From d8bcb3ae45033d3e73c7e0e217376c55d2264794 Mon Sep 17 00:00:00 2001 From: Evgeny Uglov Date: Mon, 10 Jun 2024 21:41:00 +0000 Subject: [PATCH] [KRV-24554] Add auth CRDs step to the scenarios --- tests/e2e/steps/steps_def.go | 2 +- .../csm_authorization_proxy_server.yaml | 19 +++++ ...csm_authorization_proxy_server_alt_ns.yaml | 31 +++++++- ...horization_proxy_server_default_redis.yaml | 19 +++++ .../csm_authorization_proxy_server_ocp.yaml | 31 +++++++- tests/e2e/testfiles/values.yaml | 70 ++++++++++++++----- 6 files changed, 153 insertions(+), 19 deletions(-) diff --git a/tests/e2e/steps/steps_def.go b/tests/e2e/steps/steps_def.go index b056d418e..796f59ea2 100644 --- a/tests/e2e/steps/steps_def.go +++ b/tests/e2e/steps/steps_def.go @@ -1039,7 +1039,7 @@ func (step *Step) configureAuthorizationProxyServer(res Resource, driver string, } fmt.Printf("=== Generating Admin Token ===\n") - adminTkn := exec.Command("karavictl", + adminTkn := exec.Command("dellctl", "admin", "token", "--name", "Admin", "--jwt-signing-secret", "secret", diff --git a/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server.yaml b/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server.yaml index db8835322..bf350f2f1 100644 --- a/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server.yaml +++ b/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server.yaml @@ -42,11 +42,18 @@ spec: # enable: Enable/Disable csm-authorization proxy server enabled: true proxyService: dellemc/csm-authorization-proxy:v2.0.0-alpha + proxyServiceReplicas: 1 tenantService: dellemc/csm-authorization-tenant:v2.0.0-alpha + tenantServiceReplicas: 1 roleService: dellemc/csm-authorization-role:v2.0.0-alpha + roleServiceReplicas: 1 storageService: dellemc/csm-authorization-storage:v2.0.0-alpha + storageServiceReplicas: 1 opa: openpolicyagent/opa opaKubeMgmt: openpolicyagent/kube-mgmt:0.11 + authorizationController: dellemc/csm-authorization-controller:v2.0.0-alpha + authorizationControllerReplicas: 1 + leaderElection: true # certificate: base64-encoded certificate for cert/private-key pair -- add certificate here to use custom certificates # for self-signed certs, leave empty string @@ -92,6 +99,18 @@ spec: vaultRole: csm-authorization skipCertificateValidation: true kvEnginePath: secret + # certificate: base64-encoded certificate for cert/private-key pair -- add cert here to use custom certificates + # for self-signed certs, leave empty string + # Allowed values: string + certificate: "" + # privateKey: base64-encoded private key for cert/private-key pair -- add private key here to use custom certificates + # for self-signed certs, leave empty string + # Allowed values: string + privateKey: "" + # certificateAuthority: base64-encoded certificate authority for validating vault server certificate -- add certificate authority here to use custom certificates + # for self-signed certs, leave empty string + # Allowed values: string + certificateAuthority: "" --- apiVersion: v1 diff --git a/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_alt_ns.yaml b/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_alt_ns.yaml index 73757a80b..b8f5a2a3e 100644 --- a/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_alt_ns.yaml +++ b/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_alt_ns.yaml @@ -42,11 +42,18 @@ spec: # enable: Enable/Disable csm-authorization proxy server enabled: true proxyService: dellemc/csm-authorization-proxy:v2.0.0-alpha + proxyServiceReplicas: 1 tenantService: dellemc/csm-authorization-tenant:v2.0.0-alpha + tenantServiceReplicas: 1 roleService: dellemc/csm-authorization-role:v2.0.0-alpha + roleServiceReplicas: 1 storageService: dellemc/csm-authorization-storage:v2.0.0-alpha + storageServiceReplicas: 1 opa: openpolicyagent/opa opaKubeMgmt: openpolicyagent/kube-mgmt:0.11 + authorizationController: dellemc/csm-authorization-controller:v2.0.0-alpha + authorizationControllerReplicas: 1 + leaderElection: true # certificate: base64-encoded certificate for cert/private-key pair -- add certificate here to use custom certificates # for self-signed certs, leave empty string @@ -75,14 +82,36 @@ spec: annotations: {} - name: redis - redis: redis:6.0.8-alpine + redis: redis:7.2.4-alpine commander: rediscommander/redis-commander:latest # by default, csm-authorization will deploy a local (https://kubernetes.io/docs/concepts/storage/storage-classes/#local) volume for redis # to use a different storage class for redis, specify the name of the storage class # NOTE: the storage class must NOT be a storage class provisioned by a CSI driver