From 725a94cc37874583c92bb80f2ea6cec3bd09b3b2 Mon Sep 17 00:00:00 2001 From: shivkumar dudhani <shivkumar@nirmata.com> Date: Mon, 1 Jul 2019 12:16:12 -0700 Subject: [PATCH] refactor testrunner framework --- examples/cli/ghost.yaml | 1 + examples/generate/policy_basic.yaml | 2 +- pkg/engine/patches.go | 6 +- pkg/testrunner/test.go | 140 +++++++++++++++++++------- pkg/testrunner/testcase.go | 16 ++- pkg/testrunner/testrunner_test.go | 12 ++- test/output/ghost.yaml | 1 + test/output/op_overlay_nginx.yaml | 4 +- test/scenarios/cli.yaml | 20 ---- test/scenarios/cli/cli.yaml | 38 +++++++ test/scenarios/generate.yaml | 30 ------ test/scenarios/generate/generate.yaml | 58 +++++++++++ test/scenarios/mutate/overlay.yaml | 7 +- test/scenarios/mutate/patches.yaml | 7 +- 14 files changed, 242 insertions(+), 100 deletions(-) delete mode 100644 test/scenarios/cli.yaml create mode 100644 test/scenarios/cli/cli.yaml delete mode 100644 test/scenarios/generate.yaml create mode 100644 test/scenarios/generate/generate.yaml diff --git a/examples/cli/ghost.yaml b/examples/cli/ghost.yaml index 47ef19feb7..eeca6d0579 100644 --- a/examples/cli/ghost.yaml +++ b/examples/cli/ghost.yaml @@ -29,6 +29,7 @@ spec: containers: - name: "ghost" image: "nginx:latest" + imagePullPolicy: Always ports: - containerPort: 8080 protocol: "TCP" diff --git a/examples/generate/policy_basic.yaml b/examples/generate/policy_basic.yaml index 79f92ef081..8e8c7e2286 100644 --- a/examples/generate/policy_basic.yaml +++ b/examples/generate/policy_basic.yaml @@ -4,7 +4,7 @@ metadata : name : basic-policy spec : rules: - - name: "Basic config generator for all namespaces" + - name: "Basic clone config generator for all namespaces" resource: kinds: - Namespace diff --git a/pkg/engine/patches.go b/pkg/engine/patches.go index 578023f2c0..729476c668 100644 --- a/pkg/engine/patches.go +++ b/pkg/engine/patches.go @@ -16,10 +16,14 @@ type PatchBytes []byte // ProcessPatches Returns array from separate patches that can be applied to the document // Returns error ONLY in case when creation of resource should be denied. func ProcessPatches(rule kubepolicy.Rule, resource []byte) (allPatches []PatchBytes, errs []error) { - if len(resource) == 0 || rule.Mutation == nil { + if len(resource) == 0 { errs = append(errs, errors.New("Source document for patching is empty")) return nil, errs } + if rule.Mutation == nil { + errs = append(errs, errors.New("No Mutation rules defined")) + return nil, errs + } patchedDocument := resource for _, patch := range rule.Mutation.Patches { patchRaw, err := json.Marshal(patch) diff --git a/pkg/testrunner/test.go b/pkg/testrunner/test.go index f475f2e579..5230444e5b 100644 --- a/pkg/testrunner/test.go +++ b/pkg/testrunner/test.go @@ -1,7 +1,7 @@ package testrunner import ( - "fmt" + "strconv" "testing" ospath "path" @@ -10,7 +10,7 @@ import ( pt "github.com/nirmata/kyverno/pkg/apis/policy/v1alpha1" client "github.com/nirmata/kyverno/pkg/dclient" "github.com/nirmata/kyverno/pkg/engine" - "github.com/nirmata/kyverno/pkg/result" + "github.com/nirmata/kyverno/pkg/info" kscheme "k8s.io/client-go/kubernetes/scheme" ) @@ -48,56 +48,102 @@ func (t *test) run() { } // apply the policy engine - pr, mResult, vResult, err := t.applyPolicy(t.policy, t.tResource, client) + pr, policyInfo, err := t.applyPolicy(t.policy, t.tResource, client) if err != nil { t.t.Error(err) return } // Expected Result - t.checkMutationResult(pr, mResult) - t.checkValidationResult(vResult) - t.checkGenerationResult(client) + // Test