From a1c404d94785576a9df4d146a65c515bc4a8bb38 Mon Sep 17 00:00:00 2001 From: perdasilva Date: Sun, 13 Mar 2022 13:02:23 +0100 Subject: [PATCH] Refactor csv e2e Signed-off-by: perdasilva --- test/e2e/copied_csv_e2e_test.go | 266 + test/e2e/csv_e2e_test.go | 7255 +++++++++++++------------- test/e2e/operator_groups_e2e_test.go | 2 +- test/e2e/subscription_e2e_test.go | 4 +- test/e2e/util.go | 12 +- test/e2e/webhook_e2e_test.go | 2 +- 6 files changed, 3770 insertions(+), 3771 deletions(-) create mode 100644 test/e2e/copied_csv_e2e_test.go diff --git a/test/e2e/copied_csv_e2e_test.go b/test/e2e/copied_csv_e2e_test.go new file mode 100644 index 00000000000..6d55c7b24b4 --- /dev/null +++ b/test/e2e/copied_csv_e2e_test.go @@ -0,0 +1,266 @@ +package e2e + +import ( + "context" + "fmt" + + . "github.com/onsi/ginkgo" + . "github.com/onsi/gomega" + operatorsv1 "github.com/operator-framework/api/pkg/operators/v1" + operatorsv1alpha1 "github.com/operator-framework/api/pkg/operators/v1alpha1" + "github.com/operator-framework/operator-lifecycle-manager/test/e2e/ctx" + corev1 "k8s.io/api/core/v1" + k8serrors "k8s.io/apimachinery/pkg/api/errors" + "k8s.io/apimachinery/pkg/api/meta" + metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" + "k8s.io/apimachinery/pkg/fields" + k8slabels "k8s.io/apimachinery/pkg/labels" + "k8s.io/apimachinery/pkg/selection" + apitypes "k8s.io/apimachinery/pkg/types" + "sigs.k8s.io/controller-runtime/pkg/client" +) + +var _ = Describe("Disabling copied CSVs", func() { + var ( + ns corev1.Namespace + csv operatorsv1alpha1.ClusterServiceVersion + nonTerminatingNamespaceSelector = fields.ParseSelectorOrDie("status.phase!=Terminating") + ) + + BeforeEach(func() { + nsname := genName("csv-toggle-test-") + og := operatorsv1.OperatorGroup{ + ObjectMeta: metav1.ObjectMeta{ + Name: fmt.Sprintf("%s-operatorgroup", nsname), + Namespace: nsname, + }, + } + ns = SetupGeneratedTestNamespaceWithOperatorGroup(nsname, og) + + csv = operatorsv1alpha1.ClusterServiceVersion{ + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv-toggle-test-"), + Namespace: nsname, + }, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + InstallStrategy: newNginxInstallStrategy(genName("csv-toggle-test-"), nil, nil), + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + }, + } + err := ctx.Ctx().Client().Create(context.Background(), &csv) + Expect(err).ShouldNot(HaveOccurred()) + }) + + AfterEach(func() { + Eventually(func() error { + err := ctx.Ctx().Client().Delete(context.Background(), &csv) + if err != nil && k8serrors.IsNotFound(err) { + return err + } + + return nil + }).Should(Succeed()) + TeardownNamespace(ns.GetName()) + }) + + When("an operator is installed in AllNamespace mode", func() { + It("should have Copied CSVs in all other namespaces", func() { + Eventually(func() error { + requirement, err := k8slabels.NewRequirement(operatorsv1alpha1.CopiedLabelKey, selection.Equals, []string{csv.GetNamespace()}) + if err != nil { + return err + } + + var copiedCSVs operatorsv1alpha1.ClusterServiceVersionList + err = ctx.Ctx().Client().List(context.TODO(), &copiedCSVs, &client.ListOptions{ + LabelSelector: k8slabels.NewSelector().Add(*requirement), + }) + if err != nil { + return err + } + + var namespaces corev1.NamespaceList + if err := ctx.Ctx().Client().List(context.TODO(), &namespaces, &client.ListOptions{ + FieldSelector: nonTerminatingNamespaceSelector, + }); err != nil { + return err + } + + if len(namespaces.Items)-1 != len(copiedCSVs.Items) { + return fmt.Errorf("%d copied CSVs found, expected %d", len(copiedCSVs.Items), len(namespaces.Items)-1) + } + + return nil + }).Should(Succeed()) + }) + }) + + When("Copied CSVs are disabled", func() { + BeforeEach(func() { + Eventually(func() error { + var olmConfig operatorsv1.OLMConfig + if err := ctx.Ctx().Client().Get(context.TODO(), apitypes.NamespacedName{Name: "cluster"}, &olmConfig); err != nil { + ctx.Ctx().Logf("Error getting olmConfig %v", err) + return err + } + + // Exit early if copied CSVs are disabled. + if !olmConfig.CopiedCSVsAreEnabled() { + return nil + } + + olmConfig.Spec = operatorsv1.OLMConfigSpec{ + Features: &operatorsv1.Features{ + DisableCopiedCSVs: getPointer(true), + }, + } + + if err := ctx.Ctx().Client().Update(context.TODO(), &olmConfig); err != nil { + ctx.Ctx().Logf("Error setting olmConfig %v", err) + return err + } + + return nil + }).Should(Succeed()) + }) + + It("should not have any copied CSVs", func() { + Eventually(func() error { + requirement, err := k8slabels.NewRequirement(operatorsv1alpha1.CopiedLabelKey, selection.Equals, []string{csv.GetNamespace()}) + if err != nil { + return err + } + + var copiedCSVs operatorsv1alpha1.ClusterServiceVersionList + err = ctx.Ctx().Client().List(context.TODO(), &copiedCSVs, &client.ListOptions{ + LabelSelector: k8slabels.NewSelector().Add(*requirement), + }) + if err != nil { + return err + } + + if numCSVs := len(copiedCSVs.Items); numCSVs != 0 { + return fmt.Errorf("Found %d copied CSVs, should be 0", numCSVs) + } + return nil + }).Should(Succeed()) + }) + + It("should be reflected in the olmConfig.Status.Condition array that the expected number of copied CSVs exist", func() { + Eventually(func() error { + var olmConfig operatorsv1.OLMConfig + if err := ctx.Ctx().Client().Get(context.TODO(), apitypes.NamespacedName{Name: "cluster"}, &olmConfig); err != nil { + return err + } + + foundCondition := meta.FindStatusCondition(olmConfig.Status.Conditions, operatorsv1.DisabledCopiedCSVsConditionType) + if foundCondition == nil { + return fmt.Errorf("%s condition not found", operatorsv1.DisabledCopiedCSVsConditionType) + } + + expectedCondition := metav1.Condition{ + Reason: "NoCopiedCSVsFound", + Message: "Copied CSVs are disabled and none were found for operators installed in AllNamespace mode", + Status: metav1.ConditionTrue, + } + + if foundCondition.Reason != expectedCondition.Reason || + foundCondition.Message != expectedCondition.Message || + foundCondition.Status != expectedCondition.Status { + return fmt.Errorf("condition does not have expected reason, message, and status. Expected %v, got %v", expectedCondition, foundCondition) + } + + return nil + }).Should(Succeed()) + }) + }) + + When("Copied CSVs are toggled back on", func() { + BeforeEach(func() { + Eventually(func() error { + var olmConfig operatorsv1.OLMConfig + if err := ctx.Ctx().Client().Get(context.TODO(), apitypes.NamespacedName{Name: "cluster"}, &olmConfig); err != nil { + return err + } + + // Exit early if copied CSVs are enabled. + if olmConfig.CopiedCSVsAreEnabled() { + return nil + } + + olmConfig.Spec = operatorsv1.OLMConfigSpec{ + Features: &operatorsv1.Features{ + DisableCopiedCSVs: getPointer(false), + }, + } + + if err := ctx.Ctx().Client().Update(context.TODO(), &olmConfig); err != nil { + return err + } + + return nil + }).Should(Succeed()) + }) + + It("should have copied CSVs in all other Namespaces", func() { + Eventually(func() error { + // find copied csvs... + requirement, err := k8slabels.NewRequirement(operatorsv1alpha1.CopiedLabelKey, selection.Equals, []string{csv.GetNamespace()}) + if err != nil { + return err + } + + var copiedCSVs operatorsv1alpha1.ClusterServiceVersionList + err = ctx.Ctx().Client().List(context.TODO(), &copiedCSVs, &client.ListOptions{ + LabelSelector: k8slabels.NewSelector().Add(*requirement), + }) + if err != nil { + return err + } + + var namespaces corev1.NamespaceList + if err := ctx.Ctx().Client().List(context.TODO(), &namespaces, &client.ListOptions{FieldSelector: nonTerminatingNamespaceSelector}); err != nil { + return err + } + + if len(namespaces.Items)-1 != len(copiedCSVs.Items) { + return fmt.Errorf("%d copied CSVs found, expected %d", len(copiedCSVs.Items), len(namespaces.Items)-1) + } + + return nil + }).Should(Succeed()) + }) + + It("should be reflected in the olmConfig.Status.Condition array that the expected number of copied CSVs exist", func() { + Eventually(func() error { + var olmConfig operatorsv1.OLMConfig + if err := ctx.Ctx().Client().Get(context.TODO(), apitypes.NamespacedName{Name: "cluster"}, &olmConfig); err != nil { + return err + } + foundCondition := meta.FindStatusCondition(olmConfig.Status.Conditions, operatorsv1.DisabledCopiedCSVsConditionType) + if foundCondition == nil { + return fmt.Errorf("%s condition not found", operatorsv1.DisabledCopiedCSVsConditionType) + } + + expectedCondition := metav1.Condition{ + Reason: "CopiedCSVsEnabled", + Message: "Copied CSVs are enabled and present across the cluster", + Status: metav1.ConditionFalse, + } + + if foundCondition.Reason != expectedCondition.Reason || + foundCondition.Message != expectedCondition.Message || + foundCondition.Status != expectedCondition.Status { + return fmt.Errorf("condition does not have expected reason, message, and status. Expected %v, got %v", expectedCondition, foundCondition) + } + + return nil + }).Should(Succeed()) + }) + }) +}) diff --git a/test/e2e/csv_e2e_test.go b/test/e2e/csv_e2e_test.go index facd1e1d228..3b23c6ee663 100644 --- a/test/e2e/csv_e2e_test.go +++ b/test/e2e/csv_e2e_test.go @@ -9,8 +9,11 @@ import ( . "github.com/onsi/ginkgo" . "github.com/onsi/gomega" - "github.com/onsi/gomega/types" - + operatorsv1 "github.com/operator-framework/api/pkg/operators/v1" + "github.com/operator-framework/operator-lifecycle-manager/pkg/api/client/clientset/versioned" + "github.com/operator-framework/operator-lifecycle-manager/pkg/controller/install" + "github.com/operator-framework/operator-lifecycle-manager/pkg/lib/operatorclient" + "github.com/operator-framework/operator-lifecycle-manager/pkg/lib/ownerutil" appsv1 "k8s.io/api/apps/v1" corev1 "k8s.io/api/core/v1" rbacv1 "k8s.io/api/rbac/v1" @@ -18,13 +21,9 @@ import ( apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1" "k8s.io/apimachinery/pkg/api/equality" apierrors "k8s.io/apimachinery/pkg/api/errors" - "k8s.io/apimachinery/pkg/api/meta" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" - "k8s.io/apimachinery/pkg/fields" k8slabels "k8s.io/apimachinery/pkg/labels" "k8s.io/apimachinery/pkg/runtime" - "k8s.io/apimachinery/pkg/selection" - apitypes "k8s.io/apimachinery/pkg/types" "k8s.io/apimachinery/pkg/util/diff" "k8s.io/apimachinery/pkg/util/intstr" "k8s.io/apimachinery/pkg/util/wait" @@ -32,23 +31,14 @@ import ( apiregistrationv1 "k8s.io/kube-aggregator/pkg/apis/apiregistration/v1" "sigs.k8s.io/controller-runtime/pkg/client" - operatorsv1 "github.com/operator-framework/api/pkg/operators/v1" operatorsv1alpha1 "github.com/operator-framework/api/pkg/operators/v1alpha1" - "github.com/operator-framework/operator-lifecycle-manager/pkg/api/client/clientset/versioned" - "github.com/operator-framework/operator-lifecycle-manager/pkg/controller/install" - "github.com/operator-framework/operator-lifecycle-manager/pkg/lib/operatorclient" - "github.com/operator-framework/operator-lifecycle-manager/pkg/lib/ownerutil" "github.com/operator-framework/operator-lifecycle-manager/test/e2e/ctx" ) var _ = Describe("ClusterServiceVersion", func() { - HavePhase := func(goal operatorsv1alpha1.ClusterServiceVersionPhase) types.GomegaMatcher { - return WithTransform(func(csv *operatorsv1alpha1.ClusterServiceVersion) operatorsv1alpha1.ClusterServiceVersionPhase { - return csv.Status.Phase - }, Equal(goal)) - } var ( + ns corev1.Namespace c operatorclient.ClientInterface crc versioned.Interface ) @@ -59,296 +49,147 @@ var _ = Describe("ClusterServiceVersion", func() { }) AfterEach(func() { - TearDown(testNamespace) + TeardownNamespace(ns.GetName()) }) - When("a CustomResourceDefinition was installed alongside a ClusterServiceVersion", func() { - var ( - ns corev1.Namespace - crd apiextensionsv1.CustomResourceDefinition - og operatorsv1.OperatorGroup - apiname string - apifullname string - ) - + Context("OwnNamespace OperatorGroup", func() { BeforeEach(func() { - ns = corev1.Namespace{ - ObjectMeta: metav1.ObjectMeta{ - Name: genName("test-namespace-"), - }, - } - - Eventually(func() error { - return ctx.Ctx().Client().Create(context.Background(), &ns) - }).Should(Succeed()) - - og = operatorsv1.OperatorGroup{ - ObjectMeta: metav1.ObjectMeta{ - Name: genName(fmt.Sprintf("%s-operatorgroup-", ns.GetName())), - Namespace: ns.GetName(), - }, - Spec: operatorsv1.OperatorGroupSpec{ - TargetNamespaces: []string{ns.GetName()}, - }, - } - Eventually(func() error { - return ctx.Ctx().Client().Create(context.Background(), &og) - }).Should(Succeed()) - - apiname = genName("api") - apifullname = apiname + "s.example.com" - crd = apiextensionsv1.CustomResourceDefinition{ - ObjectMeta: metav1.ObjectMeta{ - Name: apifullname, - Annotations: map[string]string{ - "operatorframework.io/installed-alongside-0": fmt.Sprintf("%s/associated-csv", ns.GetName()), - }, - }, - Spec: apiextensionsv1.CustomResourceDefinitionSpec{ - Group: "example.com", - Scope: apiextensionsv1.ClusterScoped, - Names: apiextensionsv1.CustomResourceDefinitionNames{ - Plural: apiname + "s", - Singular: apiname, - Kind: strings.Title(apiname), - ListKind: strings.Title(apiname) + "List", - }, - Versions: []apiextensionsv1.CustomResourceDefinitionVersion{{ - Name: "v1", - Served: true, - Storage: true, - Schema: &apiextensionsv1.CustomResourceValidation{ - OpenAPIV3Schema: &apiextensionsv1.JSONSchemaProps{ - Type: "object", - }, - }, - }}, - }, - } - Eventually(func() error { - return ctx.Ctx().Client().Create(context.Background(), &crd) - }).Should(Succeed()) + nsName := genName("csv-e2e-") + ns = SetupGeneratedTestNamespace(nsName, nsName) }) - AfterEach(func() { - Eventually(func() error { - return ctx.Ctx().Client().Delete(context.Background(), &crd) - }).Should(WithTransform(apierrors.IsNotFound, BeTrue())) - - Eventually(func() error { - return ctx.Ctx().Client().Delete(context.Background(), &og) - }).Should(WithTransform(apierrors.IsNotFound, BeTrue())) - - Eventually(func() error { - return ctx.Ctx().Client().Delete(context.Background(), &ns) - }).Should(WithTransform(apierrors.IsNotFound, BeTrue())) - }) + When("a CustomResourceDefinition was installed alongside a ClusterServiceVersion", func() { + var ( + crd apiextensionsv1.CustomResourceDefinition + apiname string + apifullname string + ) - // issue: https://github.com/operator-framework/operator-lifecycle-manager/issues/2646 - It("[FLAKE] can satisfy an associated ClusterServiceVersion's ownership requirement", func() { - associated := operatorsv1alpha1.ClusterServiceVersion{ - ObjectMeta: metav1.ObjectMeta{ - Name: "associated-csv", - Namespace: ns.GetName(), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{{ - Name: apifullname, - Version: "v1", - Kind: "Test", - }}, - }, - InstallStrategy: newNginxInstallStrategy(genName("deployment-"), nil, nil), - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, + BeforeEach(func() { + apiname = genName("api") + apifullname = apiname + "s.example.com" + crd = apiextensionsv1.CustomResourceDefinition{ + ObjectMeta: metav1.ObjectMeta{ + Name: apifullname, + Annotations: map[string]string{ + "operatorframework.io/installed-alongside-0": fmt.Sprintf("%s/associated-csv", ns.GetName()), }, }, - }, - } - Expect(ctx.Ctx().Client().Create(context.Background(), &associated)).To(Succeed()) - - Eventually(func() ([]operatorsv1alpha1.RequirementStatus, error) { - if err := ctx.Ctx().Client().Get(context.Background(), client.ObjectKeyFromObject(&associated), &associated); err != nil { - return nil, err - } - var result []operatorsv1alpha1.RequirementStatus - for _, s := range associated.Status.RequirementStatus { - result = append(result, operatorsv1alpha1.RequirementStatus{ - Group: s.Group, - Version: s.Version, - Kind: s.Kind, - Name: s.Name, - Status: s.Status, - }) - } - return result, nil - }).Should(ContainElement( - operatorsv1alpha1.RequirementStatus{ - Group: apiextensionsv1.SchemeGroupVersion.Group, - Version: apiextensionsv1.SchemeGroupVersion.Version, - Kind: "CustomResourceDefinition", - Name: crd.GetName(), - Status: operatorsv1alpha1.RequirementStatusReasonPresent, - }, - )) - - Eventually(func() error { - return ctx.Ctx().Client().Delete(context.Background(), &associated) - }).Should(Succeed()) - }) - - // Without this exception, upgrades can become blocked - // when the original CSV's CRD requirement becomes - // unsatisfied. - It("can satisfy an unassociated ClusterServiceVersion's ownership requirement if replaced by an associated ClusterServiceVersion", func() { - unassociated := operatorsv1alpha1.ClusterServiceVersion{ - ObjectMeta: metav1.ObjectMeta{ - Name: "unassociated-csv", - Namespace: ns.GetName(), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{{ - Name: apifullname, - Version: "v1", - Kind: "Test", - }}, - }, - InstallStrategy: newNginxInstallStrategy(genName("deployment-"), nil, nil), - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, + Spec: apiextensionsv1.CustomResourceDefinitionSpec{ + Group: "example.com", + Scope: apiextensionsv1.ClusterScoped, + Names: apiextensionsv1.CustomResourceDefinitionNames{ + Plural: apiname + "s", + Singular: apiname, + Kind: strings.Title(apiname), + ListKind: strings.Title(apiname) + "List", }, - }, - }, - } - Expect(ctx.Ctx().Client().Create(context.Background(), &unassociated)).To(Succeed()) - - associated := operatorsv1alpha1.ClusterServiceVersion{ - ObjectMeta: metav1.ObjectMeta{ - Name: "associated-csv", - Namespace: ns.GetName(), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{{ - Name: apifullname, - Version: "v1", - Kind: "Test", + Versions: []apiextensionsv1.CustomResourceDefinitionVersion{{ + Name: "v1", + Served: true, + Storage: true, + Schema: &apiextensionsv1.CustomResourceValidation{ + OpenAPIV3Schema: &apiextensionsv1.JSONSchemaProps{ + Type: "object", + }, + }, }}, }, - InstallStrategy: newNginxInstallStrategy(genName("deployment-"), nil, nil), - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - }, - Replaces: unassociated.GetName(), - }, - } - Expect(ctx.Ctx().Client().Create(context.Background(), &associated)).To(Succeed()) - - Eventually(func() error { - return ctx.Ctx().Client().Get(context.Background(), client.ObjectKeyFromObject(&unassociated), &unassociated) - }).Should(WithTransform(apierrors.IsNotFound, BeTrue())) + } + Eventually(func() error { + return ctx.Ctx().Client().Create(context.Background(), &crd) + }).Should(Succeed()) + }) - Eventually(func() error { - return ctx.Ctx().Client().Delete(context.Background(), &associated) - }).Should(Succeed()) - }) + AfterEach(func() { + Eventually(func() error { + return ctx.Ctx().KubeClient().ApiextensionsInterface().ApiextensionsV1().CustomResourceDefinitions().Delete(context.TODO(), crd.GetName(), metav1.DeleteOptions{}) + }).Should(Succeed()) + }) - // issue:https://github.com/operator-framework/operator-lifecycle-manager/issues/2639 - It("[FLAKE] can satisfy an unassociated ClusterServiceVersion's non-ownership requirement", func() { - unassociated := operatorsv1alpha1.ClusterServiceVersion{ - ObjectMeta: metav1.ObjectMeta{ - Name: "unassociated-csv", - Namespace: ns.GetName(), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Required: []operatorsv1alpha1.CRDDescription{{ - Name: apifullname, - Version: "v1", - Kind: "Test", - }}, + It("can satisfy an associated ClusterServiceVersion's ownership requirement", func() { + associated := operatorsv1alpha1.ClusterServiceVersion{ + ObjectMeta: metav1.ObjectMeta{ + Name: "associated-csv", + Namespace: ns.GetName(), }, - InstallStrategy: newNginxInstallStrategy(genName("deployment-"), nil, nil), - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{{ + Name: apifullname, + Version: "v1", + Kind: "Test", + }}, + }, + InstallStrategy: newNginxInstallStrategy(genName("deployment-"), nil, nil), + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, }, }, - }, - } - Expect(ctx.Ctx().Client().Create(context.Background(), &unassociated)).To(Succeed()) - - Eventually(func() ([]operatorsv1alpha1.RequirementStatus, error) { - if err := ctx.Ctx().Client().Get(context.Background(), client.ObjectKeyFromObject(&unassociated), &unassociated); err != nil { - return nil, err } - var result []operatorsv1alpha1.RequirementStatus - for _, s := range unassociated.Status.RequirementStatus { - result = append(result, operatorsv1alpha1.RequirementStatus{ - Group: s.Group, - Version: s.Version, - Kind: s.Kind, - Name: s.Name, - Status: s.Status, - }) - } - return result, nil - }).Should(ContainElement( - operatorsv1alpha1.RequirementStatus{ - Group: apiextensionsv1.SchemeGroupVersion.Group, - Version: apiextensionsv1.SchemeGroupVersion.Version, - Kind: "CustomResourceDefinition", - Name: crd.GetName(), - Status: operatorsv1alpha1.RequirementStatusReasonPresent, - }, - )) - Eventually(func() error { - return ctx.Ctx().Client().Delete(context.Background(), &unassociated) - }).Should(Succeed()) - }) - - When("an unassociated ClusterServiceVersion in different namespace owns the same CRD", func() { - var ( - ns corev1.Namespace - ) + Expect(ctx.Ctx().Client().Create(context.Background(), &associated)).To(Succeed()) - BeforeEach(func() { - ns = corev1.Namespace{ - ObjectMeta: metav1.ObjectMeta{ - Name: genName("test-namespace-2-"), + Eventually(func() ([]operatorsv1alpha1.RequirementStatus, error) { + if err := ctx.Ctx().Client().Get(context.Background(), client.ObjectKeyFromObject(&associated), &associated); err != nil { + return nil, err + } + var result []operatorsv1alpha1.RequirementStatus + for _, s := range associated.Status.RequirementStatus { + result = append(result, operatorsv1alpha1.RequirementStatus{ + Group: s.Group, + Version: s.Version, + Kind: s.Kind, + Name: s.Name, + Status: s.Status, + }) + } + return result, nil + }).Should(ContainElement( + operatorsv1alpha1.RequirementStatus{ + Group: apiextensionsv1.SchemeGroupVersion.Group, + Version: apiextensionsv1.SchemeGroupVersion.Version, + Kind: "CustomResourceDefinition", + Name: crd.GetName(), + Status: operatorsv1alpha1.RequirementStatusReasonPresent, }, - } - Expect(ctx.Ctx().Client().Create(context.Background(), &ns)).To(Succeed()) + )) + + Eventually(func() error { + return ctx.Ctx().Client().Delete(context.Background(), &associated) + }).Should(Succeed()) + }) - og = operatorsv1.OperatorGroup{ + // Without this exception, upgrades can become blocked + // when the original CSV's CRD requirement becomes + // unsatisfied. + It("can satisfy an unassociated ClusterServiceVersion's ownership requirement if replaced by an associated ClusterServiceVersion", func() { + unassociated := operatorsv1alpha1.ClusterServiceVersion{ ObjectMeta: metav1.ObjectMeta{ - Name: fmt.Sprintf("%s-operatorgroup", ns.GetName()), + Name: "unassociated-csv", Namespace: ns.GetName(), }, - Spec: operatorsv1.OperatorGroupSpec{ - TargetNamespaces: []string{ns.GetName()}, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{{ + Name: apifullname, + Version: "v1", + Kind: "Test", + }}, + }, + InstallStrategy: newNginxInstallStrategy(genName("deployment-"), nil, nil), + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + }, }, } - Expect(ctx.Ctx().Client().Create(context.TODO(), &og)).To(Succeed()) - }) - - AfterEach(func() { - Eventually(func() error { - return ctx.Ctx().Client().Delete(context.Background(), &ns) - }).Should(WithTransform(apierrors.IsNotFound, BeTrue())) - }) + Expect(ctx.Ctx().Client().Create(context.Background(), &unassociated)).To(Succeed()) - It("can satisfy the unassociated ClusterServiceVersion's ownership requirement", func() { associated := operatorsv1alpha1.ClusterServiceVersion{ ObjectMeta: metav1.ObjectMeta{ Name: "associated-csv", @@ -369,10 +210,21 @@ var _ = Describe("ClusterServiceVersion", func() { Supported: true, }, }, + Replaces: unassociated.GetName(), }, } Expect(ctx.Ctx().Client().Create(context.Background(), &associated)).To(Succeed()) + Eventually(func() error { + return ctx.Ctx().Client().Get(context.Background(), client.ObjectKeyFromObject(&unassociated), &unassociated) + }).Should(WithTransform(apierrors.IsNotFound, BeTrue())) + + Eventually(func() error { + return ctx.Ctx().Client().Delete(context.Background(), &associated) + }).Should(Succeed()) + }) + + It("can satisfy an unassociated ClusterServiceVersion's non-ownership requirement", func() { unassociated := operatorsv1alpha1.ClusterServiceVersion{ ObjectMeta: metav1.ObjectMeta{ Name: "unassociated-csv", @@ -380,7 +232,7 @@ var _ = Describe("ClusterServiceVersion", func() { }, Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{{ + Required: []operatorsv1alpha1.CRDDescription{{ Name: apifullname, Version: "v1", Kind: "Test", @@ -421,4043 +273,3914 @@ var _ = Describe("ClusterServiceVersion", func() { Status: operatorsv1alpha1.RequirementStatusReasonPresent, }, )) + Eventually(func() error { + return ctx.Ctx().Client().Delete(context.Background(), &unassociated) + }).Should(Succeed()) }) }) - }) - When("a csv exists specifying two replicas with one max unavailable", func() { - var ( - csv operatorsv1alpha1.ClusterServiceVersion - ) + When("an unassociated ClusterServiceVersion in different namespace owns the same CRD", func() { - const ( - TestReadinessGate = "operatorframework.io/test-readiness-gate" - ) + var ( + crd apiextensionsv1.CustomResourceDefinition + apiname string + apifullname string + ) - BeforeEach(func() { - csv = operatorsv1alpha1.ClusterServiceVersion{ - ObjectMeta: metav1.ObjectMeta{ - GenerateName: "test-csv", - Namespace: testNamespace, - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: "deployment", - Spec: appsv1.DeploymentSpec{ - Strategy: appsv1.DeploymentStrategy{ - Type: appsv1.RollingUpdateDeploymentStrategyType, - RollingUpdate: &appsv1.RollingUpdateDeployment{ - MaxUnavailable: &[]intstr.IntOrString{intstr.FromInt(1)}[0], - }, - }, - Selector: &metav1.LabelSelector{ - MatchLabels: map[string]string{"app": "foobar"}, - }, - Replicas: &[]int32{2}[0], - Template: corev1.PodTemplateSpec{ - ObjectMeta: metav1.ObjectMeta{ - Labels: map[string]string{"app": "foobar"}, - }, - Spec: corev1.PodSpec{ - Containers: []corev1.Container{ - { - Name: "foobar", - Image: *dummyImage, - }, - }, - ReadinessGates: []corev1.PodReadinessGate{ - {ConditionType: TestReadinessGate}, - }, - }, - }, - }, + BeforeEach(func() { + apiname = genName("api") + apifullname = apiname + "s.example.com" + crd = apiextensionsv1.CustomResourceDefinition{ + ObjectMeta: metav1.ObjectMeta{ + Name: apifullname, + Annotations: map[string]string{ + "operatorframework.io/installed-alongside-0": fmt.Sprintf("%s/associated-csv", ns.GetName()), + }, + }, + Spec: apiextensionsv1.CustomResourceDefinitionSpec{ + Group: "example.com", + Scope: apiextensionsv1.ClusterScoped, + Names: apiextensionsv1.CustomResourceDefinitionNames{ + Plural: apiname + "s", + Singular: apiname, + Kind: strings.Title(apiname), + ListKind: strings.Title(apiname) + "List", + }, + Versions: []apiextensionsv1.CustomResourceDefinitionVersion{{ + Name: "v1", + Served: true, + Storage: true, + Schema: &apiextensionsv1.CustomResourceValidation{ + OpenAPIV3Schema: &apiextensionsv1.JSONSchemaProps{ + Type: "object", }, }, - }, + }}, }, - InstallModes: []operatorsv1alpha1.InstallMode{{ - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }}, - }, - } - Expect(ctx.Ctx().Client().Create(context.Background(), &csv)).To(Succeed()) - - Eventually(func() (*operatorsv1alpha1.ClusterServiceVersion, error) { - var ps corev1.PodList - if err := ctx.Ctx().Client().List(context.Background(), &ps, client.MatchingLabels{"app": "foobar"}); err != nil { - return nil, err - } - - if len(ps.Items) != 2 { - return nil, fmt.Errorf("%d pods match deployment selector, want %d", len(ps.Items), 2) - } - - for _, pod := range ps.Items { - index := -1 - for i, c := range pod.Status.Conditions { - if c.Type == TestReadinessGate { - index = i - break - } - } - if index == -1 { - index = len(pod.Status.Conditions) - pod.Status.Conditions = append(pod.Status.Conditions, corev1.PodCondition{Type: TestReadinessGate}) - } - if pod.Status.Conditions[index].Status == corev1.ConditionTrue { - continue - } - pod.Status.Conditions[index].Status = corev1.ConditionTrue - if err := ctx.Ctx().Client().Status().Update(context.Background(), &pod); err != nil { - return nil, err - } } + Eventually(func() error { + return ctx.Ctx().Client().Create(context.Background(), &crd) + }).Should(Succeed()) + }) - if err := ctx.Ctx().Client().Get(context.Background(), client.ObjectKeyFromObject(&csv), &csv); err != nil { - return nil, err + It("can satisfy the unassociated ClusterServiceVersion's ownership requirement", func() { + associated := operatorsv1alpha1.ClusterServiceVersion{ + ObjectMeta: metav1.ObjectMeta{ + Name: "associated-csv", + Namespace: ns.GetName(), + }, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{{ + Name: apifullname, + Version: "v1", + Kind: "Test", + }}, + }, + InstallStrategy: newNginxInstallStrategy(genName("deployment-"), nil, nil), + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + }, + }, } - return &csv, nil - }).Should(HavePhase(operatorsv1alpha1.CSVPhaseSucceeded)) + Expect(ctx.Ctx().Client().Create(context.Background(), &associated)).To(Succeed()) + + unassociated := operatorsv1alpha1.ClusterServiceVersion{ + ObjectMeta: metav1.ObjectMeta{ + Name: "unassociated-csv", + Namespace: ns.GetName(), + }, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{{ + Name: apifullname, + Version: "v1", + Kind: "Test", + }}, + }, + InstallStrategy: newNginxInstallStrategy(genName("deployment-"), nil, nil), + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + }, + }, + } + Expect(ctx.Ctx().Client().Create(context.Background(), &unassociated)).To(Succeed()) + + Eventually(func() ([]operatorsv1alpha1.RequirementStatus, error) { + if err := ctx.Ctx().Client().Get(context.Background(), client.ObjectKeyFromObject(&unassociated), &unassociated); err != nil { + return nil, err + } + var result []operatorsv1alpha1.RequirementStatus + for _, s := range unassociated.Status.RequirementStatus { + result = append(result, operatorsv1alpha1.RequirementStatus{ + Group: s.Group, + Version: s.Version, + Kind: s.Kind, + Name: s.Name, + Status: s.Status, + }) + } + return result, nil + }).Should(ContainElement( + operatorsv1alpha1.RequirementStatus{ + Group: apiextensionsv1.SchemeGroupVersion.Group, + Version: apiextensionsv1.SchemeGroupVersion.Version, + Kind: "CustomResourceDefinition", + Name: crd.GetName(), + Status: operatorsv1alpha1.RequirementStatusReasonPresent, + }, + )) + }) }) + }) + + Context("AllNamespaces OperatorGroup", func() { + BeforeEach(func() { + ns = SetupGeneratedTestNamespace(genName("csv-e2e-")) + }) + + When("a csv exists specifying two replicas with one max unavailable", func() { + var ( + csv operatorsv1alpha1.ClusterServiceVersion + ) + + const ( + TestReadinessGate = "operatorframework.io/test-readiness-gate" + ) - It("remains in phase Succeeded when only one pod is available", func() { - Eventually(func() int32 { - dep, err := c.GetDeployment(testNamespace, "deployment") - if err != nil || dep == nil { - return 0 + BeforeEach(func() { + csv = operatorsv1alpha1.ClusterServiceVersion{ + ObjectMeta: metav1.ObjectMeta{ + GenerateName: "test-csv", + Namespace: ns.GetName(), + }, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ + { + Name: "deployment", + Spec: appsv1.DeploymentSpec{ + Strategy: appsv1.DeploymentStrategy{ + Type: appsv1.RollingUpdateDeploymentStrategyType, + RollingUpdate: &appsv1.RollingUpdateDeployment{ + MaxUnavailable: &[]intstr.IntOrString{intstr.FromInt(1)}[0], + }, + }, + Selector: &metav1.LabelSelector{ + MatchLabels: map[string]string{"app": "foobar"}, + }, + Replicas: &[]int32{2}[0], + Template: corev1.PodTemplateSpec{ + ObjectMeta: metav1.ObjectMeta{ + Labels: map[string]string{"app": "foobar"}, + }, + Spec: corev1.PodSpec{ + Containers: []corev1.Container{ + { + Name: "foobar", + Image: *dummyImage, + }, + }, + ReadinessGates: []corev1.PodReadinessGate{ + {ConditionType: TestReadinessGate}, + }, + }, + }, + }, + }, + }, + }, + }, + InstallModes: []operatorsv1alpha1.InstallMode{{ + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }}, + }, } - return dep.Status.ReadyReplicas - }).Should(Equal(int32(2))) + Expect(ctx.Ctx().Client().Create(context.Background(), &csv)).To(Succeed()) + + Eventually(func() (*operatorsv1alpha1.ClusterServiceVersion, error) { + var ps corev1.PodList + if err := ctx.Ctx().Client().List(context.Background(), &ps, client.MatchingLabels{"app": "foobar"}); err != nil { + return nil, err + } + + if len(ps.Items) != 2 { + return nil, fmt.Errorf("%d pods match deployment selector, want %d", len(ps.Items), 2) + } + + for _, pod := range ps.Items { + index := -1 + for i, c := range pod.Status.Conditions { + if c.Type == TestReadinessGate { + index = i + break + } + } + if index == -1 { + index = len(pod.Status.Conditions) + pod.Status.Conditions = append(pod.Status.Conditions, corev1.PodCondition{Type: TestReadinessGate}) + } + if pod.Status.Conditions[index].Status == corev1.ConditionTrue { + continue + } + pod.Status.Conditions[index].Status = corev1.ConditionTrue + if err := ctx.Ctx().Client().Status().Update(context.Background(), &pod); err != nil { + return nil, err + } + } + + if err := ctx.Ctx().Client().Get(context.Background(), client.ObjectKeyFromObject(&csv), &csv); err != nil { + return nil, err + } + return &csv, nil + }).Should(CSVHasPhase(operatorsv1alpha1.CSVPhaseSucceeded)) + }) - var ps corev1.PodList - Expect(ctx.Ctx().Client().List(context.Background(), &ps, client.MatchingLabels{"app": "foobar"})).To(Succeed()) - Expect(ps.Items).To(Not(BeEmpty())) + It("remains in phase Succeeded when only one pod is available", func() { + Eventually(func() int32 { + dep, err := c.GetDeployment(ns.GetName(), "deployment") + if err != nil || dep == nil { + return 0 + } + return dep.Status.ReadyReplicas + }).Should(Equal(int32(2))) + + var ps corev1.PodList + Expect(ctx.Ctx().Client().List(context.Background(), &ps, client.MatchingLabels{"app": "foobar"})).To(Succeed()) + Expect(ps.Items).To(Not(BeEmpty())) - Expect(ctx.Ctx().Client().Delete(context.Background(), &ps.Items[0])).To(Succeed()) + Expect(ctx.Ctx().Client().Delete(context.Background(), &ps.Items[0])).To(Succeed()) - Consistently(func() (*operatorsv1alpha1.ClusterServiceVersion, error) { - return &csv, ctx.Ctx().Client().Get(context.Background(), client.ObjectKeyFromObject(&csv), &csv) - }).Should(HavePhase(operatorsv1alpha1.CSVPhaseSucceeded)) + Consistently(func() (*operatorsv1alpha1.ClusterServiceVersion, error) { + return &csv, ctx.Ctx().Client().Get(context.Background(), client.ObjectKeyFromObject(&csv), &csv) + }).Should(CSVHasPhase(operatorsv1alpha1.CSVPhaseSucceeded)) + }) }) - }) + When("a copied csv exists", func() { + var ( + target corev1.Namespace + original operatorsv1alpha1.ClusterServiceVersion + copyCSV operatorsv1alpha1.ClusterServiceVersion + ) + + BeforeEach(func() { + target = corev1.Namespace{ + ObjectMeta: metav1.ObjectMeta{ + GenerateName: "watched-", + }, + } + Expect(ctx.Ctx().Client().Create(context.Background(), &target)).To(Succeed()) + + original = operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, + }, + ObjectMeta: metav1.ObjectMeta{ + GenerateName: "csv-", + Namespace: ns.GetName(), + }, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + InstallStrategy: newNginxInstallStrategy(genName("csv-"), nil, nil), + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + }, + } + Expect(ctx.Ctx().Client().Create(context.Background(), &original)).To(Succeed()) + + Eventually(func() error { + key := client.ObjectKeyFromObject(&original) + key.Namespace = target.GetName() + return ctx.Ctx().Client().Get(context.Background(), key, ©CSV) + }).Should(Succeed()) + }) - When("a copied csv exists", func() { - var ( - target corev1.Namespace - original operatorsv1alpha1.ClusterServiceVersion - copy operatorsv1alpha1.ClusterServiceVersion - ) + AfterEach(func() { + if target.GetName() != "" { + Expect(ctx.Ctx().Client().Delete(context.Background(), &target)).To(Succeed()) + } + }) + + It("is synchronized with the original csv", func() { + Eventually(func() error { + key := client.ObjectKeyFromObject(©CSV) + + key.Namespace = target.Name + if err := ctx.Ctx().Client().Get(context.Background(), key, ©CSV); err != nil { + return err + } + + copyCSV.Status.LastUpdateTime = &metav1.Time{Time: time.Unix(1, 0)} + return ctx.Ctx().Client().Status().Update(context.Background(), ©CSV) + }).Should(Succeed()) + + Eventually(func() (bool, error) { + key := client.ObjectKeyFromObject(&original) + + if err := ctx.Ctx().Client().Get(context.Background(), key, &original); err != nil { + return false, err + } + + key.Namespace = target.Name + if err := ctx.Ctx().Client().Get(context.Background(), key, ©CSV); err != nil { + return false, err + } + + return original.Status.LastUpdateTime.Equal(copyCSV.Status.LastUpdateTime), nil + }).Should(BeTrue(), "Change to status of copy should have been reverted") + }) + }) + When("a csv requires a serviceaccount solely owned by a non-csv", func() { + var ( + cm corev1.ConfigMap + sa corev1.ServiceAccount + csv operatorsv1alpha1.ClusterServiceVersion + ) + + BeforeEach(func() { + cm = corev1.ConfigMap{ + ObjectMeta: metav1.ObjectMeta{ + GenerateName: "cm-", + Namespace: ns.GetName(), + }, + } + Expect(ctx.Ctx().Client().Create(context.Background(), &cm)).To(Succeed()) + + sa = corev1.ServiceAccount{ + ObjectMeta: metav1.ObjectMeta{ + GenerateName: "sa-", + Namespace: ns.GetName(), + OwnerReferences: []metav1.OwnerReference{ + { + Name: cm.GetName(), + APIVersion: corev1.SchemeGroupVersion.String(), + Kind: "ConfigMap", + UID: cm.GetUID(), + }, + }, + }, + } + Expect(ctx.Ctx().Client().Create(context.Background(), &sa)).To(Succeed()) + + csv = operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, + }, + ObjectMeta: metav1.ObjectMeta{ + GenerateName: "csv-", + Namespace: ns.GetName(), + }, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ + { + Name: "foo", + Spec: appsv1.DeploymentSpec{ + Selector: &metav1.LabelSelector{ + MatchLabels: map[string]string{"app": "foo"}, + }, + Template: corev1.PodTemplateSpec{ + ObjectMeta: metav1.ObjectMeta{ + Labels: map[string]string{"app": "foo"}, + }, + Spec: corev1.PodSpec{Containers: []corev1.Container{ + { + Name: genName("foo"), + Image: *dummyImage, + }, + }}, + }, + }, + }, + }, + Permissions: []operatorsv1alpha1.StrategyDeploymentPermissions{ + { + ServiceAccountName: sa.GetName(), + Rules: []rbacv1.PolicyRule{}, + }, + }, + }, + }, + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + }, + } + Expect(ctx.Ctx().Client().Create(context.Background(), &csv)).To(Succeed()) + }) + + AfterEach(func() { + if cm.GetName() != "" { + Expect(ctx.Ctx().Client().Delete(context.Background(), &cm)).To(Succeed()) + } + }) + + It("considers the serviceaccount requirement satisfied", func() { + Eventually(func() (operatorsv1alpha1.StatusReason, error) { + if err := ctx.Ctx().Client().Get(context.Background(), client.ObjectKeyFromObject(&csv), &csv); err != nil { + return "", err + } + for _, requirement := range csv.Status.RequirementStatus { + if requirement.Name != sa.GetName() { + continue + } + return requirement.Status, nil + } + return "", fmt.Errorf("missing expected requirement %q", sa.GetName()) + }).Should(Equal(operatorsv1alpha1.RequirementStatusReasonPresent)) + }) + }) + + It("create with unmet requirements min kube version", func() { + + depName := genName("dep-") + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, + }, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), + }, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "999.999.999", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: newNginxInstallStrategy(depName, nil, nil), + }, + } + + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() + + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvPendingChecker) + Expect(err).ShouldNot(HaveOccurred()) + + // Shouldn't create deployment + Consistently(func() bool { + _, err := c.GetDeployment(ns.GetName(), depName) + return apierrors.IsNotFound(err) + }).Should(BeTrue()) + }) + // TODO: same test but missing serviceaccount instead + It("create with unmet requirements CRD", func() { + + depName := genName("dep-") + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, + }, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), + }, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + + InstallStrategy: newNginxInstallStrategy(depName, nil, nil), + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + DisplayName: "Not In Cluster", + Description: "A CRD that is not currently in the cluster", + Name: "not.in.cluster.com", + Version: "v1alpha1", + Kind: "NotInCluster", + }, + }, + }, + }, + } + + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() + + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvPendingChecker) + Expect(err).ShouldNot(HaveOccurred()) + + // Shouldn't create deployment + Consistently(func() bool { + _, err := c.GetDeployment(ns.GetName(), depName) + return apierrors.IsNotFound(err) + }).Should(BeTrue()) + }) + + It("create with unmet permissions CRD", func() { + saName := genName("dep-") + permissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ + { + ServiceAccountName: saName, + Rules: []rbacv1.PolicyRule{ + { + Verbs: []string{"create"}, + APIGroups: []string{""}, + Resources: []string{"deployment"}, + }, + }, + }, + } - BeforeEach(func() { - target = corev1.Namespace{ - ObjectMeta: metav1.ObjectMeta{ - GenerateName: "watched-", + clusterPermissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ + { + ServiceAccountName: saName, + Rules: []rbacv1.PolicyRule{ + { + Verbs: []string{"get"}, + APIGroups: []string{""}, + Resources: []string{"deployment"}, + }, + }, }, } - Expect(ctx.Ctx().Client().Create(context.Background(), &target)).To(Succeed()) - original = operatorsv1alpha1.ClusterServiceVersion{ + crdPlural := genName("ins") + crdName := crdPlural + ".cluster.com" + depName := genName("dep-") + csv := operatorsv1alpha1.ClusterServiceVersion{ TypeMeta: metav1.TypeMeta{ Kind: operatorsv1alpha1.ClusterServiceVersionKind, APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, }, ObjectMeta: metav1.ObjectMeta{ - GenerateName: "csv-", - Namespace: testNamespace, + Name: genName("csv"), }, Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - InstallStrategy: newNginxInstallStrategy(genName("csv-"), nil, nil), InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, { Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, Supported: true, }, }, + InstallStrategy: newNginxInstallStrategy(depName, permissions, clusterPermissions), + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "v1alpha1", + Kind: crdPlural, + DisplayName: crdName, + Description: crdName, + }, + }, + }, }, } - Expect(ctx.Ctx().Client().Create(context.Background(), &original)).To(Succeed()) - - Eventually(func() error { - key := client.ObjectKeyFromObject(&original) - key.Namespace = target.GetName() - return ctx.Ctx().Client().Get(context.Background(), key, ©) - }).Should(Succeed()) - }) - AfterEach(func() { - if target.GetName() != "" { - Expect(ctx.Ctx().Client().Delete(context.Background(), &target)).To(Succeed()) - } - }) + // Create dependency first (CRD) + cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ + ObjectMeta: metav1.ObjectMeta{ + Name: crdName, + }, + Spec: apiextensions.CustomResourceDefinitionSpec{ + Group: "cluster.com", + Versions: []apiextensions.CustomResourceDefinitionVersion{ + { + Name: "v1alpha1", + Served: true, + Storage: true, + Schema: &apiextensions.CustomResourceValidation{ + OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ + Type: "object", + Description: "my crd schema", + }, + }, + }, + }, + Names: apiextensions.CustomResourceDefinitionNames{ + Plural: crdPlural, + Singular: crdPlural, + Kind: crdPlural, + ListKind: "list" + crdPlural, + }, + Scope: apiextensions.NamespaceScoped, + }, + }) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCRD() - It("is synchronized with the original csv", func() { - Eventually(func() error { - key := client.ObjectKeyFromObject(©) + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), true, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - key.Namespace = target.Name - if err := ctx.Ctx().Client().Get(context.Background(), key, ©); err != nil { - return err - } + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvPendingChecker) + Expect(err).ShouldNot(HaveOccurred()) - copy.Status.LastUpdateTime = &metav1.Time{Time: time.Unix(1, 0)} - return ctx.Ctx().Client().Status().Update(context.Background(), ©) - }).Should(Succeed()) + // Shouldn't create deployment + Consistently(func() bool { + _, err := c.GetDeployment(ns.GetName(), depName) + return apierrors.IsNotFound(err) + }).Should(BeTrue()) + }) + It("create with unmet requirements API service", func() { - Eventually(func() (bool, error) { - key := client.ObjectKeyFromObject(&original) + depName := genName("dep-") + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, + }, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), + }, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: newNginxInstallStrategy(depName, nil, nil), + APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ + Required: []operatorsv1alpha1.APIServiceDescription{ + { + DisplayName: "Not In Cluster", + Description: "An apiservice that is not currently in the cluster", + Group: "not.in.cluster.com", + Version: "v1alpha1", + Kind: "NotInCluster", + }, + }, + }, + }, + } - if err := ctx.Ctx().Client().Get(context.Background(), key, &original); err != nil { - return false, err - } + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - key.Namespace = target.Name - if err := ctx.Ctx().Client().Get(context.Background(), key, ©); err != nil { - return false, err - } + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvPendingChecker) + Expect(err).ShouldNot(HaveOccurred()) - return original.Status.LastUpdateTime.Equal(copy.Status.LastUpdateTime), nil - }).Should(BeTrue(), "Change to status of copy should have been reverted") + // Shouldn't create deployment + Consistently(func() bool { + _, err := c.GetDeployment(ns.GetName(), depName) + return apierrors.IsNotFound(err) + }).Should(BeTrue()) }) - }) - - When("a csv requires a serviceaccount solely owned by a non-csv", func() { - var ( - cm corev1.ConfigMap - sa corev1.ServiceAccount - csv operatorsv1alpha1.ClusterServiceVersion - ) + It("create with unmet permissions API service", func() { - BeforeEach(func() { - cm = corev1.ConfigMap{ - ObjectMeta: metav1.ObjectMeta{ - GenerateName: "cm-", - Namespace: testNamespace, + saName := genName("dep-") + permissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ + { + ServiceAccountName: saName, + Rules: []rbacv1.PolicyRule{ + { + Verbs: []string{"create"}, + APIGroups: []string{""}, + Resources: []string{"deployment"}, + }, + }, }, } - Expect(ctx.Ctx().Client().Create(context.Background(), &cm)).To(Succeed()) - sa = corev1.ServiceAccount{ - ObjectMeta: metav1.ObjectMeta{ - GenerateName: "sa-", - Namespace: testNamespace, - OwnerReferences: []metav1.OwnerReference{ + clusterPermissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ + { + ServiceAccountName: saName, + Rules: []rbacv1.PolicyRule{ { - Name: cm.GetName(), - APIVersion: corev1.SchemeGroupVersion.String(), - Kind: "ConfigMap", - UID: cm.GetUID(), + Verbs: []string{"get"}, + APIGroups: []string{""}, + Resources: []string{"deployment"}, }, }, }, } - Expect(ctx.Ctx().Client().Create(context.Background(), &sa)).To(Succeed()) - csv = operatorsv1alpha1.ClusterServiceVersion{ + depName := genName("dep-") + csv := operatorsv1alpha1.ClusterServiceVersion{ TypeMeta: metav1.TypeMeta{ Kind: operatorsv1alpha1.ClusterServiceVersionKind, APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, }, ObjectMeta: metav1.ObjectMeta{ - GenerateName: "csv-", - Namespace: testNamespace, + Name: genName("csv"), }, Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: "foo", - Spec: appsv1.DeploymentSpec{ - Selector: &metav1.LabelSelector{ - MatchLabels: map[string]string{"app": "foo"}, - }, - Template: corev1.PodTemplateSpec{ - ObjectMeta: metav1.ObjectMeta{ - Labels: map[string]string{"app": "foo"}, - }, - Spec: corev1.PodSpec{Containers: []corev1.Container{ - { - Name: genName("foo"), - Image: *dummyImage, - }, - }}, - }, - }, - }, - }, - Permissions: []operatorsv1alpha1.StrategyDeploymentPermissions{ - { - ServiceAccountName: sa.GetName(), - Rules: []rbacv1.PolicyRule{}, - }, - }, - }, - }, + MinKubeVersion: "0.0.0", InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, { Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, Supported: true, }, }, + InstallStrategy: newNginxInstallStrategy(depName, permissions, clusterPermissions), + // Cheating a little; this is an APIservice that will exist for the e2e tests + APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ + Required: []operatorsv1alpha1.APIServiceDescription{ + { + Group: "packages.operators.coreos.com", + Version: "v1", + Kind: "PackageManifest", + DisplayName: "Package Manifest", + Description: "An apiservice that exists", + }, + }, + }, }, } - Expect(ctx.Ctx().Client().Create(context.Background(), &csv)).To(Succeed()) - }) - AfterEach(func() { - if cm.GetName() != "" { - Expect(ctx.Ctx().Client().Delete(context.Background(), &cm)).To(Succeed()) - } - }) + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - It("considers the serviceaccount requirement satisfied", func() { - Eventually(func() (operatorsv1alpha1.StatusReason, error) { - if err := ctx.Ctx().Client().Get(context.Background(), client.ObjectKeyFromObject(&csv), &csv); err != nil { - return "", err - } - for _, requirement := range csv.Status.RequirementStatus { - if requirement.Name != sa.GetName() { - continue - } - return requirement.Status, nil - } - return "", fmt.Errorf("missing expected requirement %q", sa.GetName()) - }).Should(Equal(operatorsv1alpha1.RequirementStatusReasonPresent)) - }) - }) + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvPendingChecker) + Expect(err).ShouldNot(HaveOccurred()) - It("create with unmet requirements min kube version", func() { + // Shouldn't create deployment + Consistently(func() bool { + _, err := c.GetDeployment(ns.GetName(), depName) + return apierrors.IsNotFound(err) + }).Should(BeTrue()) + }) + It("create with unmet requirements native API", func() { - depName := genName("dep-") - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "999.999.999", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, + depName := genName("dep-") + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, }, - InstallStrategy: newNginxInstallStrategy(depName, nil, nil), - }, - } - - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() - - _, err = fetchCSV(crc, csv.Name, testNamespace, csvPendingChecker) - Expect(err).ShouldNot(HaveOccurred()) - - // Shouldn't create deployment - Consistently(func() bool { - _, err := c.GetDeployment(testNamespace, depName) - return apierrors.IsNotFound(err) - }).Should(BeTrue()) - }) - // TODO: same test but missing serviceaccount instead - It("create with unmet requirements CRD", func() { - - depName := genName("dep-") - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), }, - InstallStrategy: newNginxInstallStrategy(depName, nil, nil), - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, { - DisplayName: "Not In Cluster", - Description: "A CRD that is not currently in the cluster", - Name: "not.in.cluster.com", - Version: "v1alpha1", - Kind: "NotInCluster", + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, }, }, + InstallStrategy: newNginxInstallStrategy(depName, nil, nil), + NativeAPIs: []metav1.GroupVersionKind{{Group: "kubenative.io", Version: "v1", Kind: "Native"}}, }, - }, - } - - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() + } - _, err = fetchCSV(crc, csv.Name, testNamespace, csvPendingChecker) - Expect(err).ShouldNot(HaveOccurred()) + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - // Shouldn't create deployment - Consistently(func() bool { - _, err := c.GetDeployment(testNamespace, depName) - return apierrors.IsNotFound(err) - }).Should(BeTrue()) - }) + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvPendingChecker) + Expect(err).ShouldNot(HaveOccurred()) - It("create with unmet permissions CRD", func() { + // Shouldn't create deployment + Consistently(func() bool { + _, err := c.GetDeployment(ns.GetName(), depName) + return apierrors.IsNotFound(err) + }).Should(BeTrue()) + }) + // TODO: same test but create serviceaccount instead + It("create requirements met CRD", func() { - saName := genName("dep-") - permissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ - { - ServiceAccountName: saName, - Rules: []rbacv1.PolicyRule{ - { - Verbs: []string{"create"}, - APIGroups: []string{""}, - Resources: []string{"deployment"}, + saName := genName("sa-") + permissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ + { + ServiceAccountName: saName, + Rules: []rbacv1.PolicyRule{ + { + Verbs: []string{"create"}, + APIGroups: []string{""}, + Resources: []string{"deployment"}, + }, }, }, - }, - } + } - clusterPermissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ - { - ServiceAccountName: saName, - Rules: []rbacv1.PolicyRule{ - { - Verbs: []string{"get"}, - APIGroups: []string{""}, - Resources: []string{"deployment"}, + clusterPermissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ + { + ServiceAccountName: saName, + Rules: []rbacv1.PolicyRule{ + { + Verbs: []string{"get"}, + APIGroups: []string{""}, + Resources: []string{"deployment"}, + }, + { + Verbs: []string{"put", "post", "get"}, + NonResourceURLs: []string{"/osb", "/osb/*"}, + }, }, }, - }, - } + } - crdPlural := genName("ins") - crdName := crdPlural + ".cluster.com" - depName := genName("dep-") - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, + crdPlural := genName("ins") + crdName := crdPlural + ".cluster.com" + depName := genName("dep-") + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, }, - InstallStrategy: newNginxInstallStrategy(depName, permissions, clusterPermissions), - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), + }, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ { - Name: crdName, - Version: "v1alpha1", - Kind: crdPlural, - DisplayName: crdName, - Description: crdName, + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, }, - }, - }, - }, - } - - // Create dependency first (CRD) - cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ - ObjectMeta: metav1.ObjectMeta{ - Name: crdName, - }, - Spec: apiextensions.CustomResourceDefinitionSpec{ - Group: "cluster.com", - Versions: []apiextensions.CustomResourceDefinitionVersion{ - { - Name: "v1alpha1", - Served: true, - Storage: true, - Schema: &apiextensions.CustomResourceValidation{ - OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ - Type: "object", - Description: "my crd schema", + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: newNginxInstallStrategy(depName, permissions, clusterPermissions), + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "v1alpha1", + Kind: crdPlural, + DisplayName: crdName, + Description: crdName, }, }, }, }, - Names: apiextensions.CustomResourceDefinitionNames{ - Plural: crdPlural, - Singular: crdPlural, - Kind: crdPlural, - ListKind: "list" + crdPlural, - }, - Scope: apiextensions.NamespaceScoped, - }, - }) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCRD() - - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, true, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() + } - _, err = fetchCSV(crc, csv.Name, testNamespace, csvPendingChecker) - Expect(err).ShouldNot(HaveOccurred()) + // Create CSV first, knowing it will fail + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), true, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - // Shouldn't create deployment - Consistently(func() bool { - _, err := c.GetDeployment(testNamespace, depName) - return apierrors.IsNotFound(err) - }).Should(BeTrue()) - }) - It("create with unmet requirements API service", func() { + fetchedCSV, err := fetchCSV(crc, csv.Name, ns.GetName(), csvPendingChecker) + Expect(err).ShouldNot(HaveOccurred()) - depName := genName("dep-") - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, + sa := corev1.ServiceAccount{} + sa.SetName(saName) + sa.SetNamespace(ns.GetName()) + sa.SetOwnerReferences([]metav1.OwnerReference{{ + Name: fetchedCSV.GetName(), APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + UID: fetchedCSV.GetUID(), + }}) + _, err = c.CreateServiceAccount(&sa) + Expect(err).ShouldNot(HaveOccurred(), "could not create ServiceAccount %#v", sa) + + crd := apiextensions.CustomResourceDefinition{ + ObjectMeta: metav1.ObjectMeta{ + Name: crdName, }, - InstallStrategy: newNginxInstallStrategy(depName, nil, nil), - APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ - Required: []operatorsv1alpha1.APIServiceDescription{ + Spec: apiextensions.CustomResourceDefinitionSpec{ + Group: "cluster.com", + Versions: []apiextensions.CustomResourceDefinitionVersion{ { - DisplayName: "Not In Cluster", - Description: "An apiservice that is not currently in the cluster", - Group: "not.in.cluster.com", - Version: "v1alpha1", - Kind: "NotInCluster", + Name: "v1alpha1", + Served: true, + Storage: true, + Schema: &apiextensions.CustomResourceValidation{ + OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ + Type: "object", + Description: "my crd schema", + }, + }, }, }, - }, - }, - } - - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() - - _, err = fetchCSV(crc, csv.Name, testNamespace, csvPendingChecker) - Expect(err).ShouldNot(HaveOccurred()) - - // Shouldn't create deployment - Consistently(func() bool { - _, err := c.GetDeployment(testNamespace, depName) - return apierrors.IsNotFound(err) - }).Should(BeTrue()) - }) - It("create with unmet permissions API service", func() { - - saName := genName("dep-") - permissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ - { - ServiceAccountName: saName, - Rules: []rbacv1.PolicyRule{ - { - Verbs: []string{"create"}, - APIGroups: []string{""}, - Resources: []string{"deployment"}, + Names: apiextensions.CustomResourceDefinitionNames{ + Plural: crdPlural, + Singular: crdPlural, + Kind: crdPlural, + ListKind: "list" + crdPlural, }, + Scope: apiextensions.NamespaceScoped, }, - }, - } + } + crd.SetOwnerReferences([]metav1.OwnerReference{{ + Name: fetchedCSV.GetName(), + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + UID: fetchedCSV.GetUID(), + }}) + cleanupCRD, err := createCRD(c, crd) + defer cleanupCRD() + Expect(err).ShouldNot(HaveOccurred()) - clusterPermissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ - { - ServiceAccountName: saName, + // Create Role/Cluster Roles and RoleBindings + role := rbacv1.Role{ Rules: []rbacv1.PolicyRule{ { - Verbs: []string{"get"}, + Verbs: []string{"create"}, APIGroups: []string{""}, Resources: []string{"deployment"}, }, }, - }, - } + } + role.SetName(genName("dep-")) + role.SetNamespace(ns.GetName()) + _, err = c.CreateRole(&role) + Expect(err).ShouldNot(HaveOccurred(), "could not create Role") - depName := genName("dep-") - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, + roleBinding := rbacv1.RoleBinding{ + Subjects: []rbacv1.Subject{ { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, - }, - InstallStrategy: newNginxInstallStrategy(depName, permissions, clusterPermissions), - // Cheating a little; this is an APIservice that will exist for the e2e tests - APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ - Required: []operatorsv1alpha1.APIServiceDescription{ - { - Group: "packages.operators.coreos.com", - Version: "v1", - Kind: "PackageManifest", - DisplayName: "Package Manifest", - Description: "An apiservice that exists", - }, + Kind: "ServiceAccount", + APIGroup: "", + Name: sa.GetName(), + Namespace: sa.GetNamespace(), }, }, - }, - } - - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() - - _, err = fetchCSV(crc, csv.Name, testNamespace, csvPendingChecker) - Expect(err).ShouldNot(HaveOccurred()) - - // Shouldn't create deployment - Consistently(func() bool { - _, err := c.GetDeployment(testNamespace, depName) - return apierrors.IsNotFound(err) - }).Should(BeTrue()) - }) - It("create with unmet requirements native API", func() { - - depName := genName("dep-") - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, + RoleRef: rbacv1.RoleRef{ + APIGroup: "rbac.authorization.k8s.io", + Kind: "Role", + Name: role.GetName(), }, - InstallStrategy: newNginxInstallStrategy(depName, nil, nil), - NativeAPIs: []metav1.GroupVersionKind{{Group: "kubenative.io", Version: "v1", Kind: "Native"}}, - }, - } - - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() - - _, err = fetchCSV(crc, csv.Name, testNamespace, csvPendingChecker) - Expect(err).ShouldNot(HaveOccurred()) - - // Shouldn't create deployment - Consistently(func() bool { - _, err := c.GetDeployment(testNamespace, depName) - return apierrors.IsNotFound(err) - }).Should(BeTrue()) - }) - // TODO: same test but create serviceaccount instead - It("create requirements met CRD", func() { + } + roleBinding.SetName(genName("dep-")) + roleBinding.SetNamespace(ns.GetName()) + _, err = c.CreateRoleBinding(&roleBinding) + Expect(err).ShouldNot(HaveOccurred(), "could not create RoleBinding") - saName := genName("sa-") - permissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ - { - ServiceAccountName: saName, + clusterRole := rbacv1.ClusterRole{ Rules: []rbacv1.PolicyRule{ { - Verbs: []string{"create"}, + Verbs: []string{"get"}, APIGroups: []string{""}, Resources: []string{"deployment"}, }, }, - }, - } + } + clusterRole.SetName(genName("dep-")) + _, err = c.CreateClusterRole(&clusterRole) + Expect(err).ShouldNot(HaveOccurred(), "could not create ClusterRole") - clusterPermissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ - { - ServiceAccountName: saName, + nonResourceClusterRole := rbacv1.ClusterRole{ Rules: []rbacv1.PolicyRule{ - { - Verbs: []string{"get"}, - APIGroups: []string{""}, - Resources: []string{"deployment"}, - }, { Verbs: []string{"put", "post", "get"}, NonResourceURLs: []string{"/osb", "/osb/*"}, }, }, - }, - } + } + nonResourceClusterRole.SetName(genName("dep-")) + _, err = c.CreateClusterRole(&nonResourceClusterRole) + Expect(err).ShouldNot(HaveOccurred(), "could not create ClusterRole") - crdPlural := genName("ins") - crdName := crdPlural + ".cluster.com" - depName := genName("dep-") - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, + clusterRoleBinding := rbacv1.ClusterRoleBinding{ + Subjects: []rbacv1.Subject{ { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + Kind: "ServiceAccount", + APIGroup: "", + Name: sa.GetName(), + Namespace: sa.GetNamespace(), }, }, - InstallStrategy: newNginxInstallStrategy(depName, permissions, clusterPermissions), - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ - { - Name: crdName, - Version: "v1alpha1", - Kind: crdPlural, - DisplayName: crdName, - Description: crdName, - }, - }, + RoleRef: rbacv1.RoleRef{ + APIGroup: "rbac.authorization.k8s.io", + Kind: "ClusterRole", + Name: clusterRole.GetName(), }, - }, - } - - // Create CSV first, knowing it will fail - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, true, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() - - fetchedCSV, err := fetchCSV(crc, csv.Name, testNamespace, csvPendingChecker) - Expect(err).ShouldNot(HaveOccurred()) + } + clusterRoleBinding.SetName(genName("dep-")) + _, err = c.CreateClusterRoleBinding(&clusterRoleBinding) + Expect(err).ShouldNot(HaveOccurred(), "could not create ClusterRoleBinding") - sa := corev1.ServiceAccount{} - sa.SetName(saName) - sa.SetNamespace(testNamespace) - sa.SetOwnerReferences([]metav1.OwnerReference{{ - Name: fetchedCSV.GetName(), - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - UID: fetchedCSV.GetUID(), - }}) - _, err = c.CreateServiceAccount(&sa) - Expect(err).ShouldNot(HaveOccurred(), "could not create ServiceAccount %#v", sa) - - crd := apiextensions.CustomResourceDefinition{ - ObjectMeta: metav1.ObjectMeta{ - Name: crdName, - }, - Spec: apiextensions.CustomResourceDefinitionSpec{ - Group: "cluster.com", - Versions: []apiextensions.CustomResourceDefinitionVersion{ + nonResourceClusterRoleBinding := rbacv1.ClusterRoleBinding{ + Subjects: []rbacv1.Subject{ { - Name: "v1alpha1", - Served: true, - Storage: true, - Schema: &apiextensions.CustomResourceValidation{ - OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ - Type: "object", - Description: "my crd schema", - }, - }, + Kind: "ServiceAccount", + APIGroup: "", + Name: sa.GetName(), + Namespace: sa.GetNamespace(), }, }, - Names: apiextensions.CustomResourceDefinitionNames{ - Plural: crdPlural, - Singular: crdPlural, - Kind: crdPlural, - ListKind: "list" + crdPlural, + RoleRef: rbacv1.RoleRef{ + APIGroup: "rbac.authorization.k8s.io", + Kind: "ClusterRole", + Name: nonResourceClusterRole.GetName(), }, - Scope: apiextensions.NamespaceScoped, - }, - } - crd.SetOwnerReferences([]metav1.OwnerReference{{ - Name: fetchedCSV.GetName(), - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - UID: fetchedCSV.GetUID(), - }}) - cleanupCRD, err := createCRD(c, crd) - defer cleanupCRD() - Expect(err).ShouldNot(HaveOccurred()) + } + nonResourceClusterRoleBinding.SetName(genName("dep-")) + _, err = c.CreateClusterRoleBinding(&nonResourceClusterRoleBinding) + Expect(err).ShouldNot(HaveOccurred(), "could not create ClusterRoleBinding") - // Create Role/Cluster Roles and RoleBindings - role := rbacv1.Role{ - Rules: []rbacv1.PolicyRule{ - { - Verbs: []string{"create"}, - APIGroups: []string{""}, - Resources: []string{"deployment"}, - }, - }, - } - role.SetName(genName("dep-")) - role.SetNamespace(testNamespace) - _, err = c.CreateRole(&role) - Expect(err).ShouldNot(HaveOccurred(), "could not create Role") + ctx.Ctx().Logf("checking for deployment") + // Poll for deployment to be ready + Eventually(func() (bool, error) { + dep, err := c.GetDeployment(ns.GetName(), depName) + if apierrors.IsNotFound(err) { + ctx.Ctx().Logf("deployment %s not found\n", depName) + return false, nil + } else if err != nil { + ctx.Ctx().Logf("unexpected error fetching deployment %s\n", depName) + return false, err + } + if dep.Status.UpdatedReplicas == *(dep.Spec.Replicas) && + dep.Status.Replicas == *(dep.Spec.Replicas) && + dep.Status.AvailableReplicas == *(dep.Spec.Replicas) { + ctx.Ctx().Logf("deployment ready") + return true, nil + } + ctx.Ctx().Logf("deployment not ready") + return false, nil + }).Should(BeTrue()) - roleBinding := rbacv1.RoleBinding{ - Subjects: []rbacv1.Subject{ - { - Kind: "ServiceAccount", - APIGroup: "", - Name: sa.GetName(), - Namespace: sa.GetNamespace(), - }, - }, - RoleRef: rbacv1.RoleRef{ - APIGroup: "rbac.authorization.k8s.io", - Kind: "Role", - Name: role.GetName(), - }, - } - roleBinding.SetName(genName("dep-")) - roleBinding.SetNamespace(testNamespace) - _, err = c.CreateRoleBinding(&roleBinding) - Expect(err).ShouldNot(HaveOccurred(), "could not create RoleBinding") + fetchedCSV, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - clusterRole := rbacv1.ClusterRole{ - Rules: []rbacv1.PolicyRule{ - { - Verbs: []string{"get"}, - APIGroups: []string{""}, - Resources: []string{"deployment"}, - }, - }, - } - clusterRole.SetName(genName("dep-")) - _, err = c.CreateClusterRole(&clusterRole) - Expect(err).ShouldNot(HaveOccurred(), "could not create ClusterRole") + // Delete CRD + cleanupCRD() - nonResourceClusterRole := rbacv1.ClusterRole{ - Rules: []rbacv1.PolicyRule{ - { - Verbs: []string{"put", "post", "get"}, - NonResourceURLs: []string{"/osb", "/osb/*"}, - }, - }, - } - nonResourceClusterRole.SetName(genName("dep-")) - _, err = c.CreateClusterRole(&nonResourceClusterRole) - Expect(err).ShouldNot(HaveOccurred(), "could not create ClusterRole") + // Wait for CSV failure + fetchedCSV, err = fetchCSV(crc, csv.Name, ns.GetName(), csvPendingChecker) + Expect(err).ShouldNot(HaveOccurred()) + + // Recreate the CRD + cleanupCRD, err = createCRD(c, crd) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCRD() + + // Wait for CSV success again + fetchedCSV, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) + }) + It("create requirements met API service", func() { - clusterRoleBinding := rbacv1.ClusterRoleBinding{ - Subjects: []rbacv1.Subject{ + sa := corev1.ServiceAccount{} + sa.SetName(genName("sa-")) + sa.SetNamespace(ns.GetName()) + _, err := c.CreateServiceAccount(&sa) + Expect(err).ShouldNot(HaveOccurred(), "could not create ServiceAccount") + + permissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ { - Kind: "ServiceAccount", - APIGroup: "", - Name: sa.GetName(), - Namespace: sa.GetNamespace(), + ServiceAccountName: sa.GetName(), + Rules: []rbacv1.PolicyRule{ + { + Verbs: []string{"create"}, + APIGroups: []string{""}, + Resources: []string{"deployment"}, + }, + }, }, - }, - RoleRef: rbacv1.RoleRef{ - APIGroup: "rbac.authorization.k8s.io", - Kind: "ClusterRole", - Name: clusterRole.GetName(), - }, - } - clusterRoleBinding.SetName(genName("dep-")) - _, err = c.CreateClusterRoleBinding(&clusterRoleBinding) - Expect(err).ShouldNot(HaveOccurred(), "could not create ClusterRoleBinding") + } - nonResourceClusterRoleBinding := rbacv1.ClusterRoleBinding{ - Subjects: []rbacv1.Subject{ + clusterPermissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ { - Kind: "ServiceAccount", - APIGroup: "", - Name: sa.GetName(), - Namespace: sa.GetNamespace(), + ServiceAccountName: sa.GetName(), + Rules: []rbacv1.PolicyRule{ + { + Verbs: []string{"get"}, + APIGroups: []string{""}, + Resources: []string{"deployment"}, + }, + }, }, - }, - RoleRef: rbacv1.RoleRef{ - APIGroup: "rbac.authorization.k8s.io", - Kind: "ClusterRole", - Name: nonResourceClusterRole.GetName(), - }, - } - nonResourceClusterRoleBinding.SetName(genName("dep-")) - _, err = c.CreateClusterRoleBinding(&nonResourceClusterRoleBinding) - Expect(err).ShouldNot(HaveOccurred(), "could not create ClusterRoleBinding") - - ctx.Ctx().Logf("checking for deployment") - // Poll for deployment to be ready - Eventually(func() (bool, error) { - dep, err := c.GetDeployment(testNamespace, depName) - if apierrors.IsNotFound(err) { - ctx.Ctx().Logf("deployment %s not found\n", depName) - return false, nil - } else if err != nil { - ctx.Ctx().Logf("unexpected error fetching deployment %s\n", depName) - return false, err } - if dep.Status.UpdatedReplicas == *(dep.Spec.Replicas) && - dep.Status.Replicas == *(dep.Spec.Replicas) && - dep.Status.AvailableReplicas == *(dep.Spec.Replicas) { - ctx.Ctx().Logf("deployment ready") - return true, nil - } - ctx.Ctx().Logf("deployment not ready") - return false, nil - }).Should(BeTrue()) - - fetchedCSV, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) - - // Delete CRD - cleanupCRD() - - // Wait for CSV failure - fetchedCSV, err = fetchCSV(crc, csv.Name, testNamespace, csvPendingChecker) - Expect(err).ShouldNot(HaveOccurred()) - - // Recreate the CRD - cleanupCRD, err = createCRD(c, crd) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCRD() - - // Wait for CSV success again - fetchedCSV, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) - }) - It("create requirements met API service", func() { - - sa := corev1.ServiceAccount{} - sa.SetName(genName("sa-")) - sa.SetNamespace(testNamespace) - _, err := c.CreateServiceAccount(&sa) - Expect(err).ShouldNot(HaveOccurred(), "could not create ServiceAccount") - permissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ - { - ServiceAccountName: sa.GetName(), - Rules: []rbacv1.PolicyRule{ - { - Verbs: []string{"create"}, - APIGroups: []string{""}, - Resources: []string{"deployment"}, + depName := genName("dep-") + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, + }, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), + }, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: newNginxInstallStrategy(depName, permissions, clusterPermissions), + // Cheating a little; this is an APIservice that will exist for the e2e tests + APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ + Required: []operatorsv1alpha1.APIServiceDescription{ + { + Group: "packages.operators.coreos.com", + Version: "v1", + Kind: "PackageManifest", + DisplayName: "Package Manifest", + Description: "An apiservice that exists", + }, + }, }, }, - }, - } + } - clusterPermissions := []operatorsv1alpha1.StrategyDeploymentPermissions{ - { - ServiceAccountName: sa.GetName(), + // Create Role/Cluster Roles and RoleBindings + role := rbacv1.Role{ Rules: []rbacv1.PolicyRule{ { - Verbs: []string{"get"}, + Verbs: []string{"create"}, APIGroups: []string{""}, Resources: []string{"deployment"}, }, }, - }, - } + } + role.SetName(genName("dep-")) + role.SetNamespace(ns.GetName()) + _, err = c.CreateRole(&role) + Expect(err).ShouldNot(HaveOccurred(), "could not create Role") - depName := genName("dep-") - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, + roleBinding := rbacv1.RoleBinding{ + Subjects: []rbacv1.Subject{ { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, - }, - InstallStrategy: newNginxInstallStrategy(depName, permissions, clusterPermissions), - // Cheating a little; this is an APIservice that will exist for the e2e tests - APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ - Required: []operatorsv1alpha1.APIServiceDescription{ - { - Group: "packages.operators.coreos.com", - Version: "v1", - Kind: "PackageManifest", - DisplayName: "Package Manifest", - Description: "An apiservice that exists", - }, + Kind: "ServiceAccount", + APIGroup: "", + Name: sa.GetName(), + Namespace: sa.GetNamespace(), }, }, - }, - } - - // Create Role/Cluster Roles and RoleBindings - role := rbacv1.Role{ - Rules: []rbacv1.PolicyRule{ - { - Verbs: []string{"create"}, - APIGroups: []string{""}, - Resources: []string{"deployment"}, + RoleRef: rbacv1.RoleRef{ + APIGroup: "rbac.authorization.k8s.io", + Kind: "Role", + Name: role.GetName(), }, - }, - } - role.SetName(genName("dep-")) - role.SetNamespace(testNamespace) - _, err = c.CreateRole(&role) - Expect(err).ShouldNot(HaveOccurred(), "could not create Role") + } + roleBinding.SetName(genName("dep-")) + roleBinding.SetNamespace(ns.GetName()) + _, err = c.CreateRoleBinding(&roleBinding) + Expect(err).ShouldNot(HaveOccurred(), "could not create RoleBinding") - roleBinding := rbacv1.RoleBinding{ - Subjects: []rbacv1.Subject{ - { - Kind: "ServiceAccount", - APIGroup: "", - Name: sa.GetName(), - Namespace: sa.GetNamespace(), + clusterRole := rbacv1.ClusterRole{ + Rules: []rbacv1.PolicyRule{ + { + Verbs: []string{"get"}, + APIGroups: []string{""}, + Resources: []string{"deployment"}, + }, }, - }, - RoleRef: rbacv1.RoleRef{ - APIGroup: "rbac.authorization.k8s.io", - Kind: "Role", - Name: role.GetName(), - }, - } - roleBinding.SetName(genName("dep-")) - roleBinding.SetNamespace(testNamespace) - _, err = c.CreateRoleBinding(&roleBinding) - Expect(err).ShouldNot(HaveOccurred(), "could not create RoleBinding") + } + clusterRole.SetName(genName("dep-")) + _, err = c.CreateClusterRole(&clusterRole) + Expect(err).ShouldNot(HaveOccurred(), "could not create ClusterRole") - clusterRole := rbacv1.ClusterRole{ - Rules: []rbacv1.PolicyRule{ - { - Verbs: []string{"get"}, - APIGroups: []string{""}, - Resources: []string{"deployment"}, + clusterRoleBinding := rbacv1.ClusterRoleBinding{ + Subjects: []rbacv1.Subject{ + { + Kind: "ServiceAccount", + APIGroup: "", + Name: sa.GetName(), + Namespace: sa.GetNamespace(), + }, }, - }, - } - clusterRole.SetName(genName("dep-")) - _, err = c.CreateClusterRole(&clusterRole) - Expect(err).ShouldNot(HaveOccurred(), "could not create ClusterRole") - - clusterRoleBinding := rbacv1.ClusterRoleBinding{ - Subjects: []rbacv1.Subject{ - { - Kind: "ServiceAccount", - APIGroup: "", - Name: sa.GetName(), - Namespace: sa.GetNamespace(), + RoleRef: rbacv1.RoleRef{ + APIGroup: "rbac.authorization.k8s.io", + Kind: "ClusterRole", + Name: clusterRole.GetName(), }, - }, - RoleRef: rbacv1.RoleRef{ - APIGroup: "rbac.authorization.k8s.io", - Kind: "ClusterRole", - Name: clusterRole.GetName(), - }, - } - clusterRoleBinding.SetName(genName("dep-")) - _, err = c.CreateClusterRoleBinding(&clusterRoleBinding) - Expect(err).ShouldNot(HaveOccurred(), "could not create ClusterRoleBinding") + } + clusterRoleBinding.SetName(genName("dep-")) + _, err = c.CreateClusterRoleBinding(&clusterRoleBinding) + Expect(err).ShouldNot(HaveOccurred(), "could not create ClusterRoleBinding") - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - fetchedCSV, err := fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + fetchedCSV, err := fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - // Fetch cluster service version again to check for unnecessary control loops - sameCSV, err := fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) - Expect(equality.Semantic.DeepEqual(fetchedCSV, sameCSV)).Should(BeTrue(), diff.ObjectDiff(fetchedCSV, sameCSV)) - }) - It("create with owned API service", func() { - - depName := genName("hat-server") - mockGroup := fmt.Sprintf("hats.%s.redhat.com", genName("")) - version := "v1alpha1" - mockGroupVersion := strings.Join([]string{mockGroup, version}, "/") - mockKinds := []string{"fez", "fedora"} - depSpec := newMockExtServerDeployment(depName, []mockGroupVersionKind{{depName, mockGroupVersion, mockKinds, 5443}}) - apiServiceName := strings.Join([]string{version, mockGroup}, ".") - - // Create CSV for the package-server - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: depName, - Spec: depSpec, - }, - }, - } + // Fetch cluster service version again to check for unnecessary control loops + sameCSV, err := fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) + Expect(equality.Semantic.DeepEqual(fetchedCSV, sameCSV)).Should(BeTrue(), diff.ObjectDiff(fetchedCSV, sameCSV)) + }) + It("create with owned API service", func() { - owned := make([]operatorsv1alpha1.APIServiceDescription, len(mockKinds)) - for i, kind := range mockKinds { - owned[i] = operatorsv1alpha1.APIServiceDescription{ - Name: apiServiceName, - Group: mockGroup, - Version: version, - Kind: kind, - DeploymentName: depName, - ContainerPort: int32(5443), - DisplayName: kind, - Description: fmt.Sprintf("A %s", kind), - } - } + depName := genName("hat-server") + mockGroup := fmt.Sprintf("hats.