using this installation of CSM Authorization # Default value: None + redisName: redis-csm + redisCommander: redicommander + sentinel: sentinel + redisReplicas: 5 storageclass: "" + - name: vault + vaultAddress: https://10.247.100.22:8400 + vaultRole: csm-authorization + skipCertificateValidation: true + kvEnginePath: secret + # certificate: base64-encoded certificate for cert/private-key pair -- add cert here to use custom certificates + # for self-signed certs, leave empty string + # Allowed values: string + certificate: "" + # privateKey: base64-encoded private key for cert/private-key pair -- add private key here to use custom certificates + # for self-signed certs, leave empty string + # Allowed values: string + privateKey: "" + # certificateAuthority: base64-encoded certificate authority for validating vault server certificate -- add certificate authority here to use custom certificates + # for self-signed certs, leave empty string + # Allowed values: string + certificateAuthority: "" + --- apiVersion: v1 kind: ConfigMap diff --git a/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_default_redis.yaml b/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_default_redis.yaml index 3554342de..dff237760 100644 --- a/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_default_redis.yaml +++ b/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_default_redis.yaml @@ -42,11 +42,18 @@ spec: # enable: Enable/Disable csm-authorization proxy server enabled: true proxyService: dellemc/csm-authorization-proxy:v2.0.0-alpha + proxyServiceReplicas: 1 tenantService: dellemc/csm-authorization-tenant:v2.0.0-alpha + tenantServiceReplicas: 1 roleService: dellemc/csm-authorization-role:v2.0.0-alpha + roleServiceReplicas: 1 storageService: dellemc/csm-authorization-storage:v2.0.0-alpha + storageServiceReplicas: 1 opa: openpolicyagent/opa opaKubeMgmt: openpolicyagent/kube-mgmt:0.11 + authorizationController: dellemc/csm-authorization-controller:v2.0.0-alpha + authorizationControllerReplicas: 1 + leaderElection: true # certificate: base64-encoded certificate for cert/private-key pair -- add certificate here to use custom certificates # for self-signed certs, leave empty string @@ -92,6 +99,18 @@ spec: vaultRole: csm-authorization skipCertificateValidation: true kvEnginePath: secret + # certificate: base64-encoded certificate for cert/private-key pair -- add cert here to use custom certificates + # for self-signed certs, leave empty string + # Allowed values: string + certificate: "" + # privateKey: base64-encoded private key for cert/private-key pair -- add private key here to use custom certificates + # for self-signed certs, leave empty string + # Allowed values: string + privateKey: "" + # certificateAuthority: base64-encoded certificate authority for validating vault server certificate -- add certificate authority here to use custom certificates + # for self-signed certs, leave empty string + # Allowed values: string + certificateAuthority: "" --- apiVersion: v1 diff --git a/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_ocp.yaml b/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_ocp.yaml index e2a37e8cd..35fbda147 100644 --- a/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_ocp.yaml +++ b/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_ocp.yaml @@ -42,11 +42,18 @@ spec: # enable: Enable/Disable csm-authorization proxy server enabled: true proxyService: dellemc/csm-authorization-proxy:v2.0.0-alpha + proxyServiceReplicas: 1 tenantService: dellemc/csm-authorization-tenant:v2.0.0-alpha + tenantServiceReplicas: 1 roleService: dellemc/csm-authorization-role:v2.0.0-alpha + roleServiceReplicas: 1 storageService: dellemc/csm-authorization-storage:v2.0.0-alpha + storageServiceReplicas: 1 opa: openpolicyagent/opa opaKubeMgmt: openpolicyagent/kube-mgmt:0.11 + authorizationController: dellemc/csm-authorization-controller:v2.0.0-alpha + authorizationControllerReplicas: 1 + leaderElection: true # certificate: base64-encoded certificate for cert/private-key pair -- add certificate here to use custom certificates # for self-signed certs, leave empty string @@ -75,14 +82,36 @@ spec: annotations: {} - name: redis - redis: redis:6.0.8-alpine + redis: redis:7.2.4-alpine commander: rediscommander/redis-commander:latest # by default, csm-authorization will deploy a local (https://kubernetes.io/docs/concepts/storage/storage-classes/#local) volume for redis # to use a different storage class for redis, specify the name of the storage class # NOTE: the storage class must NOT be a storage class provisioned