succesfuly ? + t.overAllPass(policyInfo.IsSuccessful(), t.testCase.Expected.Passes) + t.checkMutationResult(pr, policyInfo) + t.checkValidationResult(policyInfo) + t.checkGenerationResult(client, policyInfo) } -func (t *test) checkMutationResult(pr *resourceInfo, result result.Result) { +func (t *test) checkMutationResult(pr *resourceInfo, policyInfo *info.PolicyInfo) { if t.testCase.Expected.Mutation == nil { glog.Info("No Mutation check defined") return } // patched resource if !compareResource(pr, t.patchedResource) { - fmt.Printf("Expected Resource %s \n", string(t.patchedResource.rawResource)) - fmt.Printf("Patched Resource %s \n", string(pr.rawResource)) glog.Warningf("Expected resource %s ", string(pr.rawResource)) t.t.Error("Patched resources not as expected") } - // reason - reason := t.testCase.Expected.Mutation.Reason - if len(reason) > 0 && result.GetReason().String() != reason { - t.t.Error("Reason not matching") + + // check if rules match + t.compareRules(policyInfo.Rules, t.testCase.Expected.Mutation.Rules) +} + +func (t *test) overAllPass(result bool, expected string) { + b, err := strconv.ParseBool(expected) + if err != nil { + t.t.Error(err) + } + if result != b { + t.t.Errorf("Expected value %v and actual value %v dont match", expected, result) } } -func (t *test) checkValidationResult(result result.Result) { +func (t *test) compareRules(ruleInfos []*info.RuleInfo, rules []tRules) { + // Compare the rules specified in the expected against the actual rule info returned by the apply policy + for _, eRule := range rules { + // Look-up the rule from the policy info + rule := lookUpRule(eRule.Name, ruleInfos) + if rule == nil { + t.t.Errorf("Rule with name %s not found", eRule.Name) + continue + } + // get the corresponding rule + if rule.Name != eRule.Name { + t.t.Errorf("Rule Name not matching!. expected %s , actual %s", eRule.Name, rule.Name) + } + if rule.RuleType.String() != eRule.Type { + t.t.Errorf("Rule type mismatch!. expected %s, actual %s", eRule.Type, rule.RuleType.String()) + } + if len(eRule.Messages) != len(rule.Msgs) { + t.t.Errorf("Number of rule messages not same. expected %d, actual %d", len(eRule.Messages), len(rule.Msgs)) + } + for i, msg := range eRule.Messages { + if msg != rule.Msgs[i] { + t.t.Errorf("Messges dont match!. expected %s, actual %s", msg, rule.Msgs[i]) + } + } + } +} + +func lookUpRule(name string, ruleInfos []*info.RuleInfo) *info.RuleInfo { + for _, r := range ruleInfos { + if r.Name == name { + return r + } + } + return nil +} + +func (t *test) checkValidationResult(policyInfo *info.PolicyInfo) { if t.testCase.Expected.Validation == nil { glog.Info("No Validation check defined") return } - // reason - reason := t.testCase.Expected.Validation.Reason - if len(reason) > 0 && result.GetReason().String() != reason { - t.t.Error("Reason not matching") - } + + // check if rules match + t.compareRules(policyInfo.Rules, t.testCase.Expected.Validation.Rules) } -func (t *test) checkGenerationResult(client *client.Client) { +func (t *test) checkGenerationResult(client *client.Client, policyInfo *info.PolicyInfo) { if t.testCase.Expected.Generation == nil { glog.Info("No Generate check defined") return } if client == nil { - glog.Info("client needs to be configured") + t.t.Error("client needs to be configured") } + + // check if rules match + t.compareRules(policyInfo.Rules, t.testCase.Expected.Generation.Rules) + // check if the expected resources are generated for _, r := range t.genResources { n := ParseNameFromObject(r.rawResource) @@ -113,33 +159,51 @@ func (t *test) checkGenerationResult(client *client.Client) { func (t *test) applyPolicy(policy *pt.Policy, tresource *resourceInfo, - client *client.Client) (*resourceInfo, result.Result, result.Result, error) { + client *client.Client) (*resourceInfo, *info.PolicyInfo, error) { // apply policy on the trigger resource // Mutate - var vResult result.Result - var patchedResource []byte - mPatches, mResult := engine.Mutate(*policy, tresource.rawResource, *tresource.gvk) + var err error + rawResource := tresource.rawResource + rname := engine.ParseNameFromObject(rawResource) + rns := engine.ParseNamespaceFromObject(rawResource) + rkind := engine.ParseKindFromObject(rawResource) + policyInfo := info.NewPolicyInfo(policy.Name, + rkind, + rname, + rns) + // Apply Mutation Rules + patches, ruleInfos := engine.Mutate(*policy, rawResource, *tresource.gvk) + policyInfo.AddRuleInfos(ruleInfos) // TODO: only validate if there are no errors in mutate, why? - err := mResult.ToError() - if err == nil && len(mPatches) != 0 { - patchedResource, err = engine.ApplyPatches(tresource.rawResource, mPatches) - if err != nil { - return nil, nil, nil, err + if policyInfo.IsSuccessful() { + if len(patches) != 0 { + rawResource, err = engine.ApplyPatches(rawResource, patches) + if err != nil { + return nil, nil, err + } + } + } + // Validate + ruleInfos, err = engine.Validate(*policy, rawResource, *tresource.gvk) + policyInfo.AddRuleInfos(ruleInfos) + if err != nil { + return nil, nil, err + } + + if rkind == "Namespace" { + if client != nil { + ruleInfos := engine.Generate(client, *policy, rawResource, *tresource.gvk, false) + policyInfo.AddRuleInfos(ruleInfos) } - // Validate - vResult = engine.Validate(*policy, patchedResource, *tresource.gvk) } // Generate - if client != nil { - engine.Generate(client, *policy, tresource.rawResource, *tresource.gvk) - } // transform the patched Resource into resource Info - ri, err := extractResourceRaw(patchedResource) + ri, err := extractResourceRaw(rawResource) if err != nil { - return nil, nil, nil, err + return nil, nil, err } // return the results - return ri, mResult, vResult, nil + return ri, policyInfo, nil } func NewTest(ap string, t *testing.T, tc *testCase) (*test, error) { diff --git a/pkg/testrunner/testcase.go b/pkg/testrunner/testcase.go index 1bbdf70291..80363c7b1e 100644 --- a/pkg/testrunner/testcase.go +++ b/pkg/testrunner/testcase.go @@ -32,22 +32,30 @@ type tInput struct { } type tExpected struct { + Passes string `yaml:"passes"` Mutation *tMutation `yaml:"mutation,omitempty"` Validation *tValidation `yaml:"validation,omitempty"` Generation *tGeneration `yaml:"generation,omitempty"` } type tMutation struct { - Patched_Resource string `yaml:"patched_resource,omitempty"` - tResult + PatchedResource string `yaml:"patched_resource,omitempty"` + Rules []tRules `yaml:"rules"` } type tValidation struct { - tResult + Rules []tRules `yaml:"rules"` } type tGeneration struct { Resources []string `yaml:"resources"` + Rules []tRules `yaml:"rules"` +} + +type tRules struct { + Name string `yaml:"name"` + Type string `yaml:"type"` + Messages []string `yaml:"messages"` } type tResult struct { @@ -73,7 +81,7 @@ func (tc *testCase) loadPatchedResource(ap string) (*resourceInfo, error) { if tc.Expected.Mutation == nil { return nil, nil } - rs, err := loadResources(ap, tc.Expected.Mutation.Patched_Resource) + rs, err := loadResources(ap, tc.Expected.Mutation.PatchedResource) if