy - ClusterPolicy yaml file
ClusterPolicy resource
// SourceResources - Source resources yaml files
SourceResources []resource
// TriggerResource - Trigger resource yaml files
TriggerResource resource
// ExpectedResources - Expected resources to pass the test
ExpectedResources []expectedResource
}{
{
TestName: "test-role-rolebinding-without-clone",
RoleName: "ns-role",
RoleBindingName: "ns-role-binding",
ResourceNamespace: "test",
Clone: false,
Sync: false,
Data: roleRoleBindingYamlWithSync,
PolicyName: "gen-role-policy-1",
TestName: "test-role-rolebinding-without-clone",
ClusterPolicy: clusteredResource(clPolGVR, roleRoleBindingYamlWithSync),
TriggerResource: clusteredResource(nsGVR, namespaceYaml),
ExpectedResources: []expectedResource{
{rGVR, "test", "ns-role"},
{rbGVR, "test", "ns-role-binding"},
},
},
{
TestName: "test-role-rolebinding-withsync-without-clone",
RoleName: "ns-role",
RoleBindingName: "ns-role-binding",
ResourceNamespace: "test",
Clone: false,
Sync: true,
Data: roleRoleBindingYamlWithSync,
PolicyName: "gen-role-policy-2",
TestName: "test-role-rolebinding-withsync-without-clone",
ClusterPolicy: clusteredResource(clPolGVR, roleRoleBindingYamlWithSync),
TriggerResource: clusteredResource(nsGVR, namespaceYaml),
ExpectedResources: []expectedResource{
{rGVR, "test", "ns-role"},
{rbGVR, "test", "ns-role-binding"},
},
},
{
TestName: "test-role-rolebinding-with-clone",
RoleName: "ns-role",
RoleBindingName: "ns-role-binding",
ResourceNamespace: "test",
Clone: true,
CloneSourceRoleData: sourceRoleYaml,
CloneSourceRoleBindingData: sourceRoleBindingYaml,
CloneNamespace: "default",
Sync: false,
Data: roleRoleBindingYamlWithClone,
PolicyName: "gen-role-policy-3",
TestName: "test-role-rolebinding-with-clone",
ClusterPolicy: clusteredResource(clPolGVR, roleRoleBindingYamlWithClone),
SourceResources: []resource{
namespacedResource(rGVR, "default", sourceRoleYaml),
namespacedResource(rbGVR, "default", sourceRoleBindingYaml),
},
TriggerResource: clusteredResource(nsGVR, namespaceYaml),
ExpectedResources: []expectedResource{
{rGVR, "test", "ns-role"},
{rbGVR, "test", "ns-role-binding"},
},
},
}
@ -65,64 +108,45 @@ var RoleTests = []struct {
var ClusterRoleTests = []struct {
// TestName - Name of the Test
TestName string
// ClusterRoleName - Name of the ClusterRole to be Created
ClusterRoleName string
// ClusterRoleBindingName - Name of the ClusterRoleBinding
ClusterRoleBindingName string
// ResourceNamespace - Namespace for which Resources are Created
ResourceNamespace string
// Clone - Set Clone Value
Clone bool
// CloneClusterRoleName
ClonerClusterRoleName string
// CloneClusterRoleBindingName
ClonerClusterRoleBindingName string
// CloneSourceRoleData - Source ClusterRole Name from which ClusterRole is Cloned
CloneSourceClusterRoleData []byte
// CloneSourceRoleBindingData - Source ClusterRoleBinding Name from which ClusterRoleBinding is Cloned
CloneSourceClusterRoleBindingData []byte
// CloneNamespace - Namespace where Roles are Cloned
CloneNamespace string
// Sync - Set Synchronize
Sync bool
// Data - The Yaml file of the ClusterPolicy of the ClusterRole and ClusterRoleBinding - ([]byte{})
Data []byte
// PolicyName - Name of the Policy
PolicyName string
// ClusterPolicy - ClusterPolicy yaml file
ClusterPolicy resource
// SourceResources - Source resources yaml files
SourceResources []resource
// TriggerResource - Trigger resource yaml files
TriggerResource resource
// ExpectedResources - Expected resources to pass the test
ExpectedResources []expectedResource