by a CSI driver using this installation of CSM Authorization # Default value: None + redisName: redis-csm + redisCommander: redicommander + sentinel: sentinel + redisReplicas: 5 storageclass: "local-storage" + - name: vault + vaultAddress: https://10.0.0.1:8400 + vaultRole: csm-authorization + skipCertificateValidation: true + kvEnginePath: secret + # certificate: base64-encoded certificate for cert/private-key pair -- add cert here to use custom certificates + # for self-signed certs, leave empty string + # Allowed values: string + certificate: "" + # privateKey: base64-encoded private key for cert/private-key pair -- add private key here to use custom certificates + # for self-signed certs, leave empty string + # Allowed values: string + privateKey: "" + # certificateAuthority: base64-encoded certificate authority for validating vault server certificate -- add certificate authority here to use custom certificates + # for self-signed certs, leave empty string + # Allowed values: string + certificateAuthority: "" + --- apiVersion: v1 kind: ConfigMap diff --git a/tests/e2e/testfiles/values.yaml b/tests/e2e/testfiles/values.yaml index caf2280c7..8fc97158c 100644 --- a/tests/e2e/testfiles/values.yaml +++ b/tests/e2e/testfiles/values.yaml @@ -12,7 +12,7 @@ - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - "Configure authorization-proxy-server for [powerscale] for CR [1]" - # - "Configure authorization-proxy-server for [powerflex] for CR [1]" + - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Delete custom resource [1]" - "Delete Authorization CRDs [2]" @@ -29,60 +29,56 @@ - "Validate [storages] CRD for Authorization is installed" - "Delete Authorization CRDs [1]" -- scenario: "Install Authorization CRDs" - paths: - - "testfiles/authorization-templates/csm_authorization_crds.yaml" - modules: - - "authorizationproxyserver" - steps: - - "Given an environment with k8s or openshift, and CSM operator installed" - - "Install Authorization CRDs [1]" - - "Validate [csmroles] CRD for Authorization is installed" - - "Validate [csmtenants] CRD for Authorization is installed" - - "Validate [storages] CRD for Authorization is installed" - - "Delete Authorization CRDs [1]" - - scenario: "Install Authorization Proxy Server With Default Redis Storage Class" paths: - "testfiles/authorization-templates/csm_authorization_proxy_server_default_redis.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [2]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerscale]" - - "Configure authorization-proxy-server for [powerflex]" + - "Configure authorization-proxy-server for [powerscale] for CR [1]" + - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Delete custom resource [1]" + - "Delete Authorization CRDs [2]" - scenario: "Install Authorization Proxy Server with alternate namespace" paths: - "testfiles/authorization-templates/csm_authorization_proxy_server_alt_ns.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [2]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - "Configure authorization-proxy-server for [powerscale] for CR [1]" - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Delete custom resource [1]" + - "Delete Authorization CRDs [2]" - scenario: "Install Authorization Proxy Server with OpenShift default ingress controller" paths: - "testfiles/authorization-templates/csm_authorization_proxy_server_ocp.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [2]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - "Configure authorization-proxy-server for [powerscale] for CR [1]" - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Delete custom resource [1]" + - "Delete Authorization CRDs [2]" - scenario: "Install PowerScale Driver(Standalone)" paths: @@ -204,11 +200,13 @@ paths: - "testfiles/authorization-templates/csm_authorization_proxy_server.yaml" - "testfiles/storage_csm_powerscale_auth.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" - "authorization" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" @@ -226,6 +224,7 @@ - "Enable forceRemoveDriver on CR [2]" - "Delete custom resource [2]" - "Delete custom resource [1]" + - "Delete Authorization CRDs [3]" - "Restore template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] for [pscaleAuth]" - "Restore template [testfiles/powerscale-templates/karavi-authorization-config.json] for [pscaleAuthSidecar]" customTest: @@ -237,11 +236,13 @@ paths: - "testfiles/authorization-templates/csm_authorization_proxy_server.yaml" - "testfiles/storage_csm_powerscale.