err != nil { return nil, err } diff --git a/pkg/testrunner/testrunner_test.go b/pkg/testrunner/testrunner_test.go index 50d949effd..c77e875da9 100644 --- a/pkg/testrunner/testrunner_test.go +++ b/pkg/testrunner/testrunner_test.go @@ -2,6 +2,14 @@ package testrunner import "testing" -func TestExamples(t *testing.T) { - runner(t, "/test/scenarios") +func TestMutate(t *testing.T) { + runner(t, "/test/scenarios/mutate") +} + +func TestCLI(t *testing.T) { + runner(t, "/test/scenarios/cli") +} + +func TestGenerate(t *testing.T) { + runner(t, "/test/scenarios/generate") } diff --git a/test/output/ghost.yaml b/test/output/ghost.yaml index 751db9ec4c..cda52a8cc2 100644 --- a/test/output/ghost.yaml +++ b/test/output/ghost.yaml @@ -27,6 +27,7 @@ spec: containers: - name: ghost image: nginx:latest + imagePullPolicy: Always ports: - containerPort: 8080 protocol: TCP diff --git a/test/output/op_overlay_nginx.yaml b/test/output/op_overlay_nginx.yaml index d59519c5a7..a45c4fdc2e 100644 --- a/test/output/op_overlay_nginx.yaml +++ b/test/output/op_overlay_nginx.yaml @@ -22,10 +22,10 @@ spec: ports: - containerPort: 80 resources: {} - imagePullPolicy: Always + imagePullPolicy: IfNotPresent - name: ghost image: ghost:latest resources: {} - imagePullPolicy: Always + imagePullPolicy: IfNotPresent strategy: {} status: {} diff --git a/test/scenarios/cli.yaml b/test/scenarios/cli.yaml deleted file mode 100644 index 1e9496b983..0000000000 --- a/test/scenarios/cli.yaml +++ /dev/null @@ -1,20 +0,0 @@ -# file path relative to project root -input: - policy: examples/cli/policy_deployment.yaml - resource: examples/cli/nginx.yaml -expected: - mutation: - patched_resource: test/output/nginx.yaml - reason: Success - validation: - reason: Success ---- -input: - policy: examples/cli/policy_deployment.yaml - resource: examples/cli/ghost.yaml -expected: - mutation: - patched_resource: test/output/ghost.yaml - reason: Success - validation: - reason: Success \ No newline at end of file diff --git a/test/scenarios/cli/cli.yaml b/test/scenarios/cli/cli.yaml new file mode 100644 index 0000000000..8e1b2c2d96 --- /dev/null +++ b/test/scenarios/cli/cli.yaml @@ -0,0 +1,38 @@ +# file path relative to project root +input: + policy: examples/cli/policy_deployment.yaml + resource: examples/cli/nginx.yaml +expected: + passes: true + mutation: + patched_resource: test/output/nginx.yaml + rules: + - name: add-label + type: Mutation + messages: + - "Rule add-label: Patches succesfully applied." + validation: + rules: + - name: check-image + type : Validation + messages: + - "Rule check-image: Validation succesfully." +--- +input: + policy: examples/cli/policy_deployment.yaml + resource: examples/cli/ghost.yaml +expected: + passes: true + mutation: + patched_resource: test/output/ghost.yaml + rules: + - name: add-label + type: Mutation + messages: + - "Rule add-label: Patches succesfully applied." + validation: + rules: + - name: check-image + type : Validation + messages: + - "Rule check-image: Validation succesfully." diff --git a/test/scenarios/generate.yaml b/test/scenarios/generate.yaml deleted file mode 100644 index b305067a04..0000000000 --- a/test/scenarios/generate.yaml +++ /dev/null @@ -1,30 +0,0 @@ -# file path relative to project root -input: - policy: examples/generate/policy_basic.yaml - resource: examples/generate/namespace.yaml - load_resources: - - examples/generate/configMap_default.yaml -expected: - generation: - resources: - - test/output/cm_default_config.yaml - - test/output/sc_mongo_cred.yaml ---- -input: - policy: examples/generate/policy_generate.yaml - resource: examples/generate/namespace.yaml - load_resources: - - examples/generate/configMap.yaml -expected: - generation: - resources: - - test/output/cm_copied_cm.yaml - - test/output/cm_zk-kafka-address.yaml ---- -input: - policy: examples/generate/policy_networkPolicy.yaml - resource: examples/generate/namespace.yaml -expected: - generation: - resources: - - test/output/np_deny-all-traffic.yaml \ No newline at end of file diff --git a/test/scenarios/generate/generate.yaml b/test/scenarios/generate/generate.yaml new file mode 100644 index 0000000000..572efe2ad1 --- /dev/null +++ b/test/scenarios/generate/generate.yaml @@ -0,0 +1,58 @@ +# file path relative to project root +input: + policy: examples/generate/policy_basic.yaml + resource: examples/generate/namespace.yaml + load_resources: + - examples/generate/configMap_default.yaml +expected: + passes: true + generation: + resources: + - test/output/cm_default_config.yaml + - test/output/sc_mongo_cred.yaml + rules: + - name: "Basic config generator for all namespaces" + type: Generation + messages: + - "Rule Basic config generator for all namespaces: Generation succesfully." + - name: "Basic clone config generator for all namespaces" + type: Generation + messages: + - "Rule Basic clone config generator for all namespaces: Generation succesfully." + +--- +input: + policy: examples/generate/policy_generate.yaml + resource: examples/generate/namespace.yaml + load_resources: + - examples/generate/configMap.yaml +expected: + passes: true + generation: + resources: + - test/output/cm_copied_cm.yaml + - test/output/cm_zk-kafka-address.yaml + rules: + - name: "copy-comfigmap" + type: Generation + messages: + - "Rule copy-comfigmap: Generation succesfully." + - name: "zk-kafka-address" + type: Generation + messages: + - "Rule zk-kafka-address: Generation succesfully." + +--- +input: + policy: examples/generate/policy_networkPolicy.yaml + resource: examples/generate/namespace.yaml +expected: + passes: true + generation: + resources: + - test/output/np_deny-all-traffic.yaml + rules: + - name: deny-all-traffic + type: Generation + messages: + - "Rule deny-all-traffic: Generation succesfully." \ No newline at end of file diff --git a/test/scenarios/mutate/overlay.yaml b/test/scenarios/mutate/overlay.yaml index a2db4326c5..95b606bda5 100644 --- a/test/scenarios/mutate/overlay.yaml +++ b/test/scenarios/mutate/overlay.yaml @@ -3,6 +3,11 @@ input: policy: examples/mutate/overlay/policy_imagePullPolicy.yaml resource: examples/mutate/overlay/nginx.yaml expected: + passes: true mutation: patched_resource: test/output/op_overlay_nginx.yaml - reason: Success \ No newline at end of file + rules: + - name: set-image-pull-policy + type: Mutation + messages: + - "Rule set-image-pull-policy: Overlay succesfully applied." \ No newline at end of file diff --git a/test/scenarios/mutate/patches.yaml b/test/scenarios/mutate/patches.yaml index 70de56af2f..6b5201c382 100644 --- a/test/scenarios/mutate/patches.yaml +++ b/test/scenarios/mutate/patches.yaml @@ -3,6 +3,11 @@ input: policy: examples/mutate/patches/policy_endpoints.yaml resource: examples/mutate/patches/endpoints.yaml expected: + passes: true mutation: patched_resource: test/output/op_patches_endpoints.yaml - reason: Success \ No newline at end of file + rules: + - name: pEP + type: Mutation + messages: + - "Rule pEP: Patches succesfully applied." \ No newline at end of file