зеркало из https://github.com/Azure/ARO-RP.git
Add eventually timeout when we use contexts
This commit is contained in:
Родитель
f131c2564e
Коммит
9ef2e0bc0c
|
@ -61,7 +61,7 @@ func testGetPodLogsOK(ctx context.Context, containerName, podName, namespace str
|
||||||
g.Expect(err).NotTo(HaveOccurred())
|
g.Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
g.Expect(pod.Status.Phase).To(Equal(corev1.PodSucceeded))
|
g.Expect(pod.Status.Phase).To(Equal(corev1.PodSucceeded))
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
|
|
||||||
By("requesting logs via RP admin API")
|
By("requesting logs via RP admin API")
|
||||||
params := url.Values{
|
params := url.Values{
|
||||||
|
|
|
@ -33,7 +33,7 @@ var _ = Describe("[Admin API] Cluster admin update action", func() {
|
||||||
Eventually(func(g Gomega, ctx context.Context) {
|
Eventually(func(g Gomega, ctx context.Context) {
|
||||||
oc = adminGetCluster(g, ctx, clusterResourceID)
|
oc = adminGetCluster(g, ctx, clusterResourceID)
|
||||||
g.Expect(oc.Properties.ProvisioningState).To(Equal(admin.ProvisioningStateSucceeded))
|
g.Expect(oc.Properties.ProvisioningState).To(Equal(admin.ProvisioningStateSucceeded))
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
|
|
||||||
Expect(oc.Properties.LastAdminUpdateError).To(Equal(""))
|
Expect(oc.Properties.LastAdminUpdateError).To(Equal(""))
|
||||||
})
|
})
|
||||||
|
|
|
@ -83,7 +83,7 @@ var _ = Describe("[Admin API] Kubernetes objects action", func() {
|
||||||
Eventually(func(g Gomega, ctx context.Context) {
|
Eventually(func(g Gomega, ctx context.Context) {
|
||||||
_, err := clients.Kubernetes.CoreV1().Namespaces().Get(ctx, namespace, metav1.GetOptions{})
|
_, err := clients.Kubernetes.CoreV1().Namespaces().Get(ctx, namespace, metav1.GetOptions{})
|
||||||
g.Expect(kerrors.IsNotFound(err)).To(BeTrue(), "expect Namespace to be deleted")
|
g.Expect(kerrors.IsNotFound(err)).To(BeTrue(), "expect Namespace to be deleted")
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
}()
|
}()
|
||||||
|
|
||||||
testConfigMapCreateOrUpdateForbidden(ctx, "creating", objName, namespace)
|
testConfigMapCreateOrUpdateForbidden(ctx, "creating", objName, namespace)
|
||||||
|
@ -121,7 +121,7 @@ var _ = Describe("[Admin API] Kubernetes objects action", func() {
|
||||||
Eventually(func(g Gomega, ctx context.Context) {
|
Eventually(func(g Gomega, ctx context.Context) {
|
||||||
_, err := clients.Kubernetes.CoreV1().Namespaces().Get(ctx, namespace, metav1.GetOptions{})
|
_, err := clients.Kubernetes.CoreV1().Namespaces().Get(ctx, namespace, metav1.GetOptions{})
|
||||||
g.Expect(kerrors.IsNotFound(err)).To(BeTrue(), "expect Namespace to be deleted")
|
g.Expect(kerrors.IsNotFound(err)).To(BeTrue(), "expect Namespace to be deleted")
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
}()
|
}()
|
||||||
|
|
||||||
By("creating an object via Kubernetes API")
|
By("creating an object via Kubernetes API")
|
||||||
|
@ -304,7 +304,7 @@ func testConfigMapDeleteOK(ctx context.Context, objName, namespace string) {
|
||||||
Eventually(func(g Gomega, ctx context.Context) {
|
Eventually(func(g Gomega, ctx context.Context) {
|
||||||
_, err = clients.Kubernetes.CoreV1().ConfigMaps(namespace).Get(ctx, objName, metav1.GetOptions{})
|
_, err = clients.Kubernetes.CoreV1().ConfigMaps(namespace).Get(ctx, objName, metav1.GetOptions{})
|
||||||
g.Expect(kerrors.IsNotFound(err)).To(BeTrue(), "expect ConfigMap to be deleted")
|
g.Expect(kerrors.IsNotFound(err)).To(BeTrue(), "expect ConfigMap to be deleted")
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
}
|
}
|
||||||
|
|
||||||
func testConfigMapCreateOrUpdateForbidden(ctx context.Context, operation, objName, namespace string) {
|
func testConfigMapCreateOrUpdateForbidden(ctx context.Context, operation, objName, namespace string) {
|
||||||
|
@ -392,7 +392,7 @@ func testPodForceDeleteOK(ctx context.Context, objName, namespace string) {