}{
{
TestName: "test-clusterrole-clusterrolebinding-without-clone",
ClusterRoleName: "ns-cluster-role",
ClusterRoleBindingName: "ns-cluster-role-binding",
ResourceNamespace: "test",
Clone: false,
Sync: false,
Data: genClusterRoleYamlWithSync,
PolicyName: "gen-cluster-policy-1",
TestName: "test-clusterrole-clusterrolebinding-without-clone",
ClusterPolicy: clusteredResource(clPolGVR, genClusterRoleYamlWithSync),
TriggerResource: clusteredResource(nsGVR, namespaceYaml),
ExpectedResources: []expectedResource{
{crGVR, "", "ns-cluster-role"},
{crbGVR, "", "ns-cluster-role-binding"},
},
},
{
TestName: "test-clusterrole-clusterrolebinding-with-sync-without-clone",
ClusterRoleName: "ns-cluster-role",
ClusterRoleBindingName: "ns-cluster-role-binding",
ResourceNamespace: "test",
Clone: false,
Sync: true,
Data: genClusterRoleYamlWithSync,
PolicyName: "gen-cluster-policy-2",
TestName: "test-clusterrole-clusterrolebinding-with-sync-without-clone",
ClusterPolicy: clusteredResource(clPolGVR, genClusterRoleYamlWithSync),
TriggerResource: clusteredResource(nsGVR, namespaceYaml),
ExpectedResources: []expectedResource{
{crGVR, "", "ns-cluster-role"},
{crbGVR, "", "ns-cluster-role-binding"},
},
},
{
TestName: "test-clusterrole-clusterrolebinding-with-sync-with-clone",
ClusterRoleName: "cloned-cluster-role",
ClusterRoleBindingName: "cloned-cluster-role-binding",
ResourceNamespace: "test",
Clone: true,
ClonerClusterRoleName: "base-cluster-role",
ClonerClusterRoleBindingName: "base-cluster-role-binding",
CloneSourceClusterRoleData: baseClusterRoleData,
CloneSourceClusterRoleBindingData: baseClusterRoleBindingData,
Sync: false,
Data: clusterRoleRoleBindingYamlWithClone,
PolicyName: "gen-cluster-policy-3",
TestName: "test-clusterrole-clusterrolebinding-with-sync-with-clone",
ClusterPolicy: clusteredResource(clPolGVR, clusterRoleRoleBindingYamlWithClone),
SourceResources: []resource{
clusteredResource(crGVR, baseClusterRoleData),
clusteredResource(crbGVR, baseClusterRoleBindingData),
},
TriggerResource: clusteredResource(nsGVR, namespaceYaml),
ExpectedResources: []expectedResource{
{crGVR, "", "cloned-cluster-role"},
{crbGVR, "", "cloned-cluster-role-binding"},
},
},
}
@ -130,37 +154,22 @@ var ClusterRoleTests = []struct {
var NetworkPolicyGenerateTests = []struct {
// TestName - Name of the Test
TestName string
// NetworkPolicyName - Name of the NetworkPolicy to be Created
NetworkPolicyName string
// ResourceNamespace - Namespace for which Resources are Created
ResourceNamespace string
// PolicyName - Name of the Policy
PolicyName string
// Clone - Set Clone Value
Clone bool
// CloneClusterRoleName
ClonerClusterRoleName string
// CloneClusterRoleBindingName
ClonerClusterRoleBindingName string
// CloneSourceRoleData - Source ClusterRole Name from which ClusterRole is Cloned
CloneSourceClusterRoleData []byte
// CloneSourceRoleBindingData - Source ClusterRoleBinding Name from which ClusterRoleBinding is Cloned
CloneSourceClusterRoleBindingData []byte
// CloneNamespace - Namespace where Roles are Cloned
CloneNamespace string
// Sync - Set Synchronize
Sync bool
// Data - The Yaml file of the ClusterPolicy of the ClusterRole and ClusterRoleBinding - ([]byte{})
Data []byte
// ClusterPolicy - ClusterPolicy yaml file
ClusterPolicy resource
// SourceResources - Source resources yaml files
SourceResources []resource
// TriggerResource - Trigger resource yaml files
TriggerResource resource
// ExpectedResources - Expected resources to pass the test
ExpectedResources []expectedResource
}{
