1
0
Fork 0
mirror of https://github.com/kyverno/kyverno.git synced 2024-12-14 11:57:48 +00:00
kyverno/test
2019-06-17 18:11:22 -07:00
..
ConfigMap updated test after bubfix 2019-06-10 16:08:35 +03:00
ConfigMapGenerator-SecretGenerator update test examples 2019-06-03 16:09:14 -07:00
CronJob rebase with release 1.0 2019-05-22 10:43:29 -07:00
DaemonSet rebase with release 1.0 2019-05-22 10:43:29 -07:00
Deployment updated test after bubfix 2019-06-10 16:08:35 +03:00
Endpoint updated test after bubfix 2019-06-10 16:08:35 +03:00
HorizontalPodAutoscaler rebase with release 1.0 2019-05-22 10:43:29 -07:00
Ingress updated test after bubfix 2019-06-10 16:08:35 +03:00
Job updated test after bubfix 2019-06-10 16:08:35 +03:00
LimitRange updated test after bubfix 2019-06-10 16:08:35 +03:00
Namespace update apiVersion for test YAMLs and update spec.rules.generate type to object 2019-05-22 17:57:40 -07:00
NetworkPolicy updated test after bubfix 2019-06-10 16:08:35 +03:00
output rework the framework 2019-06-17 18:11:22 -07:00
PersistentVolumeClaim updated test after bubfix 2019-06-10 16:08:35 +03:00
PodDisruptionBudget update apiVersion for test YAMLs and update spec.rules.generate type to object 2019-05-22 17:57:40 -07:00
PodTemplate Updated examples 2019-05-23 20:37:11 +03:00
ResourceQuota update apiVersion for test YAMLs and update spec.rules.generate type to object 2019-05-22 17:57:40 -07:00
scenarios rework the framework 2019-06-17 18:11:22 -07:00
Secret update apiVersion for test YAMLs and update spec.rules.generate type to object 2019-05-22 17:57:40 -07:00
Service update apiVersion for test YAMLs and update spec.rules.generate type to object 2019-05-22 17:57:40 -07:00
StatefulSet updated test after bubfix 2019-06-10 16:08:35 +03:00
README.md fix conflicts 2019-05-22 20:26:53 -07:00

Test samples

This directory contains policies and resources for testing. There are definitions for each supported resource type and an sample policy for the corresponding resource.

How to use

Currently, the testing is possible only via kubectl when kyverno is installed to the cluster. So, build and install the policy controller first.

Each folder contains a pair of files, one of which is the definition of the resource, and the second is the definition of the policy for this resource. Let's look at an example of the endpoints mutation. Endpoints are listed in file test/Endpoints/endpoints.yaml:

apiVersion: v1
kind: Endpoints
metadata:
  name: test-endpoint
  labels:
    label : test
subsets:
- addresses:
  - ip: 192.168.10.171
  ports:
  - name: secure-connection
    port: 443
    protocol: TCP

Create this resource:

> kubectl create -f test/Endpoints/endpoints.yaml
endpoints/test-endpoint created
> kubectl get -f test/Endpoints/endpoints.yaml
NAME            ENDPOINTS            AGE
test-endpoint   192.168.10.171:443   6s

We just created an endpoints resource and made sure that it was created without changes. Let's remove it now and try to create it again, but with an active policy for endpoints resources.

> kubectl delete -f test/Endpoints/endpoints.yaml
endpoints "test-endpoint" deleted

We have this a policy for enpoints (policy-endpoint.yaml):

apiVersion : kyverno.io/v1alpha1
kind : Policy
metadata :
  name : policy-endpoints
spec :
  rules:
    - name:
      resource:
        kinds:
          - Endpoints
        selector:
          matchLabels:
            label : test
      mutate:
        patches:
          - path : "/subsets/0/ports/0/port"
            op : replace
            value: 9663
          - path : "/subsets/0"
            op: add
            value:
              addresses:
              - ip: "192.168.10.171"
              ports:
              - name: load-balancer-connection
                port: 80
                protocol: UDP

This policy does 2 patches:

  • replaces the first port of the first connection to 6443
  • adds new endpoint with IP 192.168.10.171 and port 80 (UDP)

Let's apply this policy and create the endpoints again to see the changes:

> kubectl create -f test/Endpoints/policy-endpoints.yaml
policy.policy.nirmata.io/policy-endpoints created
> kubectl create -f test/Endpoints/endpoints.yaml
endpoints/test-endpoint created
> kubectl get -f test/Endpoints/endpoints.yaml
NAME            ENDPOINTS                               AGE
test-endpoint   192.168.10.171:80,192.168.10.171:9663   30s

As you can see, the endpoints resource was created with changes: a new port 80 was added, and port 443 was changed to 6443.

Enjoy :)