|
||||||
Eventually(func(g Gomega, ctx context.Context) {
|
Eventually(func(g Gomega, ctx context.Context) {
|
||||||
_, err = clients.Kubernetes.CoreV1().Pods(namespace).Get(ctx, objName, metav1.GetOptions{})
|
_, err = clients.Kubernetes.CoreV1().Pods(namespace).Get(ctx, objName, metav1.GetOptions{})
|
||||||
g.Expect(kerrors.IsNotFound(err)).To(BeTrue(), "expect Pod to be deleted")
|
g.Expect(kerrors.IsNotFound(err)).To(BeTrue(), "expect Pod to be deleted")
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
}
|
}
|
||||||
|
|
||||||
func mockSecret(name, namespace string) corev1.Secret {
|
func mockSecret(name, namespace string) corev1.Secret {
|
||||||
|
|
|
@ -123,7 +123,7 @@ func getNodeUptime(g Gomega, ctx context.Context, node string) (time.Time, error
|
||||||
g.Expect(err).NotTo(HaveOccurred())
|
g.Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
g.Expect(p.Status.Phase).To(Equal(corev1.PodSucceeded))
|
g.Expect(p.Status.Phase).To(Equal(corev1.PodSucceeded))
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
|
|
||||||
By("getting logs")
|
By("getting logs")
|
||||||
req := clients.Kubernetes.CoreV1().Pods(namespace).GetLogs(name, &corev1.PodLogOptions{})
|
req := clients.Kubernetes.CoreV1().Pods(namespace).GetLogs(name, &corev1.PodLogOptions{})
|
||||||
|
|
|
@ -7,7 +7,6 @@ import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
|
||||||
|
|
||||||
. "github.com/onsi/ginkgo/v2"
|
. "github.com/onsi/ginkgo/v2"
|
||||||
. "github.com/onsi/gomega"
|
. "github.com/onsi/gomega"
|
||||||
|
@ -43,7 +42,7 @@ var _ = Describe("Cluster", Serial, func() {
|
||||||
By("verifying the namespace is ready")
|
By("verifying the namespace is ready")
|
||||||
Eventually(func(ctx context.Context) error {
|
Eventually(func(ctx context.Context) error {
|
||||||
return p.Verify(ctx)
|
return p.Verify(ctx)
|
||||||
}).WithContext(ctx).WithTimeout(5 * time.Minute).Should(BeNil())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(BeNil())
|
||||||
|
|
||||||
DeferCleanup(func(ctx context.Context) {
|
DeferCleanup(func(ctx context.Context) {
|
||||||
By("deleting a test namespace")
|
By("deleting a test namespace")
|
||||||
|
@ -53,7 +52,7 @@ var _ = Describe("Cluster", Serial, func() {
|
||||||
By("verifying the namespace is deleted")
|
By("verifying the namespace is deleted")
|
||||||
Eventually(func(ctx context.Context) error {
|
Eventually(func(ctx context.Context) error {
|
||||||
return p.VerifyProjectIsDeleted(ctx)
|
return p.VerifyProjectIsDeleted(ctx)
|
||||||
}).WithContext(ctx).WithTimeout(5 * time.Minute).Should(BeNil())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(BeNil())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -78,7 +77,7 @@ var _ = Describe("Cluster", Serial, func() {
|
||||||
g.Expect(err).NotTo(HaveOccurred())
|
g.Expect(err).NotTo(HaveOccurred())
|
||||||
g.Expect(ready.StatefulSetIsReady(s)).To(BeTrue(), "expect stateful to be ready")
|
g.Expect(ready.StatefulSetIsReady(s)).To(BeTrue(), "expect stateful to be ready")
|
||||||
GinkgoWriter.Println(s)
|
GinkgoWriter.Println(s)
|
||||||
}).WithContext(ctx).WithTimeout(5 * time.Minute).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
|
|
||||||
// TODO: this test is marked as pending as it isn't working as expected
|
// TODO: this test is marked as pending as it isn't working as expected
|
||||||
|
@ -169,7 +168,7 @@ var _ = Describe("Cluster", Serial, func() {
|
||||||
g.Expect(nAclSubnets).To(ContainElement(strings.ToLower(subnet)))
|
g.Expect(nAclSubnets).To(ContainElement(strings.ToLower(subnet)))
|
||||||
}
|
}
|
||||||
|
|
||||||
}).WithContext(ctx).WithTimeout(5 * time.Minute).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
|
|
||||||
By("creating stateful set")
|
By("creating stateful set")
|
||||||
storageClass := "azurefile-csi"
|
storageClass := "azurefile-csi"