{
TestName: "test-generate-policy-for-namespace-with-label",
NetworkPolicyName: "allow-dns",
ResourceNamespace: "test",
PolicyName: "add-networkpolicy",
Clone: false,
Sync: true,
Data: genNetworkPolicyYaml,
TestName: "test-generate-policy-for-namespace-with-label",
ClusterPolicy: clusteredResource(clPolGVR, genNetworkPolicyYaml),
TriggerResource: clusteredResource(nsGVR, namespaceWithLabelYaml),
ExpectedResources: []expectedResource{
{npGVR, "test", "allow-dns"},
},
},
}

View file

@ -3,7 +3,6 @@ package generate
import (
"errors"
"fmt"
"os"
"testing"
"time"
@ -16,389 +15,98 @@ import (
. "github.com/onsi/gomega"
)
var (
// Cluster Policy GVR
clPolGVR = e2e.GetGVR("kyverno.io", "v1", "clusterpolicies")
// Namespace GVR
nsGVR = e2e.GetGVR("", "v1", "namespaces")
// ClusterRole GVR
crGVR = e2e.GetGVR("rbac.authorization.k8s.io", "v1", "clusterroles")
// ClusterRoleBinding GVR
crbGVR = e2e.GetGVR("rbac.authorization.k8s.io", "v1", "clusterrolebindings")
// Role GVR
rGVR = e2e.GetGVR("rbac.authorization.k8s.io", "v1", "roles")
// RoleBinding GVR
rbGVR = e2e.GetGVR("rbac.authorization.k8s.io", "v1", "rolebindings")
// ConfigMap GVR
cmGVR = e2e.GetGVR("", "v1", "configmaps")
// NetworkPolicy GVR
npGVR = e2e.GetGVR("networking.k8s.io", "v1", "networkpolicies")
// ClusterPolicy Namespace
clPolNS = ""
// NetworkPolicy Namespace
npPolNS = ""
)
func Test_ClusterRole_ClusterRoleBinding_Sets(t *testing.T) {
RegisterTestingT(t)
if os.Getenv("E2E") == "" {
t.Skip("Skipping E2E Test")
}
setup(t)
// ====== Range Over ClusterRoleTests ==================
for _, tests := range ClusterRoleTests {
t.Run(tests.TestName, func(t *testing.T) {
e2eClient, err := e2e.NewE2EClient()
Expect(err).To(BeNil())
e2eClient := createClient()
t.Cleanup(func() {
By("Cleaning Cluster Policies")
_ = e2eClient.CleanClusterPolicies(clPolGVR)
// If Clone is true Clear Source Resource and Recreate
if tests.Clone {
By("Clone = true, Deleting Source ClusterRole and ClusterRoleBinding")
// Delete ClusterRole to be cloned
_ = e2eClient.DeleteClusteredResource(crGVR, tests.ClonerClusterRoleName)
// Delete ClusterRoleBinding to be cloned
_ = e2eClient.DeleteClusteredResource(crbGVR, tests.ClonerClusterRoleBindingName)
}
// Clear Namespace
By(fmt.Sprintf("Deleting Namespace : %s\n", tests.ResourceNamespace))
_ = e2eClient.DeleteClusteredResource(nsGVR, tests.ResourceNamespace)
// Wait Till Deletion of Namespace
err = e2e.GetWithRetry(1*time.Second, 15, func() error {
_, err := e2eClient.GetClusteredResource(nsGVR, tests.ResourceNamespace)
if err != nil {
return nil
}
return fmt.Errorf("failed to delete namespace: %v", err)
})
Expect(err).NotTo(HaveOccurred())
deleteResources(e2eClient, tests.ExpectedResources...)
})
By(fmt.Sprintf("Test to generate ClusterRole and ClusterRoleBinding : %s", tests.TestName))
By(fmt.Sprintf("synchronize = %v\t clone = %v", tests.Sync, tests.Clone))
// sanity check
expectResourcesNotExist(e2eClient, tests.ExpectedResources...)
// ======== Create ClusterRole Policy =============
By(fmt.Sprintf("Creating Generate Role Policy: %s", tests.PolicyName))
_, err = e2eClient.CreateNamespacedResourceYaml(clPolGVR, clPolNS, tests.PolicyName, tests.Data)
Expect(err).NotTo(HaveOccurred())
// create policy
policy := createResource(t, e2eClient, tests.ClusterPolicy)
Expect(commonE2E.PolicyCreated(policy.GetName())).To(Succeed())
err = commonE2E.PolicyCreated(tests.PolicyName)
Expect(err).NotTo(HaveOccurred())
// create source resources
createResources(t, e2eClient, tests.SourceResources...)
