1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2025-03-10 09:56:55 +00:00
kyverno/test/e2e/verifyimages/config.go
Sambhav Kothari ec4e4ba452
Add support for custom image extractors (#3596)
Signed-off-by: Sambhav Kothari <skothari44@bloomberg.net>
2022-04-14 09:08:30 -07:00

72 lines
2.2 KiB
Go

package verifyimages
import (
"github.com/kyverno/kyverno/test/e2e"
"k8s.io/apimachinery/pkg/runtime/schema"
)
var taskGVR = e2e.GetGVR("tekton.dev", "v1beta1", "tasks")
var VerifyImagesTests = []struct {
//TestName - Name of the Test
TestName string
// PolicyName - Name of the Policy
PolicyName string
// PolicyRaw - The Yaml file of the ClusterPolicy
PolicyRaw []byte
// ResourceName - Name of the Resource
ResourceName string
// ResourceNamespace - Namespace of the Resource
ResourceNamespace string
// ResourceGVR - GVR of the Resource
ResourceGVR schema.GroupVersionResource
// ResourceRaw - The Yaml file of the ClusterPolicy
ResourceRaw []byte
// MustSucceed - indicates if validation must succeed
MustSucceed bool
}{
{
// Case for custom image extraction
TestName: "checks that custom images are populated with simple extractor",
PolicyName: "tasks",
PolicyRaw: kyvernoTaskPolicyWithSimpleExtractor,
ResourceName: "example-task-name",
ResourceNamespace: "test-validate",
ResourceGVR: taskGVR,
ResourceRaw: tektonTask,
MustSucceed: false,
},
{
// Case for custom image extraction
TestName: "checks that custom images are populated with complex extractor",
PolicyName: "tasks",
PolicyRaw: kyvernoTaskPolicyWithComplexExtractor,
ResourceName: "example-task-name",
ResourceNamespace: "test-validate",
ResourceGVR: taskGVR,
ResourceRaw: tektonTask,
MustSucceed: false,
},
{
// Case for custom image extraction
TestName: "checks that custom images are not populated",
PolicyName: "tasks",
PolicyRaw: kyvernoTaskPolicyWithoutExtractor,
ResourceName: "example-task-name",
ResourceNamespace: "test-validate",
ResourceGVR: taskGVR,
ResourceRaw: tektonTask,
MustSucceed: true,
},
{
// Case for custom image extraction
TestName: "checks that custom images are populated and verified",
PolicyName: "tasks",
PolicyRaw: kyvernoTaskPolicyKeyless,
ResourceName: "example-task-name",
ResourceNamespace: "test-validate",
ResourceGVR: taskGVR,
ResourceRaw: tektonTaskVerified,
MustSucceed: true,
},
}