%s.redhat.com", genName("")) + version := "v1alpha1" + mockGroupVersion := strings.Join([]string{mockGroup, version}, "/") + mockKinds := []string{"fez", "fedora"} + depSpec := newMockExtServerDeployment(depName, []mockGroupVersionKind{{depName, mockGroupVersion, mockKinds, 5443}}) + apiServiceName := strings.Join([]string{version, mockGroup}, ".") - csv := operatorsv1alpha1.ClusterServiceVersion{ - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ + // Create CSV for the package-server + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, + Name: depName, + Spec: depSpec, }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, + }, + } + + owned := make([]operatorsv1alpha1.APIServiceDescription, len(mockKinds)) + for i, kind := range mockKinds { + owned[i] = operatorsv1alpha1.APIServiceDescription{ + Name: apiServiceName, + Group: mockGroup, + Version: version, + Kind: kind, + DeploymentName: depName, + ContainerPort: int32(5443), + DisplayName: kind, + Description: fmt.Sprintf("A %s", kind), + } + } + + csv := operatorsv1alpha1.ClusterServiceVersion{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ + Owned: owned, }, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, - }, - APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ - Owned: owned, - }, - }, - } - csv.SetName(depName) + } + csv.SetName(depName) - // Create the APIService CSV - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) - defer func() { - watcher, err := c.ApiregistrationV1Interface().ApiregistrationV1().APIServices().Watch(context.TODO(), metav1.ListOptions{FieldSelector: "metadata.name=" + apiServiceName}) + // Create the APIService CSV + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, false) Expect(err).ShouldNot(HaveOccurred()) - - deleted := make(chan struct{}) - go func() { - defer GinkgoRecover() - events := watcher.ResultChan() - for { - select { - case evt := <-events: - if evt.Type == watch.Deleted { - deleted <- struct{}{} - return + defer func() { + watcher, err := c.ApiregistrationV1Interface().ApiregistrationV1().APIServices().Watch(context.TODO(), metav1.ListOptions{FieldSelector: "metadata.name=" + apiServiceName}) + Expect(err).ShouldNot(HaveOccurred()) + + deleted := make(chan struct{}) + go func() { + defer GinkgoRecover() + events := watcher.ResultChan() + for { + select { + case evt := <-events: + if evt.Type == watch.Deleted { + deleted <- struct{}{} + return + } + case <-time.After(pollDuration): + Fail("API service not cleaned up after CSV deleted") } - case <-time.After(pollDuration): - Fail("API service not cleaned up after CSV deleted") } - } + }() + + cleanupCSV() + <-deleted }() - cleanupCSV() - <-deleted - }() + fetchedCSV, err := fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - fetchedCSV, err := fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + // Should create Deployment + dep, err := c.GetDeployment(ns.GetName(), depName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected Deployment") - // Should create Deployment - dep, err := c.GetDeployment(testNamespace, depName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected Deployment") - - // Should create APIService - apiService, err := c.GetAPIService(apiServiceName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected APIService") - - // Should create Service - serviceName := fmt.Sprintf("%s-service", depName) - _, err = c.GetService(testNamespace, serviceName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected Service") - - // Should create certificate Secret - secretName := fmt.Sprintf("%s-cert", serviceName) - _, err = c.GetSecret(testNamespace, secretName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected Secret") - - // Should create a Role for the Secret - _, err = c.GetRole(testNamespace, secretName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected Secret Role") - - // Should create a RoleBinding for the Secret - _, err = c.GetRoleBinding(testNamespace, secretName) - Expect(err).ShouldNot(HaveOccurred(), "error getting exptected Secret RoleBinding") - - // Should create a system:auth-delegator Cluster RoleBinding - _, err = c.GetClusterRoleBinding(fmt.Sprintf("%s-system:auth-delegator", serviceName)) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected system:auth-delegator ClusterRoleBinding") - - // Should create an extension-apiserver-authentication-reader RoleBinding in kube-system - _, err = c.GetRoleBinding("kube-system", fmt.Sprintf("%s-auth-reader", serviceName)) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected extension-apiserver-authentication-reader RoleBinding") - - // Store the ca sha annotation - oldCAAnnotation, ok := dep.Spec.Template.GetAnnotations()[install.OLMCAHashAnnotationKey] - Expect(ok).Should(BeTrue(), "expected olm sha annotation not present on existing pod template") - - // Induce a cert rotation - Eventually(Apply(fetchedCSV, func(csv *operatorsv1alpha1.ClusterServiceVersion) error { - now := metav1.Now() - csv.Status.CertsLastUpdated = &now - csv.Status.CertsRotateAt = &now - return nil - })).Should(Succeed()) - - _, err = fetchCSV(crc, csv.Name, testNamespace, func(csv *operatorsv1alpha1.ClusterServiceVersion) bool { - // Should create deployment - dep, err = c.GetDeployment(testNamespace, depName) - if err != nil { - return false - } + // Should create APIService + apiService, err := c.GetAPIService(apiServiceName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected APIService") - // Should have a new ca hash annotation - newCAAnnotation, ok := dep.Spec.Template.GetAnnotations()[install.OLMCAHashAnnotationKey] - if !ok { - ctx.Ctx().Logf("expected olm sha annotation not present in new pod template") - return false - } + // Should create Service + serviceName := fmt.Sprintf("%s-service", depName) + _, err = c.GetService(ns.GetName(), serviceName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected Service") - if newCAAnnotation != oldCAAnnotation { - // Check for success - return csvSucceededChecker(csv) - } + // Should create certificate Secret + secretName := fmt.Sprintf("%s-cert", serviceName) + _, err = c.GetSecret(ns.GetName(), secretName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected Secret") - return false - }) - Expect(err).ShouldNot(HaveOccurred(), "failed to rotate cert") + // Should create a Role for the Secret + _, err = c.GetRole(ns.GetName(), secretName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected Secret Role") - // Get the APIService UID - oldAPIServiceUID := apiService.GetUID() + // Should create a RoleBinding for the Secret + _, err = c.GetRoleBinding(ns.GetName(), secretName) + Expect(err).ShouldNot(HaveOccurred(), "error getting exptected Secret RoleBinding") - // Delete the APIService - err = c.DeleteAPIService(apiServiceName, &metav1.DeleteOptions{}) - Expect(err).ShouldNot(HaveOccurred()) + // Should create a system:auth-delegator Cluster RoleBinding + _, err = c.GetClusterRoleBinding(fmt.Sprintf("%s-system:auth-delegator", serviceName)) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected system:auth-delegator ClusterRoleBinding") + + // Should create an extension-apiserver-authentication-reader RoleBinding in kube-system + _, err = c.GetRoleBinding("kube-system", fmt.Sprintf("%s-auth-reader", serviceName)) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected extension-apiserver-authentication-reader RoleBinding") + + // Store the ca sha annotation + oldCAAnnotation, ok := dep.Spec.Template.GetAnnotations()[install.OLMCAHashAnnotationKey] + Expect(ok).Should(BeTrue(), "expected olm sha annotation not present on existing pod template") + + // Induce a cert rotation + Eventually(Apply(fetchedCSV, func(csv *operatorsv1alpha1.ClusterServiceVersion) error { + now := metav1.Now() + csv.Status.CertsLastUpdated = &now + csv.Status.CertsRotateAt = &now + return nil + })).Should(Succeed()) + + _, err = fetchCSV(crc, csv.Name, ns.GetName(), func(csv *operatorsv1alpha1.ClusterServiceVersion) bool { + // Should create deployment + dep, err = c.GetDeployment(ns.GetName(), depName) + if err != nil { + return false + } + + // Should have a new ca hash annotation + newCAAnnotation, ok := dep.Spec.Template.GetAnnotations()[install.OLMCAHashAnnotationKey] + if !ok { + ctx.Ctx().Logf("expected olm sha annotation not present in new pod template") + return false + } + + if newCAAnnotation != oldCAAnnotation { + // Check for success + return csvSucceededChecker(csv) + } - // Wait for CSV success - fetchedCSV, err = fetchCSV(crc, csv.GetName(), testNamespace, func(csv *operatorsv1alpha1.ClusterServiceVersion) bool { - // Should create an APIService - apiService, err := c.GetAPIService(apiServiceName) - if err != nil { return false - } + }) + Expect(err).ShouldNot(HaveOccurred(), "failed to rotate cert") - if csvSucceededChecker(csv) { - return apiService.GetUID() != oldAPIServiceUID - } - return false + // Get the APIService UID + oldAPIServiceUID := apiService.GetUID() + + // Delete the APIService + err = c.DeleteAPIService(apiServiceName, &metav1.DeleteOptions{}) + Expect(err).ShouldNot(HaveOccurred()) + + // Wait for CSV success + fetchedCSV, err = fetchCSV(crc, csv.GetName(), ns.GetName(), func(csv *operatorsv1alpha1.ClusterServiceVersion) bool { + // Should create an APIService + apiService, err := c.GetAPIService(apiServiceName) + if err != nil { + return false + } + + if csvSucceededChecker(csv) { + return apiService.GetUID() != oldAPIServiceUID + } + return false + }) + Expect(err).ShouldNot(HaveOccurred()) }) - Expect(err).ShouldNot(HaveOccurred()) - }) - It("update with owned API service", func() { - - depName := genName("hat-server") - mockGroup := fmt.Sprintf("hats.%s.redhat.com", genName("")) - version := "v1alpha1" - mockGroupVersion := strings.Join([]string{mockGroup, version}, "/") - mockKinds := []string{"fedora"} - depSpec := newMockExtServerDeployment(depName, []mockGroupVersionKind{{depName, mockGroupVersion, mockKinds, 5443}}) - apiServiceName := strings.Join([]string{version, mockGroup}, ".") - - // Create CSVs for the hat-server - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: depName, - Spec: depSpec, - }, - }, - } + It("update with owned API service", func() { - owned := make([]operatorsv1alpha1.APIServiceDescription, len(mockKinds)) - for i, kind := range mockKinds { - owned[i] = operatorsv1alpha1.APIServiceDescription{ - Name: apiServiceName, - Group: mockGroup, - Version: version, - Kind: kind, - DeploymentName: depName, - ContainerPort: int32(5443), - DisplayName: kind, - Description: fmt.Sprintf("A %s", kind), - } - } + depName := genName("hat-server") + mockGroup := fmt.Sprintf("hats.%s.redhat.com", genName("")) + version := "v1alpha1" + mockGroupVersion := strings.Join([]string{mockGroup, version}, "/") + mockKinds := []string{"fedora"} + depSpec := newMockExtServerDeployment(depName, []mockGroupVersionKind{{depName, mockGroupVersion, mockKinds, 5443}}) + apiServiceName := strings.Join([]string{version, mockGroup}, ".") - csv := operatorsv1alpha1.ClusterServiceVersion{ - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, + // Create CSVs for the hat-server + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + Name: depName, + Spec: depSpec, }, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, - }, - APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ - Owned: owned, - }, - }, - } - csv.SetName("csv-hat-1") - - // Create the APIService CSV - _, err := createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) + } - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + owned := make([]operatorsv1alpha1.APIServiceDescription, len(mockKinds)) + for i, kind := range mockKinds { + owned[i] = operatorsv1alpha1.APIServiceDescription{ + Name: apiServiceName, + Group: mockGroup, + Version: version, + Kind: kind, + DeploymentName: depName, + ContainerPort: int32(5443), + DisplayName: kind, + Description: fmt.Sprintf("A %s", kind), + } + } - // Should create Deployment - _, err = c.GetDeployment(testNamespace, depName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected Deployment") - - // Should create APIService - _, err = c.GetAPIService(apiServiceName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected APIService") - - // Should create Service - serviceName := fmt.Sprintf("%s-service", depName) - _, err = c.GetService(testNamespace, serviceName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected Service") - - // Should create certificate Secret - secretName := fmt.Sprintf("%s-cert", serviceName) - _, err = c.GetSecret(testNamespace, secretName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected Secret") - - // Should create a Role for the Secret - _, err = c.GetRole(testNamespace, secretName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected Secret Role") - - // Should create a RoleBinding for the Secret - _, err = c.GetRoleBinding(testNamespace, secretName) - Expect(err).ShouldNot(HaveOccurred(), "error getting exptected Secret RoleBinding") - - // Should create a system:auth-delegator Cluster RoleBinding - _, err = c.GetClusterRoleBinding(fmt.Sprintf("%s-system:auth-delegator", serviceName)) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected system:auth-delegator ClusterRoleBinding") - - // Should create an extension-apiserver-authentication-reader RoleBinding in kube-system - _, err = c.GetRoleBinding("kube-system", fmt.Sprintf("%s-auth-reader", serviceName)) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected extension-apiserver-authentication-reader RoleBinding") - - // Create a new CSV that owns the same API Service and replace the old CSV - csv2 := operatorsv1alpha1.ClusterServiceVersion{ - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - Replaces: csv.Name, - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, + csv := operatorsv1alpha1.ClusterServiceVersion{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ + Owned: owned, }, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, - }, - APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ - Owned: owned, - }, - }, - } - csv2.SetName("csv-hat-2") + } + csv.SetName("csv-hat-1") - // Create CSV2 to replace CSV - cleanupCSV2, err := createCSV(c, crc, csv2, testNamespace, false, true) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV2() + // Create the APIService CSV + _, err := createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) - _, err = fetchCSV(crc, csv2.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - // Should create Deployment - _, err = c.GetDeployment(testNamespace, depName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected Deployment") + // Should create Deployment + _, err = c.GetDeployment(ns.GetName(), depName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected Deployment") - // Should create APIService - _, err = c.GetAPIService(apiServiceName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected APIService") + // Should create APIService + _, err = c.GetAPIService(apiServiceName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected APIService") - // Should create Service - Eventually(func() error { - _, err := c.GetService(testNamespace, serviceName) - return err - }, timeout, interval).ShouldNot(HaveOccurred()) + // Should create Service + serviceName := fmt.Sprintf("%s-service", depName) + _, err = c.GetService(ns.GetName(), serviceName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected Service") - // Should create certificate Secret - secretName = fmt.Sprintf("%s-cert", serviceName) - Eventually(func() error { - _, err = c.GetSecret(testNamespace, secretName) - return err - }, timeout, interval).ShouldNot(HaveOccurred()) + // Should create certificate Secret + secretName := fmt.Sprintf("%s-cert", serviceName) + _, err = c.GetSecret(ns.GetName(), secretName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected Secret") - // Should create a Role for the Secret - _, err = c.GetRole(testNamespace, secretName) - Eventually(func() error { - _, err = c.GetRole(testNamespace, secretName) - return err - }, timeout, interval).ShouldNot(HaveOccurred()) + // Should create a Role for the Secret + _, err = c.GetRole(ns.GetName(), secretName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected Secret Role") - // Should create a RoleBinding for the Secret - Eventually(func() error { - _, err = c.GetRoleBinding(testNamespace, secretName) - return err - }, timeout, interval).ShouldNot(HaveOccurred()) + // Should create a RoleBinding for the Secret + _, err = c.GetRoleBinding(ns.GetName(), secretName) + Expect(err).ShouldNot(HaveOccurred(), "error getting exptected Secret RoleBinding") - // Should create a system:auth-delegator Cluster RoleBinding - Eventually(func() error { + // Should create a system:auth-delegator Cluster RoleBinding _, err = c.GetClusterRoleBinding(fmt.Sprintf("%s-system:auth-delegator", serviceName)) - return err - }, timeout, interval).ShouldNot(HaveOccurred()) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected system:auth-delegator ClusterRoleBinding") - // Should create an extension-apiserver-authentication-reader RoleBinding in kube-system - Eventually(func() error { + // Should create an extension-apiserver-authentication-reader RoleBinding in kube-system _, err = c.GetRoleBinding("kube-system", fmt.Sprintf("%s-auth-reader", serviceName)) - return err - }, timeout, interval).ShouldNot(HaveOccurred()) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected extension-apiserver-authentication-reader RoleBinding") + Expect(err).ShouldNot(HaveOccurred(), "error getting expected extension-apiserver-authentication-reader RoleBinding") - // Should eventually GC the CSV - Eventually(func() bool { - return csvExists(crc, csv.Name) - }).Should(BeFalse()) + // Create a new CSV that owns the same API Service and replace the old CSV + csv2 := operatorsv1alpha1.ClusterServiceVersion{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + Replaces: csv.Name, + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, + }, + APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ + Owned: owned, + }, + }, + } + csv2.SetName("csv-hat-2") - // Rename the initial CSV - csv.SetName("csv-hat-3") + // Create CSV2 to replace CSV + cleanupCSV2, err := createCSV(c, crc, csv2, ns.GetName(), false, true) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV2() - // Recreate the old CSV - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, true) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() + _, err = fetchCSV(crc, csv2.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - fetched, err := fetchCSV(crc, csv.Name, testNamespace, buildCSVReasonChecker(operatorsv1alpha1.CSVReasonOwnerConflict)) - Expect(err).ShouldNot(HaveOccurred()) - Expect(fetched.Status.Phase).Should(Equal(operatorsv1alpha1.CSVPhaseFailed)) - }) - It("create same CSV with owned API service multi namespace", func() { + // Should create Deployment + _, err = c.GetDeployment(ns.GetName(), depName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected Deployment") - // Create new namespace in a new operator group - secondNamespaceName := genName(testNamespace + "-") - matchingLabel := map[string]string{"inGroup": secondNamespaceName} + // Should create APIService + _, err = c.GetAPIService(apiServiceName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected APIService") - _, err := c.KubernetesInterface().CoreV1().Namespaces().Create(context.TODO(), &corev1.Namespace{ - ObjectMeta: metav1.ObjectMeta{ - Name: secondNamespaceName, - Labels: matchingLabel, - }, - }, metav1.CreateOptions{}) - Expect(err).ShouldNot(HaveOccurred()) - defer func() { - err = c.KubernetesInterface().CoreV1().Namespaces().Delete(context.TODO(), secondNamespaceName, metav1.DeleteOptions{}) - Expect(err).ShouldNot(HaveOccurred()) - }() + // Should create Service + Eventually(func() error { + _, err := c.GetService(ns.GetName(), serviceName) + return err + }, timeout, interval).ShouldNot(HaveOccurred()) - // Create a new operator group for the new namespace - operatorGroup := operatorsv1.OperatorGroup{ - ObjectMeta: metav1.ObjectMeta{ - Name: genName("e2e-operator-group-"), - Namespace: secondNamespaceName, - }, - Spec: operatorsv1.OperatorGroupSpec{ - Selector: &metav1.LabelSelector{ - MatchLabels: matchingLabel, - }, - }, - } - _, err = crc.OperatorsV1().OperatorGroups(secondNamespaceName).Create(context.TODO(), &operatorGroup, metav1.CreateOptions{}) - Expect(err).ShouldNot(HaveOccurred()) - defer func() { - err = crc.OperatorsV1().OperatorGroups(secondNamespaceName).Delete(context.TODO(), operatorGroup.Name, metav1.DeleteOptions{}) + // Should create certificate Secret + secretName = fmt.Sprintf("%s-cert", serviceName) + Eventually(func() error { + _, err = c.GetSecret(ns.GetName(), secretName) + return err + }, timeout, interval).ShouldNot(HaveOccurred()) + + // Should create a Role for the Secret + _, err = c.GetRole(ns.GetName(), secretName) + Eventually(func() error { + _, err = c.GetRole(ns.GetName(), secretName) + return err + }, timeout, interval).ShouldNot(HaveOccurred()) + + // Should create a RoleBinding for the Secret + Eventually(func() error { + _, err = c.GetRoleBinding(ns.GetName(), secretName) + return err + }, timeout, interval).ShouldNot(HaveOccurred()) + + // Should create a system:auth-delegator Cluster RoleBinding + Eventually(func() error { + _, err = c.GetClusterRoleBinding(fmt.Sprintf("%s-system:auth-delegator", serviceName)) + return err + }, timeout, interval).ShouldNot(HaveOccurred()) + + // Should create an extension-apiserver-authentication-reader RoleBinding in kube-system + Eventually(func() error { + _, err = c.GetRoleBinding("kube-system", fmt.Sprintf("%s-auth-reader", serviceName)) + return err + }, timeout, interval).ShouldNot(HaveOccurred()) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected extension-apiserver-authentication-reader RoleBinding") + + // Should eventually GC the CSV + Eventually(func() bool { + return csvExists(ns.GetName(), crc, csv.Name) + }).Should(BeFalse()) + + // Rename the initial CSV + csv.SetName("csv-hat-3") + + // Recreate the old CSV + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, true) Expect(err).ShouldNot(HaveOccurred()) - }() + defer cleanupCSV() - ctx.Ctx().Logf("Waiting on new operator group to have correct status") - Eventually(func() ([]string, error) { - og, err := crc.OperatorsV1().OperatorGroups(secondNamespaceName).Get(context.TODO(), operatorGroup.Name, metav1.GetOptions{}) - if err != nil { - return nil, err - } - return og.Status.Namespaces, nil - }).Should(ConsistOf([]string{secondNamespaceName})) - - depName := genName("hat-server") - mockGroup := fmt.Sprintf("hats.%s.redhat.com", genName("")) - version := "v1alpha1" - mockGroupVersion := strings.Join([]string{mockGroup, version}, "/") - mockKinds := []string{"fedora"} - depSpec := newMockExtServerDeployment(depName, []mockGroupVersionKind{{depName, mockGroupVersion, mockKinds, 5443}}) - apiServiceName := strings.Join([]string{version, mockGroup}, ".") - - // Create CSVs for the hat-server - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: depName, - Spec: depSpec, - }, - }, - } + fetched, err := fetchCSV(crc, csv.Name, ns.GetName(), buildCSVReasonChecker(operatorsv1alpha1.CSVReasonOwnerConflict)) + Expect(err).ShouldNot(HaveOccurred()) + Expect(fetched.Status.Phase).Should(Equal(operatorsv1alpha1.CSVPhaseFailed)) + }) + It("create same CSV with owned API service multi namespace", func() { - owned := make([]operatorsv1alpha1.APIServiceDescription, len(mockKinds)) - for i, kind := range mockKinds { - owned[i] = operatorsv1alpha1.APIServiceDescription{ - Name: apiServiceName, - Group: mockGroup, - Version: version, - Kind: kind, - DeploymentName: depName, - ContainerPort: int32(5443), - DisplayName: kind, - Description: fmt.Sprintf("A %s", kind), - } - } + // Create new namespace in a new operator group + secondNamespaceName := genName(ns.GetName() + "-") + matchingLabel := map[string]string{"inGroup": secondNamespaceName} - csv := operatorsv1alpha1.ClusterServiceVersion{ - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, + _, err := c.KubernetesInterface().CoreV1().Namespaces().Create(context.TODO(), &corev1.Namespace{ + ObjectMeta: metav1.ObjectMeta{ + Name: secondNamespaceName, + Labels: matchingLabel, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, + }, metav1.CreateOptions{}) + Expect(err).ShouldNot(HaveOccurred()) + defer func() { + err = c.KubernetesInterface().CoreV1().Namespaces().Delete(context.TODO(), secondNamespaceName, metav1.DeleteOptions{}) + Expect(err).ShouldNot(HaveOccurred()) + }() + + // Create a new operator group for the new namespace + operatorGroup := operatorsv1.OperatorGroup{ + ObjectMeta: metav1.ObjectMeta{ + Name: genName("e2e-operator-group-"), + Namespace: secondNamespaceName, }, - APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ - Owned: owned, + Spec: operatorsv1.OperatorGroupSpec{ + Selector: &metav1.LabelSelector{ + MatchLabels: matchingLabel, + }, }, - }, - } - csv.SetName("csv-hat-1") + } + _, err = crc.OperatorsV1().OperatorGroups(secondNamespaceName).Create(context.TODO(), &operatorGroup, metav1.CreateOptions{}) + Expect(err).ShouldNot(HaveOccurred()) + defer func() { + err = crc.OperatorsV1().OperatorGroups(secondNamespaceName).Delete(context.TODO(), operatorGroup.Name, metav1.DeleteOptions{}) + Expect(err).ShouldNot(HaveOccurred()) + }() - // Create the initial CSV - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() + ctx.Ctx().Logf("Waiting on new operator group to have correct status") + Eventually(func() ([]string, error) { + og, err := crc.OperatorsV1().OperatorGroups(secondNamespaceName).Get(context.TODO(), operatorGroup.Name, metav1.GetOptions{}) + if err != nil { + return nil, err + } + return og.Status.Namespaces, nil + }).Should(ConsistOf([]string{secondNamespaceName})) - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + depName := genName("hat-server") + mockGroup := fmt.Sprintf("hats.%s.redhat.com", genName("")) + version := "v1alpha1" + mockGroupVersion := strings.Join([]string{mockGroup, version}, "/") + mockKinds := []string{"fedora"} + depSpec := newMockExtServerDeployment(depName, []mockGroupVersionKind{{depName, mockGroupVersion, mockKinds, 5443}}) + apiServiceName := strings.Join([]string{version, mockGroup}, ".") - // Should create Deployment - _, err = c.GetDeployment(testNamespace, depName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected Deployment") - - // Should create APIService - _, err = c.GetAPIService(apiServiceName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected APIService") - - // Should create Service - serviceName := fmt.Sprintf("%s-service", depName) - _, err = c.GetService(testNamespace, serviceName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected Service") - - // Should create certificate Secret - secretName := fmt.Sprintf("%s-cert", serviceName) - _, err = c.GetSecret(testNamespace, secretName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected Secret") - - // Should create a Role for the Secret - _, err = c.GetRole(testNamespace, secretName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected Secret Role") - - // Should create a RoleBinding for the Secret - _, err = c.GetRoleBinding(testNamespace, secretName) - Expect(err).ShouldNot(HaveOccurred(), "error getting exptected Secret RoleBinding") - - // Should create a system:auth-delegator Cluster RoleBinding - _, err = c.GetClusterRoleBinding(fmt.Sprintf("%s-system:auth-delegator", serviceName)) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected system:auth-delegator ClusterRoleBinding") - - // Should create an extension-apiserver-authentication-reader RoleBinding in kube-system - _, err = c.GetRoleBinding("kube-system", fmt.Sprintf("%s-auth-reader", serviceName)) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected extension-apiserver-authentication-reader RoleBinding") - - // Create a new CSV that owns the same API Service but in a different namespace - csv2 := operatorsv1alpha1.ClusterServiceVersion{ - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ + // Create CSVs for the hat-server + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, + Name: depName, + Spec: depSpec, }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, + }, + } + + owned := make([]operatorsv1alpha1.APIServiceDescription, len(mockKinds)) + for i, kind := range mockKinds { + owned[i] = operatorsv1alpha1.APIServiceDescription{ + Name: apiServiceName, + Group: mockGroup, + Version: version, + Kind: kind, + DeploymentName: depName, + ContainerPort: int32(5443), + DisplayName: kind, + Description: fmt.Sprintf("A %s", kind), + } + } + + csv := operatorsv1alpha1.ClusterServiceVersion{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ + Owned: owned, }, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, - }, - APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ - Owned: owned, - }, - }, - } - csv2.SetName("csv-hat-2") - - // Create CSV2 to replace CSV - _, err = createCSV(c, crc, csv2, secondNamespaceName, false, true) - Expect(err).ShouldNot(HaveOccurred()) + } + csv.SetName("csv-hat-1") - _, err = fetchCSV(crc, csv2.Name, secondNamespaceName, csvFailedChecker) - Expect(err).ShouldNot(HaveOccurred()) - }) - It("orphaned API service clean up", func() { + // Create the initial CSV + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - mockGroup := fmt.Sprintf("hats.