From 3a40714f498b13956e20a1404cec1ab144ce4862 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Charles-Edouard=20Br=C3=A9t=C3=A9ch=C3=A9?= Date: Thu, 15 Feb 2024 20:55:37 +0100 Subject: [PATCH] chore: migrate from kuttl to chainsaw MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Charles-Edouard Brétéché --- .chainsaw.yaml | 12 ++ .github/workflows/e2e.yaml | 28 ++-- CONTRIBUTING.md | 6 +- Makefile | 97 ++++++------ hack/install-kuttl.sh | 12 -- kuttl-test-autoscale.yaml | 6 - kuttl-test-instrumentation.yaml | 5 - kuttl-test-multi-instr.yaml | 6 - kuttl-test-opampbridge.yaml | 6 - kuttl-test-openshift.yaml | 6 - kuttl-test-pdb.yaml | 6 - kuttl-test-prometheuscr.yaml | 16 -- kuttl-test-targetallocator.yaml | 6 - kuttl-test-upgrade.yaml | 19 --- kuttl-test.yaml | 7 - tests/e2e-autoscale/autoscale/03-delete.yaml | 8 - .../autoscale/chainsaw-test.yaml | 35 ++++ .../00-install-collector.yaml | 12 +- .../chainsaw-test.yaml | 36 +++++ .../00-install-collector.yaml | 42 ++--- .../00-install-instrumentation.yaml | 34 ++-- .../01-assert.yaml | 140 ++++++++-------- .../01-install-app.yaml | 70 ++++---- .../02-assert.yaml | 134 ++++++++-------- .../02-install-app.yaml | 70 ++++---- .../chainsaw-test.yaml | 28 ++++ .../chainsaw-test.yaml | 26 +++ .../00-install-collector.yaml | 11 +- .../chainsaw-test.yaml | 36 +++++ .../00-install-collector.yaml | 11 +- .../instrumentation-dotnet/chainsaw-test.yaml | 36 +++++ .../instrumentation-go/01-add-scc.yaml | 12 -- .../instrumentation-go/chainsaw-test.yaml | 32 ++++ .../chainsaw-test.yaml | 26 +++ .../01-cleanup-other-ns.yaml | 6 - .../02-install-collector.yaml | 11 +- .../04-cleanup-other-ns.yaml | 6 - .../chainsaw-test.yaml | 50 ++++++ .../00-install-collector.yaml | 11 +- .../instrumentation-java/chainsaw-test.yaml | 36 +++++ .../00-install-collector.yaml | 12 +- .../chainsaw-test.yaml | 36 +++++ .../00-install-collector.yaml | 45 ++---- .../chainsaw-test.yaml | 42 +++++ .../00-install-collector.yaml | 12 +- .../instrumentation-nginx/chainsaw-test.yaml | 36 +++++ .../chainsaw-test.yaml | 26 +++ .../00-install-collector.yaml | 11 +- .../instrumentation-nodejs/chainsaw-test.yaml | 36 +++++ .../chainsaw-test.yaml | 26 +++ .../00-install-collector.yaml | 11 +- .../instrumentation-python/chainsaw-test.yaml | 36 +++++ .../00-install-collector.yaml | 11 +- .../instrumentation-sdk/chainsaw-test.yaml | 36 +++++ .../chainsaw-test.yaml | 20 +++ .../chainsaw-test.yaml | 20 +++ .../chainsaw-test.yaml | 20 +++ .../opampbridge/00-assert.yaml | 43 +++-- .../opampbridge/00-install.yaml | 23 ++- .../opampbridge/chainsaw-test.yaml | 17 ++ tests/e2e-openshift/kafka/05-assert.yaml | 6 - tests/e2e-openshift/kafka/chainsaw-test.yaml | 43 +++++ tests/e2e-openshift/monitoring/00-assert.yaml | 4 - tests/e2e-openshift/monitoring/03-assert.yaml | 7 - .../monitoring/chainsaw-test.yaml | 36 +++++ .../multi-cluster/02-otlp-receiver.yaml | 30 ++-- .../multi-cluster/03-otlp-sender.yaml | 63 +++++--- .../multi-cluster/05-assert.yaml | 6 - .../multi-cluster/chainsaw-test.yaml | 47 ++++++ .../otlp-metrics-traces/01-assert.yaml | 4 - .../otlp-metrics-traces/04-assert.yaml | 6 - .../otlp-metrics-traces/05-assert.yaml | 5 - .../otlp-metrics-traces/chainsaw-test.yaml | 43 +++++ .../route/01-report-empty-otlphttp-spans.yaml | 9 -- tests/e2e-openshift/route/chainsaw-test.yaml | 23 +++ tests/e2e-pdb/pdb/chainsaw-test.yaml | 14 ++ .../target-allocator/chainsaw-test.yaml | 14 ++ .../chainsaw-test.yaml | 18 +++ .../07-delete.yaml | 8 - .../08-install.yaml | 118 +++++++------- .../chainsaw-test.yaml | 74 +++++++++ .../targetallocator-features/00-assert.yaml | 146 ++++++++--------- .../targetallocator-features/00-install.yaml | 149 ++++++++---------- .../targetallocator-features/01-assert.yaml | 9 +- .../targetallocator-features/01-liveness.yaml | 5 - .../chainsaw-test.yaml | 49 ++++++ .../00-assert.yaml | 23 +-- .../00-install.yaml | 131 +++++++-------- .../chainsaw-test.yaml | 41 +++++ .../00-assert.yaml | 18 +-- .../00-install.yaml | 144 +++++++++-------- .../chainsaw-test.yaml | 39 +++++ .../upgrade-test/01-upgrade-operator.yaml | 4 - .../upgrade-test/chainsaw-test.yaml | 25 +++ tests/e2e/daemonset-features/00-add-scc.yaml | 4 - .../03-add-sa-collector.yaml | 4 - .../e2e/daemonset-features/chainsaw-test.yaml | 26 +++ .../01-report-empty-otlphttp-spans.yaml | 8 - .../e2e/ingress-subdomains/chainsaw-test.yaml | 22 +++ tests/e2e/ingress/chainsaw-test.yaml | 14 ++ .../e2e/managed-reconcile/chainsaw-test.yaml | 26 +++ .../multiple-configmaps/chainsaw-test.yaml | 14 ++ .../00-assert.yaml | 14 +- .../00-promreceiver-allocatorconfig.yaml | 28 ++-- .../02-assert.yaml | 14 +- .../03-assert.yaml | 14 +- .../chainsaw-test.yaml | 54 +++++++ tests/e2e/smoke-daemonset/00-assert.yaml | 10 +- tests/e2e/smoke-daemonset/chainsaw-test.yaml | 17 ++ .../smoke-init-containers/chainsaw-test.yaml | 14 ++ .../smoke-pod-annotations/chainsaw-test.yaml | 14 ++ tests/e2e/smoke-pod-labels/chainsaw-test.yaml | 14 ++ .../chainsaw-test.yaml | 22 +++ .../chainsaw-test.yaml | 14 ++ .../chainsaw-test.yaml | 18 +++ tests/e2e/smoke-sidecar/chainsaw-test.yaml | 18 +++ tests/e2e/smoke-simplest/chainsaw-test.yaml | 14 ++ .../e2e/smoke-statefulset/chainsaw-test.yaml | 14 ++ .../e2e/smoke-targetallocator/00-assert.yaml | 18 +-- .../e2e/smoke-targetallocator/00-install.yaml | 27 ++-- .../smoke-targetallocator/chainsaw-test.yaml | 33 ++++ .../statefulset-features/chainsaw-test.yaml | 20 +++ 122 files changed, 2349 insertions(+), 1197 deletions(-) create mode 100644 .chainsaw.yaml delete mode 100755 hack/install-kuttl.sh delete mode 100644 kuttl-test-autoscale.yaml delete mode 100644 kuttl-test-instrumentation.yaml delete mode 100644 kuttl-test-multi-instr.yaml delete mode 100644 kuttl-test-opampbridge.yaml delete mode 100644 kuttl-test-openshift.yaml delete mode 100644 kuttl-test-pdb.yaml delete mode 100644 kuttl-test-prometheuscr.yaml delete mode 100644 kuttl-test-targetallocator.yaml delete mode 100644 kuttl-test-upgrade.yaml delete mode 100644 kuttl-test.yaml delete mode 100644 tests/e2e-autoscale/autoscale/03-delete.yaml create mode 100755 tests/e2e-autoscale/autoscale/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-apache-httpd/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-apache-multicontainer/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-dotnet-multicontainer/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-dotnet-musl/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-dotnet/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-go/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-java-multicontainer/chainsaw-test.yaml delete mode 100644 tests/e2e-instrumentation/instrumentation-java-other-ns/01-cleanup-other-ns.yaml delete mode 100644 tests/e2e-instrumentation/instrumentation-java-other-ns/04-cleanup-other-ns.