// == If Clone is true Create Source Resources ======
if tests.Clone {
By(fmt.Sprintf("Clone = true, Creating Cloner Resources in Namespace : %s", tests.CloneNamespace))
// Create ClusterRole to be cloned
_, err := e2eClient.CreateClusteredResourceYaml(crGVR, tests.CloneSourceClusterRoleData)
Expect(err).NotTo(HaveOccurred())
// Create ClusterRoleBinding to be cloned
_, err = e2eClient.CreateClusteredResourceYaml(crbGVR, tests.CloneSourceClusterRoleBindingData)
Expect(err).NotTo(HaveOccurred())
}
// create trigger
createResource(t, e2eClient, tests.TriggerResource)
// =================================================
// ======= Create Namespace ==================
By(fmt.Sprintf("Creating Namespace which triggers generate %s \n", tests.ResourceNamespace))
_, err = e2eClient.CreateClusteredResourceYaml(nsGVR, namespaceYaml)
Expect(err).NotTo(HaveOccurred())
// Wait Till Creation of Namespace
err = e2e.GetWithRetry(1*time.Second, 15, func() error {
_, err := e2eClient.GetClusteredResource(nsGVR, tests.ResourceNamespace)
if err != nil {
return err
}
return nil
})
Expect(err).NotTo(HaveOccurred())
// ======== Verify ClusterRole Creation =====
By("Verifying ClusterRole")
// Wait Till Creation of ClusterRole
err = e2e.GetWithRetry(1*time.Second, 30, func() error {
_, err := e2eClient.GetClusteredResource(crGVR, tests.ClusterRoleName)
if err != nil {
return err
}
return nil
})
Expect(err).NotTo(HaveOccurred())
// ============================================
// ======= Verify ClusterRoleBinding Creation ========
By("Verifying ClusterRoleBinding")
err = e2e.GetWithRetry(1*time.Second, 30, func() error {
_, err := e2eClient.GetClusteredResource(crbGVR, tests.ClusterRoleBindingName)
if err != nil {
return err
}
return nil
})
Expect(err).NotTo(HaveOccurred())
rbRes, err := e2eClient.GetClusteredResource(crbGVR, tests.ClusterRoleBindingName)
Expect(err).NotTo(HaveOccurred())
Expect(rbRes.GetName()).To(Equal(tests.ClusterRoleBindingName))
// ============================================
// verify expected resources
expectResources(e2eClient, tests.ExpectedResources...)
})
}
}
func Test_Role_RoleBinding_Sets(t *testing.T) {
RegisterTestingT(t)
if os.Getenv("E2E") == "" {
t.Skip("Skipping E2E Test")
}
// Generate E2E Client ==================
e2eClient, err := e2e.NewE2EClient()
Expect(err).To(BeNil())
// ======================================
setup(t)
// ====== Range Over RuleTest ==================
for _, tests := range RoleTests {
By(fmt.Sprintf("Test to generate Role and RoleBinding : %s", tests.TestName))
By(fmt.Sprintf("synchronize = %v\t clone = %v", tests.Sync, tests.Clone))
t.Run(tests.TestName, func(t *testing.T) {
e2eClient := createClient()
// ======= CleanUp Resources =====
By("Cleaning Cluster Policies")
_ = e2eClient.CleanClusterPolicies(clPolGVR)
t.Cleanup(func() {
deleteResources(e2eClient, tests.ExpectedResources...)
})
// Clear Namespace
By(fmt.Sprintf("Deleting Namespace : %s", tests.ResourceNamespace))
_ = e2eClient.DeleteClusteredResource(nsGVR, tests.ResourceNamespace)
// sanity check
expectResourcesNotExist(e2eClient, tests.ExpectedResources...)
// If Clone is true Clear Source Resource and Recreate
if tests.Clone {
By(fmt.Sprintf("Clone = true, Deleting Source Role and RoleBinding from Clone Namespace : %s", tests.CloneNamespace))
// Delete Role to be cloned
_ = e2eClient.DeleteNamespacedResource(rGVR, tests.CloneNamespace, tests.RoleName)
// Delete RoleBinding to be cloned
_ = e2eClient.DeleteNamespacedResource(rbGVR, tests.CloneNamespace, tests.RoleBindingName)
}
// create policy
policy := createResource(t, e2eClient, tests.ClusterPolicy)
Expect(commonE2E.PolicyCreated(policy.GetName())).To(Succeed())
// Wait Till Deletion of Namespace
err = e2e.GetWithRetry(1*time.Second, 15, func() error {
_, err := e2eClient.GetClusteredResource(nsGVR, tests.ResourceNamespace)
if err != nil {
return nil
}
return fmt.Errorf("failed to delete namespace: %v", err)
// create source resources
createResources(t, e2eClient, tests.SourceResources...)
