mirror of
https://github.com/argoproj/argo-cd.git
synced 2026-02-20 01:28:45 +01:00
Signed-off-by: Drew Bailey <drew.bailey@airbnb.com> Co-authored-by: Drew Bailey <drew.bailey@airbnb.com>
357 lines
10 KiB
Go
357 lines
10 KiB
Go
package e2e
|
|
|
|
import (
|
|
"fmt"
|
|
"net/url"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
. "github.com/argoproj/argo-cd/v3/pkg/apis/application/v1alpha1"
|
|
"github.com/argoproj/argo-cd/v3/test/e2e/fixture"
|
|
accountFixture "github.com/argoproj/argo-cd/v3/test/e2e/fixture/account"
|
|
"github.com/argoproj/argo-cd/v3/test/e2e/fixture/app"
|
|
clusterFixture "github.com/argoproj/argo-cd/v3/test/e2e/fixture/cluster"
|
|
"github.com/argoproj/argo-cd/v3/util/errors"
|
|
)
|
|
|
|
func TestClusterList(t *testing.T) {
|
|
fixture.SkipIfAlreadyRun(t)
|
|
defer fixture.RecordTestRun(t)
|
|
|
|
last := ""
|
|
expected := fmt.Sprintf(`SERVER NAME VERSION STATUS MESSAGE PROJECT
|
|
https://kubernetes.default.svc in-cluster %v Successful `, fixture.GetVersions(t).ServerVersion)
|
|
|
|
ctx := clusterFixture.Given(t)
|
|
ctx.Project(fixture.ProjectName)
|
|
|
|
// We need an application targeting the cluster, otherwise the test will
|
|
// fail if run isolated.
|
|
app.GivenWithSameState(ctx).
|
|
Path(guestbookPath).
|
|
When().
|
|
CreateApp()
|
|
|
|
tries := 25
|
|
for i := 0; i <= tries; i++ {
|
|
clusterFixture.GivenWithSameState(ctx).
|
|
When().
|
|
List().
|
|
Then().
|
|
AndCLIOutput(func(output string, _ error) {
|
|
last = output
|
|
})
|
|
if expected == last {
|
|
break
|
|
} else if i < tries {
|
|
// We retry with a simple backoff
|
|
time.Sleep(time.Duration(i+1) * 100 * time.Millisecond)
|
|
}
|
|
}
|
|
assert.Equal(t, expected, last)
|
|
}
|
|
|
|
func TestClusterAdd(t *testing.T) {
|
|
ctx := clusterFixture.Given(t)
|
|
ctx.Project(fixture.ProjectName).
|
|
Upsert(true).
|
|
Server(KubernetesInternalAPIServerAddr).
|
|
When().
|
|
Create().
|
|
List().
|
|
Then().
|
|
AndCLIOutput(func(output string, _ error) {
|
|
assert.Contains(t, fixture.NormalizeOutput(output), fmt.Sprintf(`https://kubernetes.default.svc %s %v Successful %s`, ctx.GetName(), fixture.GetVersions(t).ServerVersion, fixture.ProjectName))
|
|
})
|
|
}
|
|
|
|
func TestClusterAddPermissionDenied(t *testing.T) {
|
|
ctx := accountFixture.Given(t)
|
|
ctx.Name("test").
|
|
When().
|
|
Create().
|
|
Login().
|
|
SetPermissions([]fixture.ACL{}, "org-admin")
|
|
|
|
clusterFixture.
|
|
GivenWithSameState(ctx).
|
|
Project(fixture.ProjectName).
|
|
Upsert(true).
|
|
Server(KubernetesInternalAPIServerAddr).
|
|
When().
|
|
IgnoreErrors().
|
|
Create().
|
|
Then().
|
|
AndCLIOutput(func(_ string, err error) {
|
|
assert.ErrorContains(t, err, "PermissionDenied desc = permission denied")
|
|
})
|
|
}
|
|
|
|
func TestClusterAddAllowed(t *testing.T) {
|
|
accountCtx := accountFixture.Given(t)
|
|
accountCtx.Name("test").
|
|
When().
|
|
Create().
|
|
Login().
|
|
SetPermissions([]fixture.ACL{
|
|
{
|
|
Resource: "clusters",
|
|
Action: "create",
|
|
Scope: fixture.ProjectName + "/*",
|
|
},
|
|
{
|
|
Resource: "clusters",
|
|
Action: "get",
|
|
Scope: fixture.ProjectName + "/*",
|
|
},
|
|
}, "org-admin")
|
|
|
|
ctx := clusterFixture.GivenWithSameState(accountCtx)
|
|
ctx.Project(fixture.ProjectName).
|
|
Project(fixture.ProjectName).
|
|
Upsert(true).
|
|
Server(KubernetesInternalAPIServerAddr).
|
|
When().
|
|
Create().
|
|
List().
|
|
Then().
|
|
AndCLIOutput(func(output string, _ error) {
|
|
assert.Contains(t, fixture.NormalizeOutput(output), fmt.Sprintf(`https://kubernetes.default.svc %s %v Successful %s`, ctx.GetName(), fixture.GetVersions(t).ServerVersion, fixture.ProjectName))
|
|
})
|
|
}
|
|
|
|
func TestClusterListDenied(t *testing.T) {
|
|
ctx := accountFixture.Given(t)
|
|
ctx.Name("test").
