mirror of
https://github.com/projectcapsule/capsule.git
synced 2026-02-14 18:09:58 +00:00
250 lines
8.2 KiB
Go
250 lines
8.2 KiB
Go
// Copyright 2020-2023 Project Capsule Authors.
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
|
|
package e2e
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/projectcapsule/capsule/pkg/api"
|
|
|
|
. "github.com/onsi/ginkgo/v2"
|
|
. "github.com/onsi/gomega"
|
|
corev1 "k8s.io/api/core/v1"
|
|
networkingv1 "k8s.io/api/networking/v1"
|
|
"k8s.io/apimachinery/pkg/api/resource"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
"sigs.k8s.io/controller-runtime/pkg/client"
|
|
|
|
capsulev1beta2 "github.com/projectcapsule/capsule/api/v1beta2"
|
|
)
|
|
|
|
var _ = Describe("changing Tenant managed Kubernetes resources", Label("tenant", "managed", "current"), func() {
|
|
tnt := &capsulev1beta2.Tenant{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "tenant-resources-changes",
|
|
},
|
|
Spec: capsulev1beta2.TenantSpec{
|
|
Owners: api.OwnerListSpec{
|
|
{
|
|
CoreOwnerSpec: api.CoreOwnerSpec{
|
|
UserSpec: api.UserSpec{
|
|
Name: "laura",
|
|
Kind: "User",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
LimitRanges: api.LimitRangesSpec{Items: []corev1.LimitRangeSpec{
|
|
{
|
|
Limits: []corev1.LimitRangeItem{
|
|
{
|
|
Type: corev1.LimitTypePod,
|
|
Min: map[corev1.ResourceName]resource.Quantity{
|
|
corev1.ResourceCPU: resource.MustParse("50m"),
|
|
corev1.ResourceMemory: resource.MustParse("5Mi"),
|
|
},
|
|
Max: map[corev1.ResourceName]resource.Quantity{
|
|
corev1.ResourceCPU: resource.MustParse("1"),
|
|
corev1.ResourceMemory: resource.MustParse("1Gi"),
|
|
},
|
|
},
|
|
{
|
|
Type: corev1.LimitTypeContainer,
|
|
Default: map[corev1.ResourceName]resource.Quantity{
|
|
corev1.ResourceCPU: resource.MustParse("200m"),
|
|
corev1.ResourceMemory: resource.MustParse("100Mi"),
|
|
},
|
|
DefaultRequest: map[corev1.ResourceName]resource.Quantity{
|
|
corev1.ResourceCPU: resource.MustParse("100m"),
|
|
corev1.ResourceMemory: resource.MustParse("10Mi"),
|
|
},
|
|
Min: map[corev1.ResourceName]resource.Quantity{
|
|
corev1.ResourceCPU: resource.MustParse("50m"),
|
|
corev1.ResourceMemory: resource.MustParse("5Mi"),
|
|
},
|
|
Max: map[corev1.ResourceName]resource.Quantity{
|
|
corev1.ResourceCPU: resource.MustParse("1"),
|
|
corev1.ResourceMemory: resource.MustParse("1Gi"),
|
|
},
|
|
},
|
|
{
|
|
Type: corev1.LimitTypePersistentVolumeClaim,
|
|
Min: map[corev1.ResourceName]resource.Quantity{
|
|
corev1.ResourceStorage: resource.MustParse("1Gi"),
|
|
},
|
|
Max: map[corev1.ResourceName]resource.Quantity{
|
|
corev1.ResourceStorage: resource.MustParse("10Gi"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
NetworkPolicies: api.NetworkPolicySpec{Items: []networkingv1.NetworkPolicySpec{
|
|
{
|
|
Ingress: []networkingv1.NetworkPolicyIngressRule{
|
|
{
|
|
From: []networkingv1.NetworkPolicyPeer{
|
|
{
|
|
NamespaceSelector: &metav1.LabelSelector{
|
|
MatchLabels: map[string]string{
|
|
"capsule.clastix.io/tenant": "tenant-resources",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
PodSelector: &metav1.LabelSelector{},
|
|
},
|
|
{
|
|
IPBlock: &networkingv1.IPBlock{
|
|
CIDR: "192.168.0.0/12",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
Egress: []networkingv1.NetworkPolicyEgressRule{
|
|
{
|
|
To: []networkingv1.NetworkPolicyPeer{
|
|
{
|
|
IPBlock: &networkingv1.IPBlock{
|
|
CIDR: "0.0.0.0/0",
|
|
Except: []string{
|
|
"192.168.0.0/12",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
PodSelector: metav1.LabelSelector{},
|
|
PolicyTypes: []networkingv1.PolicyType{
|
|
networkingv1.PolicyTypeIngress,
|
|
networkingv1.PolicyTypeEgress,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
NodeSelector: map[string]string{
|
|
"kubernetes.io/os": "linux",
|
|
},
|
|
ResourceQuota: api.ResourceQuotaSpec{Items: []corev1.ResourceQuotaSpec{
|
|
{
|
|
Hard: map[corev1.ResourceName]resource.Quantity{
|
|
corev1.ResourceLimitsCPU: resource.MustParse("8"),
|
|
corev1.ResourceLimitsMemory: resource.MustParse("16Gi"),
|
|
corev1.ResourceRequestsCPU: resource.MustParse("8"),
|
|
corev1.ResourceRequestsMemory: resource.MustParse("16Gi"),
|
|
},
|
|
Scopes: []corev1.ResourceQuotaScope{
|