%s.redhat.com", genName("")) - version := "v1alpha1" - apiServiceName := strings.Join([]string{version, mockGroup}, ".") + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - apiService := &apiregistrationv1.APIService{ - ObjectMeta: metav1.ObjectMeta{ - Name: apiServiceName, - }, - Spec: apiregistrationv1.APIServiceSpec{ - Group: mockGroup, - Version: version, - GroupPriorityMinimum: 100, - VersionPriority: 100, - }, - } + // Should create Deployment + _, err = c.GetDeployment(ns.GetName(), depName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected Deployment") - watcher, err := c.ApiregistrationV1Interface().ApiregistrationV1().APIServices().Watch(context.TODO(), metav1.ListOptions{FieldSelector: "metadata.name=" + apiServiceName}) - Expect(err).ShouldNot(HaveOccurred()) + // Should create APIService + _, err = c.GetAPIService(apiServiceName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected APIService") - deleted := make(chan struct{}) - quit := make(chan struct{}) - defer close(quit) - go func() { - defer GinkgoRecover() - events := watcher.ResultChan() - for { - select { - case <-quit: - return - case evt := <-events: - if evt.Type == watch.Deleted { - deleted <- struct{}{} - } - case <-time.After(pollDuration): - Fail("orphaned apiservice not cleaned up as expected") - } - } - }() - - _, err = c.CreateAPIService(apiService) - Expect(err).ShouldNot(HaveOccurred(), "error creating expected APIService") - orphanedAPISvc, err := c.GetAPIService(apiServiceName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected APIService") - - newLabels := map[string]string{"olm.owner": "hat-serverfd4r5", "olm.owner.kind": "ClusterServiceVersion", "olm.owner.namespace": "nonexistent-namespace"} - orphanedAPISvc.SetLabels(newLabels) - _, err = c.UpdateAPIService(orphanedAPISvc) - Expect(err).ShouldNot(HaveOccurred(), "error updating APIService") - <-deleted - - _, err = c.CreateAPIService(apiService) - Expect(err).ShouldNot(HaveOccurred(), "error creating expected APIService") - orphanedAPISvc, err = c.GetAPIService(apiServiceName) - Expect(err).ShouldNot(HaveOccurred(), "error getting expected APIService") - - newLabels = map[string]string{"olm.owner": "hat-serverfd4r5", "olm.owner.kind": "ClusterServiceVersion", "olm.owner.namespace": testNamespace} - orphanedAPISvc.SetLabels(newLabels) - _, err = c.UpdateAPIService(orphanedAPISvc) - Expect(err).ShouldNot(HaveOccurred(), "error updating APIService") - <-deleted - }) - It("CSV annotations overwrite pod template annotations defined in a StrategyDetailsDeployment", func() { - // Create a StrategyDetailsDeployment that defines the `foo1` and `foo2` annotations on a pod template - nginxName := genName("nginx-") - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: genName("dep-"), - Spec: newNginxDeployment(nginxName), - }, - }, - } - strategy.DeploymentSpecs[0].Spec.Template.Annotations = map[string]string{ - "foo1": "notBar1", - "foo2": "bar2", - } + // Should create Service + serviceName := fmt.Sprintf("%s-service", depName) + _, err = c.GetService(ns.GetName(), serviceName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected Service") - // Create a CSV that defines the `foo1` and `foo3` annotations - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - Annotations: map[string]string{ - "foo1": "bar1", - "foo3": "bar3", - }, - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, - }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, - }, - }, - } + // Should create certificate Secret + secretName := fmt.Sprintf("%s-cert", serviceName) + _, err = c.GetSecret(ns.GetName(), secretName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected Secret") - // Create the CSV and make sure to clean it up - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() + // Should create a Role for the Secret + _, err = c.GetRole(ns.GetName(), secretName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected Secret Role") - // Wait for current CSV to succeed - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + // Should create a RoleBinding for the Secret + _, err = c.GetRoleBinding(ns.GetName(), secretName) + Expect(err).ShouldNot(HaveOccurred(), "error getting exptected Secret RoleBinding") - // Should have created deployment - dep, err := c.GetDeployment(testNamespace, strategy.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(dep).ShouldNot(BeNil()) + // Should create a system:auth-delegator Cluster RoleBinding + _, err = c.GetClusterRoleBinding(fmt.Sprintf("%s-system:auth-delegator", serviceName)) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected system:auth-delegator ClusterRoleBinding") - // Make sure that the pods annotations are correct - annotations := dep.Spec.Template.Annotations - Expect(annotations["foo1"]).Should(Equal("bar1")) - Expect(annotations["foo2"]).Should(Equal("bar2")) - Expect(annotations["foo3"]).Should(Equal("bar3")) - }) - It("Set labels for the Deployment created via the ClusterServiceVersion", func() { - // Create a StrategyDetailsDeployment that defines labels for Deployment inside - nginxName := genName("nginx-") - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: genName("dep-"), - Spec: newNginxDeployment(nginxName), - Label: k8slabels.Set{ - "application": "nginx", - "application.type": "proxy", - }, - }, - }, - } + // Should create an extension-apiserver-authentication-reader RoleBinding in kube-system + _, err = c.GetRoleBinding("kube-system", fmt.Sprintf("%s-auth-reader", serviceName)) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected extension-apiserver-authentication-reader RoleBinding") - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, + // Create a new CSV that owns the same API Service but in a different namespace + csv2 := operatorsv1alpha1.ClusterServiceVersion{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ + Owned: owned, }, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, - }, - }, - } + } + csv2.SetName("csv-hat-2") - // Create the CSV and make sure to clean it up - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() + // Create CSV2 to replace CSV + _, err = createCSV(c, crc, csv2, secondNamespaceName, false, true) + Expect(err).ShouldNot(HaveOccurred()) - // Wait for current CSV to succeed - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + _, err = fetchCSV(crc, csv2.Name, secondNamespaceName, csvFailedChecker) + Expect(err).ShouldNot(HaveOccurred()) + }) + It("orphaned API service clean up", func() { - // Should have created deployment - dep, err := c.GetDeployment(testNamespace, strategy.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(dep).ShouldNot(BeNil()) - - // Make sure that the deployment labels are correct - labels := dep.GetLabels() - Expect(labels["olm.owner"]).Should(Equal(csv.GetName())) - Expect(labels["olm.owner.namespace"]).Should(Equal(testNamespace)) - Expect(labels["application"]).Should(Equal("nginx")) - Expect(labels["application.type"]).Should(Equal("proxy")) - }) - It("update same deployment name", func() { + mockGroup := fmt.Sprintf("hats.%s.redhat.com", genName("")) + version := "v1alpha1" + apiServiceName := strings.Join([]string{version, mockGroup}, ".") - // Create dependency first (CRD) - crdPlural := genName("ins") - crdName := crdPlural + ".cluster.com" - cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ - ObjectMeta: metav1.ObjectMeta{ - Name: crdName, - }, - Spec: apiextensions.CustomResourceDefinitionSpec{ - Group: "cluster.com", - Versions: []apiextensions.CustomResourceDefinitionVersion{ - { - Name: "v1alpha1", - Served: true, - Storage: true, - Schema: &apiextensions.CustomResourceValidation{ - OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ - Type: "object", - Description: "my crd schema", - }, - }, - }, + apiService := &apiregistrationv1.APIService{ + ObjectMeta: metav1.ObjectMeta{ + Name: apiServiceName, }, - Names: apiextensions.CustomResourceDefinitionNames{ - Plural: crdPlural, - Singular: crdPlural, - Kind: crdPlural, - ListKind: "list" + crdPlural, + Spec: apiregistrationv1.APIServiceSpec{ + Group: mockGroup, + Version: version, + GroupPriorityMinimum: 100, + VersionPriority: 100, }, - Scope: apiextensions.NamespaceScoped, - }, - }) + } - // Create "current" CSV - nginxName := genName("nginx-") - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: genName("dep-"), - Spec: newNginxDeployment(nginxName), - }, - }, - } + watcher, err := c.ApiregistrationV1Interface().ApiregistrationV1().APIServices().Watch(context.TODO(), metav1.ListOptions{FieldSelector: "metadata.name=" + apiServiceName}) + Expect(err).ShouldNot(HaveOccurred()) - Expect(err).ShouldNot(HaveOccurred()) + deleted := make(chan struct{}) + quit := make(chan struct{}) + defer close(quit) + go func() { + defer GinkgoRecover() + events := watcher.ResultChan() + for { + select { + case <-quit: + return + case evt := <-events: + if evt.Type == watch.Deleted { + deleted <- struct{}{} + } + case <-time.After(pollDuration): + Fail("orphaned apiservice not cleaned up as expected") + } + } + }() - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCRD() - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, + _, err = c.CreateAPIService(apiService) + Expect(err).ShouldNot(HaveOccurred(), "error creating expected APIService") + orphanedAPISvc, err := c.GetAPIService(apiServiceName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected APIService") + + newLabels := map[string]string{"olm.owner": "hat-serverfd4r5", "olm.owner.kind": "ClusterServiceVersion", "olm.owner.namespace": "nonexistent-namespace"} + orphanedAPISvc.SetLabels(newLabels) + _, err = c.UpdateAPIService(orphanedAPISvc) + Expect(err).ShouldNot(HaveOccurred(), "error updating APIService") + <-deleted + + _, err = c.CreateAPIService(apiService) + Expect(err).ShouldNot(HaveOccurred(), "error creating expected APIService") + orphanedAPISvc, err = c.GetAPIService(apiServiceName) + Expect(err).ShouldNot(HaveOccurred(), "error getting expected APIService") + + newLabels = map[string]string{"olm.owner": "hat-serverfd4r5", "olm.owner.kind": "ClusterServiceVersion", "olm.owner.namespace": ns.GetName()} + orphanedAPISvc.SetLabels(newLabels) + _, err = c.UpdateAPIService(orphanedAPISvc) + Expect(err).ShouldNot(HaveOccurred(), "error updating APIService") + <-deleted + }) + It("CSV annotations overwrite pod template annotations defined in a StrategyDetailsDeployment", func() { + // Create a StrategyDetailsDeployment that defines the `foo1` and `foo2` annotations on a pod template + nginxName := genName("nginx-") + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + Name: genName("dep-"), + Spec: newNginxDeployment(nginxName), }, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, + } + strategy.DeploymentSpecs[0].Spec.Template.Annotations = map[string]string{ + "foo1": "notBar1", + "foo2": "bar2", + } + + // Create a CSV that defines the `foo1` and `foo3` annotations + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, + }, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), + Annotations: map[string]string{ + "foo1": "bar1", + "foo3": "bar3", + }, }, - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ { - Name: crdName, - Version: "v1alpha1", - Kind: crdPlural, - DisplayName: crdName, - Description: "In the cluster", + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, }, }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, + }, }, - }, - } + } - // Don't need to cleanup this CSV, it will be deleted by the upgrade process - _, err = createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) + // Create the CSV and make sure to clean it up + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - // Wait for current CSV to succeed - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + // Wait for current CSV to succeed + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - // Should have created deployment - dep, err := c.GetDeployment(testNamespace, strategy.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(dep).ShouldNot(BeNil()) + // Should have created deployment + dep, err := c.GetDeployment(ns.GetName(), strategy.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(dep).ShouldNot(BeNil()) - // Create "updated" CSV - strategyNew := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - // Same name - Name: strategy.DeploymentSpecs[0].Name, - // Different spec - Spec: newNginxDeployment(nginxName), + // Make sure that the pods annotations are correct + annotations := dep.Spec.Template.Annotations + Expect(annotations["foo1"]).Should(Equal("bar1")) + Expect(annotations["foo2"]).Should(Equal("bar2")) + Expect(annotations["foo3"]).Should(Equal("bar3")) + }) + It("Set labels for the Deployment created via the ClusterServiceVersion", func() { + // Create a StrategyDetailsDeployment that defines labels for Deployment inside + nginxName := genName("nginx-") + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ + { + Name: genName("dep-"), + Spec: newNginxDeployment(nginxName), + Label: k8slabels.Set{ + "application": "nginx", + "application.type": "proxy", + }, + }, }, - }, - } - - Expect(err).ShouldNot(HaveOccurred()) + } - csvNew := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - Replaces: csv.Name, - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategyNew, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), }, - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, { - Name: crdName, - Version: "v1alpha1", - Kind: crdPlural, - DisplayName: crdName, - Description: "In the cluster", + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, }, }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, + }, }, - }, - } - - cleanupNewCSV, err := createCSV(c, crc, csvNew, testNamespace, true, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupNewCSV() - - // Wait for updated CSV to succeed - fetchedCSV, err := fetchCSV(crc, csvNew.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + } - // Should have updated existing deployment - depUpdated, err := c.GetDeployment(testNamespace, strategyNew.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(depUpdated).ShouldNot(BeNil()) - Expect(strategyNew.DeploymentSpecs[0].Spec.Template.Spec.Containers[0].Name).Should(Equal(depUpdated.Spec.Template.Spec.Containers[0].Name)) + // Create the CSV and make sure to clean it up + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - // Should eventually GC the CSV - Eventually(func() bool { - return csvExists(crc, csv.Name) - }).Should(BeFalse()) + // Wait for current CSV to succeed + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - // Fetch cluster service version again to check for unnecessary control loops - sameCSV, err := fetchCSV(crc, csvNew.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) - Expect(equality.Semantic.DeepEqual(fetchedCSV, sameCSV)).Should(BeTrue(), diff.ObjectDiff(fetchedCSV, sameCSV)) - }) - It("update different deployment name", func() { + // Should have created deployment + dep, err := c.GetDeployment(ns.GetName(), strategy.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(dep).ShouldNot(BeNil()) + + // Make sure that the deployment labels are correct + labels := dep.GetLabels() + Expect(labels["olm.owner"]).Should(Equal(csv.GetName())) + Expect(labels["olm.owner.namespace"]).Should(Equal(ns.GetName())) + Expect(labels["application"]).Should(Equal("nginx")) + Expect(labels["application.type"]).Should(Equal("proxy")) + }) + It("update same deployment name", func() { - // Create dependency first (CRD) - crdPlural := genName("ins2") - crdName := crdPlural + ".cluster.com" - cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ - ObjectMeta: metav1.ObjectMeta{ - Name: crdName, - }, - Spec: apiextensions.CustomResourceDefinitionSpec{ - Group: "cluster.com", - Versions: []apiextensions.CustomResourceDefinitionVersion{ - { - Name: "v1alpha1", - Served: true, - Storage: true, - Schema: &apiextensions.CustomResourceValidation{ - OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ - Type: "object", - Description: "my crd schema", + // Create dependency first (CRD) + crdPlural := genName("ins") + crdName := crdPlural + ".cluster.com" + cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ + ObjectMeta: metav1.ObjectMeta{ + Name: crdName, + }, + Spec: apiextensions.CustomResourceDefinitionSpec{ + Group: "cluster.com", + Versions: []apiextensions.CustomResourceDefinitionVersion{ + { + Name: "v1alpha1", + Served: true, + Storage: true, + Schema: &apiextensions.CustomResourceValidation{ + OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ + Type: "object", + Description: "my crd schema", + }, }, }, }, + Names: apiextensions.CustomResourceDefinitionNames{ + Plural: crdPlural, + Singular: crdPlural, + Kind: crdPlural, + ListKind: "list" + crdPlural, + }, + Scope: apiextensions.NamespaceScoped, }, - Names: apiextensions.CustomResourceDefinitionNames{ - Plural: crdPlural, - Singular: crdPlural, - Kind: crdPlural, - ListKind: "list" + crdPlural, - }, - Scope: apiextensions.NamespaceScoped, - }, - }) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCRD() + }) - // create "current" CSV - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: genName("dep-"), - Spec: newNginxDeployment(genName("nginx-")), + // Create "current" CSV + nginxName := genName("nginx-") + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ + { + Name: genName("dep-"), + Spec: newNginxDeployment(nginxName), + }, }, - }, - } + } - Expect(err).ShouldNot(HaveOccurred()) + Expect(err).ShouldNot(HaveOccurred()) - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCRD() + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), }, - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, { - Name: crdName, - Version: "v1alpha1", - Kind: crdPlural, - DisplayName: crdName, - Description: "In the cluster2", + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, + }, + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "v1alpha1", + Kind: crdPlural, + DisplayName: crdName, + Description: "In the cluster", + }, }, }, }, - }, - } + } - // don't need to clean up this CSV, it will be deleted by the upgrade process - _, err = createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) + // Don't need to cleanup this CSV, it will be deleted by the upgrade process + _, err = createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) - // Wait for current CSV to succeed - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + // Wait for current CSV to succeed + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - // Should have created deployment - dep, err := c.GetDeployment(testNamespace, strategy.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(dep).ShouldNot(BeNil()) + // Should have created deployment + dep, err := c.GetDeployment(ns.GetName(), strategy.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(dep).ShouldNot(BeNil()) - // Create "updated" CSV - strategyNew := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: genName("dep2"), - Spec: newNginxDeployment(genName("nginx-")), + // Create "updated" CSV + strategyNew := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ + { + // Same name + Name: strategy.DeploymentSpecs[0].Name, + // Different spec + Spec: newNginxDeployment(nginxName), + }, }, - }, - } + } - Expect(err).ShouldNot(HaveOccurred()) + Expect(err).ShouldNot(HaveOccurred()) - csvNew := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv2"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - Replaces: csv.Name, - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, + csvNew := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategyNew, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), }, - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + Replaces: csv.Name, + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, { - Name: crdName, - Version: "v1alpha1", - Kind: crdPlural, - DisplayName: crdName, - Description: "In the cluster2", + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategyNew, + }, + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "v1alpha1", + Kind: crdPlural, + DisplayName: crdName, + Description: "In the cluster", + }, }, }, }, - }, - } + } - cleanupNewCSV, err := createCSV(c, crc, csvNew, testNamespace, true, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupNewCSV() + cleanupNewCSV, err := createCSV(c, crc, csvNew, ns.GetName(), true, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupNewCSV() - // Wait for updated CSV to succeed - fetchedCSV, err := fetchCSV(crc, csvNew.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + // Wait for updated CSV to succeed + fetchedCSV, err := fetchCSV(crc, csvNew.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - // Fetch cluster service version again to check for unnecessary control loops - sameCSV, err := fetchCSV(crc, csvNew.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) - Expect(equality.Semantic.DeepEqual(fetchedCSV, sameCSV)).Should(BeTrue(), diff.ObjectDiff(fetchedCSV, sameCSV)) + // Should have updated existing deployment + depUpdated, err := c.GetDeployment(ns.GetName(), strategyNew.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(depUpdated).ShouldNot(BeNil()) + Expect(strategyNew.DeploymentSpecs[0].Spec.Template.Spec.Containers[0].Name).Should(Equal(depUpdated.Spec.Template.Spec.Containers[0].Name)) - // Should have created new deployment and deleted old - depNew, err := c.GetDeployment(testNamespace, strategyNew.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(depNew).ShouldNot(BeNil()) - err = waitForDeploymentToDelete(c, strategy.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) + // Should eventually GC the CSV + Eventually(func() bool { + return csvExists(ns.GetName(), crc, csv.Name) + }).Should(BeFalse()) - // Should eventually GC the CSV - Eventually(func() bool { - return csvExists(crc, csv.Name) - }).Should(BeFalse()) - }) - It("update multiple intermediates", func() { + // Fetch cluster service version again to check for unnecessary control loops + sameCSV, err := fetchCSV(crc, csvNew.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) + Expect(equality.Semantic.DeepEqual(fetchedCSV, sameCSV)).Should(BeTrue(), diff.ObjectDiff(fetchedCSV, sameCSV)) + }) + It("update different deployment name", func() { - // Create dependency first (CRD) - crdPlural := genName("ins3") - crdName := crdPlural + ".cluster.com" - cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ - ObjectMeta: metav1.ObjectMeta{ - Name: crdName, - }, - Spec: apiextensions.CustomResourceDefinitionSpec{ - Group: "cluster.com", - Versions: []apiextensions.CustomResourceDefinitionVersion{ - { - Name: "v1alpha1", - Served: true, - Storage: true, - Schema: &apiextensions.CustomResourceValidation{ - OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ - Type: "object", - Description: "my crd schema", + // Create dependency first (CRD) + crdPlural := genName("ins2") + crdName := crdPlural + ".cluster.com" + cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ + ObjectMeta: metav1.ObjectMeta{ + Name: crdName, + }, + Spec: apiextensions.CustomResourceDefinitionSpec{ + Group: "cluster.com", + Versions: []apiextensions.CustomResourceDefinitionVersion{ + { + Name: "v1alpha1", + Served: true, + Storage: true, + Schema: &apiextensions.CustomResourceValidation{ + OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ + Type: "object", + Description: "my crd schema", + }, }, }, }, + Names: apiextensions.CustomResourceDefinitionNames{ + Plural: crdPlural, + Singular: crdPlural, + Kind: crdPlural, + ListKind: "list" + crdPlural, + }, + Scope: apiextensions.NamespaceScoped, }, - Names: apiextensions.CustomResourceDefinitionNames{ - Plural: crdPlural, - Singular: crdPlural, - Kind: crdPlural, - ListKind: "list" + crdPlural, - }, - Scope: apiextensions.NamespaceScoped, - }, - }) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCRD() + }) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCRD() - // create "current" CSV - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: genName("dep-"), - Spec: newNginxDeployment(genName("nginx-")), + // create "current" CSV + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ + { + Name: genName("dep-"), + Spec: newNginxDeployment(genName("nginx-")), + }, }, - }, - } + } - Expect(err).ShouldNot(HaveOccurred()) + Expect(err).ShouldNot(HaveOccurred()) - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), }, - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ { - Name: crdName, - Version: "v1alpha1", - Kind: crdPlural, - DisplayName: crdName, - Description: "In the cluster3", + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, }, }, - }, - }, - } - - // don't need to clean up this CSV, it will be deleted by the upgrade process - _, err = createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) - - // Wait for current CSV to succeed - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) - - // Should have created deployment - dep, err := c.GetDeployment(testNamespace, strategy.