// create trigger
createResource(t, e2eClient, tests.TriggerResource)
// verify expected resources
expectResources(e2eClient, tests.ExpectedResources...)
})
Expect(err).NotTo(HaveOccurred())
// ======== Create Role Policy =============
By(fmt.Sprintf("\nCreating Generate Role Policy %s", tests.PolicyName))
_, err = e2eClient.CreateNamespacedResourceYaml(clPolGVR, clPolNS, tests.PolicyName, tests.Data)
Expect(err).NotTo(HaveOccurred())
err = commonE2E.PolicyCreated(tests.PolicyName)
Expect(err).NotTo(HaveOccurred())
// ============================================
// === If Clone is true Create Source Resources ==
if tests.Clone {
By(fmt.Sprintf("Clone = true, Creating Cloner Resources in Namespace : %s", tests.CloneNamespace))
_, err := e2eClient.CreateNamespacedResourceYaml(rGVR, tests.CloneNamespace, "", tests.CloneSourceRoleData)
Expect(err).NotTo(HaveOccurred())
_, err = e2eClient.CreateNamespacedResourceYaml(rbGVR, tests.CloneNamespace, "", tests.CloneSourceRoleBindingData)
Expect(err).NotTo(HaveOccurred())
}
// ================================================
// ======= Create Namespace ==================
By(fmt.Sprintf("Creating Namespace which triggers generate %s", clPolNS))
_, err = e2eClient.CreateClusteredResourceYaml(nsGVR, namespaceYaml)
Expect(err).NotTo(HaveOccurred())
// Wait Till Creation of Namespace
err = e2e.GetWithRetry(1*time.Second, 15, func() error {
_, err := e2eClient.GetClusteredResource(nsGVR, tests.ResourceNamespace)
if err != nil {
return err
}
return nil
})
Expect(err).NotTo(HaveOccurred())
// ======== Verify Role Creation =====
By(fmt.Sprintf("Verifying Role in the Namespace : %s", tests.ResourceNamespace))
// Wait Till Creation of Role
err = e2e.GetWithRetry(1*time.Second, 15, func() error {
_, err := e2eClient.GetNamespacedResource(rGVR, tests.ResourceNamespace, tests.RoleName)
if err != nil {
return err
}
return nil
})
Expect(err).NotTo(HaveOccurred())
rRes, err := e2eClient.GetNamespacedResource(rGVR, tests.ResourceNamespace, tests.RoleName)
Expect(err).NotTo(HaveOccurred())
Expect(rRes.GetName()).To(Equal(tests.RoleName))
// ============================================
// ======= Verify RoleBinding Creation ========
By(fmt.Sprintf("Verifying RoleBinding in the Namespace : %s", tests.ResourceNamespace))
err = e2e.GetWithRetry(1*time.Second, 15, func() error {
_, err := e2eClient.GetNamespacedResource(rbGVR, tests.ResourceNamespace, tests.RoleBindingName)
if err != nil {
return err
}
return nil
})
Expect(err).NotTo(HaveOccurred())
rbRes, err := e2eClient.GetNamespacedResource(rbGVR, tests.ResourceNamespace, tests.RoleBindingName)
Expect(err).NotTo(HaveOccurred())
Expect(rbRes.GetName()).To(Equal(tests.RoleBindingName))
// ============================================
// ======= CleanUp Resources =====
_ = e2eClient.CleanClusterPolicies(clPolGVR)
// === If Clone is true Delete Source Resources ==
if tests.Clone {
By(fmt.Sprintf("Clone = true, Deleting Cloner Resources in Namespace : %s", tests.CloneNamespace))
_ = e2eClient.DeleteNamespacedResource(rGVR, tests.CloneNamespace, tests.RoleName)
_ = e2eClient.DeleteNamespacedResource(rbGVR, tests.CloneNamespace, tests.RoleBindingName)
}
// Clear Namespace
_ = e2eClient.DeleteClusteredResource(nsGVR, tests.ResourceNamespace)
// Wait Till Deletion of Namespace
err = e2e.GetWithRetry(1*time.Second, 15, func() error {
_, err := e2eClient.GetClusteredResource(nsGVR, tests.ResourceNamespace)
if err != nil {
return nil
}
return fmt.Errorf("failed to delete namespace: %v", err)
})
// Do not fail if waiting fails. Sometimes namespace needs time to be deleted.