|
||||||
|
@ -186,7 +185,7 @@ var _ = Describe("Cluster", Serial, func() {
|
||||||
pvc, err := clients.Kubernetes.CoreV1().PersistentVolumeClaims(p.Name).Get(ctx, ssName, metav1.GetOptions{})
|
pvc, err := clients.Kubernetes.CoreV1().PersistentVolumeClaims(p.Name).Get(ctx, ssName, metav1.GetOptions{})
|
||||||
g.Expect(err).NotTo(HaveOccurred())
|
g.Expect(err).NotTo(HaveOccurred())
|
||||||
GinkgoWriter.Println(pvc)
|
GinkgoWriter.Println(pvc)
|
||||||
}).WithContext(ctx).WithTimeout(5 * time.Minute).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
|
|
||||||
By("cleaning up the cluster subnets (removing service endpoints)")
|
By("cleaning up the cluster subnets (removing service endpoints)")
|
||||||
for _, s := range ocpSubnets {
|
for _, s := range ocpSubnets {
|
||||||
|
@ -230,7 +229,7 @@ var _ = Describe("Cluster", Serial, func() {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
return ready.ServiceIsReady(svc)
|
return ready.ServiceIsReady(svc)
|
||||||
}).WithContext(ctx).Should(BeTrue())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(BeTrue())
|
||||||
|
|
||||||
By("verifying the internal load balancer service is ready")
|
By("verifying the internal load balancer service is ready")
|
||||||
Eventually(func(ctx context.Context) bool {
|
Eventually(func(ctx context.Context) bool {
|
||||||
|
@ -239,7 +238,7 @@ var _ = Describe("Cluster", Serial, func() {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
return ready.ServiceIsReady(svc)
|
return ready.ServiceIsReady(svc)
|
||||||
}).WithContext(ctx).Should(BeTrue())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(BeTrue())
|
||||||
})
|
})
|
||||||
|
|
||||||
// mainly we want to test the gateway/egress functionality - this request for the image will travel from
|
// mainly we want to test the gateway/egress functionality - this request for the image will travel from
|
||||||
|
@ -257,7 +256,7 @@ var _ = Describe("Cluster", Serial, func() {
|
||||||
g.Expect(err).NotTo(HaveOccurred())
|
g.Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
g.Expect(ready.DeploymentIsReady(s)).To(BeTrue(), "expect stateful to be ready")
|
g.Expect(ready.DeploymentIsReady(s)).To(BeTrue(), "expect stateful to be ready")
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
|
|
@ -96,7 +96,7 @@ var _ = Describe("ARO Operator - Internet checking", func() {
|
||||||
|
|
||||||
g.Expect(conditions.IsTrue(co.Status.Conditions, arov1alpha1.InternetReachableFromMaster)).To(BeTrue())
|
g.Expect(conditions.IsTrue(co.Status.Conditions, arov1alpha1.InternetReachableFromMaster)).To(BeTrue())
|
||||||
g.Expect(conditions.IsTrue(co.Status.Conditions, arov1alpha1.InternetReachableFromWorker)).To(BeTrue())
|
g.Expect(conditions.IsTrue(co.Status.Conditions, arov1alpha1.InternetReachableFromWorker)).To(BeTrue())
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("sets InternetReachableFromMaster and InternetReachableFromWorker to false when URL is not reachable", func(ctx context.Context) {
|
It("sets InternetReachableFromMaster and InternetReachableFromWorker to false when URL is not reachable", func(ctx context.Context) {
|
||||||
|
@ -119,7 +119,7 @@ var _ = Describe("ARO Operator - Internet checking", func() {
|
||||||
|
|
||||||
g.Expect(conditions.IsFalse(co.Status.Conditions, arov1alpha1.InternetReachableFromMaster)).To(BeTrue())
|
g.Expect(conditions.IsFalse(co.Status.Conditions, arov1alpha1.InternetReachableFromMaster)).To(BeTrue())
|
||||||
g.Expect(conditions.IsFalse(co.Status.Conditions, arov1alpha1.InternetReachableFromWorker)).To(BeTrue())
|
g.Expect(conditions.IsFalse(co.Status.Conditions, arov1alpha1.InternetReachableFromWorker)).To(BeTrue())
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -133,7 +133,7 @@ var _ = Describe("ARO Operator - Geneva Logging", func() {
|
||||||
}
|
}
|
||||||
|
|
||||||