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-java-other-ns/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-java/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-nginx-contnr-secctx/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-nginx-multicontainer/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-nginx/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-nodejs-multicontainer/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-nodejs/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-python-multicontainer/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-python/chainsaw-test.yaml create mode 100755 tests/e2e-instrumentation/instrumentation-sdk/chainsaw-test.yaml create mode 100755 tests/e2e-multi-instrumentation/instrumentation-multi-multicontainer/chainsaw-test.yaml create mode 100755 tests/e2e-multi-instrumentation/instrumentation-multi-no-containers/chainsaw-test.yaml create mode 100755 tests/e2e-multi-instrumentation/instrumentation-single-instr-first-container/chainsaw-test.yaml create mode 100755 tests/e2e-opampbridge/opampbridge/chainsaw-test.yaml delete mode 100644 tests/e2e-openshift/kafka/05-assert.yaml create mode 100755 tests/e2e-openshift/kafka/chainsaw-test.yaml delete mode 100644 tests/e2e-openshift/monitoring/00-assert.yaml create mode 100755 tests/e2e-openshift/monitoring/chainsaw-test.yaml delete mode 100644 tests/e2e-openshift/multi-cluster/05-assert.yaml create mode 100755 tests/e2e-openshift/multi-cluster/chainsaw-test.yaml delete mode 100644 tests/e2e-openshift/otlp-metrics-traces/01-assert.yaml delete mode 100644 tests/e2e-openshift/otlp-metrics-traces/04-assert.yaml delete mode 100644 tests/e2e-openshift/otlp-metrics-traces/05-assert.yaml create mode 100755 tests/e2e-openshift/otlp-metrics-traces/chainsaw-test.yaml delete mode 100644 tests/e2e-openshift/route/01-report-empty-otlphttp-spans.yaml create mode 100755 tests/e2e-openshift/route/chainsaw-test.yaml create mode 100755 tests/e2e-pdb/pdb/chainsaw-test.yaml create mode 100755 tests/e2e-pdb/target-allocator/chainsaw-test.yaml create mode 100755 tests/e2e-prometheuscr/create-pm-prometheus-exporters/chainsaw-test.yaml delete mode 100644 tests/e2e-prometheuscr/create-sm-prometheus-exporters/07-delete.yaml create mode 100755 tests/e2e-prometheuscr/create-sm-prometheus-exporters/chainsaw-test.yaml delete mode 100644 tests/e2e-targetallocator/targetallocator-features/01-liveness.yaml create mode 100755 tests/e2e-targetallocator/targetallocator-features/chainsaw-test.yaml create mode 100755 tests/e2e-targetallocator/targetallocator-kubernetessd/chainsaw-test.yaml create mode 100755 tests/e2e-targetallocator/targetallocator-prometheuscr/chainsaw-test.yaml delete mode 