mirror of
https://github.com/vmware-tanzu/velero.git
synced 2026-02-09 21:40:17 +00:00
1. In data movement scenario, volumesnapshotcontent by Velero backup will be deleted instead of retained in CSI scenaito, so add a checkpoint for data movement scenario to verify no volumesnapshotcontent left after Velero backup; 2. Fix global context varaible issue, context varaible is not effective due to it's initialized right after the very beginning of all tests instead of beginning of each test, so if someone script a new E2E test and did not overwrite it in the test body, then it will fail the test if it was triggerd one hour later; 3. Due to CSI plugin is deprecated, it breaked down migration tests, because v1.13 still needs to install CSI plugin for the test. Signed-off-by: danfengl <danfengl@vmware.com>
184 lines
6.4 KiB
Go
184 lines
6.4 KiB
Go
/*
|
|
Copyright the Velero contributors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the Licensm.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apachm.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the Licensm.
|
|
*/
|
|
|
|
/*
|
|
Copyright 2021 the Velero contributors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package basic
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
. "github.com/vmware-tanzu/velero/test/e2e/test"
|
|
. "github.com/vmware-tanzu/velero/test/util/k8s"
|
|
)
|
|
|
|
type RBACCase struct {
|
|
TestCase
|
|
}
|
|
|
|
func (r *RBACCase) Init() error {
|
|
r.TestCase.Init()
|
|
r.CaseBaseName = "rabc-" + r.UUIDgen
|
|
r.BackupName = "backup-" + r.CaseBaseName
|
|
r.RestoreName = "restore-" + r.CaseBaseName
|
|
r.NamespacesTotal = 1
|
|
r.NSIncluded = &[]string{}
|
|
|
|
for nsNum := 0; nsNum < r.NamespacesTotal; nsNum++ {
|
|
createNSName := fmt.Sprintf("%s-%00000d", r.CaseBaseName, nsNum)
|
|
*r.NSIncluded = append(*r.NSIncluded, createNSName)
|
|
}
|
|
r.TestMsg = &TestMSG{
|
|
Desc: "Backup/restore of Namespaced Scoped and Cluster Scoped RBAC",
|
|
Text: "should be successfully backed up and restored",
|
|
FailedMSG: "Failed to successfully backup and restore RBAC",
|
|
}
|
|
r.BackupArgs = []string{
|
|
"create", "--namespace", r.VeleroCfg.VeleroNamespace, "backup", r.BackupName,
|
|
"--include-namespaces", strings.Join(*r.NSIncluded, ","),
|
|
"--default-volumes-to-fs-backup", "--wait",
|
|
}
|
|
r.RestoreArgs = []string{
|
|
"create", "--namespace", r.VeleroCfg.VeleroNamespace, "restore", r.RestoreName,
|
|
"--from-backup", r.BackupName, "--wait",
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (r *RBACCase) CreateResources() error {
|
|
for nsNum := 0; nsNum < r.NamespacesTotal; nsNum++ {
|
|
createNSName := fmt.Sprintf("%s-%00000d", r.CaseBaseName, nsNum)
|
|
fmt.Printf("Creating namespaces ...%s\n", createNSName)
|
|
if err := CreateNamespace(r.Ctx, r.Client, createNSName); err != nil {
|
|
return errors.Wrapf(err, "Failed to create namespace %s", createNSName)
|
|
}
|
|
serviceAccountName := fmt.Sprintf("service-account-%s-%00000d", r.CaseBaseName, nsNum)
|
|
fmt.Printf("Creating service account ...%s\n", createNSName)
|
|
if err := CreateServiceAccount(r.Ctx, r.Client, createNSName, serviceAccountName); err != nil {
|
|
return errors.Wrapf(err, "Failed to create service account %s", serviceAccountName)
|
|
}
|
|
clusterRoleName := fmt.Sprintf("clusterrole-%s-%00000d", r.CaseBaseName, nsNum)
|
|
clusterRoleBindingName := fmt.Sprintf("clusterrolebinding-%s-%00000d", r.CaseBaseName, nsNum)
|
|