if err != nil {
By(err.Error())
}
By(fmt.Sprintf("Test %s Completed \n\n\n", tests.TestName))
}
}
func Test_Generate_NetworkPolicy(t *testing.T) {
RegisterTestingT(t)
if os.Getenv("E2E") == "" {
t.Skip("Skipping E2E Test")
}
// Generate E2E Client ==================
e2eClient, err := e2e.NewE2EClient()
Expect(err).To(BeNil())
// ======================================
setup(t)
// ====== Range Over RuleTest ==================
for _, test := range NetworkPolicyGenerateTests {
By(fmt.Sprintf("Test to generate NetworkPolicy : %s", test.TestName))
By(fmt.Sprintf("synchronize = %v\t clone = %v", test.Sync, test.Clone))
for _, tests := range NetworkPolicyGenerateTests {
t.Run(tests.TestName, func(t *testing.T) {
e2eClient := createClient()
// ======= CleanUp Resources =====
By("Cleaning Cluster Policies")
_ = e2eClient.CleanClusterPolicies(clPolGVR)
t.Cleanup(func() {
deleteResources(e2eClient, tests.ExpectedResources...)
})
// Clear Namespace
By(fmt.Sprintf("Deleting Namespace : %s", test.ResourceNamespace))
_ = e2eClient.DeleteClusteredResource(nsGVR, test.ResourceNamespace)
// sanity check
expectResourcesNotExist(e2eClient, tests.ExpectedResources...)
// Wait Till Deletion of Namespace
err = e2e.GetWithRetry(1*time.Second, 15, func() error {
_, err := e2eClient.GetClusteredResource(nsGVR, test.ResourceNamespace)
if err != nil {
return nil
}
return errors.New("deleting Namespace")
// create policy
policy := createResource(t, e2eClient, tests.ClusterPolicy)
Expect(commonE2E.PolicyCreated(policy.GetName())).To(Succeed())
// create source resources
createResources(t, e2eClient, tests.SourceResources...)
// create trigger
createResource(t, e2eClient, tests.TriggerResource)
// verify expected resources
expectResources(e2eClient, tests.ExpectedResources...)
})
Expect(err).NotTo(HaveOccurred())
// ======== Create Generate NetworkPolicy Policy =============
By("Creating Generate NetworkPolicy Policy")
_, err := e2eClient.CreateNamespacedResourceYaml(clPolGVR, npPolNS, test.PolicyName, test.Data)
Expect(err).NotTo(HaveOccurred())
err = commonE2E.PolicyCreated(test.PolicyName)
Expect(err).NotTo(HaveOccurred())
// ======= Create Namespace ==================
By(fmt.Sprintf("Creating Namespace which triggers generate %s", npPolNS))
_, err = e2eClient.CreateClusteredResourceYaml(nsGVR, namespaceWithLabelYaml)
Expect(err).NotTo(HaveOccurred())
// Wait Till Creation of Namespace
err = e2e.GetWithRetry(1*time.Second, 15, func() error {
_, err := e2eClient.GetClusteredResource(nsGVR, test.ResourceNamespace)
if err != nil {
return err
}
return nil
})
Expect(err).NotTo(HaveOccurred())
// ======== NetworkPolicy Creation =====
By(fmt.Sprintf("Verifying NetworkPolicy in the Namespace : %s", test.ResourceNamespace))
// Wait Till Creation of NetworkPolicy
err = e2e.GetWithRetry(1*time.Second, 15, func() error {
_, err := e2eClient.GetNamespacedResource(npGVR, test.ResourceNamespace, test.NetworkPolicyName)
if err != nil {
return err
}
return nil
})
Expect(err).NotTo(HaveOccurred())
npRes, err := e2eClient.GetNamespacedResource(npGVR, test.ResourceNamespace, test.NetworkPolicyName)
Expect(err).NotTo(HaveOccurred())
Expect(npRes.GetName()).To(Equal(test.NetworkPolicyName))
// ============================================
// ======= CleanUp Resources =====
_ = e2eClient.CleanClusterPolicies(clPolGVR)
// Clear Namespace
_ = e2eClient.DeleteClusteredResource(nsGVR, test.ResourceNamespace)
// Wait Till Deletion of Namespace
err = e2e.GetWithRetry(1*time.Second, 15, func() error {
