generated from canonical/template-operator
-
Notifications
You must be signed in to change notification settings - Fork 5
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
c8763bd
commit 7617d3b
Showing
1 changed file
with
123 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,123 @@ | ||
#!/usr/bin/env python3 | ||
# Copyright 2024 Canonical Ltd. | ||
# See LICENSE file for licensing details. | ||
|
||
import asyncio | ||
import logging | ||
import time | ||
from pathlib import Path | ||
|
||
import pytest | ||
import yaml | ||
from pytest_operator.plugin import OpsTest | ||
|
||
from .helpers.helpers import CHARM_SERIES, get_leader_unit | ||
|
||
logger = logging.getLogger(__name__) | ||
METADATA = yaml.safe_load(Path("./metadata.yaml").read_text()) | ||
PGB = METADATA["name"] | ||
MAX_RETRIES = 20 | ||
UNTRUST_ERROR_MESSAGE = f"Insufficient permissions, try: `juju trust {PGB} --scope=cluster`" | ||
|
||
|
||
@pytest.mark.group(1) | ||
async def test_enable_rbac(ops_test: OpsTest): | ||
"""Enables RBAC from inside test runner's environment. | ||
Assert on permission enforcement being active. | ||
""" | ||
enable_rbac_call = await asyncio.create_subprocess_exec( | ||
"sudo", | ||
"microk8s", | ||
"enable", | ||
"rbac", | ||
stdout=asyncio.subprocess.PIPE, | ||
stderr=asyncio.subprocess.PIPE, | ||
) | ||
await enable_rbac_call.communicate() | ||
|
||
is_default_auth = None | ||
retries = 0 | ||
while is_default_auth != "no" and retries < MAX_RETRIES: | ||
rbac_check = await asyncio.create_subprocess_exec( | ||
"microk8s", | ||
"kubectl", | ||
"auth", | ||
"can-i", | ||
"get", | ||
"cm", | ||
"-A", | ||
"--as=system:serviceaccount:default:no-permissions", | ||
stdout=asyncio.subprocess.PIPE, | ||
stderr=asyncio.subprocess.PIPE, | ||
) | ||
stdout, _ = await rbac_check.communicate() | ||
if stdout: | ||
is_default_auth = stdout.decode().split()[0] | ||
logger.info(f"Response from rbac check ('no' means enabled): {is_default_auth}") | ||
retries += 1 | ||
|
||
assert is_default_auth == "no" | ||
|
||
|
||
@pytest.mark.group(1) | ||
async def test_model_connectivity(ops_test: OpsTest): | ||
"""Tries to regain connectivity to model after microK8s restart.""" | ||
retries = 0 | ||
while retries < MAX_RETRIES: | ||
try: | ||
await ops_test.model.connect_current() | ||
status = await ops_test.model.get_status() | ||
logger.info(f"Connection established: {status}") | ||
return | ||
except Exception as e: | ||
logger.info(f"Connection attempt failed: {e}") | ||
retries += 1 | ||
logger.info(f"Retrying ({retries}/{MAX_RETRIES})...") | ||
time.sleep(3) | ||
|
||
logger.error(f"Max retries number of {MAX_RETRIES} reached. Unable to connect.") | ||
assert False | ||
|
||
|
||
@pytest.mark.group(1) | ||
@pytest.mark.abort_on_fail | ||
async def test_deploy_without_trust(ops_test: OpsTest, pgb_charm): | ||
"""Build and deploy the charm with trust set to false. | ||
Assert on the unit status being blocked due to lack of trust. | ||
""" | ||
resources = { | ||
"pgbouncer-image": METADATA["resources"]["pgbouncer-image"]["upstream-source"], | ||
} | ||
async with ops_test.fast_forward(): | ||
await ops_test.model.deploy( | ||
pgb_charm, | ||
resources=resources, | ||
application_name=PGB, | ||
series=CHARM_SERIES, | ||
trust=False, | ||
) | ||
await ops_test.model.wait_for_idle(apps=[PGB], status="blocked", timeout=1000) | ||
|
||
await ops_test.model.block_until( | ||
lambda: any( | ||
unit.workload_status == "blocked" for unit in ops_test.model.applications[PGB].units | ||
), | ||
timeout=1000, | ||
) | ||
|
||
leader_unit = await get_leader_unit(ops_test, PGB) | ||
assert leader_unit.workload_status == "blocked" | ||
assert leader_unit.workload_status_message == UNTRUST_ERROR_MESSAGE | ||
|
||
|
||
@pytest.mark.group(1) | ||
async def test_trust_blocked_deployment(ops_test: OpsTest): | ||
"""Trust existing blocked deployment. | ||
Assert on the application status recovering to active. | ||
""" | ||
await ops_test.juju("trust", PGB, "--scope=cluster") | ||
|
||
await ops_test.model.wait_for_idle(apps=[PGB], status="active", timeout=1000) |