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(dep).ShouldNot(BeNil()) - - // Create "updated" CSV - strategyNew := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: genName("dep2"), - Spec: newNginxDeployment(genName("nginx-")), - }, - }, - } - - Expect(err).ShouldNot(HaveOccurred()) - - csvNew := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv2"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - Replaces: csv.Name, - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, }, - }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategyNew, - }, - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ - { - Name: crdName, - Version: "v1alpha1", - Kind: crdPlural, - DisplayName: crdName, - Description: "In the cluster3", + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "v1alpha1", + Kind: crdPlural, + DisplayName: crdName, + Description: "In the cluster2", + }, }, }, }, - }, - } - - cleanupNewCSV, err := createCSV(c, crc, csvNew, testNamespace, true, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupNewCSV() - - // Wait for updated CSV to succeed - fetchedCSV, err := fetchCSV(crc, csvNew.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + } - // Fetch cluster service version again to check for unnecessary control loops - sameCSV, err := fetchCSV(crc, csvNew.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) - Expect(equality.Semantic.DeepEqual(fetchedCSV, sameCSV)).Should(BeTrue(), diff.ObjectDiff(fetchedCSV, sameCSV)) + // don't need to clean up this CSV, it will be deleted by the upgrade process + _, err = createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) - // Should have created new deployment and deleted old - depNew, err := c.GetDeployment(testNamespace, strategyNew.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(depNew).ShouldNot(BeNil()) - err = waitForDeploymentToDelete(c, strategy.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) + // Wait for current CSV to succeed + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - // Should eventually GC the CSV - Eventually(func() bool { - return csvExists(crc, csv.Name) - }).Should(BeFalse()) - }) - It("update in place", func() { + // Should have created deployment + dep, err := c.GetDeployment(ns.GetName(), strategy.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(dep).ShouldNot(BeNil()) - // Create dependency first (CRD) - crdPlural := genName("ins") - crdName := crdPlural + ".cluster.com" - cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ - ObjectMeta: metav1.ObjectMeta{ - Name: crdName, - }, - Spec: apiextensions.CustomResourceDefinitionSpec{ - Group: "cluster.com", - Versions: []apiextensions.CustomResourceDefinitionVersion{ + // Create "updated" CSV + strategyNew := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ { - Name: "v1alpha1", - Served: true, - Storage: true, - Schema: &apiextensions.CustomResourceValidation{ - OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ - Type: "object", - Description: "my crd schema", - }, - }, + Name: genName("dep2"), + Spec: newNginxDeployment(genName("nginx-")), }, }, - Names: apiextensions.CustomResourceDefinitionNames{ - Plural: crdPlural, - Singular: crdPlural, - Kind: crdPlural, - ListKind: "list" + crdPlural, - }, - Scope: apiextensions.NamespaceScoped, - }, - }) - - // Create "current" CSV - nginxName := genName("nginx-") - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: genName("dep-"), - Spec: newNginxDeployment(nginxName), - }, - }, - } + } - Expect(err).ShouldNot(HaveOccurred()) + Expect(err).ShouldNot(HaveOccurred()) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCRD() - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, + csvNew := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv2"), }, - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + Replaces: csv.Name, + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, { - Name: crdName, - Version: "v1alpha1", - Kind: crdPlural, - DisplayName: crdName, - Description: "In the cluster", + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, }, }, - }, - }, - } - - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, true) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() - - // Wait for current CSV to succeed - fetchedCSV, err := fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) - - // Should have created deployment - dep, err := c.GetDeployment(testNamespace, strategy.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(dep).ShouldNot(BeNil()) - - // Create "updated" CSV - strategyNew := strategy - strategyNew.DeploymentSpecs[0].Spec.Template.Spec.Containers = []corev1.Container{ - { - Name: genName("nginx-"), - Image: *dummyImage, - Ports: []corev1.ContainerPort{ - { - ContainerPort: 80, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategyNew, + }, + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "v1alpha1", + Kind: crdPlural, + DisplayName: crdName, + Description: "In the cluster2", + }, + }, }, }, - ImagePullPolicy: corev1.PullIfNotPresent, - }, - } - - // Also set something outside the spec template - this should be ignored - var five int32 = 5 - strategyNew.DeploymentSpecs[0].Spec.Replicas = &five - - Expect(err).ShouldNot(HaveOccurred()) - - fetchedCSV.Spec.InstallStrategy.StrategySpec = strategyNew - - // Update CSV directly - _, err = crc.OperatorsV1alpha1().ClusterServiceVersions(testNamespace).Update(context.TODO(), fetchedCSV, metav1.UpdateOptions{}) - Expect(err).ShouldNot(HaveOccurred()) - - // wait for deployment spec to be updated - Eventually(func() (string, error) { - fetched, err := c.GetDeployment(testNamespace, strategyNew.DeploymentSpecs[0].Name) - if err != nil { - return "", err } - ctx.Ctx().Logf("waiting for deployment to update...") - return fetched.Spec.Template.Spec.Containers[0].Name, nil - }).Should(Equal(strategyNew.DeploymentSpecs[0].Spec.Template.Spec.Containers[0].Name)) - // Wait for updated CSV to succeed - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + cleanupNewCSV, err := createCSV(c, crc, csvNew, ns.GetName(), true, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupNewCSV() - depUpdated, err := c.GetDeployment(testNamespace, strategyNew.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(depUpdated).ShouldNot(BeNil()) + // Wait for updated CSV to succeed + fetchedCSV, err := fetchCSV(crc, csvNew.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - // Deployment should have changed even though the CSV is otherwise the same - Expect(strategyNew.DeploymentSpecs[0].Spec.Template.Spec.Containers[0].Name).Should(Equal(depUpdated.Spec.Template.Spec.Containers[0].Name)) - Expect(strategyNew.DeploymentSpecs[0].Spec.Template.Spec.Containers[0].Image).Should(Equal(depUpdated.Spec.Template.Spec.Containers[0].Image)) + // Fetch cluster service version again to check for unnecessary control loops + sameCSV, err := fetchCSV(crc, csvNew.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) + Expect(equality.Semantic.DeepEqual(fetchedCSV, sameCSV)).Should(BeTrue(), diff.ObjectDiff(fetchedCSV, sameCSV)) - // Field updated even though template spec didn't change, because it was part of a template spec change as well - Expect(*strategyNew.DeploymentSpecs[0].Spec.Replicas).Should(Equal(*depUpdated.Spec.Replicas)) - }) - It("update multiple version CRD", func() { + // Should have created new deployment and deleted old + depNew, err := c.GetDeployment(ns.GetName(), strategyNew.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(depNew).ShouldNot(BeNil()) + err = waitForDeploymentToDelete(ns.GetName(), c, strategy.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) - // Create initial CRD which has 2 versions: v1alpha1 & v1alpha2 - crdPlural := genName("ins4") - crdName := crdPlural + ".cluster.com" - cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ - ObjectMeta: metav1.ObjectMeta{ - Name: crdName, - }, - Spec: apiextensions.CustomResourceDefinitionSpec{ - Group: "cluster.com", - Versions: []apiextensions.CustomResourceDefinitionVersion{ - { - Name: "v1alpha1", - Served: true, - Storage: true, - Schema: &apiextensions.CustomResourceValidation{ - OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ - Type: "object", - Description: "my crd schema", + // Should eventually GC the CSV + Eventually(func() bool { + return csvExists(ns.GetName(), crc, csv.Name) + }).Should(BeFalse()) + }) + It("update multiple intermediates", func() { + + // Create dependency first (CRD) + crdPlural := genName("ins3") + crdName := crdPlural + ".cluster.com" + cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ + ObjectMeta: metav1.ObjectMeta{ + Name: crdName, + }, + Spec: apiextensions.CustomResourceDefinitionSpec{ + Group: "cluster.com", + Versions: []apiextensions.CustomResourceDefinitionVersion{ + { + Name: "v1alpha1", + Served: true, + Storage: true, + Schema: &apiextensions.CustomResourceValidation{ + OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ + Type: "object", + Description: "my crd schema", + }, }, }, }, - { - Name: "v1alpha2", - Served: true, - Storage: false, - Schema: &apiextensions.CustomResourceValidation{ - OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ - Type: "object", - Description: "my crd schema", - }, - }, + Names: apiextensions.CustomResourceDefinitionNames{ + Plural: crdPlural, + Singular: crdPlural, + Kind: crdPlural, + ListKind: "list" + crdPlural, }, + Scope: apiextensions.NamespaceScoped, }, - Names: apiextensions.CustomResourceDefinitionNames{ - Plural: crdPlural, - Singular: crdPlural, - Kind: crdPlural, - ListKind: "list" + crdPlural, - }, - Scope: apiextensions.NamespaceScoped, - }, - }) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCRD() + }) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCRD() - // create initial deployment strategy - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: genName("dep1-"), - Spec: newNginxDeployment(genName("nginx-")), + // create "current" CSV + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ + { + Name: genName("dep-"), + Spec: newNginxDeployment(genName("nginx-")), + }, }, - }, - } + } - Expect(err).ShouldNot(HaveOccurred()) + Expect(err).ShouldNot(HaveOccurred()) - // First CSV with owning CRD v1alpha1 - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, + }, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), + }, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "v1alpha1", + Kind: crdPlural, + DisplayName: crdName, + Description: "In the cluster3", + }, + }, }, + }, + } + + // don't need to clean up this CSV, it will be deleted by the upgrade process + _, err = createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) + + // Wait for current CSV to succeed + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) + + // Should have created deployment + dep, err := c.GetDeployment(ns.GetName(), strategy.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(dep).ShouldNot(BeNil()) + + // Create "updated" CSV + strategyNew := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + Name: genName("dep2"), + Spec: newNginxDeployment(genName("nginx-")), }, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, + } + + Expect(err).ShouldNot(HaveOccurred()) + + csvNew := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, + }, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv2"), }, - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + Replaces: csv.Name, + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, { - Name: crdName, - Version: "v1alpha1", - Kind: crdPlural, - DisplayName: crdName, - Description: "In the cluster4", + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategyNew, + }, + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "v1alpha1", + Kind: crdPlural, + DisplayName: crdName, + Description: "In the cluster3", + }, }, }, }, - }, - } + } - // CSV will be deleted by the upgrade process later - _, err = createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) + cleanupNewCSV, err := createCSV(c, crc, csvNew, ns.GetName(), true, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupNewCSV() - // Wait for current CSV to succeed - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + // Wait for updated CSV to succeed + fetchedCSV, err := fetchCSV(crc, csvNew.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - // Should have created deployment - dep, err := c.GetDeployment(testNamespace, strategy.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(dep).ShouldNot(BeNil()) + // Fetch cluster service version again to check for unnecessary control loops + sameCSV, err := fetchCSV(crc, csvNew.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) + Expect(equality.Semantic.DeepEqual(fetchedCSV, sameCSV)).Should(BeTrue(), diff.ObjectDiff(fetchedCSV, sameCSV)) - // Create updated deployment strategy - strategyNew := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: genName("dep2-"), - Spec: newNginxDeployment(genName("nginx-")), - }, - }, - } + // Should have created new deployment and deleted old + depNew, err := c.GetDeployment(ns.GetName(), strategyNew.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(depNew).ShouldNot(BeNil()) + err = waitForDeploymentToDelete(ns.GetName(), c, strategy.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) - Expect(err).ShouldNot(HaveOccurred()) + // Should eventually GC the CSV + Eventually(func() bool { + return csvExists(ns.GetName(), crc, csv.Name) + }).Should(BeFalse()) + }) + It("update in place", func() { - // Second CSV with owning CRD v1alpha1 and v1alpha2 - csvNew := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv2"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - Replaces: csv.Name, - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, + // Create dependency first (CRD) + crdPlural := genName("ins") + crdName := crdPlural + ".cluster.com" + cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ + ObjectMeta: metav1.ObjectMeta{ + Name: crdName, + }, + Spec: apiextensions.CustomResourceDefinitionSpec{ + Group: "cluster.com", + Versions: []apiextensions.CustomResourceDefinitionVersion{ + { + Name: "v1alpha1", + Served: true, + Storage: true, + Schema: &apiextensions.CustomResourceValidation{ + OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ + Type: "object", + Description: "my crd schema", + }, + }, + }, }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, + Names: apiextensions.CustomResourceDefinitionNames{ + Plural: crdPlural, + Singular: crdPlural, + Kind: crdPlural, + ListKind: "list" + crdPlural, }, + Scope: apiextensions.NamespaceScoped, + }, + }) + + // Create "current" CSV + nginxName := genName("nginx-") + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + Name: genName("dep-"), + Spec: newNginxDeployment(nginxName), }, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategyNew, + } + + Expect(err).ShouldNot(HaveOccurred()) + + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCRD() + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, + }, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), }, - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, { - Name: crdName, - Version: "v1alpha1", - Kind: crdPlural, - DisplayName: crdName, - Description: "In the cluster4", + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, }, { - Name: crdName, - Version: "v1alpha2", - Kind: crdPlural, - DisplayName: crdName, - Description: "In the cluster4", + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, + }, + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "v1alpha1", + Kind: crdPlural, + DisplayName: crdName, + Description: "In the cluster", + }, }, }, }, - }, - } - - // Create newly updated CSV - _, err = createCSV(c, crc, csvNew, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) + } - // Wait for updated CSV to succeed - fetchedCSV, err := fetchCSV(crc, csvNew.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, true) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - // Fetch cluster service version again to check for unnecessary control loops - sameCSV, err := fetchCSV(crc, csvNew.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) - Expect(equality.Semantic.DeepEqual(fetchedCSV, sameCSV)).Should(BeTrue(), diff.ObjectDiff(fetchedCSV, sameCSV)) + // Wait for current CSV to succeed + fetchedCSV, err := fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - // Should have created new deployment and deleted old one - depNew, err := c.GetDeployment(testNamespace, strategyNew.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(depNew).ShouldNot(BeNil()) - err = waitForDeploymentToDelete(c, strategy.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) + // Should have created deployment + dep, err := c.GetDeployment(ns.GetName(), strategy.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(dep).ShouldNot(BeNil()) - // Create updated deployment strategy - strategyNew2 := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ + // Create "updated" CSV + strategyNew := strategy + strategyNew.DeploymentSpecs[0].Spec.Template.Spec.Containers = []corev1.Container{ { - Name: genName("dep3-"), - Spec: newNginxDeployment(genName("nginx-")), - }, - }, - } - Expect(err).ShouldNot(HaveOccurred()) - - // Third CSV with owning CRD v1alpha2 - csvNew2 := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv3"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - Replaces: csvNew.Name, - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, - }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategyNew2, - }, - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ + Name: genName("nginx-"), + Image: *dummyImage, + Ports: []corev1.ContainerPort{ { - Name: crdName, - Version: "v1alpha2", - Kind: crdPlural, - DisplayName: crdName, - Description: "In the cluster4", + ContainerPort: 80, }, }, + ImagePullPolicy: corev1.PullIfNotPresent, }, - }, - } + } - // Create newly updated CSV - cleanupNewCSV, err := createCSV(c, crc, csvNew2, testNamespace, true, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupNewCSV() + // Also set something outside the spec template - this should be ignored + var five int32 = 5 + strategyNew.DeploymentSpecs[0].Spec.Replicas = &five - // Wait for updated CSV to succeed - fetchedCSV, err = fetchCSV(crc, csvNew2.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + Expect(err).ShouldNot(HaveOccurred()) - // Fetch cluster service version again to check for unnecessary control loops - sameCSV, err = fetchCSV(crc, csvNew2.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) - Expect(equality.Semantic.DeepEqual(fetchedCSV, sameCSV)).Should(BeTrue(), diff.ObjectDiff(fetchedCSV, sameCSV)) + fetchedCSV.Spec.InstallStrategy.StrategySpec = strategyNew - // Should have created new deployment and deleted old one - depNew, err = c.GetDeployment(testNamespace, strategyNew2.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(depNew).ShouldNot(BeNil()) - err = waitForDeploymentToDelete(c, strategyNew.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) + // Update CSV directly + _, err = crc.OperatorsV1alpha1().ClusterServiceVersions(ns.GetName()).Update(context.TODO(), fetchedCSV, metav1.UpdateOptions{}) + Expect(err).ShouldNot(HaveOccurred()) - // Should clean up the CSV - Eventually(func() bool { - return csvExists(crc, csvNew.Name) - }).Should(BeFalse()) - }) - It("update modify deployment name", func() { + // wait for deployment spec to be updated + Eventually(func() (string, error) { + fetched, err := c.GetDeployment(ns.GetName(), strategyNew.DeploymentSpecs[0].Name) + if err != nil { + return "", err + } + ctx.Ctx().Logf("waiting for deployment to update...") + return fetched.Spec.Template.Spec.Containers[0].Name, nil + }).Should(Equal(strategyNew.DeploymentSpecs[0].Spec.Template.Spec.Containers[0].Name)) - // Create dependency first (CRD) - crdPlural := genName("ins2") - crdName := crdPlural + ".cluster.com" - cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ - ObjectMeta: metav1.ObjectMeta{ - Name: crdName, - }, - Spec: apiextensions.CustomResourceDefinitionSpec{ - Group: "cluster.com", - Versions: []apiextensions.CustomResourceDefinitionVersion{ - { - Name: "v1alpha1", - Served: true, - Storage: true, - Schema: &apiextensions.CustomResourceValidation{ - OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ - Type: "object", - Description: "my crd schema", + // Wait for updated CSV to succeed + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) + + depUpdated, err := c.GetDeployment(ns.GetName(), strategyNew.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(depUpdated).ShouldNot(BeNil()) + + // Deployment should have changed even though the CSV is otherwise the same + Expect(strategyNew.DeploymentSpecs[0].Spec.Template.Spec.Containers[0].Name).Should(Equal(depUpdated.Spec.Template.Spec.Containers[0].Name)) + Expect(strategyNew.DeploymentSpecs[0].Spec.Template.Spec.Containers[0].Image).Should(Equal(depUpdated.Spec.Template.Spec.Containers[0].Image)) + + // Field updated even though template spec didn't change, because it was part of a template spec change as well + Expect(*strategyNew.DeploymentSpecs[0].Spec.Replicas).Should(Equal(*depUpdated.Spec.Replicas)) + }) + It("update multiple version CRD", func() { + + // Create initial CRD which has 2 versions: v1alpha1 & v1alpha2 + crdPlural := genName("ins4") + crdName := crdPlural + ".cluster.com" + cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ + ObjectMeta: metav1.ObjectMeta{ + Name: crdName, + }, + Spec: apiextensions.CustomResourceDefinitionSpec{ + Group: "cluster.com", + Versions: []apiextensions.CustomResourceDefinitionVersion{ + { + Name: "v1alpha1", + Served: true, + Storage: true, + Schema: &apiextensions.CustomResourceValidation{ + OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ + Type: "object", + Description: "my crd schema", + }, + }, + }, + { + Name: "v1alpha2", + Served: true, + Storage: false, + Schema: &apiextensions.CustomResourceValidation{ + OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ + Type: "object", + Description: "my crd schema", + }, }, }, }, + Names: apiextensions.CustomResourceDefinitionNames{ + Plural: crdPlural, + Singular: crdPlural, + Kind: crdPlural, + ListKind: "list" + crdPlural, + }, + Scope: apiextensions.NamespaceScoped, }, - Names: apiextensions.CustomResourceDefinitionNames{ - Plural: crdPlural, - Singular: crdPlural, - Kind: crdPlural, - ListKind: "list" + crdPlural, - }, - Scope: apiextensions.NamespaceScoped, - }, - }) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCRD() + }) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCRD() - // create "current" CSV - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: genName("dep-"), - Spec: newNginxDeployment(genName("nginx-")), - }, - { - Name: "dep2-test", - Spec: newNginxDeployment("nginx2"), + // create initial deployment strategy + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ + { + Name: genName("dep1-"), + Spec: newNginxDeployment(genName("nginx-")), + }, }, - }, - } + } - Expect(err).ShouldNot(HaveOccurred()) + Expect(err).ShouldNot(HaveOccurred()) - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, + // First CSV with owning CRD v1alpha1 + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), }, - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, { - Name: crdName, - Version: "v1alpha1", - Kind: crdPlural, - DisplayName: crdName, - Description: "In the cluster2", + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, + }, + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "v1alpha1", + Kind: crdPlural, + DisplayName: crdName, + Description: "In the cluster4", + }, }, }, }, - }, - } + } - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, true, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() + // CSV will be deleted by the upgrade process later + _, err = createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) - // Wait for current CSV to succeed - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + // Wait for current CSV to succeed + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - // Should have created deployments - dep, err := c.GetDeployment(testNamespace, strategy.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(dep).ShouldNot(BeNil()) - dep2, err := c.GetDeployment(testNamespace, strategy.DeploymentSpecs[1].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(dep2).ShouldNot(BeNil()) + // Should have created deployment + dep, err := c.GetDeployment(ns.GetName(), strategy.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(dep).ShouldNot(BeNil()) - // Create "updated" CSV - strategyNew := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: genName("dep3-"), - Spec: newNginxDeployment(genName("nginx3-")), - }, - { - Name: "dep2-test", - Spec: newNginxDeployment("nginx2"), + // Create updated deployment strategy + strategyNew := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ + { + Name: genName("dep2-"), + Spec: newNginxDeployment(genName("nginx-")), + }, }, - }, - } - - Expect(err).ShouldNot(HaveOccurred()) - - // Fetch the current csv - fetchedCSV, err := fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) - - // Update csv with same strategy with different deployment's name - fetchedCSV.Spec.InstallStrategy.StrategySpec = strategyNew - - // Update the current csv with the new csv - _, err = crc.OperatorsV1alpha1().ClusterServiceVersions(testNamespace).Update(context.TODO(), fetchedCSV, metav1.UpdateOptions{}) - Expect(err).ShouldNot(HaveOccurred()) + } - // Wait for new deployment to exist - err = waitForDeployment(c, strategyNew.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) + Expect(err).ShouldNot(HaveOccurred()) - // Wait for updated CSV to succeed - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + // Second CSV with owning CRD v1alpha1 and v1alpha2 + csvNew := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, + }, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv2"), + }, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + Replaces: csv.Name, + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategyNew, + }, + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "v1alpha1", + Kind: crdPlural, + DisplayName: crdName, + Description: "In the cluster4", + }, + { + Name: crdName, + Version: "v1alpha2", + Kind: crdPlural, + DisplayName: crdName, + Description: "In the cluster4", + }, + }, + }, + }, + } - // Should have created new deployment and deleted old - depNew, err := c.GetDeployment(testNamespace, strategyNew.