_, err := e2eClient.GetClusteredResource(nsGVR, test.ResourceNamespace)
if err != nil {
return nil
}
return errors.New("deleting Namespace")
})
Expect(err).NotTo(HaveOccurred())
By(fmt.Sprintf("Test %s Completed \n\n\n", test.TestName))
}
}
func Test_Generate_Namespace_Label_Actions(t *testing.T) {
RegisterTestingT(t)
if os.Getenv("E2E") == "" {
t.Skip("Skipping E2E Test")
}
setup(t)
// Generate E2E Client ==================
e2eClient, err := e2e.NewE2EClient()
@ -590,10 +298,8 @@ func loopElement(found bool, elementObj interface{}) bool {
}
func Test_Generate_Synchronize_Flag(t *testing.T) {
RegisterTestingT(t)
if os.Getenv("E2E") == "" {
t.Skip("Skipping E2E Test")
}
setup(t)
// Generate E2E Client ==================
e2eClient, err := e2e.NewE2EClient()
Expect(err).To(BeNil())
@ -776,10 +482,8 @@ func Test_Generate_Synchronize_Flag(t *testing.T) {
}
func Test_Source_Resource_Update_Replication(t *testing.T) {
RegisterTestingT(t)
if os.Getenv("E2E") == "" {
t.Skip("Skipping E2E Test")
}
setup(t)
// Generate E2E Client ==================
e2eClient, err := e2e.NewE2EClient()
Expect(err).To(BeNil())
@ -985,10 +689,8 @@ func Test_Source_Resource_Update_Replication(t *testing.T) {
}
func Test_Generate_Policy_Deletion_for_Clone(t *testing.T) {
RegisterTestingT(t)
if os.Getenv("E2E") == "" {
t.Skip("Skipping E2E Test")
}
setup(t)
// Generate E2E Client ==================
e2eClient, err := e2e.NewE2EClient()
Expect(err).To(BeNil())

View file

@ -0,0 +1,177 @@
package generate
import (
"fmt"
"os"
"testing"
"time"
"github.com/kyverno/kyverno/test/e2e"
apierrors "k8s.io/apimachinery/pkg/api/errors"
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
"sigs.k8s.io/yaml"
. "github.com/onsi/ginkgo"
. "github.com/onsi/gomega"
)
func setup(t *testing.T) {
RegisterTestingT(t)
if os.Getenv("E2E") == "" {
t.Skip("Skipping E2E Test")
}
}
func createClient() *e2e.E2EClient {
client, err := e2e.NewE2EClient()
Expect(err).NotTo(HaveOccurred())
return client
}
func deleteClusteredResource(client *e2e.E2EClient, resource expectedResource) {
By(fmt.Sprintf("Deleting %s : %s", resource.gvr.String(), resource.name))
client.DeleteClusteredResource(resource.gvr, resource.name)
err := e2e.GetWithRetry(1*time.Second, 15, func() error {
_, err := client.GetClusteredResource(resource.gvr, resource.name)
if err == nil {
return fmt.Errorf("resource still exists: %s, %s", resource.gvr.String(), resource.name)
}
if apierrors.IsNotFound(err) {
return nil
}
return err
})
Expect(err).NotTo(HaveOccurred())
}
func deleteNamespacedResource(client *e2e.E2EClient, resource expectedResource) {
By(fmt.Sprintf("Deleting %s : %s/%s", resource.gvr.String(), resource.ns, resource.name))
client.DeleteNamespacedResource(resource.gvr, resource.ns, resource.name)
err := e2e.GetWithRetry(1*time.Second, 15, func() error {
_, err := client.GetNamespacedResource(resource.gvr, resource.ns, resource.name)
if err == nil {
return fmt.Errorf("resource still exists: %s, %s/%s", resource.gvr.String(), resource.ns, resource.name)
}
if apierrors.IsNotFound(err) {
return nil
}
return err
})
Expect(err).NotTo(HaveOccurred())
}
func deleteResource(client *e2e.E2EClient, resource expectedResource) {
if resource.ns != "" {
deleteNamespacedResource(client, resource)
} else {
deleteClusteredResource(client, resource)
}
}
func deleteResources(client *e2e.E2EClient, resources ...expectedResource) {
for _, resource := range resources {
deleteResource(client, resource)
}
}
