// Copyright 2020-2023 Project Capsule Authors. // SPDX-License-Identifier: Apache-2.0 package e2e import ( "context" "fmt" "github.com/projectcapsule/capsule/pkg/api" . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" corev1 "k8s.io/api/core/v1" networkingv1 "k8s.io/api/networking/v1" "k8s.io/apimachinery/pkg/api/resource" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/types" "sigs.k8s.io/controller-runtime/pkg/client" capsulev1beta2 "github.com/projectcapsule/capsule/api/v1beta2" ) var _ = Describe("changing Tenant managed Kubernetes resources", Label("tenant", "managed", "current"), func() { tnt := &capsulev1beta2.Tenant{ ObjectMeta: metav1.ObjectMeta{ Name: "tenant-resources-changes", }, Spec: capsulev1beta2.TenantSpec{ Owners: api.OwnerListSpec{ { CoreOwnerSpec: api.CoreOwnerSpec{ UserSpec: api.UserSpec{ Name: "laura", Kind: "User", }, }, }, }, LimitRanges: api.LimitRangesSpec{Items: []corev1.LimitRangeSpec{ { Limits: []corev1.LimitRangeItem{ { Type: corev1.LimitTypePod, Min: map[corev1.ResourceName]resource.Quantity{ corev1.ResourceCPU: resource.MustParse("50m"), corev1.ResourceMemory: resource.MustParse("5Mi"), }, Max: map[corev1.ResourceName]resource.Quantity{ corev1.ResourceCPU: resource.MustParse("1"), corev1.ResourceMemory: resource.MustParse("1Gi"), }, }, { Type: corev1.LimitTypeContainer, Default: map[corev1.ResourceName]resource.Quantity{ corev1.ResourceCPU: resource.MustParse("200m"), corev1.ResourceMemory: resource.MustParse("100Mi"), }, DefaultRequest: map[corev1.ResourceName]resource.Quantity{ corev1.ResourceCPU: resource.MustParse("100m"), corev1.ResourceMemory: resource.MustParse("10Mi"), }, Min: map[corev1.ResourceName]resource.Quantity{ corev1.ResourceCPU: resource.MustParse("50m"), corev1.ResourceMemory: resource.MustParse("5Mi"), }, Max: map[corev1.ResourceName]resource.Quantity{ corev1.ResourceCPU: resource.MustParse("1"), corev1.ResourceMemory: resource.MustParse("1Gi"), }, }, { Type: corev1.LimitTypePersistentVolumeClaim, Min: map[corev1.ResourceName]resource.Quantity{ corev1.ResourceStorage: resource.MustParse("1Gi"), }, Max: map[corev1.ResourceName]resource.Quantity{ corev1.ResourceStorage: resource.MustParse("10Gi"), }, }, }, }, }, }, NetworkPolicies: api.NetworkPolicySpec{Items: []networkingv1.NetworkPolicySpec{ { Ingress: []networkingv1.NetworkPolicyIngressRule{ { From: []networkingv1.NetworkPolicyPeer{ { NamespaceSelector: &metav1.LabelSelector{ MatchLabels: map[string]string{ "capsule.clastix.io/tenant": "tenant-resources", }, }, }, { PodSelector: &metav1.LabelSelector{}, }, { IPBlock: &networkingv1.IPBlock{ CIDR: "192.168.0.0/12", }, }, }, }, }, Egress: []networkingv1.NetworkPolicyEgressRule{ { To: []networkingv1.NetworkPolicyPeer{ { IPBlock: &networkingv1.IPBlock{ CIDR: "0.0.0.0/0", Except: []string{ "192.168.0.0/12", }, }, }, }, }, }, PodSelector: metav1.LabelSelector{}, PolicyTypes: []networkingv1.PolicyType{ networkingv1.PolicyTypeIngress, networkingv1.PolicyTypeEgress, }, }, }, }, NodeSelector: map[string]string{ "kubernetes.io/os": "linux", }, ResourceQuota: api.ResourceQuotaSpec{Items: []corev1.ResourceQuotaSpec{ { Hard: map[corev1.ResourceName]resource.Quantity{ corev1.ResourceLimitsCPU: resource.MustParse("8"), corev1.ResourceLimitsMemory: resource.MustParse("16Gi"), corev1.ResourceRequestsCPU: resource.MustParse("8"), corev1.ResourceRequestsMemory: resource.MustParse("16Gi"), }, Scopes: []corev1.ResourceQuotaScope{ corev1.ResourceQuotaScopeNotTerminating, }, }, { Hard: map[corev1.ResourceName]resource.Quantity{ corev1.ResourcePods: resource.MustParse("10"), }, }, { Hard: map[corev1.ResourceName]resource.Quantity{ corev1.ResourceRequestsStorage: resource.MustParse("100Gi"), }, }, }, }, }, } nsl := []string{"fire", "walk", "with", "me"} JustBeforeEach(func() { EventuallyCreation(func() error { tnt.ResourceVersion = "" return k8sClient.Create(context.TODO(), tnt) }).Should(Succeed()) By("creating the Namespaces", func() { for _, i := range nsl { ns := NewNamespace(i) NamespaceCreation(ns, tnt.Spec.Owners[0].UserSpec, defaultTimeoutInterval).Should(Succeed()) TenantNamespaceList(tnt, defaultTimeoutInterval).Should(ContainElement(ns.GetName())) } }) }) JustAfterEach(func() { Expect(k8sClient.Delete(context.TODO(), tnt)).Should(Succeed()) }) It("should reapply the original resources upon third party change", func() { for _, ns := range nsl { By("changing Limit Range", func() { for i, s := range tnt.Spec.LimitRanges.Items { n := fmt.Sprintf("capsule-%s-%d", tnt.GetName(), i) lr := &corev1.LimitRange{} Eventually(func() error { return k8sClient.Get(context.TODO(), types.NamespacedName{Name: n, Namespace: ns}, lr) }, defaultTimeoutInterval, defaultPollInterval).Should(Succeed()) cs := ownerClient(tnt.Spec.Owners[0].UserSpec) err := cs.CoreV1().LimitRanges(ns).Delete(context.TODO(), n, metav1.DeleteOptions{}) Expect(err).To(HaveOccurred()) c := lr.DeepCopy() c.Spec.Limits = []corev1.LimitRangeItem{} Expect(k8sClient.Update(context.TODO(), c, &client.UpdateOptions{})).Should(Succeed()) Eventually(func() corev1.LimitRangeSpec { Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: n, Namespace: ns}, lr)).Should(Succeed()) return lr.Spec }, defaultTimeoutInterval, defaultPollInterval).Should(Equal(s)) } }) By("changing Network Policy", func() { for i, s := range tnt.Spec.NetworkPolicies.Items { n := fmt.Sprintf("capsule-%s-%d", tnt.GetName(), i) np := &networkingv1.NetworkPolicy{} Eventually(func() error { return k8sClient.Get(context.TODO(), types.NamespacedName{Name: n, Namespace: ns}, np) }, defaultTimeoutInterval, defaultPollInterval).Should(Succeed()) Expect(np.Spec).Should(Equal(s)) cs := ownerClient(tnt.Spec.Owners[0].UserSpec) err := cs.NetworkingV1().NetworkPolicies(ns).Delete(context.TODO(), n, metav1.DeleteOptions{}) Expect(err).To(HaveOccurred()) c := np.DeepCopy() c.Spec.Egress = []networkingv1.NetworkPolicyEgressRule{} c.Spec.Ingress = []networkingv1.NetworkPolicyIngressRule{} Expect(k8sClient.Update(context.TODO(), c, &client.UpdateOptions{})).Should(Succeed()) Eventually(func() networkingv1.NetworkPolicySpec { Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: n, Namespace: ns}, np)).Should(Succeed()) return np.Spec }, defaultTimeoutInterval, defaultPollInterval).Should(Equal(s)) } }) By("changing Resource Quota", func() { for i, s := range tnt.Spec.ResourceQuota.Items { n := fmt.Sprintf("capsule-%s-%d", tnt.GetName(), i) rq := &corev1.ResourceQuota{} Eventually(func() error { return k8sClient.Get(context.TODO(), types.NamespacedName{Name: n, Namespace: ns}, rq) }, defaultTimeoutInterval, defaultPollInterval).Should(Succeed()) cs := ownerClient(tnt.Spec.Owners[0].UserSpec) err := cs.CoreV1().ResourceQuotas(ns).Delete(context.TODO(), n, metav1.DeleteOptions{}) Expect(err).To(HaveOccurred()) c := rq.DeepCopy() c.Spec.Hard = map[corev1.ResourceName]resource.Quantity{} Expect(k8sClient.Update(context.TODO(), c, &client.UpdateOptions{})).Should(Succeed()) Eventually(func() corev1.ResourceQuotaSpec { Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: n, Namespace: ns}, rq)).Should(Succeed()) return rq.Spec }, defaultTimeoutInterval, defaultPollInterval).Should(Equal(s)) } }) } }) })