mirror of
https://github.com/projectcapsule/capsule.git
synced 2026-02-14 09:59:57 +00:00
209 lines
6.5 KiB
Go
209 lines
6.5 KiB
Go
// Copyright 2020-2023 Project Capsule Authors.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package e2e
|
|
|
|
import (
|
|
"context"
|
|
"time"
|
|
|
|
. "github.com/onsi/ginkgo/v2"
|
|
. "github.com/onsi/gomega"
|
|
rbacv1 "k8s.io/api/rbac/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
|
|
capsulev1beta2 "github.com/projectcapsule/capsule/api/v1beta2"
|
|
"github.com/projectcapsule/capsule/pkg/api"
|
|
)
|
|
|
|
var _ = Describe("creating a Namespace with user-specified labels and annotations", Label("namespace"), func() {
|
|
tnt := &capsulev1beta2.Tenant{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "tenant-user-metadata-forbidden",
|
|
},
|
|
Spec: capsulev1beta2.TenantSpec{
|
|
NamespaceOptions: &capsulev1beta2.NamespaceOptions{
|
|
ForbiddenLabels: api.ForbiddenListSpec{
|
|
Exact: []string{"foo", "bar"},
|
|
Regex: "^gatsby-.*$",
|
|
},
|
|
ForbiddenAnnotations: api.ForbiddenListSpec{
|
|
Exact: []string{"foo", "bar"},
|
|
Regex: "^gatsby-.*$",
|
|
},
|
|
},
|
|
Owners: api.OwnerListSpec{
|
|
{
|
|
CoreOwnerSpec: api.CoreOwnerSpec{
|
|
UserSpec: api.UserSpec{
|
|
Name: "gatsby",
|
|
Kind: "User",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
JustBeforeEach(func() {
|
|
EventuallyCreation(func() error {
|
|
tnt.ResourceVersion = ""
|
|
return k8sClient.Create(context.TODO(), tnt)
|
|
}).Should(Succeed())
|
|
})
|
|
JustAfterEach(func() {
|
|
Expect(k8sClient.Delete(context.TODO(), tnt)).Should(Succeed())
|
|
})
|
|
|
|
It("should allow", func() {
|
|
By("specifying non-forbidden labels", func() {
|
|
ns := NewNamespace("")
|
|
ns.SetLabels(map[string]string{"bim": "baz"})
|
|
NamespaceCreation(ns, tnt.Spec.Owners[0].UserSpec, defaultTimeoutInterval).Should(Succeed())
|
|
})
|
|
By("specifying non-forbidden annotations", func() {
|
|
ns := NewNamespace("")
|
|
ns.SetAnnotations(map[string]string{"bim": "baz"})
|
|
NamespaceCreation(ns, tnt.Spec.Owners[0].UserSpec, defaultTimeoutInterval).Should(Succeed())
|
|
})
|
|
})
|
|
|
|
It("should fail when creating a Namespace", func() {
|
|
By("specifying forbidden labels using exact match", func() {
|
|
ns := NewNamespace("")
|
|
ns.SetLabels(map[string]string{"foo": "bar"})
|
|
NamespaceCreation(ns, tnt.Spec.Owners[0].UserSpec, defaultTimeoutInterval).ShouldNot(Succeed())
|
|
})
|
|
By("specifying forbidden labels using regex match", func() {
|
|
ns := NewNamespace("")
|
|
ns.SetLabels(map[string]string{"gatsby-foo": "bar"})
|
|
NamespaceCreation(ns, tnt.Spec.Owners[0].UserSpec, defaultTimeoutInterval).ShouldNot(Succeed())
|
|
})
|
|
By("specifying forbidden annotations using exact match", func() {
|
|
ns := NewNamespace("")
|
|
ns.SetAnnotations(map[string]string{"foo": "bar"})
|
|
NamespaceCreation(ns, tnt.Spec.Owners[0].UserSpec, defaultTimeoutInterval).ShouldNot(Succeed())
|
|
})
|
|
By("specifying forbidden annotations using regex match", func() {
|
|
ns := NewNamespace("")
|
|
ns.SetAnnotations(map[string]string{"gatsby-foo": "bar"})
|
|
NamespaceCreation(ns, tnt.Spec.Owners[0].UserSpec, defaultTimeoutInterval).ShouldNot(Succeed())
|
|
})
|
|
})
|
|
|
|
It("should fail when updating a Namespace", func() {
|
|
role := &rbacv1.Role{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "ns-patch",
|
|
},
|
|
Rules: []rbacv1.PolicyRule{
|
|
{
|
|
Verbs: []string{"patch", "update"},
|
|
APIGroups: []string{""},
|
|