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(depNew).ShouldNot(BeNil()) + // Create newly updated CSV + _, err = createCSV(c, crc, csvNew, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) - // Make sure the unchanged deployment still exists - depNew2, err := c.GetDeployment(testNamespace, strategyNew.DeploymentSpecs[1].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(depNew2).ShouldNot(BeNil()) + // Wait for updated CSV to succeed + fetchedCSV, err := fetchCSV(crc, csvNew.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - err = waitForDeploymentToDelete(c, strategy.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - }) - It("update deployment spec in an existing CSV for a hotfix", func() { + // Fetch cluster service version again to check for unnecessary control loops + sameCSV, err := fetchCSV(crc, csvNew.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) + Expect(equality.Semantic.DeepEqual(fetchedCSV, sameCSV)).Should(BeTrue(), diff.ObjectDiff(fetchedCSV, sameCSV)) - c := newKubeClient() - crc := newCRClient() + // Should have created new deployment and deleted old one + depNew, err := c.GetDeployment(ns.GetName(), strategyNew.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(depNew).ShouldNot(BeNil()) + err = waitForDeploymentToDelete(ns.GetName(), c, strategy.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) - // Create dependency first (CRD) - crdPlural := genName("ins") - crdName := crdPlural + ".cluster.com" - cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ - ObjectMeta: metav1.ObjectMeta{ - Name: crdName, - }, - Spec: apiextensions.CustomResourceDefinitionSpec{ - Group: "cluster.com", - Versions: []apiextensions.CustomResourceDefinitionVersion{ + // Create updated deployment strategy + strategyNew2 := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ { - Name: "v1alpha1", - Served: true, - Storage: true, - Schema: &apiextensions.CustomResourceValidation{ - OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ - Type: "object", - Description: "my crd schema", + Name: genName("dep3-"), + Spec: newNginxDeployment(genName("nginx-")), + }, + }, + } + Expect(err).ShouldNot(HaveOccurred()) + + // Third CSV with owning CRD v1alpha2 + csvNew2 := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, + }, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv3"), + }, + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + Replaces: csvNew.Name, + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategyNew2, + }, + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "v1alpha2", + Kind: crdPlural, + DisplayName: crdName, + Description: "In the cluster4", }, }, }, }, - Names: apiextensions.CustomResourceDefinitionNames{ - Plural: crdPlural, - Singular: crdPlural, - Kind: crdPlural, - ListKind: "list" + crdPlural, - }, - Scope: apiextensions.NamespaceScoped, - }, - }) - defer cleanupCRD() - Expect(err).ShouldNot(HaveOccurred()) + } - // Create "current" CSV - nginxName := genName("nginx-") - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: genName("dep-"), - Spec: newNginxDeployment(nginxName), - }, - }, - } + // Create newly updated CSV + cleanupNewCSV, err := createCSV(c, crc, csvNew2, ns.GetName(), true, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupNewCSV() - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, + // Wait for updated CSV to succeed + fetchedCSV, err = fetchCSV(crc, csvNew2.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) + + // Fetch cluster service version again to check for unnecessary control loops + sameCSV, err = fetchCSV(crc, csvNew2.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) + Expect(equality.Semantic.DeepEqual(fetchedCSV, sameCSV)).Should(BeTrue(), diff.ObjectDiff(fetchedCSV, sameCSV)) + + // Should have created new deployment and deleted old one + depNew, err = c.GetDeployment(ns.GetName(), strategyNew2.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(depNew).ShouldNot(BeNil()) + err = waitForDeploymentToDelete(ns.GetName(), c, strategyNew.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + + // Should clean up the CSV + Eventually(func() bool { + return csvExists(ns.GetName(), crc, csvNew.Name) + }).Should(BeFalse()) + }) + + It("update modify deployment name", func() { + + // Create dependency first (CRD) + crdPlural := genName("ins2") + crdName := crdPlural + ".cluster.com" + cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ + ObjectMeta: metav1.ObjectMeta{ + Name: crdName, + }, + Spec: apiextensions.CustomResourceDefinitionSpec{ + Group: "cluster.com", + Versions: []apiextensions.CustomResourceDefinitionVersion{ + { + Name: "v1alpha1", + Served: true, + Storage: true, + Schema: &apiextensions.CustomResourceValidation{ + OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ + Type: "object", + Description: "my crd schema", + }, + }, + }, }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, + Names: apiextensions.CustomResourceDefinitionNames{ + Plural: crdPlural, + Singular: crdPlural, + Kind: crdPlural, + ListKind: "list" + crdPlural, }, + Scope: apiextensions.NamespaceScoped, + }, + }) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCRD() + + // create "current" CSV + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, + Name: genName("dep-"), + Spec: newNginxDeployment(genName("nginx-")), }, { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + Name: "dep2-test", + Spec: newNginxDeployment("nginx2"), }, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, + } + + Expect(err).ShouldNot(HaveOccurred()) + + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, + }, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), }, - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, { - Name: crdName, - Version: "v1alpha1", - Kind: crdPlural, - DisplayName: crdName, - Description: "In the cluster", + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, + }, + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "v1alpha1", + Kind: crdPlural, + DisplayName: crdName, + Description: "In the cluster2", + }, }, }, }, - }, - } + } - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, true, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), true, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - // Wait for current CSV to succeed - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + // Wait for current CSV to succeed + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - // Should have created deployment - dep, err := c.GetDeployment(testNamespace, strategy.DeploymentSpecs[0].Name) - Expect(err).ShouldNot(HaveOccurred()) - Expect(dep).ShouldNot(BeNil()) + // Should have created deployments + dep, err := c.GetDeployment(ns.GetName(), strategy.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(dep).ShouldNot(BeNil()) + dep2, err := c.GetDeployment(ns.GetName(), strategy.DeploymentSpecs[1].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(dep2).ShouldNot(BeNil()) - // Create "updated" CSV - strategyNew := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - // Same name - Name: strategy.DeploymentSpecs[0].Name, - // Different spec - Spec: newNginxDeployment(nginxName), + // Create "updated" CSV + strategyNew := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ + { + Name: genName("dep3-"), + Spec: newNginxDeployment(genName("nginx3-")), + }, + { + Name: "dep2-test", + Spec: newNginxDeployment("nginx2"), + }, }, - }, - } + } - // Fetch the current csv - fetchedCSV, err := fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + Expect(err).ShouldNot(HaveOccurred()) - // Update csv with modified deployment spec - fetchedCSV.Spec.InstallStrategy.StrategySpec = strategyNew + // Fetch the current csv + fetchedCSV, err := fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - Eventually(func() error { - // Update the current csv - _, err = crc.OperatorsV1alpha1().ClusterServiceVersions(testNamespace).Update(context.TODO(), fetchedCSV, metav1.UpdateOptions{}) - return err - }).Should(Succeed()) + // Update csv with same strategy with different deployment's name + fetchedCSV.Spec.InstallStrategy.StrategySpec = strategyNew - // Wait for updated CSV to succeed - _, err = fetchCSV(crc, csv.Name, testNamespace, func(csv *operatorsv1alpha1.ClusterServiceVersion) bool { + // Update the current csv with the new csv + _, err = crc.OperatorsV1alpha1().ClusterServiceVersions(ns.GetName()).Update(context.TODO(), fetchedCSV, metav1.UpdateOptions{}) + Expect(err).ShouldNot(HaveOccurred()) - // Should have updated existing deployment - depUpdated, err := c.GetDeployment(testNamespace, strategyNew.DeploymentSpecs[0].Name) + // Wait for new deployment to exist + err = waitForDeployment(ns.GetName(), c, strategyNew.DeploymentSpecs[0].Name) Expect(err).ShouldNot(HaveOccurred()) - Expect(depUpdated).ShouldNot(BeNil()) - // container name has been updated and differs from initial CSV spec and updated CSV spec - Expect(depUpdated.Spec.Template.Spec.Containers[0].Name).ShouldNot(Equal(strategyNew.DeploymentSpecs[0].Spec.Template.Spec.Containers[0].Name)) - // Check for success - return csvSucceededChecker(csv) + // Wait for updated CSV to succeed + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) + + // Should have created new deployment and deleted old + depNew, err := c.GetDeployment(ns.GetName(), strategyNew.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(depNew).ShouldNot(BeNil()) + + // Make sure the unchanged deployment still exists + depNew2, err := c.GetDeployment(ns.GetName(), strategyNew.DeploymentSpecs[1].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(depNew2).ShouldNot(BeNil()) + + err = waitForDeploymentToDelete(ns.GetName(), c, strategy.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) }) - Expect(err).ShouldNot(HaveOccurred()) + It("update deployment spec in an existing CSV for a hotfix", func() { - }) - It("emits CSV requirement events", func() { + c := newKubeClient() + crc := newCRClient() - csv := &operatorsv1alpha1.ClusterServiceVersion{ - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, + // Create dependency first (CRD) + crdPlural := genName("ins") + crdName := crdPlural + ".cluster.com" + cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ + ObjectMeta: metav1.ObjectMeta{ + Name: crdName, }, - InstallStrategy: newNginxInstallStrategy(genName("dep-"), nil, nil), - APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ - // Require an API that we know won't exist under our domain - Required: []operatorsv1alpha1.APIServiceDescription{ + Spec: apiextensions.CustomResourceDefinitionSpec{ + Group: "cluster.com", + Versions: []apiextensions.CustomResourceDefinitionVersion{ { - Group: "bad.packages.operators.coreos.com", - Version: "v1", - Kind: "PackageManifest", + Name: "v1alpha1", + Served: true, + Storage: true, + Schema: &apiextensions.CustomResourceValidation{ + OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ + Type: "object", + Description: "my crd schema", + }, + }, }, }, + Names: apiextensions.CustomResourceDefinitionNames{ + Plural: crdPlural, + Singular: crdPlural, + Kind: crdPlural, + ListKind: "list" + crdPlural, + }, + Scope: apiextensions.NamespaceScoped, }, - }, - } - csv.SetNamespace(testNamespace) - csv.SetName(genName("csv-")) - - clientCtx := context.Background() - listOpts := metav1.ListOptions{ - FieldSelector: "involvedObject.kind=ClusterServiceVersion", - } - events, err := c.KubernetesInterface().CoreV1().Events(csv.GetNamespace()).List(clientCtx, listOpts) - Expect(err).ToNot(HaveOccurred()) - - // Watch latest events from test namespace for CSV - listOpts.ResourceVersion = events.ResourceVersion - w, err := c.KubernetesInterface().CoreV1().Events(testNamespace).Watch(context.Background(), listOpts) - Expect(err).ToNot(HaveOccurred()) - defer w.Stop() - - cleanupCSV, err := createCSV(c, crc, *csv, csv.GetNamespace(), false, false) - Expect(err).ToNot(HaveOccurred()) - defer cleanupCSV() - - By("emitting when requirements are not met") - nextReason := func() string { - if e := <-w.ResultChan(); e.Object != nil { - return e.Object.(*corev1.Event).Reason - } - return "" - } - Eventually(nextReason).Should(Equal("RequirementsNotMet")) - - // Patch the CSV to require an API that we know exists - Eventually(ctx.Ctx().SSAClient().Apply(clientCtx, csv, func(c *operatorsv1alpha1.ClusterServiceVersion) error { - c.Spec.APIServiceDefinitions.Required[0].Group = "packages.operators.coreos.com" - return nil - })).Should(Succeed()) - - By("emitting when requirements are met") - Eventually(nextReason).Should(Equal("AllRequirementsMet")) - }) - - // TODO: test behavior when replaces field doesn't point to existing CSV - It("status invalid CSV", func() { + }) + defer cleanupCRD() + Expect(err).ShouldNot(HaveOccurred()) - // Create CRD - crdPlural := genName("ins") - crdName := crdPlural + ".cluster.com" - cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ - ObjectMeta: metav1.ObjectMeta{ - Name: crdName, - }, - Spec: apiextensions.CustomResourceDefinitionSpec{ - Group: "cluster.com", - Versions: []apiextensions.CustomResourceDefinitionVersion{ + // Create "current" CSV + nginxName := genName("nginx-") + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ { - Name: "v1alpha1", - Served: true, - Storage: true, - Schema: &apiextensions.CustomResourceValidation{ - OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ - Type: "object", - Description: "my crd schema", - }, - }, + Name: genName("dep-"), + Spec: newNginxDeployment(nginxName), }, }, - Names: apiextensions.CustomResourceDefinitionNames{ - Plural: crdPlural, - Singular: crdPlural, - Kind: crdPlural, - ListKind: "list" + crdPlural, - }, - Scope: apiextensions.NamespaceScoped, - }, - }) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCRD() - - // create CSV - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: genName("dep-"), - Spec: newNginxDeployment(genName("nginx-")), - }, - }, - } - - Expect(err).ShouldNot(HaveOccurred()) + } - csv := operatorsv1alpha1.ClusterServiceVersion{ - TypeMeta: metav1.TypeMeta{ - Kind: operatorsv1alpha1.ClusterServiceVersionKind, - APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, - }, - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv"), - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, - }, + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), }, - CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ - Owned: []operatorsv1alpha1.CRDDescription{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, { - Name: crdName, - Version: "apiextensions.k8s.io/v1alpha1", // purposely invalid, should be just v1alpha1 to match CRD - Kind: crdPlural, - DisplayName: crdName, - Description: "In the cluster2", + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, + }, + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "v1alpha1", + Kind: crdPlural, + DisplayName: crdName, + Description: "In the cluster", + }, }, }, }, - }, - } - - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, true, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() - - notServedStatus := operatorsv1alpha1.RequirementStatus{ - Group: "apiextensions.k8s.io", - Version: "v1", - Kind: "CustomResourceDefinition", - Name: crdName, - Status: operatorsv1alpha1.RequirementStatusReasonNotPresent, - Message: "CRD version not served", - } - csvCheckPhaseAndRequirementStatus := func(csv *operatorsv1alpha1.ClusterServiceVersion) bool { - if csv.Status.Phase == operatorsv1alpha1.CSVPhasePending { - for _, status := range csv.Status.RequirementStatus { - if status.Message == notServedStatus.Message { - return true - } - } } - return false - } - - fetchedCSV, err := fetchCSV(crc, csv.Name, testNamespace, csvCheckPhaseAndRequirementStatus) - Expect(err).ShouldNot(HaveOccurred()) - - Expect(fetchedCSV.Status.RequirementStatus).Should(ContainElement(notServedStatus)) - }) - - It("api service resource migrated if adoptable", func() { - depName := genName("hat-server") - mockGroup := fmt.Sprintf("hats.%s.redhat.com", genName("")) - version := "v1alpha1" - mockGroupVersion := strings.Join([]string{mockGroup, version}, "/") - mockKinds := []string{"fedora"} - depSpec := newMockExtServerDeployment(depName, []mockGroupVersionKind{{depName, mockGroupVersion, mockKinds, 5443}}) - apiServiceName := strings.Join([]string{version, mockGroup}, ".") + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), true, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - // Create CSVs for the hat-server - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: depName, - Spec: depSpec, - }, - }, - } + // Wait for current CSV to succeed + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - owned := make([]operatorsv1alpha1.APIServiceDescription, len(mockKinds)) - for i, kind := range mockKinds { - owned[i] = operatorsv1alpha1.APIServiceDescription{ - Name: apiServiceName, - Group: mockGroup, - Version: version, - Kind: kind, - DeploymentName: depName, - ContainerPort: int32(5443), - DisplayName: kind, - Description: fmt.Sprintf("A %s", kind), - } - } + // Should have created deployment + dep, err := c.GetDeployment(ns.GetName(), strategy.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(dep).ShouldNot(BeNil()) - csv := operatorsv1alpha1.ClusterServiceVersion{ - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, - }, + // Create "updated" CSV + strategyNew := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + // Same name + Name: strategy.DeploymentSpecs[0].Name, + // Different spec + Spec: newNginxDeployment(nginxName), }, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, - }, - APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ - Owned: owned, - }, - }, - } - csv.SetName("csv-hat-1") - csv.SetNamespace(testNamespace) - - createLegacyAPIResources(&csv, owned[0]) + } - // Create the APIService CSV - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() + // Fetch the current csv + fetchedCSV, err := fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + // Update csv with modified deployment spec + fetchedCSV.Spec.InstallStrategy.StrategySpec = strategyNew - checkLegacyAPIResources(owned[0], true) - }) + Eventually(func() error { + // Update the current csv + _, err = crc.OperatorsV1alpha1().ClusterServiceVersions(ns.GetName()).Update(context.TODO(), fetchedCSV, metav1.UpdateOptions{}) + return err + }).Should(Succeed()) - It("API service resource not migrated if not adoptable", func() { + // Wait for updated CSV to succeed + _, err = fetchCSV(crc, csv.Name, ns.GetName(), func(csv *operatorsv1alpha1.ClusterServiceVersion) bool { - depName := genName("hat-server") - mockGroup := fmt.Sprintf("hats.%s.redhat.com", genName("")) - version := "v1alpha1" - mockGroupVersion := strings.Join([]string{mockGroup, version}, "/") - mockKinds := []string{"fedora"} - depSpec := newMockExtServerDeployment(depName, []mockGroupVersionKind{{depName, mockGroupVersion, mockKinds, 5443}}) - apiServiceName := strings.Join([]string{version, mockGroup}, ".") + // Should have updated existing deployment + depUpdated, err := c.GetDeployment(ns.GetName(), strategyNew.DeploymentSpecs[0].Name) + Expect(err).ShouldNot(HaveOccurred()) + Expect(depUpdated).ShouldNot(BeNil()) + // container name has been updated and differs from initial CSV spec and updated CSV spec + Expect(depUpdated.Spec.Template.Spec.Containers[0].Name).ShouldNot(Equal(strategyNew.DeploymentSpecs[0].Spec.Template.Spec.Containers[0].Name)) - // Create CSVs for the hat-server - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: depName, - Spec: depSpec, - }, - }, - } + // Check for success + return csvSucceededChecker(csv) + }) + Expect(err).ShouldNot(HaveOccurred()) - owned := make([]operatorsv1alpha1.APIServiceDescription, len(mockKinds)) - for i, kind := range mockKinds { - owned[i] = operatorsv1alpha1.APIServiceDescription{ - Name: apiServiceName, - Group: mockGroup, - Version: version, - Kind: kind, - DeploymentName: depName, - ContainerPort: int32(5443), - DisplayName: kind, - Description: fmt.Sprintf("A %s", kind), - } - } + }) + It("emits CSV requirement events", func() { - csv := operatorsv1alpha1.ClusterServiceVersion{ - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, + csv := &operatorsv1alpha1.ClusterServiceVersion{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, }, - { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + InstallStrategy: newNginxInstallStrategy(genName("dep-"), nil, nil), + APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ + // Require an API that we know won't exist under our domain + Required: []operatorsv1alpha1.APIServiceDescription{ + { + Group: "bad.packages.operators.coreos.com", + Version: "v1", + Kind: "PackageManifest", + }, + }, }, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, - }, - APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ - Owned: owned, - }, - }, - } - csv.SetName("csv-hat-1") - csv.SetNamespace(testNamespace) - - createLegacyAPIResources(nil, owned[0]) - - // Create the APIService CSV - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() - - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) - - checkLegacyAPIResources(owned[0], false) + } + csv.SetNamespace(ns.GetName()) + csv.SetName(genName("csv-")) - // Cleanup the resources created for this test that were not cleaned up. - deleteLegacyAPIResources(owned[0]) - }) + clientCtx := context.Background() + listOpts := metav1.ListOptions{ + FieldSelector: "involvedObject.kind=ClusterServiceVersion", + } + events, err := c.KubernetesInterface().CoreV1().Events(csv.GetNamespace()).List(clientCtx, listOpts) + Expect(err).ToNot(HaveOccurred()) + + // Watch latest events from test namespace for CSV + listOpts.ResourceVersion = events.ResourceVersion + w, err := c.KubernetesInterface().CoreV1().Events(ns.GetName()).Watch(context.Background(), listOpts) + Expect(err).ToNot(HaveOccurred()) + defer w.Stop() + + cleanupCSV, err := createCSV(c, crc, *csv, csv.GetNamespace(), false, false) + Expect(err).ToNot(HaveOccurred()) + defer cleanupCSV() + + By("emitting when requirements are not met") + nextReason := func() string { + if e := <-w.ResultChan(); e.Object != nil { + return e.Object.(*corev1.Event).Reason + } + return "" + } + Eventually(nextReason).Should(Equal("RequirementsNotMet")) - It("multiple API services on a single pod", func() { - - // Create the deployment that both APIServices will be deployed to. - depName := genName("hat-server") - - // Define the expected mock APIService settings. - version := "v1alpha1" - apiService1Group := fmt.Sprintf("hats.%s.redhat.com", genName("")) - apiService1GroupVersion := strings.Join([]string{apiService1Group, version}, "/") - apiService1Kinds := []string{"fedora"} - apiService1Name := strings.Join([]string{version, apiService1Group}, ".") - - apiService2Group := fmt.Sprintf("hats.%s.redhat.com", genName("")) - apiService2GroupVersion := strings.Join([]string{apiService2Group, version}, "/") - apiService2Kinds := []string{"fez"} - apiService2Name := strings.Join([]string{version, apiService2Group}, ".") - - // Create the deployment spec with the two APIServices. - mockGroupVersionKinds := []mockGroupVersionKind{ - { - depName, - apiService1GroupVersion, - apiService1Kinds, - 5443, - }, - { - depName, - apiService2GroupVersion, - apiService2Kinds, - 5444, - }, - } - depSpec := newMockExtServerDeployment(depName, mockGroupVersionKinds) + // Patch the CSV to require an API that we know exists + Eventually(ctx.Ctx().SSAClient().Apply(clientCtx, csv, func(c *operatorsv1alpha1.ClusterServiceVersion) error { + c.Spec.APIServiceDefinitions.Required[0].Group = "packages.operators.coreos.com" + return nil + })).Should(Succeed()) - // Create the CSV. - strategy := operatorsv1alpha1.StrategyDetailsDeployment{ - DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ - { - Name: depName, - Spec: depSpec, - }, - }, - } + By("emitting when requirements are met") + Eventually(nextReason).Should(Equal("AllRequirementsMet")) + }) - // Update the owned APIServices two include the two APIServices. - owned := []operatorsv1alpha1.APIServiceDescription{ - { - Name: apiService1Name, - Group: apiService1Group, - Version: version, - Kind: apiService1Kinds[0], - DeploymentName: depName, - ContainerPort: int32(5443), - DisplayName: apiService1Kinds[0], - Description: fmt.Sprintf("A %s", apiService1Kinds[0]), - }, - { - Name: apiService2Name, - Group: apiService2Group, - Version: version, - Kind: apiService2Kinds[0], - DeploymentName: depName, - ContainerPort: int32(5444), - DisplayName: apiService2Kinds[0], - Description: fmt.Sprintf("A %s", apiService2Kinds[0]), - }, - } + // TODO: test behavior when replaces field doesn't point to existing CSV + It("status invalid CSV", func() { - csv := operatorsv1alpha1.ClusterServiceVersion{ - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - MinKubeVersion: "0.0.0", - InstallModes: []operatorsv1alpha1.InstallMode{ - { - Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, - Supported: true, - }, - { - Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, - Supported: true, + // Create CRD + crdPlural := genName("ins") + crdName := crdPlural + ".cluster.com" + cleanupCRD, err := createCRD(c, apiextensions.CustomResourceDefinition{ + ObjectMeta: metav1.ObjectMeta{ + Name: crdName, + }, + Spec: apiextensions.CustomResourceDefinitionSpec{ + Group: "cluster.com", + Versions: []apiextensions.CustomResourceDefinitionVersion{ + { + Name: "v1alpha1", + Served: true, + Storage: true, + Schema: &apiextensions.CustomResourceValidation{ + OpenAPIV3Schema: &apiextensions.JSONSchemaProps{ + Type: "object", + Description: "my crd schema", + }, + }, + }, }, - { - Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, - Supported: true, + Names: apiextensions.CustomResourceDefinitionNames{ + Plural: crdPlural, + Singular: crdPlural, + Kind: crdPlural, + ListKind: "list" + crdPlural, }, + Scope: apiextensions.NamespaceScoped, + }, + }) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCRD() + + // create CSV + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + Name: genName("dep-"), + Spec: newNginxDeployment(genName("nginx-")), }, }, - InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ - StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, - StrategySpec: strategy, + } + Expect(err).ShouldNot(HaveOccurred()) + + csv := operatorsv1alpha1.ClusterServiceVersion{ + TypeMeta: metav1.TypeMeta{ + Kind: operatorsv1alpha1.ClusterServiceVersionKind, + APIVersion: operatorsv1alpha1.ClusterServiceVersionAPIVersion, }, - APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ - Owned: owned, + ObjectMeta: metav1.ObjectMeta{ + Name: genName("csv"), }, - }, - } - csv.SetName("csv-hat-1") - csv.SetNamespace(testNamespace) - - // Create the APIService CSV - cleanupCSV, err := createCSV(c, crc, csv, testNamespace, false, false) - Expect(err).ShouldNot(HaveOccurred()) - defer cleanupCSV() - - _, err = fetchCSV(crc, csv.Name, testNamespace, csvSucceededChecker) - Expect(err).ShouldNot(HaveOccurred()) + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, + }, + CustomResourceDefinitions: operatorsv1alpha1.CustomResourceDefinitions{ + Owned: []operatorsv1alpha1.CRDDescription{ + { + Name: crdName, + Version: "apiextensions.k8s.io/v1alpha1", // purposely invalid, should be just v1alpha1 to match CRD + Kind: crdPlural, + DisplayName: crdName, + Description: "In the cluster2", + }, + }, + }, + }, + } - // Check that the APIService caBundles are equal - apiService1, err := c.GetAPIService(apiService1Name) - Expect(err).ShouldNot(HaveOccurred()) + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), true, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() + + notServedStatus := operatorsv1alpha1.RequirementStatus{ + Group: "apiextensions.k8s.io", + Version: "v1", + Kind: "CustomResourceDefinition", + Name: crdName, + Status: operatorsv1alpha1.RequirementStatusReasonNotPresent, + Message: "CRD version not served", + } + csvCheckPhaseAndRequirementStatus := func(csv *operatorsv1alpha1.ClusterServiceVersion) bool { + if csv.Status.Phase == operatorsv1alpha1.CSVPhasePending { + for _, status := range csv.Status.RequirementStatus { + if status.Message == notServedStatus.Message { + return true + } + } + } + return false + } - apiService2, err := c.GetAPIService(apiService2Name) - Expect(err).ShouldNot(HaveOccurred()) + fetchedCSV, err := fetchCSV(crc, csv.Name, ns.GetName(), csvCheckPhaseAndRequirementStatus) + Expect(err).ShouldNot(HaveOccurred()) - Expect(apiService2.Spec.CABundle).Should(Equal(apiService1.Spec.CABundle)) - }) -}) + Expect(fetchedCSV.Status.RequirementStatus).Should(ContainElement(notServedStatus)) + }) -var _ = Describe("Disabling copied CSVs", func() { - var ( - ns corev1.Namespace - csv operatorsv1alpha1.ClusterServiceVersion - ) + It("api service resource migrated if adoptable", func() { - BeforeEach(func() { - nsname := genName("csv-toggle-test-") - og := operatorsv1.OperatorGroup{ - ObjectMeta: metav1.ObjectMeta{ - Name: fmt.Sprintf("%s-operatorgroup", nsname), - Namespace: nsname, - }, - } - ns = SetupGeneratedTestNamespaceWithOperatorGroup(nsname, og) + depName := genName("hat-server") + mockGroup := fmt.Sprintf("hats.