if err := CreateRBACWithBindingSA(r.Ctx, r.Client, createNSName, serviceAccountName, clusterRoleName, clusterRoleBindingName); err != nil {
|
|
return errors.Wrapf(err, "Failed to create cluster role %s with role binding %s", clusterRoleName, clusterRoleBindingName)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (r *RBACCase) Verify() error {
|
|
for nsNum := 0; nsNum < r.NamespacesTotal; nsNum++ {
|
|
checkNSName := fmt.Sprintf("%s-%00000d", r.CaseBaseName, nsNum)
|
|
checkServiceAccountName := fmt.Sprintf("service-account-%s-%00000d", r.CaseBaseName, nsNum)
|
|
checkClusterRoleName := fmt.Sprintf("clusterrole-%s-%00000d", r.CaseBaseName, nsNum)
|
|
checkClusterRoleBindingName := fmt.Sprintf("clusterrolebinding-%s-%00000d", r.CaseBaseName, nsNum)
|
|
checkNS, err := GetNamespace(r.Ctx, r.Client, checkNSName)
|
|
if err != nil {
|
|
return errors.Wrapf(err, "Could not retrieve test namespace %s", checkNSName)
|
|
}
|
|
if checkNS.Name != checkNSName {
|
|
return errors.Errorf("Retrieved namespace for %s has name %s instead", checkNSName, checkNS.Name)
|
|
}
|
|
|
|
//getting service account from the restore
|
|
checkSA, err := GetServiceAccount(r.Ctx, r.Client, checkNSName, checkServiceAccountName)
|
|
|
|
if err != nil {
|
|
return errors.Wrapf(err, "Could not retrieve test service account %s", checkSA)
|
|
}
|
|
|
|
if checkSA.Name != checkServiceAccountName {
|
|
return errors.Errorf("Retrieved service account for %s has name %s instead", checkServiceAccountName, checkSA.Name)
|
|
}
|
|
|
|
//getting cluster role from the restore
|
|
checkClusterRole, err := GetClusterRole(r.Ctx, r.Client, checkClusterRoleName)
|
|
|
|
if err != nil {
|
|
return errors.Wrapf(err, "Could not retrieve test cluster role %s", checkClusterRole)
|
|
}
|
|
|
|
if checkSA.Name != checkServiceAccountName {
|
|
return errors.Errorf("Retrieved cluster role for %s has name %s instead", checkClusterRoleName, checkClusterRole.Name)
|
|
}
|
|
|
|
//getting cluster role binding from the restore
|
|
checkClusterRoleBinding, err := GetClusterRoleBinding(r.Ctx, r.Client, checkClusterRoleBindingName)
|
|
|
|
if err != nil {
|
|
return errors.Wrapf(err, "Could not retrieve test cluster role binding %s", checkClusterRoleBinding)
|
|
}
|
|
|
|
if checkClusterRoleBinding.Name != checkClusterRoleBindingName {
|
|
return errors.Errorf("Retrieved cluster role binding for %s has name %s instead", checkClusterRoleBindingName, checkClusterRoleBinding.Name)
|
|
}
|
|
|
|
//check if the role binding maps to service account
|
|
checkSubjects := checkClusterRoleBinding.Subjects[0].Name
|
|
|
|
if checkSubjects != checkServiceAccountName {
|
|
return errors.Errorf("Retrieved cluster role binding for %s has name %s instead", checkServiceAccountName, checkSubjects)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (r *RBACCase) Destroy() error {
|
|
//cleanup clusterrole
|
|
err := CleanupClusterRole(r.Ctx, r.Client, r.CaseBaseName)
|
|
if err != nil {
|
|
return errors.Wrap(err, "Could not cleanup clusterroles")
|
|
}
|
|
|
|
//cleanup cluster rolebinding
|
|
err = CleanupClusterRoleBinding(r.Ctx, r.Client, r.CaseBaseName)
|
|
if err != nil {
|
|
return errors.Wrap(err, "Could not cleanup clusterrolebindings")
|
|
}
|
|
|
|
err = CleanupNamespacesWithPoll(r.Ctx, r.Client, r.CaseBaseName)
|
|
if err != nil {
|
|
return errors.Wrap(err, "Could cleanup retrieve namespaces")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (r *RBACCase) Clean() error {
|
|
if !r.VeleroCfg.Debug {
|
|
return r.Destroy()
|
|
}
|
|
return nil
|
|
}
|