By("checking that mdsd DaemonSet is ready before the test")
|
By("checking that mdsd DaemonSet is ready before the test")
|
||||||
Eventually(mdsdIsReady).WithContext(ctx).Should(Succeed())
|
Eventually(mdsdIsReady).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
|
|
||||||
initial, err := updatedObjects(ctx, "openshift-azure-logging")
|
initial, err := updatedObjects(ctx, "openshift-azure-logging")
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
@ -143,7 +143,7 @@ var _ = Describe("ARO Operator - Geneva Logging", func() {
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
By("checking that mdsd DaemonSet is ready")
|
By("checking that mdsd DaemonSet is ready")
|
||||||
Eventually(mdsdIsReady).WithContext(ctx).Should(Succeed())
|
Eventually(mdsdIsReady).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
|
|
||||||
By("confirming that only one object was updated")
|
By("confirming that only one object was updated")
|
||||||
final, err := updatedObjects(ctx, "openshift-azure-logging")
|
final, err := updatedObjects(ctx, "openshift-azure-logging")
|
||||||
|
@ -166,7 +166,7 @@ var _ = Describe("ARO Operator - Cluster Monitoring ConfigMap", func() {
|
||||||
}
|
}
|
||||||
|
|
||||||
By("waiting for the ConfigMap to make sure it exists")
|
By("waiting for the ConfigMap to make sure it exists")
|
||||||
Eventually(configMapExists).WithContext(ctx).Should(Succeed())
|
Eventually(configMapExists).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
|
|
||||||
By("unmarshalling the config from the ConfigMap data")
|
By("unmarshalling the config from the ConfigMap data")
|
||||||
var configData monitoring.Config
|
var configData monitoring.Config
|
||||||
|
@ -191,14 +191,14 @@ var _ = Describe("ARO Operator - Cluster Monitoring ConfigMap", func() {
|
||||||
}
|
}
|
||||||
|
|
||||||
By("waiting for the ConfigMap to make sure it exists")
|
By("waiting for the ConfigMap to make sure it exists")
|
||||||
Eventually(configMapExists).WithContext(ctx).Should(Succeed())
|
Eventually(configMapExists).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
|
|
||||||
By("deleting for the ConfigMap")
|
By("deleting for the ConfigMap")
|
||||||
err := clients.Kubernetes.CoreV1().ConfigMaps("openshift-monitoring").Delete(ctx, "cluster-monitoring-config", metav1.DeleteOptions{})
|
err := clients.Kubernetes.CoreV1().ConfigMaps("openshift-monitoring").Delete(ctx, "cluster-monitoring-config", metav1.DeleteOptions{})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
By("waiting for the ConfigMap to make sure it was restored")
|
By("waiting for the ConfigMap to make sure it was restored")
|
||||||
Eventually(configMapExists).WithContext(ctx).Should(Succeed())
|
Eventually(configMapExists).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -210,14 +210,14 @@ var _ = Describe("ARO Operator - RBAC", func() {
|
||||||
}
|
}
|
||||||
|
|
||||||
By("waiting for the ClusterRole to make sure it exists")
|
By("waiting for the ClusterRole to make sure it exists")
|
||||||
Eventually(clusterRoleExists).WithContext(ctx).Should(Succeed())
|
Eventually(clusterRoleExists).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
|
|
||||||
By("deleting for the ClusterRole")
|
By("deleting for the ClusterRole")
|
||||||
err := clients.Kubernetes.RbacV1().ClusterRoles().Delete(ctx, "system:aro-sre", metav1.DeleteOptions{})
|
err := clients.Kubernetes.RbacV1().ClusterRoles().Delete(ctx, "system:aro-sre", metav1.DeleteOptions{})
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
By("waiting for the ClusterRole to make sure it was restored")
|
By("waiting for the ClusterRole to make sure it was restored")
|
||||||
Eventually(clusterRoleExists).WithContext(ctx).Should(Succeed())
|
Eventually(clusterRoleExists).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -244,7 +244,7 @@ var _ = Describe("ARO Operator - MachineHealthCheck", func() {