Resources: []string{"namespaces"},
|
|
},
|
|
},
|
|
}
|
|
|
|
roleBinding := &rbacv1.RoleBinding{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "ns-patch",
|
|
},
|
|
Subjects: []rbacv1.Subject{
|
|
{
|
|
APIGroup: "rbac.authorization.k8s.io",
|
|
Kind: tnt.Spec.Owners[0].Kind.String(),
|
|
Name: tnt.Spec.Owners[0].Name,
|
|
},
|
|
},
|
|
RoleRef: rbacv1.RoleRef{
|
|
APIGroup: "rbac.authorization.k8s.io",
|
|
Kind: "Role",
|
|
Name: role.GetName(),
|
|
},
|
|
}
|
|
|
|
rbacPatch := func(ns string) {
|
|
role := role.DeepCopy()
|
|
role.SetNamespace(ns)
|
|
Expect(k8sClient.Create(context.Background(), role)).To(Succeed())
|
|
|
|
roleBinding := roleBinding.DeepCopy()
|
|
roleBinding.SetNamespace(ns)
|
|
Expect(k8sClient.Create(context.Background(), roleBinding)).To(Succeed())
|
|
}
|
|
|
|
cs := ownerClient(tnt.Spec.Owners[0].UserSpec)
|
|
|
|
By("specifying forbidden labels using exact match", func() {
|
|
ns := NewNamespace("forbidden-labels-exact-match")
|
|
|
|
NamespaceCreation(ns, tnt.Spec.Owners[0].UserSpec, defaultTimeoutInterval).Should(Succeed())
|
|
rbacPatch(ns.GetName())
|
|
Consistently(func() error {
|
|
if err := k8sClient.Get(context.Background(), types.NamespacedName{Name: ns.GetName()}, ns); err != nil {
|
|
return nil
|
|
}
|
|
|
|
ns.SetLabels(map[string]string{"foo": "bar"})
|
|
|
|
_, err := cs.CoreV1().Namespaces().Update(context.Background(), ns, metav1.UpdateOptions{})
|
|
|
|
return err
|
|
}, 10*time.Second, time.Second).ShouldNot(Succeed())
|
|
})
|
|
By("specifying forbidden labels using regex match", func() {
|
|
ns := NewNamespace("forbidden-labels-regex-match")
|
|
|
|
NamespaceCreation(ns, tnt.Spec.Owners[0].UserSpec, defaultTimeoutInterval).Should(Succeed())
|
|
rbacPatch(ns.GetName())
|
|
Consistently(func() error {
|
|
if err := k8sClient.Get(context.Background(), types.NamespacedName{Name: ns.GetName()}, ns); err != nil {
|
|
return nil
|
|
}
|
|
|
|
ns.SetLabels(map[string]string{"gatsby-foo": "bar"})
|
|
|
|
_, err := cs.CoreV1().Namespaces().Update(context.Background(), ns, metav1.UpdateOptions{})
|
|
|
|
return err
|
|
}, 3*time.Second, time.Second).ShouldNot(Succeed())
|
|
})
|
|
By("specifying forbidden annotations using exact match", func() {
|
|
ns := NewNamespace("forbidden-annotations-exact-match")
|
|
|
|
NamespaceCreation(ns, tnt.Spec.Owners[0].UserSpec, defaultTimeoutInterval).Should(Succeed())
|
|
rbacPatch(ns.GetName())
|
|
Consistently(func() error {
|
|
if err := k8sClient.Get(context.Background(), types.NamespacedName{Name: ns.GetName()}, ns); err != nil {
|
|
return nil
|
|
}
|
|
|
|
ns.SetAnnotations(map[string]string{"foo": "bar"})
|
|
|
|
_, err := cs.CoreV1().Namespaces().Update(context.Background(), ns, metav1.UpdateOptions{})
|
|
|
|
return err
|
|
}, 10*time.Second, time.Second).ShouldNot(Succeed())
|
|
})
|
|
By("specifying forbidden annotations using regex match", func() {
|
|
ns := NewNamespace("forbidden-annotations-regex-match")
|
|
|
|
NamespaceCreation(ns, tnt.Spec.Owners[0].UserSpec, defaultTimeoutInterval).Should(Succeed())
|
|
rbacPatch(ns.GetName())
|
|
Consistently(func() error {
|
|
if err := k8sClient.Get(context.Background(), types.NamespacedName{Name: ns.GetName()}, ns); err != nil {
|
|
return nil
|
|
}
|
|
|
|
ns.SetAnnotations(map[string]string{"gatsby-foo": "bar"})
|
|
|
|
_, err := cs.CoreV1().Namespaces().Update(context.Background(), ns, metav1.UpdateOptions{})
|
|
|
|
return err
|
|
}, 10*time.Second, time.Second).ShouldNot(Succeed())
|
|
})
|
|
})
|
|
})
|