func createClusteredResource(t *testing.T, client *e2e.E2EClient, resource resource) *unstructured.Unstructured {
var u unstructured.Unstructured
Expect(yaml.Unmarshal(resource.raw, &u)).To(Succeed())
By(fmt.Sprintf("Creating %s : %s", resource.gvr.String(), u.GetName()))
result, err := client.CreateClusteredResource(resource.gvr, &u)
Expect(err).NotTo(HaveOccurred())
t.Cleanup(func() {
deleteResources(client, expectedResource{resource.gvr, result.GetNamespace(), result.GetName()})
})
return result
}
func createNamespacedResource(t *testing.T, client *e2e.E2EClient, resource resource) *unstructured.Unstructured {
var u unstructured.Unstructured
Expect(yaml.Unmarshal(resource.raw, &u)).To(Succeed())
By(fmt.Sprintf("Creating %s : %s/%s", resource.gvr.String(), resource.ns, u.GetName()))
result, err := client.CreateNamespacedResource(resource.gvr, resource.ns, &u)
Expect(err).NotTo(HaveOccurred())
t.Cleanup(func() {
deleteResources(client, expectedResource{resource.gvr, result.GetNamespace(), result.GetName()})
})
return result
}
func createResource(t *testing.T, client *e2e.E2EClient, resource resource) *unstructured.Unstructured {
if resource.ns != "" {
return createNamespacedResource(t, client, resource)
} else {
return createClusteredResource(t, client, resource)
}
}
func createResources(t *testing.T, client *e2e.E2EClient, resources ...resource) {
for _, resource := range resources {
createResource(t, client, resource)
}
}
func expectClusteredResource(client *e2e.E2EClient, resource expectedResource) {
By(fmt.Sprintf("Expecting %s : %s", resource.gvr.String(), resource.name))
err := e2e.GetWithRetry(1*time.Second, 30, func() error {
_, err := client.GetClusteredResource(resource.gvr, resource.name)
if err != nil {
return err
}
return nil
})
Expect(err).NotTo(HaveOccurred())
}
func expectNamespacedResource(client *e2e.E2EClient, resource expectedResource) {
By(fmt.Sprintf("Expecting %s : %s/%s", resource.gvr.String(), resource.ns, resource.name))
err := e2e.GetWithRetry(1*time.Second, 30, func() error {
_, err := client.GetNamespacedResource(resource.gvr, resource.ns, resource.name)
if err != nil {
return err
}
return nil
})
Expect(err).NotTo(HaveOccurred())
}
func expectResource(client *e2e.E2EClient, resource expectedResource) {
if resource.ns != "" {
expectNamespacedResource(client, resource)
} else {
expectClusteredResource(client, resource)
}
}
func expectResources(client *e2e.E2EClient, resources ...expectedResource) {
for _, resource := range resources {
expectResource(client, resource)
}
}
func expectClusteredResourceNotExists(client *e2e.E2EClient, resource expectedResource) {
By(fmt.Sprintf("Expecting not exists %s : %s", resource.gvr.String(), resource.name))
_, err := client.GetClusteredResource(resource.gvr, resource.name)
Expect(apierrors.IsNotFound(err)).To(BeTrue())
}
func expectNamespacedResourceNotExists(client *e2e.E2EClient, resource expectedResource) {
By(fmt.Sprintf("Expecting not exists %s : %s/%s", resource.gvr.String(), resource.ns, resource.name))
_, err := client.GetNamespacedResource(resource.gvr, resource.ns, resource.name)
Expect(apierrors.IsNotFound(err)).To(BeTrue())
}
func expectResourceNotExists(client *e2e.E2EClient, resource expectedResource) {
if resource.ns != "" {
expectNamespacedResourceNotExists(client, resource)
} else {
expectClusteredResourceNotExists(client, resource)
}
}
func expectResourcesNotExist(client *e2e.E2EClient, resources ...expectedResource) {
for _, resource := range resources {
expectResourceNotExists(client, resource)
}
}