|
|
When().
|
|
Create().
|
|
Login().
|
|
SetPermissions([]fixture.ACL{
|
|
{
|
|
Resource: "clusters",
|
|
Action: "create",
|
|
Scope: fixture.ProjectName + "/*",
|
|
},
|
|
}, "org-admin")
|
|
|
|
clusterFixture.
|
|
GivenWithSameState(ctx).
|
|
Project(fixture.ProjectName).
|
|
Upsert(true).
|
|
Server(KubernetesInternalAPIServerAddr).
|
|
When().
|
|
Create().
|
|
List().
|
|
Then().
|
|
AndCLIOutput(func(output string, _ error) {
|
|
assert.Equal(t, "SERVER NAME VERSION STATUS MESSAGE PROJECT", output)
|
|
})
|
|
}
|
|
|
|
func TestClusterSet(t *testing.T) {
|
|
ctx := clusterFixture.Given(t)
|
|
ctx.Project(fixture.ProjectName).
|
|
Namespaces([]string{"namespace-edit-1", "namespace-edit-2"}).
|
|
Server(KubernetesInternalAPIServerAddr).
|
|
When().
|
|
Create().
|
|
SetNamespaces().
|
|
GetByName().
|
|
Then().
|
|
AndCLIOutput(func(output string, _ error) {
|
|
assert.Contains(t, output, "namespace-edit-1")
|
|
assert.Contains(t, output, "namespace-edit-2")
|
|
})
|
|
}
|
|
|
|
func TestClusterGet(t *testing.T) {
|
|
fixture.SkipIfAlreadyRun(t)
|
|
fixture.EnsureCleanState(t)
|
|
defer fixture.RecordTestRun(t)
|
|
output := errors.NewHandler(t).FailOnErr(fixture.RunCli("cluster", "get", "https://kubernetes.default.svc")).(string)
|
|
|
|
assert.Contains(t, output, "name: in-cluster")
|
|
assert.Contains(t, output, "server: https://kubernetes.default.svc")
|
|
assert.Contains(t, output, fmt.Sprintf(`serverVersion: "%v"`, fixture.GetVersions(t).ServerVersion))
|
|
assert.Contains(t, output, `config:
|
|
tlsClientConfig:
|
|
insecure: false`)
|
|
|
|
assert.Contains(t, output, `status: Successful`)
|
|
}
|
|
|
|
func TestClusterNameInRestAPI(t *testing.T) {
|
|
fixture.EnsureCleanState(t)
|
|
|
|
var cluster Cluster
|
|
err := fixture.DoHttpJsonRequest("GET", "/api/v1/clusters/in-cluster?id.type=name", &cluster)
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, "in-cluster", cluster.Name)
|
|
assert.Contains(t, cluster.Server, "https://kubernetes.default.svc")
|
|
|
|
err = fixture.DoHttpJsonRequest("PUT",
|
|
"/api/v1/clusters/in-cluster?id.type=name&updatedFields=labels", &cluster, []byte(`{"labels":{"test": "val"}}`)...)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, map[string]string{"test": "val"}, cluster.Labels)
|
|
}
|
|
|
|
func TestClusterURLInRestAPI(t *testing.T) {
|
|
fixture.EnsureCleanState(t)
|
|
|
|
clusterURL := url.QueryEscape(KubernetesInternalAPIServerAddr)
|
|
|
|
var cluster Cluster
|
|
err := fixture.DoHttpJsonRequest("GET", "/api/v1/clusters/"+clusterURL, &cluster)
|
|
require.NoError(t, err)
|
|
|
|
assert.Equal(t, "in-cluster", cluster.Name)
|
|
assert.Contains(t, cluster.Server, "https://kubernetes.default.svc")
|
|
|
|
err = fixture.DoHttpJsonRequest("PUT",
|
|
fmt.Sprintf("/api/v1/clusters/%s?&updatedFields=labels", clusterURL), &cluster, []byte(`{"labels":{"test": "val"}}`)...)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, map[string]string{"test": "val"}, cluster.Labels)
|
|
}
|
|
|
|
func TestClusterSkipReconcileAnnotation(t *testing.T) {
|
|
fixture.EnsureCleanState(t)
|
|
|
|
clusterURL := url.QueryEscape(KubernetesInternalAPIServerAddr)
|
|
|
|
var cluster Cluster
|
|
err := fixture.DoHttpJsonRequest("PUT",
|
|
fmt.Sprintf("/api/v1/clusters/%s?updatedFields=annotations", clusterURL),
|
|
&cluster,
|
|
fmt.Appendf(nil, `{"annotations":{%q:"true"}}`, "argocd.argoproj.io/skip-reconcile")...)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, "true", cluster.Annotations["argocd.argoproj.io/skip-reconcile"])
|
|
|
|
var cluster2 Cluster
|
|
err = fixture.DoHttpJsonRequest("GET", "/api/v1/clusters/"+clusterURL, &cluster2)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, "in-cluster", cluster2.Name)
|
|
assert.Equal(t, "true", cluster2.Annotations["argocd.argoproj.io/skip-reconcile"])
|
|
|
|
err = fixture.DoHttpJsonRequest("PUT",
|
|
fmt.Sprintf("/api/v1/clusters/%s?updatedFields=annotations", clusterURL),
|
|
&cluster,
|
|
[]byte(`{"annotations":{}}`)...)