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
By("waiting for the machine health check to be restored")
|
By("waiting for the machine health check to be restored")
|
||||||
Eventually(getMachineHealthCheck).WithContext(ctx).Should(Succeed())
|
Eventually(getMachineHealthCheck).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("the alerting rule must recreated if deleted", func(ctx context.Context) {
|
It("the alerting rule must recreated if deleted", func(ctx context.Context) {
|
||||||
|
@ -253,7 +253,7 @@ var _ = Describe("ARO Operator - MachineHealthCheck", func() {
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
By("waiting for the machine health check remediation alert to be restored")
|
By("waiting for the machine health check remediation alert to be restored")
|
||||||
Eventually(getMachineHealthCheckRemediationAlertName).WithContext(ctx).Should(Succeed())
|
Eventually(getMachineHealthCheckRemediationAlertName).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
|
|
||||||
})
|
})
|
||||||
|
@ -271,7 +271,7 @@ var _ = Describe("ARO Operator - Conditions", func() {
|
||||||
for _, condition := range arov1alpha1.ClusterChecksTypes() {
|
for _, condition := range arov1alpha1.ClusterChecksTypes() {
|
||||||
g.Expect(conditions.IsTrue(co.Status.Conditions, condition)).To(BeTrue(), "Condition %s", condition)
|
g.Expect(conditions.IsTrue(co.Status.Conditions, condition)).To(BeTrue(), "Condition %s", condition)
|
||||||
}
|
}
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("must have all the conditions on the cluster operator set to the expected values", func(ctx context.Context) {
|
It("must have all the conditions on the cluster operator set to the expected values", func(ctx context.Context) {
|
||||||
|
@ -282,7 +282,7 @@ var _ = Describe("ARO Operator - Conditions", func() {
|
||||||
g.Expect(cov1Helpers.IsStatusConditionTrue(co.Status.Conditions, configv1.OperatorAvailable))
|
g.Expect(cov1Helpers.IsStatusConditionTrue(co.Status.Conditions, configv1.OperatorAvailable))
|
||||||
g.Expect(cov1Helpers.IsStatusConditionFalse(co.Status.Conditions, configv1.OperatorProgressing))
|
g.Expect(cov1Helpers.IsStatusConditionFalse(co.Status.Conditions, configv1.OperatorProgressing))
|
||||||
g.Expect(cov1Helpers.IsStatusConditionFalse(co.Status.Conditions, configv1.OperatorDegraded))
|
g.Expect(cov1Helpers.IsStatusConditionFalse(co.Status.Conditions, configv1.OperatorDegraded))
|
||||||
}).WithContext(ctx).WithTimeout(timeout).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).WithTimeout(timeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -384,7 +384,7 @@ var _ = Describe("ARO Operator - Azure Subnet Reconciler", func() {
|
||||||
co, err := clients.AROClusters.AroV1alpha1().Clusters().Get(ctx, "cluster", metav1.GetOptions{})
|
co, err := clients.AROClusters.AroV1alpha1().Clusters().Get(ctx, "cluster", metav1.GetOptions{})
|
||||||
g.Expect(err).NotTo(HaveOccurred())
|
g.Expect(err).NotTo(HaveOccurred())
|
||||||
g.Expect(co.Annotations).To(Satisfy(subnetReconciliationAnnotationExists))
|
g.Expect(co.Annotations).To(Satisfy(subnetReconciliationAnnotationExists))
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
@ -409,7 +409,7 @@ var _ = Describe("ARO Operator - MUO Deployment", func() {
|
||||||
g.Expect(err).NotTo(HaveOccurred())
|
g.Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
g.Expect(string(b)).To(ContainSubstring(`X:boringcrypto,strictfipsruntime`))
|
g.Expect(string(b)).To(ContainSubstring(`X:boringcrypto,strictfipsruntime`))
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
}, SpecTimeout(2*time.Minute))
|
}, SpecTimeout(2*time.Minute))
|
||||||
|
|
||||||
It("must be restored if deleted", func(ctx context.Context) {
|
It("must be restored if deleted", func(ctx context.Context) {
|
||||||
|
@ -430,13 +430,13 @@ var _ = Describe("ARO Operator - MUO Deployment", func() {
|