100644 tests/e2e-upgrade/upgrade-test/01-upgrade-operator.yaml create mode 100755 tests/e2e-upgrade/upgrade-test/chainsaw-test.yaml delete mode 100644 tests/e2e/daemonset-features/00-add-scc.yaml delete mode 100644 tests/e2e/daemonset-features/03-add-sa-collector.yaml create mode 100755 tests/e2e/daemonset-features/chainsaw-test.yaml delete mode 100644 tests/e2e/ingress-subdomains/01-report-empty-otlphttp-spans.yaml create mode 100755 tests/e2e/ingress-subdomains/chainsaw-test.yaml create mode 100755 tests/e2e/ingress/chainsaw-test.yaml create mode 100755 tests/e2e/managed-reconcile/chainsaw-test.yaml create mode 100755 tests/e2e/multiple-configmaps/chainsaw-test.yaml create mode 100755 tests/e2e/prometheus-config-validation/chainsaw-test.yaml create mode 100755 tests/e2e/smoke-daemonset/chainsaw-test.yaml create mode 100755 tests/e2e/smoke-init-containers/chainsaw-test.yaml create mode 100755 tests/e2e/smoke-pod-annotations/chainsaw-test.yaml create mode 100755 tests/e2e/smoke-pod-labels/chainsaw-test.yaml create mode 100755 tests/e2e/smoke-restarting-deployment/chainsaw-test.yaml create mode 100755 tests/e2e/smoke-shareprocessnamespace/chainsaw-test.yaml create mode 100755 tests/e2e/smoke-sidecar-other-namespace/chainsaw-test.yaml create mode 100755 tests/e2e/smoke-sidecar/chainsaw-test.yaml create mode 100755 tests/e2e/smoke-simplest/chainsaw-test.yaml create mode 100755 tests/e2e/smoke-statefulset/chainsaw-test.yaml create mode 100755 tests/e2e/smoke-targetallocator/chainsaw-test.yaml create mode 100755 tests/e2e/statefulset-features/chainsaw-test.yaml diff --git a/.chainsaw.yaml b/.chainsaw.yaml new file mode 100644 index 0000000000..20a9dbf07a --- /dev/null +++ b/.chainsaw.yaml @@ -0,0 +1,12 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/configuration-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Configuration +metadata: + name: configuration +spec: + parallel: 4 + timeouts: + assert: 5m0s + cleanup: 5m0s + delete: 5m0s + error: 5m0s diff --git a/.github/workflows/e2e.yaml b/.github/workflows/e2e.yaml index 3fc54126e3..e3e1c971cb 100644 --- a/.github/workflows/e2e.yaml +++ b/.github/workflows/e2e.yaml @@ -12,7 +12,6 @@ concurrency: jobs: e2e-tests: - name: End-to-end tests ${{ matrix.group }} on K8s ${{ matrix.kube-version }} runs-on: ubuntu-22.04 strategy: fail-fast: false @@ -25,13 +24,13 @@ jobs: - "1.29" group: - e2e - - e2e-instrumentation - - e2e-upgrade - e2e-autoscale - - e2e-pdb + - e2e-instrumentation - e2e-opampbridge - - e2e-targetallocator + - e2e-pdb - e2e-prometheuscr + - e2e-targetallocator + - e2e-upgrade - e2e-multi-instrumentation include: - group: e2e-prometheuscr @@ -42,33 +41,38 @@ jobs: steps: - name: Check out code into the Go module directory uses: actions/checkout@v4 - - name: Set up Go uses: actions/setup-go@v5 with: go-version: "~1.21.3" - - name: Cache tools uses: actions/cache@v4 with: path: bin key: ${{ runner.os }}-${{ runner.arch }}-${{ hashFiles('Makefile') }} - + - name: Install chainsaw + uses: kyverno/action-install-chainsaw@v0.1.4 - name: Install tools run: make install-tools - - - name: "run tests" + - name: Prepare e2e tests env: KUBE_VERSION: ${{ matrix.kube-version }} run: | + set -e make ${{ matrix.setup != '' && matrix.setup || 'prepare-e2e' }} KUBE_VERSION=$KUBE_VERSION VERSION=e2e + - name: Run e2e tests + env: + KUBE_VERSION: ${{ matrix.kube-version }} + run: | + set -e make ${{ matrix.group }} - - name: "log operator if failed" if: ${{ failure() }} env: KUBE_VERSION: ${{ matrix.kube-version }} - run: make e2e-log-operator KUBE_VERSION=$KUBE_VERSION + run: | + set -e + make e2e-log-operator KUBE_VERSION=$KUBE_VERSION e2e-tests-check: runs-on: ubuntu-22.04 diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index 495c20fa6e..7ce09703f9 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -118,11 +118,11 @@ KUBEBUILDER_ASSETS=$(./bin/setup-envtest use -p path 1.23) go test ./pkg... ### End to end tests -To run the end-to-end tests, you'll need [`kind`](https://kind.sigs.k8s.io) and [`kuttl`](https://kuttl.dev). Refer to their documentation for installation instructions. +To run the end-to-end tests, you'll need [`kind`](https://kind.sigs.k8s.io) and [`chainsaw`](https://kyverno.github.io/chainsaw). Refer to their documentation for installation instructions. Once they are installed, the tests can be executed with `make prepare-e2e`, which will build an image to use with the tests, followed by `make e2e`. Each call to the `e2e` target will setup a fresh `kind` cluster, making it safe to be executed multiple times with a single `prepare-e2e` step. -The tests are located under `tests/e2e` and are written to be used with `kuttl`. Refer to their documentation to understand how tests are written. +The tests are located under `tests/e2e` and are written to be used with `chainsaw`. Refer to their documentation to understand how tests are written. To evert the changes made by the `make prepare-e2e` run `make reset`. @@ -133,7 +133,7 @@ To install the OpenTelemetry operator, please follow the instructions in [Opera Once the operator is installed, the tests can be executed using `make e2e-openshift`, which will call to the `e2e-openshift` target. Note that `kind` is disabled for the TestSuite as the requirement is to use an OpenShift cluster for these test cases. -The tests are located under `tests/e2e-openshift` and are written to be used with `kuttl`. +The tests are located under `tests/e2e-openshift` and are written to be used with `chainsaw`. ### Undeploying the operator from the local cluster diff --git a/Makefile b/Makefile index ce3a9787b3..fb51afbd81 100644 --- a/Makefile +++ b/Makefile @@ -197,39 +197,18 @@ generate: controller-gen # end-to-tests .PHONY: e2e -e2e: - $(KUTTL) test - - -# instrumentation end-to-tests -.PHONY: e2e-instrumentation -e2e-instrumentation: - $(KUTTL) test --config kuttl-test-instrumentation.yaml - -# end-to-end-test for PrometheusCR E2E tests -.PHONY: e2e-prometheuscr -e2e-prometheuscr: - $(KUTTL) test --config kuttl-test-prometheuscr.yaml - -# end-to-end-test for testing upgrading -.PHONY: e2e-upgrade -e2e-upgrade: undeploy - $(KUTTL) test --config kuttl-test-upgrade.yaml +e2e: chainsaw + $(CHAINSAW) test --test-dir ./tests/e2e # end-to-end-test for testing autoscale .PHONY: e2e-autoscale -e2e-autoscale: - $(KUTTL) test --config kuttl-test-autoscale.yaml - -# end-to-end-test for testing pdb support -.PHONY: e2e-pdb -e2e-pdb: - $(KUTTL) test --config kuttl-test-pdb.yaml +e2e-autoscale: chainsaw + $(CHAINSAW) test --test-dir ./tests/e2e-autoscale -# end-to-end-test for testing OpenShift cases -.PHONY: e2e-openshift -e2e-openshift: - $(KUTTL) test --config kuttl-test-openshift.yaml +# instrumentation end-to-tests +.PHONY: e2e-instrumentation +e2e-instrumentation: chainsaw + $(CHAINSAW) test --test-dir ./tests/e2e-instrumentation .PHONY: e2e-log-operator e2e-log-operator: @@ -238,24 +217,41 @@ e2e-log-operator: # end-to-tests for multi-instrumentation .PHONY: e2e-multi-instrumentation -e2e-multi-instrumentation: - $(KUTTL) test --config kuttl-test-multi-instr.yaml +e2e-multi-instrumentation: chainsaw + $(CHAINSAW) test --test-dir ./tests/e2e-multi-instrumentation # OpAMPBridge CR end-to-tests .PHONY: e2e-opampbridge -e2e-opampbridge: - $(KUTTL) test --config kuttl-test-opampbridge.yaml +e2e-opampbridge: chainsaw + $(CHAINSAW) test --test-dir ./tests/e2e-opampbridge + +# end-to-end-test for testing pdb support +.PHONY: e2e-pdb +e2e-pdb: chainsaw + $(CHAINSAW) test --test-dir ./tests/e2e-pdb + +# end-to-end-test for PrometheusCR E2E tests +.PHONY: e2e-prometheuscr +e2e-prometheuscr: chainsaw + $(CHAINSAW) test --test-dir ./tests/e2e-prometheuscr # Target allocator end-to-tests .PHONY: e2e-targetallocator -e2e-targetallocator: - $(KUTTL) test --config kuttl-test-targetallocator.yaml +e2e-targetallocator: chainsaw + $(CHAINSAW) test --test-dir ./tests/e2e-targetallocator + +# end-to-end-test for testing upgrading +.PHONY: e2e-upgrade +e2e-upgrade: undeploy chainsaw + kubectl apply -f ./tests/e2e-upgrade/upgrade-test/opentelemetry-operator-v0.86.0.yaml + go run hack/check-operator-ready.go + $(CHAINSAW) test --test-dir ./tests/e2e-upgrade .PHONY: prepare-e2e -prepare-e2e: kuttl set-image-controller add-image-targetallocator add-image-opampbridge container container-target-allocator container-operator-opamp-bridge start-kind cert-manager install-metrics-server install-targetallocator-prometheus-crds load-image-all deploy +prepare-e2e: chainsaw set-image-controller add-image-targetallocator add-image-opampbridge container container-target-allocator container-operator-opamp-bridge start-kind cert-manager install-metrics-server install-targetallocator-prometheus-crds load-image-all deploy .PHONY: prepare-e2e-with-featuregates -prepare-e2e-with-featuregates: kuttl enable-operator-featuregates prepare-e2e +prepare-e2e-with-featuregates: chainsaw enable-operator-featuregates prepare-e2e .PHONY: scorecard-tests scorecard-tests: operator-sdk @@ -361,7 +357,6 @@ cmctl: KUSTOMIZE ?= $(LOCALBIN)/kustomize KIND ?= $(LOCALBIN)/kind -KUTTL ?= $(LOCALBIN)/kubectl-kuttl CONTROLLER_GEN ?= $(LOCALBIN)/controller-gen ENVTEST ?= $(LOCALBIN)/setup-envtest CHLOGGEN ?= $(LOCALBIN)/chloggen @@ -371,10 +366,16 @@ KUSTOMIZE_VERSION ?= v5.0.3 CONTROLLER_TOOLS_VERSION ?= v0.12.0 GOLANGCI_LINT_VERSION ?= v1.54.0 KIND_VERSION ?= v0.20.0 -KUTTL_VERSION ?= 0.15.0 + +# Checks if chainsaw is in your PATH +ifneq ($(shell which chainsaw),) +CHAINSAW ?= $(shell which chainsaw) +else +CHAINSAW ?