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" - "authorization" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" @@ -263,6 +264,7 @@ - "Enable forceRemoveDriver on CR [2]" - "Delete custom resource [2]" - "Delete custom resource [1]" + - "Delete Authorization CRDs [3]" - "Restore template [testfiles/powerscale-templates/powerscale-secret-template.yaml] for [pscale]" - "Restore template [testfiles/powerscale-templates/karavi-authorization-config.json] for [pscaleAuthSidecar]" customTest: @@ -337,11 +339,13 @@ paths: - "testfiles/authorization-templates/csm_authorization_proxy_server.yaml" - "testfiles/storage_csm_powerscale_auth.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" - "authorization" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" @@ -363,6 +367,7 @@ - "Enable forceRemoveDriver on CR [2]" - "Delete custom resource [2]" - "Delete custom resource [1]" + - "Delete Authorization CRDs [3]" - "Restore template [testfiles/powerscale-templates/powerscale-secret-template.yaml] for [pscale]" - "Restore template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] for [pscaleAuth]" - "Restore template [testfiles/powerscale-templates/karavi-authorization-config.json] for [pscaleAuthSidecar]" @@ -470,12 +475,14 @@ paths: - "testfiles/authorization-templates/csm_authorization_proxy_server.yaml" - "testfiles/storage_csm_powerscale_observability_auth.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" - "authorization" - "observability" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" @@ -494,6 +501,7 @@ - "Enable forceRemoveDriver on CR [2]" - "Delete custom resource [2]" - "Delete custom resource [1]" + - "Delete Authorization CRDs [3]" - "Restore template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" - "Restore template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] for [pscaleAuth]" - "Restore template [testfiles/powerscale-templates/karavi-authorization-config.json] for [pscaleAuthSidecar]" @@ -507,12 +515,14 @@ paths: - "testfiles/authorization-templates/csm_authorization_proxy_server.yaml" - "testfiles/storage_csm_powerscale.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" - "observability" - "authorization" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" @@ -539,6 +549,7 @@ - "Enable forceRemoveDriver on CR [2]" - "Delete custom resource [2]" - "Delete custom resource [1]" + - "Delete Authorization CRDs [3]" - "Restore template [testfiles/powerscale-templates/powerscale-secret-template.yaml] for [pscale]" - "Restore template [testfiles/powerscale-templates/karavi-authorization-config.json] for [pscaleAuthSidecar]" @@ -546,12 +557,14 @@ paths: - "testfiles/authorization-templates/csm_authorization_proxy_server.yaml" - "testfiles/storage_csm_powerscale_observability_auth.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" - "authorization" - "observability" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" @@ -579,6 +592,7 @@ - "Enable forceRemoveDriver on CR [2]" - "Delete custom resource [2]" - "Delete custom resource [1]" + - "Delete Authorization CRDs [3]" - "Restore template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" - "Restore template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] for [pscaleAuth]" - "Restore template [testfiles/powerscale-templates/karavi-authorization-config.json] for [pscaleAuthSidecar]" @@ -592,12 +606,14 @@ paths: - "testfiles/authorization-templates/csm_authorization_proxy_server.yaml" - "testfiles/storage_csm_powerscale_observability_auth.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" - "authorization" - "observability" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" @@ -625,6 +641,7 @@ - "Enable forceRemoveDriver on CR [2]" - "Delete custom resource [2]" - "Delete custom resource [1]" + - "Delete Authorization CRDs [3]" - "Restore template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" - "Restore template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] for [pscaleAuth]" - "Restore template [testfiles/powerscale-templates/karavi-authorization-config.json] for [pscaleAuthSidecar]" @@ -792,11 +809,13 @@ paths: - "testfiles/authorization-templates/csm_authorization_proxy_server.yaml" - "testfiles/storage_csm_powerflex_auth.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorization" - "authorizationproxyserver" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" @@ -815,6 +834,7 @@ - "Enable forceRemoveDriver on CR [2]" - "Delete custom resource [2]" - "Delete custom resource [1]" + - "Delete Authorization CRDs [3]" - "Restore template [testfiles/powerflex-templates/csm-authorization-config.json] for [pflexAuthSidecar]" - "Restore template [testfiles/powerflex-templates/powerflex-secret-template.yaml] for [pflexAuth]" - "Restore template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" @@ -827,11 +847,13 @@ paths: - "testfiles/authorization-templates/csm_authorization_proxy_server.yaml" - "testfiles/storage_csm_powerflex.