||||||
}
|
}
|
||||||
|
|
||||||
By("waiting for the MUO deployment to be ready")
|
By("waiting for the MUO deployment to be ready")
|
||||||
Eventually(muoDeploymentExists).WithContext(ctx).Should(Succeed())
|
Eventually(muoDeploymentExists).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
|
|
||||||
By("deleting the MUO deployment")
|
By("deleting the MUO deployment")
|
||||||
Expect(deleteMUODeployment(ctx)).Should(Succeed())
|
Expect(deleteMUODeployment(ctx)).Should(Succeed())
|
||||||
|
|
||||||
By("waiting for the MUO deployment to be reconciled")
|
By("waiting for the MUO deployment to be reconciled")
|
||||||
Eventually(muoDeploymentExists).WithContext(ctx).Should(Succeed())
|
Eventually(muoDeploymentExists).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
}, SpecTimeout(2*time.Minute))
|
}, SpecTimeout(2*time.Minute))
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -508,7 +508,7 @@ var _ = Describe("ARO Operator - ImageConfig Reconciler", func() {
|
||||||
Expect(err).NotTo(HaveOccurred())
|
Expect(err).NotTo(HaveOccurred())
|
||||||
|
|
||||||
By("waiting for the Image config to be reset")
|
By("waiting for the Image config to be reset")
|
||||||
Eventually(verifyLists(nil, nil)).WithContext(ctx).Should(Succeed())
|
Eventually(verifyLists(nil, nil)).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("must set empty allow and block lists in Image config by default", func() {
|
It("must set empty allow and block lists in Image config by default", func() {
|
||||||
|
@ -528,7 +528,7 @@ var _ = Describe("ARO Operator - ImageConfig Reconciler", func() {
|
||||||
|
|
||||||
By("checking that Image config eventually has ARO service registries and the test registry in the allow list")
|
By("checking that Image config eventually has ARO service registries and the test registry in the allow list")
|
||||||
expectedAllowlist := append(requiredRegistries, optionalRegistry)
|
expectedAllowlist := append(requiredRegistries, optionalRegistry)
|
||||||
Eventually(verifyLists(expectedAllowlist, nil)).WithContext(ctx).Should(Succeed())
|
Eventually(verifyLists(expectedAllowlist, nil)).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("must remove ARO service registries from the block lists, but keep customer added registries", func(ctx context.Context) {
|
It("must remove ARO service registries from the block lists, but keep customer added registries", func(ctx context.Context) {
|
||||||
|
@ -539,7 +539,7 @@ var _ = Describe("ARO Operator - ImageConfig Reconciler", func() {
|
||||||
|
|
||||||
By("checking that Image config eventually doesn't include ARO service registries")
|
By("checking that Image config eventually doesn't include ARO service registries")
|
||||||
expectedBlocklist := []string{optionalRegistry}
|
expectedBlocklist := []string{optionalRegistry}
|
||||||
Eventually(verifyLists(nil, expectedBlocklist)).WithContext(ctx).Should(Succeed())
|
Eventually(verifyLists(nil, expectedBlocklist)).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -634,13 +634,13 @@ var _ = Describe("ARO Operator - Guardrails", func() {
|
||||||
}
|
}
|
||||||
|
|
||||||
By("waiting for the gatekeeper Controller Manager deployment to be ready")
|
By("waiting for the gatekeeper Controller Manager deployment to be ready")
|
||||||
Eventually(controllerManagerDeploymentExists).WithContext(ctx).Should(Succeed())
|
Eventually(controllerManagerDeploymentExists).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
|
|
||||||
By("deleting the gatekeeper Controller Manager deployment")
|
By("deleting the gatekeeper Controller Manager deployment")
|
||||||
Expect(deleteControllerManagerDeployment(ctx)).Should(Succeed())
|
Expect(deleteControllerManagerDeployment(ctx)).Should(Succeed())
|
||||||
|
|
||||||
By("waiting for the gatekeeper Controller Manager deployment to be reconciled")
|