%s.redhat.com", genName("")) + version := "v1alpha1" + mockGroupVersion := strings.Join([]string{mockGroup, version}, "/") + mockKinds := []string{"fedora"} + depSpec := newMockExtServerDeployment(depName, []mockGroupVersionKind{{depName, mockGroupVersion, mockKinds, 5443}}) + apiServiceName := strings.Join([]string{version, mockGroup}, ".") - csv = operatorsv1alpha1.ClusterServiceVersion{ - ObjectMeta: metav1.ObjectMeta{ - Name: genName("csv-toggle-test-"), - Namespace: nsname, - }, - Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ - InstallStrategy: newNginxInstallStrategy(genName("csv-toggle-test-"), nil, nil), - InstallModes: []operatorsv1alpha1.InstallMode{ + // Create CSVs for the hat-server + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ { - Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, - Supported: true, + Name: depName, + Spec: depSpec, }, }, - }, - } - err := ctx.Ctx().Client().Create(context.Background(), &csv) - Expect(err).ShouldNot(HaveOccurred()) - }) - AfterEach(func() { - Eventually(func() error { - err := ctx.Ctx().Client().Delete(context.Background(), &csv) - if err != nil && apierrors.IsNotFound(err) { - return err } - return nil - }).Should(Succeed()) - TeardownNamespace(ns.GetName()) - Eventually(func() error { - var namespace corev1.Namespace - return ctx.Ctx().Client().Get(context.Background(), client.ObjectKeyFromObject(&ns), &namespace) - }).Should(WithTransform(apierrors.IsNotFound, BeTrue())) - }) - - When("an operator is installed in AllNamespace mode", func() { - // issue: https://github.com/operator-framework/operator-lifecycle-manager/issues/2643 - It("[FLAKE] should have Copied CSVs in all other namespaces", func() { - Eventually(func() error { - requirement, err := k8slabels.NewRequirement(operatorsv1alpha1.CopiedLabelKey, selection.Equals, []string{csv.GetNamespace()}) - if err != nil { - return err + owned := make([]operatorsv1alpha1.APIServiceDescription, len(mockKinds)) + for i, kind := range mockKinds { + owned[i] = operatorsv1alpha1.APIServiceDescription{ + Name: apiServiceName, + Group: mockGroup, + Version: version, + Kind: kind, + DeploymentName: depName, + ContainerPort: int32(5443), + DisplayName: kind, + Description: fmt.Sprintf("A %s", kind), } + } - var copiedCSVs operatorsv1alpha1.ClusterServiceVersionList - err = ctx.Ctx().Client().List(context.TODO(), &copiedCSVs, &client.ListOptions{ - LabelSelector: k8slabels.NewSelector().Add(*requirement), - }) - if err != nil { - return err - } + csv := operatorsv1alpha1.ClusterServiceVersion{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, + }, + APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ + Owned: owned, + }, + }, + } + csv.SetName("csv-hat-1") + csv.SetNamespace(ns.GetName()) - var namespaces corev1.NamespaceList - if err := ctx.Ctx().Client().List(context.TODO(), &namespaces, &client.ListOptions{}); err != nil { - return err - } + createLegacyAPIResources(ns.GetName(), &csv, owned[0]) - if len(namespaces.Items)-1 != len(copiedCSVs.Items) { - return fmt.Errorf("%d copied CSVs found, expected %d", len(copiedCSVs.Items), len(namespaces.Items)-1) - } + // Create the APIService CSV + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - return nil - }).Should(Succeed()) + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) + + checkLegacyAPIResources(ns.GetName(), owned[0], true) }) - }) - When("Copied CSVs are disabled", func() { - BeforeEach(func() { - Eventually(func() error { - var olmConfig operatorsv1.OLMConfig - if err := ctx.Ctx().Client().Get(context.TODO(), apitypes.NamespacedName{Name: "cluster"}, &olmConfig); err != nil { - ctx.Ctx().Logf("Error getting olmConfig %v", err) - return err - } + It("API service resource not migrated if not adoptable", func() { - // Exit early if copied CSVs are disabled. - if !olmConfig.CopiedCSVsAreEnabled() { - return nil - } + depName := genName("hat-server") + mockGroup := fmt.Sprintf("hats.%s.redhat.com", genName("")) + version := "v1alpha1" + mockGroupVersion := strings.Join([]string{mockGroup, version}, "/") + mockKinds := []string{"fedora"} + depSpec := newMockExtServerDeployment(depName, []mockGroupVersionKind{{depName, mockGroupVersion, mockKinds, 5443}}) + apiServiceName := strings.Join([]string{version, mockGroup}, ".") - olmConfig.Spec = operatorsv1.OLMConfigSpec{ - Features: &operatorsv1.Features{ - DisableCopiedCSVs: getPointer(true), + // Create CSVs for the hat-server + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ + { + Name: depName, + Spec: depSpec, }, - } - - if err := ctx.Ctx().Client().Update(context.TODO(), &olmConfig); err != nil { - ctx.Ctx().Logf("Error setting olmConfig %v", err) - return err - } - - return nil - }).Should(Succeed()) - }) - - It("should not have any copied CSVs", func() { - Eventually(func() error { - requirement, err := k8slabels.NewRequirement(operatorsv1alpha1.CopiedLabelKey, selection.Equals, []string{csv.GetNamespace()}) - if err != nil { - return err - } + }, + } - var copiedCSVs operatorsv1alpha1.ClusterServiceVersionList - err = ctx.Ctx().Client().List(context.TODO(), &copiedCSVs, &client.ListOptions{ - LabelSelector: k8slabels.NewSelector().Add(*requirement), - }) - if err != nil { - return err + owned := make([]operatorsv1alpha1.APIServiceDescription, len(mockKinds)) + for i, kind := range mockKinds { + owned[i] = operatorsv1alpha1.APIServiceDescription{ + Name: apiServiceName, + Group: mockGroup, + Version: version, + Kind: kind, + DeploymentName: depName, + ContainerPort: int32(5443), + DisplayName: kind, + Description: fmt.Sprintf("A %s", kind), } + } - if numCSVs := len(copiedCSVs.Items); numCSVs != 0 { - return fmt.Errorf("Found %d copied CSVs, should be 0", numCSVs) - } - return nil - }).Should(Succeed()) - }) + csv := operatorsv1alpha1.ClusterServiceVersion{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, + }, + APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ + Owned: owned, + }, + }, + } + csv.SetName("csv-hat-1") + csv.SetNamespace(ns.GetName()) - // issue: https://github.com/operator-framework/operator-lifecycle-manager/issues/2634 - It("[FLAKE] should be reflected in the olmConfig.Status.Condition array that the expected number of copied CSVs exist", func() { - Eventually(func() error { - var olmConfig operatorsv1.OLMConfig - if err := ctx.Ctx().Client().Get(context.TODO(), apitypes.NamespacedName{Name: "cluster"}, &olmConfig); err != nil { - return err - } + createLegacyAPIResources(ns.GetName(), nil, owned[0]) - foundCondition := meta.FindStatusCondition(olmConfig.Status.Conditions, operatorsv1.DisabledCopiedCSVsConditionType) - if foundCondition == nil { - return fmt.Errorf("%s condition not found", operatorsv1.DisabledCopiedCSVsConditionType) - } + // Create the APIService CSV + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - expectedCondition := metav1.Condition{ - Reason: "NoCopiedCSVsFound", - Message: "Copied CSVs are disabled and none were found for operators installed in AllNamespace mode", - Status: metav1.ConditionTrue, - } + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - if foundCondition.Reason != expectedCondition.Reason || - foundCondition.Message != expectedCondition.Message || - foundCondition.Status != expectedCondition.Status { - return fmt.Errorf("condition does not have expected reason, message, and status. Expected %v, got %v", expectedCondition, foundCondition) - } + checkLegacyAPIResources(ns.GetName(), owned[0], false) - return nil - }).Should(Succeed()) + // Cleanup the resources created for this test that were not cleaned up. + deleteLegacyAPIResources(ns.GetName(), owned[0]) }) - }) - When("Copied CSVs are toggled back on", func() { - BeforeEach(func() { - Eventually(func() error { - var olmConfig operatorsv1.OLMConfig - if err := ctx.Ctx().Client().Get(context.TODO(), apitypes.NamespacedName{Name: "cluster"}, &olmConfig); err != nil { - return err - } + It("multiple API services on a single pod", func() { - // Exit early if copied CSVs are enabled. - if olmConfig.CopiedCSVsAreEnabled() { - return nil - } + // Create the deployment that both APIServices will be deployed to. + depName := genName("hat-server") - olmConfig.Spec = operatorsv1.OLMConfigSpec{ - Features: &operatorsv1.Features{ - DisableCopiedCSVs: getPointer(false), - }, - } + // Define the expected mock APIService settings. + version := "v1alpha1" + apiService1Group := fmt.Sprintf("hats.%s.redhat.com", genName("")) + apiService1GroupVersion := strings.Join([]string{apiService1Group, version}, "/") + apiService1Kinds := []string{"fedora"} + apiService1Name := strings.Join([]string{version, apiService1Group}, ".") - if err := ctx.Ctx().Client().Update(context.TODO(), &olmConfig); err != nil { - return err - } + apiService2Group := fmt.Sprintf("hats.%s.redhat.com", genName("")) + apiService2GroupVersion := strings.Join([]string{apiService2Group, version}, "/") + apiService2Kinds := []string{"fez"} + apiService2Name := strings.Join([]string{version, apiService2Group}, ".") - return nil - }).Should(Succeed()) - }) + // Create the deployment spec with the two APIServices. + mockGroupVersionKinds := []mockGroupVersionKind{ + { + depName, + apiService1GroupVersion, + apiService1Kinds, + 5443, + }, + { + depName, + apiService2GroupVersion, + apiService2Kinds, + 5444, + }, + } + depSpec := newMockExtServerDeployment(depName, mockGroupVersionKinds) - // issue: https://github.com/operator-framework/operator-lifecycle-manager/issues/2634 - It("[FLAKE] should have copied CSVs in all other Namespaces", func() { - Eventually(func() error { - // find copied csvs... - requirement, err := k8slabels.NewRequirement(operatorsv1alpha1.CopiedLabelKey, selection.Equals, []string{csv.GetNamespace()}) - if err != nil { - return err - } + // Create the CSV. + strategy := operatorsv1alpha1.StrategyDetailsDeployment{ + DeploymentSpecs: []operatorsv1alpha1.StrategyDeploymentSpec{ + { + Name: depName, + Spec: depSpec, + }, + }, + } - var copiedCSVs operatorsv1alpha1.ClusterServiceVersionList - err = ctx.Ctx().Client().List(context.TODO(), &copiedCSVs, &client.ListOptions{ - LabelSelector: k8slabels.NewSelector().Add(*requirement), - }) - if err != nil { - return err - } + // Update the owned APIServices two include the two APIServices. + owned := []operatorsv1alpha1.APIServiceDescription{ + { + Name: apiService1Name, + Group: apiService1Group, + Version: version, + Kind: apiService1Kinds[0], + DeploymentName: depName, + ContainerPort: int32(5443), + DisplayName: apiService1Kinds[0], + Description: fmt.Sprintf("A %s", apiService1Kinds[0]), + }, + { + Name: apiService2Name, + Group: apiService2Group, + Version: version, + Kind: apiService2Kinds[0], + DeploymentName: depName, + ContainerPort: int32(5444), + DisplayName: apiService2Kinds[0], + Description: fmt.Sprintf("A %s", apiService2Kinds[0]), + }, + } - var namespaces corev1.NamespaceList - if err := ctx.Ctx().Client().List(context.TODO(), &namespaces, &client.ListOptions{FieldSelector: fields.SelectorFromSet(map[string]string{"status.phase": "Active"})}); err != nil { - return err - } + csv := operatorsv1alpha1.ClusterServiceVersion{ + Spec: operatorsv1alpha1.ClusterServiceVersionSpec{ + MinKubeVersion: "0.0.0", + InstallModes: []operatorsv1alpha1.InstallMode{ + { + Type: operatorsv1alpha1.InstallModeTypeOwnNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeSingleNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeMultiNamespace, + Supported: true, + }, + { + Type: operatorsv1alpha1.InstallModeTypeAllNamespaces, + Supported: true, + }, + }, + InstallStrategy: operatorsv1alpha1.NamedInstallStrategy{ + StrategyName: operatorsv1alpha1.InstallStrategyNameDeployment, + StrategySpec: strategy, + }, + APIServiceDefinitions: operatorsv1alpha1.APIServiceDefinitions{ + Owned: owned, + }, + }, + } + csv.SetName("csv-hat-1") + csv.SetNamespace(ns.GetName()) - targetNamespaces := len(namespaces.Items) - 1 - for _, ns := range namespaces.Items { - // filter out any namespaces that are currently reporting a Terminating phase - // as the API server will reject any resource events in terminating namespaces. - if ns.Status.Phase == "Terminating" { - targetNamespaces-- - } - } - if targetNamespaces != len(copiedCSVs.Items) { - return fmt.Errorf("%d copied CSVs found, expected %d", len(copiedCSVs.Items), targetNamespaces) - } - return nil - }).Should(Succeed()) - }) + // Create the APIService CSV + cleanupCSV, err := createCSV(c, crc, csv, ns.GetName(), false, false) + Expect(err).ShouldNot(HaveOccurred()) + defer cleanupCSV() - // issue: https://github.com/operator-framework/operator-lifecycle-manager/issues/2641 - It("[FLAKE] should be reflected in the olmConfig.Status.Condition array that the expected number of copied CSVs exist", func() { - Eventually(func() error { - var olmConfig operatorsv1.OLMConfig - if err := ctx.Ctx().Client().Get(context.TODO(), apitypes.NamespacedName{Name: "cluster"}, &olmConfig); err != nil { - return err - } - foundCondition := meta.FindStatusCondition(olmConfig.Status.Conditions, operatorsv1.DisabledCopiedCSVsConditionType) - if foundCondition == nil { - return fmt.Errorf("%s condition not found", operatorsv1.DisabledCopiedCSVsConditionType) - } + _, err = fetchCSV(crc, csv.Name, ns.GetName(), csvSucceededChecker) + Expect(err).ShouldNot(HaveOccurred()) - expectedCondition := metav1.Condition{ - Reason: "CopiedCSVsEnabled", - Message: "Copied CSVs are enabled and present across the cluster", - Status: metav1.ConditionFalse, - } + // Check that the APIService caBundles are equal + apiService1, err := c.GetAPIService(apiService1Name) + Expect(err).ShouldNot(HaveOccurred()) - if foundCondition.Reason != expectedCondition.Reason || - foundCondition.Message != expectedCondition.Message || - foundCondition.Status != expectedCondition.Status { - return fmt.Errorf("condition does not have expected reason, message, and status. Expected %v, got %v", expectedCondition, foundCondition) - } + apiService2, err := c.GetAPIService(apiService2Name) + Expect(err).ShouldNot(HaveOccurred()) - return nil - }).Should(Succeed()) + Expect(apiService2.Spec.CABundle).Should(Equal(apiService1.Spec.CABundle)) }) }) }) @@ -4745,9 +4468,9 @@ func awaitCSV(c versioned.Interface, namespace, name string, checker csvConditio return fetched, err } -func waitForDeployment(c operatorclient.ClientInterface, name string) error { +func waitForDeployment(namespace string, c operatorclient.ClientInterface, name string) error { return wait.Poll(pollInterval, pollDuration, func() (bool, error) { - _, err := c.GetDeployment(testNamespace, name) + _, err := c.GetDeployment(namespace, name) if err != nil { if apierrors.IsNotFound(err) { return false, nil @@ -4758,12 +4481,12 @@ func waitForDeployment(c operatorclient.ClientInterface, name string) error { }) } -func waitForDeploymentToDelete(c operatorclient.ClientInterface, name string) error { +func waitForDeploymentToDelete(namespace string, c operatorclient.ClientInterface, name string) error { var err error Eventually(func() (bool, error) { ctx.Ctx().Logf("waiting for deployment %s to delete", name) - _, err := c.GetDeployment(testNamespace, name) + _, err := c.GetDeployment(namespace, name) if apierrors.IsNotFound(err) { ctx.Ctx().Logf("deleted %s", name) return true, nil @@ -4777,8 +4500,8 @@ func waitForDeploymentToDelete(c operatorclient.ClientInterface, name string) er return err } -func csvExists(c versioned.Interface, name string) bool { - fetched, err := c.OperatorsV1alpha1().ClusterServiceVersions(testNamespace).Get(context.TODO(), name, metav1.GetOptions{}) +func csvExists(namespace string, c versioned.Interface, name string) bool { + fetched, err := c.OperatorsV1alpha1().ClusterServiceVersions(namespace).Get(context.TODO(), name, metav1.GetOptions{}) if apierrors.IsNotFound(err) { return false } @@ -4789,21 +4512,21 @@ func csvExists(c versioned.Interface, name string) bool { return true } -func deleteLegacyAPIResources(desc operatorsv1alpha1.APIServiceDescription) { +func deleteLegacyAPIResources(namespace string, desc operatorsv1alpha1.APIServiceDescription) { c := newKubeClient() apiServiceName := fmt.Sprintf("%s.%s", desc.Version, desc.Group) - err := c.DeleteService(testNamespace, strings.Replace(apiServiceName, ".", "-", -1), &metav1.DeleteOptions{}) + err := c.DeleteService(namespace, strings.Replace(apiServiceName, ".", "-", -1), &metav1.DeleteOptions{}) Expect(err).ShouldNot(HaveOccurred()) - err = c.DeleteSecret(testNamespace, apiServiceName+"-cert", &metav1.DeleteOptions{}) + err = c.DeleteSecret(namespace, apiServiceName+"-cert", &metav1.DeleteOptions{}) Expect(err).ShouldNot(HaveOccurred()) - err = c.DeleteRole(testNamespace, apiServiceName+"-cert", &metav1.DeleteOptions{}) + err = c.DeleteRole(namespace, apiServiceName+"-cert", &metav1.DeleteOptions{}) Expect(err).ShouldNot(HaveOccurred()) - err = c.DeleteRoleBinding(testNamespace, apiServiceName+"-cert", &metav1.DeleteOptions{}) + err = c.DeleteRoleBinding(namespace, apiServiceName+"-cert", &metav1.DeleteOptions{}) Expect(err).ShouldNot(HaveOccurred()) err = c.DeleteClusterRoleBinding(apiServiceName+"-system:auth-delegator", &metav1.DeleteOptions{}) @@ -4813,7 +4536,7 @@ func deleteLegacyAPIResources(desc operatorsv1alpha1.APIServiceDescription) { Expect(err).ShouldNot(HaveOccurred()) } -func createLegacyAPIResources(csv *operatorsv1alpha1.ClusterServiceVersion, desc operatorsv1alpha1.APIServiceDescription) { +func createLegacyAPIResources(namespace string, csv *operatorsv1alpha1.ClusterServiceVersion, desc operatorsv1alpha1.APIServiceDescription) { c := newKubeClient() apiServiceName := fmt.Sprintf("%s.%s", desc.Version, desc.Group) @@ -4821,7 +4544,7 @@ func createLegacyAPIResources(csv *operatorsv1alpha1.ClusterServiceVersion, desc // Attempt to create the legacy service service := corev1.Service{} service.SetName(strings.Replace(apiServiceName, ".", "-", -1)) - service.SetNamespace(testNamespace) + service.SetNamespace(namespace) if csv != nil { err := ownerutil.AddOwnerLabels(&service, csv) Expect(err).ShouldNot(HaveOccurred()) @@ -4834,7 +4557,7 @@ func createLegacyAPIResources(csv *operatorsv1alpha1.ClusterServiceVersion, desc // Attempt to create the legacy secret secret := corev1.Secret{} secret.SetName(apiServiceName + "-cert") - secret.SetNamespace(testNamespace) + secret.SetNamespace(namespace) if csv != nil { err = ownerutil.AddOwnerLabels(&secret, csv) Expect(err).ShouldNot(HaveOccurred()) @@ -4848,7 +4571,7 @@ func createLegacyAPIResources(csv *operatorsv1alpha1.ClusterServiceVersion, desc // Attempt to create the legacy secret role role := rbacv1.Role{} role.SetName(apiServiceName + "-cert") - role.SetNamespace(testNamespace) + role.SetNamespace(namespace) if csv != nil { err = ownerutil.AddOwnerLabels(&role, csv) Expect(err).ShouldNot(HaveOccurred()) @@ -4859,7 +4582,7 @@ func createLegacyAPIResources(csv *operatorsv1alpha1.ClusterServiceVersion, desc // Attempt to create the legacy secret role binding roleBinding := rbacv1.RoleBinding{} roleBinding.SetName(apiServiceName + "-cert") - roleBinding.SetNamespace(testNamespace) + roleBinding.SetNamespace(namespace) roleBinding.RoleRef = rbacv1.RoleRef{ APIGroup: "rbac.authorization.k8s.io", Kind: "Role", @@ -4900,24 +4623,24 @@ func createLegacyAPIResources(csv *operatorsv1alpha1.ClusterServiceVersion, desc Expect(err).ShouldNot(HaveOccurred()) } -func checkLegacyAPIResources(desc operatorsv1alpha1.APIServiceDescription, expectedIsNotFound bool) { +func checkLegacyAPIResources(namespace string, desc operatorsv1alpha1.APIServiceDescription, expectedIsNotFound bool) { c := newKubeClient() apiServiceName := fmt.Sprintf("%s.%s", desc.Version, desc.Group) // Attempt to create the legacy service - _, err := c.GetService(testNamespace, strings.Replace(apiServiceName, ".", "-", -1)) + _, err := c.GetService(namespace, strings.Replace(apiServiceName, ".", "-", -1)) Expect(apierrors.IsNotFound(err)).Should(Equal(expectedIsNotFound)) // Attempt to create the legacy secret - _, err = c.GetSecret(testNamespace, apiServiceName+"-cert") + _, err = c.GetSecret(namespace, apiServiceName+"-cert") Expect(apierrors.IsNotFound(err)).Should(Equal(expectedIsNotFound)) // Attempt to create the legacy secret role - _, err = c.GetRole(testNamespace, apiServiceName+"-cert") + _, err = c.GetRole(namespace, apiServiceName+"-cert") Expect(apierrors.IsNotFound(err)).Should(Equal(expectedIsNotFound)) // Attempt to create the legacy secret role binding - _, err = c.GetRoleBinding(testNamespace, apiServiceName+"-cert") + _, err = c.GetRoleBinding(namespace, apiServiceName+"-cert") Expect(apierrors.IsNotFound(err)).Should(Equal(expectedIsNotFound)) // Attempt to create the legacy authDelegatorClusterRoleBinding diff --git a/test/e2e/operator_groups_e2e_test.go b/test/e2e/operator_groups_e2e_test.go index 7b8f94be9d2..18a1e5d4568 100644 --- a/test/e2e/operator_groups_e2e_test.go +++ b/test/e2e/operator_groups_e2e_test.go @@ -1084,7 +1084,7 @@ var _ = Describe("Operator Group", func() { require.NoError(GinkgoT(), awaitAnnotations(GinkgoT(), q, map[string]string{v1.OperatorGroupProvidedAPIsAnnotationKey: ""})) // Ensure csvA's deployment is deleted - require.NoError(GinkgoT(), waitForDeploymentToDelete(c, pkgAStable)) + require.NoError(GinkgoT(), waitForDeploymentToDelete(testNamespace, c, pkgAStable)) // Await csvB's success _, err = awaitCSV(crc, nsB, csvB.GetName(), csvSucceededChecker) diff --git a/test/e2e/subscription_e2e_test.go b/test/e2e/subscription_e2e_test.go index cecfcbd42ab..03e36a58585 100644 --- a/test/e2e/subscription_e2e_test.go +++ b/test/e2e/subscription_e2e_test.go @@ -586,11 +586,11 @@ var _ = Describe("Subscription", func() { // Should eventually GC the CSVs Eventually(func() bool { - return csvExists(crc, csvA.Name) + return csvExists(generatedNamespace.GetName(), crc, csvA.Name) }).Should(BeFalse()) Eventually(func() bool { - return csvExists(crc, csvB.Name) + return csvExists(generatedNamespace.GetName(), crc, csvB.Name) }).Should(BeFalse()) // TODO: check installplans, subscription status, etc diff --git a/test/e2e/util.go b/test/e2e/util.go index 170cea79957..fe4c663ba13 100644 --- a/test/e2e/util.go +++ b/test/e2e/util.go @@ -509,7 +509,11 @@ func buildCatalogSourceCleanupFunc(crc versioned.Interface, namespace string, ca Expect(err).ToNot(HaveOccurred()) Eventually(func() (bool, error) { - fetched, err := newKubeClient().KubernetesInterface().CoreV1().Pods(catalogSource.GetNamespace()).List(context.Background(), metav1.ListOptions{LabelSelector: "olm.catalogSource=" + catalogSource.GetName()}) + listOpts := metav1.ListOptions{ + LabelSelector: "olm.catalogSource=" + catalogSource.GetName(), + FieldSelector: "status.phase=Running", + } + fetched, err := newKubeClient().KubernetesInterface().CoreV1().Pods(catalogSource.GetNamespace()).List(context.Background(), listOpts) if err != nil { return false, err } @@ -959,6 +963,12 @@ func HavePhase(goal operatorsv1alpha1.InstallPlanPhase) gtypes.GomegaMatcher { }, Equal(goal)) } +func CSVHasPhase(goal operatorsv1alpha1.ClusterServiceVersionPhase) gtypes.GomegaMatcher { + return WithTransform(func(csv *operatorsv1alpha1.ClusterServiceVersion) operatorsv1alpha1.ClusterServiceVersionPhase { + return csv.Status.Phase + }, Equal(goal)) +} + func HaveMessage(goal string) gtypes.GomegaMatcher { return WithTransform(func(plan *operatorsv1alpha1.InstallPlan) string { return plan.Status.Message diff --git a/test/e2e/webhook_e2e_test.go b/test/e2e/webhook_e2e_test.go index 6699ba58d3e..2652a50f4d1 100644 --- a/test/e2e/webhook_e2e_test.go +++ b/test/e2e/webhook_e2e_test.go @@ -415,7 +415,7 @@ var _ = Describe("CSVs with a Webhook", func() { // Make sure old resources are cleaned up. Eventually(func() bool { - return csvExists(crc, csv.Spec.Replaces) + return csvExists(testNamespace, crc, csv.Spec.Replaces) }).Should(BeFalse()) // Wait until previous webhook is cleaned up