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" - "authorization" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" @@ -853,6 +875,7 @@ - "Enable forceRemoveDriver on CR [2]" - "Delete custom resource [1]" - "Delete custom resource [2]" + - "Delete Authorization CRDs [3]" - "Restore template [testfiles/powerflex-templates/powerflex-secret-template.yaml] for [pflexAuth]" - "Restore template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Restore template [testfiles/powerflex-templates/csm-authorization-config.json] for [pflexAuthSidecar]" @@ -865,11 +888,13 @@ paths: - "testfiles/authorization-templates/csm_authorization_proxy_server.yaml" - "testfiles/storage_csm_powerflex_auth.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorization" - "authorizationproxyserver" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" @@ -892,6 +917,7 @@ - "Enable forceRemoveDriver on CR [2]" - "Delete custom resource [1]" - "Delete custom resource [2]" + - "Delete Authorization CRDs [3]" - "Restore template [testfiles/powerflex-templates/powerflex-secret-template.yaml] for [pflex]" - "Restore template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Restore template [testfiles/powerflex-templates/csm-authorization-config.json] for [pflexAuthSidecar]" @@ -1073,12 +1099,14 @@ paths: - "testfiles/authorization-templates/csm_authorization_proxy_server.yaml" - "testfiles/storage_csm_powerflex.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" - "authorization" - "observability" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" @@ -1106,6 +1134,7 @@ - "Enable forceRemoveDriver on CR [2]" - "Delete custom resource [1]" - "Delete custom resource [2]" + - "Delete Authorization CRDs [3]" - "Restore template [testfiles/powerflex-templates/powerflex-secret-template.yaml] for [pflexAuth]" - "Restore template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Restore template [testfiles/powerflex-templates/csm-authorization-config.json] for [pflexAuthSidecar]" @@ -1114,12 +1143,14 @@ paths: - "testfiles/authorization-templates/csm_authorization_proxy_server.yaml" - "testfiles/storage_csm_powerflex_observability_auth.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" - "authorization" - "observability" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" @@ -1138,6 +1169,7 @@ - "Enable forceRemoveDriver on CR [2]" - "Delete custom resource [2]" - "Delete custom resource [1]" + - "Delete Authorization CRDs [3]" - "Restore template [testfiles/powerflex-templates/powerflex-secret-template.yaml] for [pflexAuth]" - "Restore template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Restore template [testfiles/powerflex-templates/csm-authorization-config.json] for [pflexAuthSidecar]" @@ -1150,12 +1182,14 @@ paths: - "testfiles/authorization-templates/csm_authorization_proxy_server.yaml" - "testfiles/storage_csm_powerflex_observability_auth.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" - "authorization" - "observability" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" @@ -1183,6 +1217,7 @@ - "Enable forceRemoveDriver on CR [2]" - "Delete custom resource [2]" - "Delete custom resource [1]" + - "Delete Authorization CRDs [3]" - "Restore template [testfiles/powerflex-templates/powerflex-secret-template.yaml] for [pflexAuth]" - "Restore template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Restore template [testfiles/powerflex-templates/csm-authorization-config.json] for [pflexAuthSidecar]" @@ -1195,12 +1230,14 @@ paths: - "testfiles/authorization-templates/csm_authorization_proxy_server.yaml" - "testfiles/storage_csm_powerflex_observability_auth.yaml" + - "testfiles/authorization-templates/csm_authorization_crds.yaml" modules: - "authorizationproxyserver" - "authorization" - "observability" steps: - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" @@ -1228,6 +1265,7 @@ - "Enable forceRemoveDriver on CR [2]" - "Delete custom resource [2]" - "Delete custom resource [1]" + - "Delete Authorization CRDs [3]" - "Restore template [testfiles/powerflex-templates/powerflex-secret-template.yaml] for [pflexAuth]" - "Restore template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Restore template [testfiles/powerflex-templates/csm-authorization-config.json] for [pflexAuthSidecar]"