|
corev1.ResourceQuotaScopeNotTerminating,
|
|
},
|
|
},
|
|
{
|
|
Hard: map[corev1.ResourceName]resource.Quantity{
|
|
corev1.ResourcePods: resource.MustParse("10"),
|
|
},
|
|
},
|
|
{
|
|
Hard: map[corev1.ResourceName]resource.Quantity{
|
|
corev1.ResourceRequestsStorage: resource.MustParse("100Gi"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
nsl := []string{"fire", "walk", "with", "me"}
|
|
JustBeforeEach(func() {
|
|
EventuallyCreation(func() error {
|
|
tnt.ResourceVersion = ""
|
|
return k8sClient.Create(context.TODO(), tnt)
|
|
}).Should(Succeed())
|
|
By("creating the Namespaces", func() {
|
|
for _, i := range nsl {
|
|
ns := NewNamespace(i)
|
|
NamespaceCreation(ns, tnt.Spec.Owners[0].UserSpec, defaultTimeoutInterval).Should(Succeed())
|
|
TenantNamespaceList(tnt, defaultTimeoutInterval).Should(ContainElement(ns.GetName()))
|
|
}
|
|
})
|
|
})
|
|
JustAfterEach(func() {
|
|
Expect(k8sClient.Delete(context.TODO(), tnt)).Should(Succeed())
|
|
})
|
|
It("should reapply the original resources upon third party change", func() {
|
|
for _, ns := range nsl {
|
|
By("changing Limit Range", func() {
|
|
for i, s := range tnt.Spec.LimitRanges.Items {
|
|
n := fmt.Sprintf("capsule-%s-%d", tnt.GetName(), i)
|
|
lr := &corev1.LimitRange{}
|
|
Eventually(func() error {
|
|
return k8sClient.Get(context.TODO(), types.NamespacedName{Name: n, Namespace: ns}, lr)
|
|
}, defaultTimeoutInterval, defaultPollInterval).Should(Succeed())
|
|
|
|
cs := ownerClient(tnt.Spec.Owners[0].UserSpec)
|
|
err := cs.CoreV1().LimitRanges(ns).Delete(context.TODO(), n, metav1.DeleteOptions{})
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
c := lr.DeepCopy()
|
|
c.Spec.Limits = []corev1.LimitRangeItem{}
|
|
Expect(k8sClient.Update(context.TODO(), c, &client.UpdateOptions{})).Should(Succeed())
|
|
|
|
Eventually(func() corev1.LimitRangeSpec {
|
|
Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: n, Namespace: ns}, lr)).Should(Succeed())
|
|
return lr.Spec
|
|
}, defaultTimeoutInterval, defaultPollInterval).Should(Equal(s))
|
|
}
|
|
})
|
|
By("changing Network Policy", func() {
|
|
for i, s := range tnt.Spec.NetworkPolicies.Items {
|
|
n := fmt.Sprintf("capsule-%s-%d", tnt.GetName(), i)
|
|
np := &networkingv1.NetworkPolicy{}
|
|
Eventually(func() error {
|
|
return k8sClient.Get(context.TODO(), types.NamespacedName{Name: n, Namespace: ns}, np)
|
|
}, defaultTimeoutInterval, defaultPollInterval).Should(Succeed())
|
|
Expect(np.Spec).Should(Equal(s))
|
|
|
|
cs := ownerClient(tnt.Spec.Owners[0].UserSpec)
|
|
err := cs.NetworkingV1().NetworkPolicies(ns).Delete(context.TODO(), n, metav1.DeleteOptions{})
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
c := np.DeepCopy()
|
|
c.Spec.Egress = []networkingv1.NetworkPolicyEgressRule{}
|
|
c.Spec.Ingress = []networkingv1.NetworkPolicyIngressRule{}
|
|
Expect(k8sClient.Update(context.TODO(), c, &client.UpdateOptions{})).Should(Succeed())
|
|
|
|
Eventually(func() networkingv1.NetworkPolicySpec {
|
|
Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: n, Namespace: ns}, np)).Should(Succeed())
|
|
return np.Spec
|
|
}, defaultTimeoutInterval, defaultPollInterval).Should(Equal(s))
|
|
}
|
|
})
|
|
By("changing Resource Quota", func() {
|
|
for i, s := range tnt.Spec.ResourceQuota.Items {
|
|
n := fmt.Sprintf("capsule-%s-%d", tnt.GetName(), i)
|
|
rq := &corev1.ResourceQuota{}
|
|
Eventually(func() error {
|
|
return k8sClient.Get(context.TODO(), types.NamespacedName{Name: n, Namespace: ns}, rq)
|
|
}, defaultTimeoutInterval, defaultPollInterval).Should(Succeed())
|
|
|
|
cs := ownerClient(tnt.Spec.Owners[0].UserSpec)
|
|
err := cs.CoreV1().ResourceQuotas(ns).Delete(context.TODO(), n, metav1.DeleteOptions{})
|
|
Expect(err).To(HaveOccurred())
|
|
|
|
c := rq.DeepCopy()
|
|
c.Spec.Hard = map[corev1.ResourceName]resource.Quantity{}
|
|
Expect(k8sClient.Update(context.TODO(), c, &client.UpdateOptions{})).Should(Succeed())
|
|
|
|
Eventually(func() corev1.ResourceQuotaSpec {
|
|
Expect(k8sClient.Get(context.TODO(), types.NamespacedName{Name: n, Namespace: ns}, rq)).Should(Succeed())
|
|
return rq.Spec
|
|
}, defaultTimeoutInterval, defaultPollInterval).Should(Equal(s))
|
|
}
|
|
})
|
|
}
|
|
})
|
|
})
|