By("waiting for the gatekeeper Controller Manager deployment to be reconciled")
|
||||||
Eventually(controllerManagerDeploymentExists).WithContext(ctx).Should(Succeed())
|
Eventually(controllerManagerDeploymentExists).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("Audit must be restored if deleted", func(ctx context.Context) {
|
It("Audit must be restored if deleted", func(ctx context.Context) {
|
||||||
|
@ -669,13 +669,13 @@ var _ = Describe("ARO Operator - Guardrails", func() {
|
||||||
}
|
}
|
||||||
|
|
||||||
By("waiting for the gatekeeper Audit deployment to be ready")
|
By("waiting for the gatekeeper Audit deployment to be ready")
|
||||||
Eventually(auditDeploymentExists).WithContext(ctx).Should(Succeed())
|
Eventually(auditDeploymentExists).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
|
|
||||||
By("deleting the gatekeeper Audit deployment")
|
By("deleting the gatekeeper Audit deployment")
|
||||||
Expect(deleteAuditDeployment(ctx)).Should(Succeed())
|
Expect(deleteAuditDeployment(ctx)).Should(Succeed())
|
||||||
|
|
||||||
By("waiting for the gatekeeper Audit deployment to be reconciled")
|
By("waiting for the gatekeeper Audit deployment to be reconciled")
|
||||||
Eventually(auditDeploymentExists).WithContext(ctx).Should(Succeed())
|
Eventually(auditDeploymentExists).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
|
|
||||||
})
|
})
|
||||||
|
@ -700,13 +700,13 @@ var _ = Describe("ARO Operator - Cloud Provder Config ConfigMap", func() {
|
||||||
var err error
|
var err error
|
||||||
cm, err = clients.Kubernetes.CoreV1().ConfigMaps("openshift-config").Get(ctx, "cloud-provider-config", metav1.GetOptions{})
|
cm, err = clients.Kubernetes.CoreV1().ConfigMaps("openshift-config").Get(ctx, "cloud-provider-config", metav1.GetOptions{})
|
||||||
g.Expect(err).ToNot(HaveOccurred())
|
g.Expect(err).ToNot(HaveOccurred())
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
|
|
||||||
By("waiting for disableOutboundSNAT to be true")
|
By("waiting for disableOutboundSNAT to be true")
|
||||||
Eventually(func(g Gomega, ctx context.Context) {
|
Eventually(func(g Gomega, ctx context.Context) {
|
||||||
disableOutboundSNAT, err := cpcController.GetDisableOutboundSNAT(cm.Data["config"])
|
disableOutboundSNAT, err := cpcController.GetDisableOutboundSNAT(cm.Data["config"])
|
||||||
g.Expect(err).NotTo(HaveOccurred())
|
g.Expect(err).NotTo(HaveOccurred())
|
||||||
g.Expect(disableOutboundSNAT).To(BeTrue())
|
g.Expect(disableOutboundSNAT).To(BeTrue())
|
||||||
}).WithContext(ctx).Should(Succeed())
|
}).WithContext(ctx).WithTimeout(DefaultEventuallyTimeout).Should(Succeed())
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
|
@ -48,7 +48,10 @@ import (
|
||||||
"github.com/Azure/ARO-RP/test/util/kubeadminkubeconfig"
|
"github.com/Azure/ARO-RP/test/util/kubeadminkubeconfig"
|
||||||
)
|
)
|
||||||
|
|
||||||
var disallowedInFilenameRegex = regexp.MustCompile(`[<>:"/\\|?*\x00-\x1F]`)
|
var (
|
||||||
|
disallowedInFilenameRegex = regexp.MustCompile(`[<>:"/\\|?*\x00-\x1F]`)
|
||||||
|
DefaultEventuallyTimeout = 5 * time.Minute
|
||||||
|
)
|
||||||
|
|
||||||
type clientSet struct {
|
type clientSet struct {
|
||||||
Operations redhatopenshift20220904.OperationsClient
|
Operations redhatopenshift20220904.OperationsClient
|
||||||
|
@ -428,7 +431,7 @@ func done(ctx context.Context) error {
|
||||||
var _ = BeforeSuite(func() {
|
var _ = BeforeSuite(func() {
|
||||||
log.Info("BeforeSuite")
|
log.Info("BeforeSuite")
|
||||||
|
|
||||||
SetDefaultEventuallyTimeout(5 * time.Minute)
|
SetDefaultEventuallyTimeout(DefaultEventuallyTimeout)
|
||||||
SetDefaultEventuallyPollingInterval(10 * time.Second)
|
SetDefaultEventuallyPollingInterval(10 * time.Second)
|
||||||
|
|
||||||
if err := setup(context.Background()); err != nil {
|
if err := setup(context.Background()); err != nil {
|
||||||
|
|
Загрузка…
Ссылка в новой задаче