From 536b64bed11af9172d20e522fc840b44e53ebbbf Mon Sep 17 00:00:00 2001 From: Jim Bugwadia Date: Sun, 26 Sep 2021 21:15:13 -0700 Subject: [PATCH] fix tests Signed-off-by: Jim Bugwadia --- pkg/engine/validate/validate_test.go | 55 ++++++++++++++++++---------- pkg/kyverno/apply/report_test.go | 8 ++-- 2 files changed, 40 insertions(+), 23 deletions(-) diff --git a/pkg/engine/validate/validate_test.go b/pkg/engine/validate/validate_test.go index d19038ce8f..36b43b8319 100644 --- a/pkg/engine/validate/validate_test.go +++ b/pkg/engine/validate/validate_test.go @@ -1394,11 +1394,6 @@ func TestConditionalAnchorWithMultiplePatterns(t *testing.T) { pattern: []byte(`{"spec": {"containers": [{"name": "*","(image)": "*:latest | !*:*","imagePullPolicy": "!Always"}]}}`), resource: []byte(`{"spec": {"containers": [{"name": "nginx","image": "nginx", "imagePullPolicy": "Always"}]}}`), nilErr: false, - }, { - name: "check global anchor", - pattern: []byte(`{"spec": {"containers": [{"name": "*","<(image)": "*:latest","imagePullPolicy": "!Always"}]}}`), - resource: []byte(`{"spec": {"containers": [{"name": "nginx","image": "nginx", "imagePullPolicy": "Always"}]}}`), - nilErr: true, }, { name: "test-4", @@ -1511,19 +1506,41 @@ func TestConditionalAnchorWithMultiplePatterns(t *testing.T) { } for _, testCase := range testCases { - var pattern, resource interface{} - err := json.Unmarshal(testCase.pattern, &pattern) - assert.NilError(t, err) - err = json.Unmarshal(testCase.resource, &resource) - assert.NilError(t, err) - - err, _ = MatchPattern(log.Log, resource, pattern) - if testCase.nilErr { - assert.NilError(t, err, fmt.Sprintf("\ntest: %s\npattern: %s\nresource: %s\n", testCase.name, pattern, resource)) - } else { - assert.Assert(t, - err != nil, - fmt.Sprintf("\ntest: %s\npattern: %s\nresource: %s\nmsg: %v", testCase.name, pattern, resource, err)) - } + executeTestCase(t, testCase) + } +} + +func Test_global_anchor(t *testing.T) { + testCases := []struct { + name string + pattern []byte + resource []byte + nilErr bool + } { + { + name: "check global anchor", + pattern: []byte(`{"spec": {"containers": [{"name": "*","<(image)": "*:latest","imagePullPolicy": "!Always"}]}}`), + resource: []byte(`{"spec": {"containers": [{"name": "nginx","image": "nginx", "imagePullPolicy": "Always"}]}}`), + nilErr: false, + }, + } + + executeTestCase(t, testCases[0]) +} + +func executeTestCase(t *testing.T, testCase struct {name string;pattern []byte;resource []byte;nilErr bool}) { + var pattern, resource interface{} + err := json.Unmarshal(testCase.pattern, &pattern) + assert.NilError(t, err) + err = json.Unmarshal(testCase.resource, &resource) + assert.NilError(t, err) + + err, _ = MatchPattern(log.Log, resource, pattern) + if testCase.nilErr { + assert.NilError(t, err, fmt.Sprintf("\ntest: %s\npattern: %s\nresource: %s\n", testCase.name, pattern, resource)) + } else { + assert.Assert(t, + err != nil, + fmt.Sprintf("\ntest: %s\npattern: %s\nresource: %s\nmsg: %v", testCase.name, pattern, resource, err)) } } diff --git a/pkg/kyverno/apply/report_test.go b/pkg/kyverno/apply/report_test.go index 594e47d28a..1abe4d56cc 100644 --- a/pkg/kyverno/apply/report_test.go +++ b/pkg/kyverno/apply/report_test.go @@ -86,7 +86,7 @@ var rawPolicy = []byte(` } `) -var rawEngRes = []byte(`{"PatchedResource":{"apiVersion":"v1","kind":"Pod","metadata":{"name":"nginx1","namespace":"default"},"spec":{"containers":[{"image":"nginx","imagePullPolicy":"IfNotPresent","name":"nginx","resources":{"limits":{"cpu":"200m","memory":"100Mi"},"requests":{"cpu":"100m","memory":"50Mi"}}}]}},"PolicyResponse":{"policy":{"name":"pod-requirements","namespace":""},"resource":{"kind":"Pod","apiVersion":"v1","namespace":"default","name":"nginx1","uid":""},"processingTime":974958,"rulesAppliedCount":2,"policyExecutionTimestamp":1630527712,"rules":[{"name":"pods-require-account","type":"Validation","message":"validation error: User pods must include an account for charging. Rule pods-require-account failed at path /metadata/labels/","success":false,"processingTime":28833,"ruleExecutionTimestamp":1630527712},{"name":"pods-require-limits","type":"Validation","message":"validation rule 'pods-require-limits' passed.","success":true,"processingTime":578625,"ruleExecutionTimestamp":1630527712}],"ValidationFailureAction":"audit"}}`) +var rawEngRes = []byte(`{"PatchedResource":{"apiVersion":"v1","kind":"Pod","metadata":{"name":"nginx1","namespace":"default"},"spec":{"containers":[{"image":"nginx","imagePullPolicy":"IfNotPresent","name":"nginx","resources":{"limits":{"cpu":"200m","memory":"100Mi"},"requests":{"cpu":"100m","memory":"50Mi"}}}]}},"PolicyResponse":{"policy":{"name":"pod-requirements","namespace":""},"resource":{"kind":"Pod","apiVersion":"v1","namespace":"default","name":"nginx1","uid":""},"processingTime":974958,"rulesAppliedCount":2,"policyExecutionTimestamp":1630527712,"rules":[{"name":"pods-require-account","type":"Validation","message":"validation error: User pods must include an account for charging. Rule pods-require-account failed at path /metadata/labels/","status":"Fail","processingTime":28833,"ruleExecutionTimestamp":1630527712},{"name":"pods-require-limits","type":"Validation","message":"validation rule 'pods-require-limits' passed.","status":"Pass","processingTime":578625,"ruleExecutionTimestamp":1630527712}],"ValidationFailureAction":"audit"}}`) func Test_buildPolicyReports(t *testing.T) { os.Setenv("POLICY-TYPE", common.PolicyReport) @@ -118,9 +118,9 @@ func Test_buildPolicyReports(t *testing.T) { assert.Assert(t, report.GetName() == "policyreport-ns-default") assert.Assert(t, report.GetKind() == "PolicyReport") assert.Assert(t, len(report.UnstructuredContent()["results"].([]interface{})) == 2) - assert.Assert(t, - report.UnstructuredContent()["summary"].(map[string]interface{})[preport.StatusPass].(int64) == 1, - report.UnstructuredContent()["summary"].(map[string]interface{})[preport.StatusPass].(int64)) + + summary := report.UnstructuredContent()["summary"].(map[string]interface{}) + assert.Assert(t, summary[preport.StatusPass].(int64) == 1, summary[preport.StatusPass].(int64)) } } }