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
func TestClusterDeleteDenied(t *testing.T) {
|
|
ctx := accountFixture.Given(t)
|
|
ctx.Name("test").
|
|
When().
|
|
Create().
|
|
Login().
|
|
SetPermissions([]fixture.ACL{
|
|
{
|
|
Resource: "clusters",
|
|
Action: "create",
|
|
Scope: fixture.ProjectName + "/*",
|
|
},
|
|
{
|
|
Resource: "clusters",
|
|
Action: "get",
|
|
Scope: fixture.ProjectName + "/*",
|
|
},
|
|
}, "org-admin")
|
|
|
|
// Attempt to remove cluster creds by name
|
|
clusterFixture.
|
|
GivenWithSameState(ctx).
|
|
Project(fixture.ProjectName).
|
|
Upsert(true).
|
|
Server(KubernetesInternalAPIServerAddr).
|
|
When().
|
|
Create().
|
|
DeleteByName().
|
|
Then().
|
|
AndCLIOutput(func(_ string, err error) {
|
|
assert.ErrorContains(t, err, "PermissionDenied desc = permission denied")
|
|
})
|
|
|
|
// Attempt to remove cluster creds by server
|
|
clusterFixture.
|
|
GivenWithSameState(ctx).
|
|
Project(fixture.ProjectName).
|
|
Upsert(true).
|
|
Server(KubernetesInternalAPIServerAddr).
|
|
When().
|
|
Create().
|
|
DeleteByServer().
|
|
Then().
|
|
AndCLIOutput(func(_ string, err error) {
|
|
assert.ErrorContains(t, err, "PermissionDenied desc = permission denied")
|
|
})
|
|
}
|
|
|
|
func TestClusterDelete(t *testing.T) {
|
|
ctx := clusterFixture.Given(t)
|
|
accountFixture.GivenWithSameState(ctx).
|
|
When().
|
|
Create().
|
|
Login().
|
|
SetPermissions([]fixture.ACL{
|
|
{
|
|
Resource: "clusters",
|
|
Action: "create",
|
|
Scope: fixture.ProjectName + "/*",
|
|
},
|
|
{
|
|
Resource: "clusters",
|
|
Action: "get",
|
|
Scope: fixture.ProjectName + "/*",
|
|
},
|
|
{
|
|
Resource: "clusters",
|
|
Action: "delete",
|
|
Scope: fixture.ProjectName + "/*",
|
|
},
|
|
}, "org-admin")
|
|
|
|
clstAction := ctx.
|
|
Project(fixture.ProjectName).
|
|
Upsert(true).
|
|
Server(KubernetesInternalAPIServerAddr).
|
|
When().
|
|
CreateWithRBAC()
|
|
clstAction.
|
|
Then().
|
|
Expect().
|
|
AndCLIOutput(func(_ string, err error) {
|
|
assert.NoError(t, err)
|
|
})
|
|
|
|
// Check that RBAC is created
|
|
_, err := fixture.Run("", "kubectl", "get", "serviceaccount", "argocd-manager", "-n", "kube-system")
|
|
require.NoError(t, err, "Expected no error from not finding serviceaccount argocd-manager")
|
|
|
|
_, err = fixture.Run("", "kubectl", "get", "clusterrole", "argocd-manager-role")
|
|
require.NoError(t, err, "Expected no error from not finding clusterrole argocd-manager-role")
|
|
|
|
_, err = fixture.Run("", "kubectl", "get", "clusterrolebinding", "argocd-manager-role-binding")
|
|
require.NoError(t, err, "Expected no error from not finding clusterrolebinding argocd-manager-role-binding")
|
|
|
|
clstAction.DeleteByName().
|
|
Then().
|
|
AndCLIOutput(func(output string, _ error) {
|
|
assert.Equal(t, fmt.Sprintf("Cluster '%s' removed", ctx.GetName()), output)
|
|
})
|
|
|
|
// Check that RBAC is removed after delete
|
|
output, err := fixture.Run("", "kubectl", "get", "serviceaccount", "argocd-manager", "-n", "kube-system")
|
|
require.Error(t, err, "Expected error from not finding serviceaccount argocd-manager but got:\n%s", output)
|
|
|
|
output, err = fixture.Run("", "kubectl", "get", "clusterrole", "argocd-manager-role")
|
|
require.Error(t, err, "Expected error from not finding clusterrole argocd-manager-role but got:\n%s", output)
|
|
|
|
output, err = fixture.Run("", "kubectl", "get", "clusterrolebinding", "argocd-manager-role-binding")
|
|
assert.Error(t, err, "Expected error from not finding clusterrolebinding argocd-manager-role-binding but got:\n%s", output)
|
|
}
|