mirror of
https://github.com/FairwindsOps/polaris.git
synced 2026-02-14 18:09:54 +00:00
* Bump lins * Code refactoring * Fixign issues * Fixing issues * Fixing issues * Fixing issues * [WIP] * [WIP] * [WIP] * Trying to fix tests * Trying to fix tests * Fixing issues * Fixing issues * Fixing issues * Fixing issues * Fixing issues * Fixing issues * Revert go mod * Revert go mod * Revert go mod * Revert go mod * Fixing issues * Fixing issue * Code refactoring * Updating json schema version * Updating json schema version
147 lines
4.3 KiB
Go
147 lines
4.3 KiB
Go
// Copyright 2022 FairwindsOps, Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package test
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"runtime"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/fairwindsops/polaris/pkg/config"
|
|
"github.com/fairwindsops/polaris/pkg/kube"
|
|
"github.com/fairwindsops/polaris/pkg/validator"
|
|
)
|
|
|
|
type testCase struct {
|
|
check string
|
|
filename string
|
|
resources *kube.ResourceProvider
|
|
failure bool
|
|
config config.Configuration
|
|
manifest string
|
|
}
|
|
|
|
func initTestCases() ([]testCase, map[string]string, map[string][]testCase) {
|
|
checkToTest := os.Getenv("POLARIS_CHECK_TEST") // if set, only run tests for this check
|
|
_, baseDir, _, _ := runtime.Caller(0)
|
|
baseDir = filepath.Dir(baseDir) + "/checks"
|
|
dirs, err := os.ReadDir(baseDir)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
if checkToTest != "" {
|
|
fmt.Printf("POLARIS_CHECK_TEST is set... Running tests for '%s' only\n", checkToTest)
|
|
}
|
|
var testCases = []testCase{}
|
|
var mutatedYamlContentMap = map[string]string{}
|
|
var mutationTestCasesMap = map[string][]testCase{}
|
|
for _, dir := range dirs {
|
|
check := dir.Name()
|
|
if checkToTest != "" && checkToTest != check {
|
|
continue
|
|
}
|
|
if strings.HasPrefix(check, "_") {
|
|
continue // skip directories starting with _
|
|
}
|
|
checkDir := baseDir + "/" + check
|
|
cases, err := os.ReadDir(checkDir)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
configString := "checks:\n " + check + ": danger"
|
|
checkPath := checkDir + "/check.yaml"
|
|
customCheckContent, err := os.ReadFile(checkPath)
|
|
if err == nil {
|
|
lines := strings.Split(string(customCheckContent), "\n")
|
|
for idx := range lines {
|
|
lines[idx] = " " + lines[idx]
|
|
}
|
|
configString += "\ncustomChecks:\n " + check + ":\n"
|
|
configString += strings.Join(lines, "\n")
|
|
}
|
|
c, err := config.Parse([]byte(configString))
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
for _, tc := range cases {
|
|
if tc.Name() == "check.yaml" {
|
|
continue
|
|
}
|
|
yamlContent, err := os.ReadFile(checkDir + "/" + tc.Name())
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
resourceFilename := strings.Replace(tc.Name(), "mutated", "failure", -1)
|
|
|
|
resources, err := kube.CreateResourceProviderFromPath(checkDir + "/" + resourceFilename)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
testcase := testCase{
|
|
filename: tc.Name(),
|
|
check: check,
|
|
resources: resources,
|
|
failure: strings.Contains(resourceFilename, "failure"),
|
|
config: c,
|
|
manifest: string(yamlContent),
|
|
}
|
|
|
|
if strings.Contains(tc.Name(), "mutated") {
|
|
key := fmt.Sprintf("%s/%s", check, tc.Name())
|
|
mutatedYamlContentMap[key] = string(yamlContent)
|
|
testCases, ok := mutationTestCasesMap[check]
|
|
if !ok {
|
|
testCases = []testCase{}
|
|
}
|
|
testCases = append(testCases, testcase)
|
|
mutationTestCasesMap[check] = testCases
|
|
} else {
|
|
testCases = append(testCases, testcase)
|
|
}
|
|
}
|
|
}
|
|
return testCases, mutatedYamlContentMap, mutationTestCasesMap
|
|
}
|
|
|
|
func TestChecks(t *testing.T) {
|
|
testCases, _, _ := initTestCases()
|
|
for _, tc := range testCases {
|
|
results, err := validator.ApplyAllSchemaChecksToResourceProvider(context.Background(), &tc.config, tc.resources)
|
|
if err != nil {
|
|
t.Fatalf("Error running checks: %v", err)
|
|
}
|
|
auditData := validator.AuditData{Results: results}
|
|
summary := auditData.GetSummary()
|
|
total := summary.Successes + summary.Dangers
|
|
msg := fmt.Sprintf("Check %s ran %d times instead of 1", tc.check, total)
|
|
if assert.LessOrEqual(t, uint(1), total, msg) {
|
|
if tc.failure {
|
|
message := "Check " + tc.check + " passed unexpectedly for " + tc.filename
|
|
assert.LessOrEqual(t, uint(1), summary.Dangers, message)
|
|
} else {
|
|
message := "Check " + tc.check + " failed unexpectedly for " + tc.filename
|
|
assert.LessOrEqual(t, uint(1), summary.Successes, message)
|
|
assert.Equal(t, uint(0), summary.Dangers, message)
|
|
}
|
|
}
|
|
}
|
|
}
|