= $(LOCALBIN)/chainsaw +endif .PHONY: install-tools -install-tools: kustomize golangci-lint kind controller-gen envtest crdoc kuttl kind operator-sdk +install-tools: kustomize golangci-lint kind controller-gen envtest crdoc kind operator-sdk chainsaw .PHONY: kustomize kustomize: ## Download kustomize locally if necessary. @@ -403,6 +404,18 @@ CRDOC = $(shell pwd)/bin/crdoc crdoc: ## Download crdoc locally if necessary. $(call go-get-tool,$(CRDOC), fybrik.io/crdoc,v0.5.2) +.PHONY: chainsaw +chainsaw: ## Find or download chainsaw +ifeq (, $(shell which chainsaw)) + @{ \ + set -e ;\ + go install github.com/kyverno/chainsaw@v0.1.4 ;\ + } +CHAINSAW ?= $(GOBIN)/chainsaw +else +CHAINSAW ?= $(shell which chainsaw) +endif + # go-get-tool will 'go get' any package $2 and install it to $1. PROJECT_DIR := $(shell dirname $(abspath $(lastword $(MAKEFILE_LIST)))) define go-get-tool @@ -418,10 +431,6 @@ rm -rf $$TMP_DIR ;\ } endef -.PHONY: kuttl -kuttl: $(LOCALBIN) - @KUTTL=$(KUTTL) KUTTL_VERSION=$(KUTTL_VERSION) ./hack/install-kuttl.sh - OPERATOR_SDK = $(shell pwd)/bin/operator-sdk .PHONY: operator-sdk operator-sdk: $(LOCALBIN) diff --git a/hack/install-kuttl.sh b/hack/install-kuttl.sh deleted file mode 100755 index 41a725a98d..0000000000 --- a/hack/install-kuttl.sh +++ /dev/null @@ -1,12 +0,0 @@ -#!/bin/bash - -if (${KUTTL} version | grep ${KUTTL_VERSION}) > /dev/null 2>&1; then - exit 0; -fi - -OS=$(go env GOOS) -ARCH=$(uname -m) - -curl -Lo ${KUTTL} https://github.com/kudobuilder/kuttl/releases/download/v${KUTTL_VERSION}/kubectl-kuttl_${KUTTL_VERSION}_${OS}_${ARCH} -chmod +x ${KUTTL} - diff --git a/kuttl-test-autoscale.yaml b/kuttl-test-autoscale.yaml deleted file mode 100644 index 9f97b6ce4c..0000000000 --- a/kuttl-test-autoscale.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestSuite -artifactsDir: ./tests/_build/artifacts/ -testDirs: - - ./tests/e2e-autoscale/ -timeout: 300 diff --git a/kuttl-test-instrumentation.yaml b/kuttl-test-instrumentation.yaml deleted file mode 100644 index 545357c420..0000000000 --- a/kuttl-test-instrumentation.yaml +++ /dev/null @@ -1,5 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestSuite -testDirs: - - ./tests/e2e-instrumentation/ -timeout: 300 diff --git a/kuttl-test-multi-instr.yaml b/kuttl-test-multi-instr.yaml deleted file mode 100644 index 62d26978c2..0000000000 --- a/kuttl-test-multi-instr.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestSuite -artifactsDir: ./tests/_build/artifacts/ -testDirs: - - ./tests/e2e-multi-instrumentation/ -timeout: 300 diff --git a/kuttl-test-opampbridge.yaml b/kuttl-test-opampbridge.yaml deleted file mode 100644 index f658ce15ac..0000000000 --- a/kuttl-test-opampbridge.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestSuite -artifactsDir: ./tests/_build/artifacts/ -testDirs: - - ./tests/e2e-opampbridge/ -timeout: 300 diff --git a/kuttl-test-openshift.yaml b/kuttl-test-openshift.yaml deleted file mode 100644 index 24fc7da7a4..0000000000 --- a/kuttl-test-openshift.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestSuite -startKIND: false -testDirs: - - ./tests/e2e-openshift/ -timeout: 300 diff --git a/kuttl-test-pdb.yaml b/kuttl-test-pdb.yaml deleted file mode 100644 index 68034a0a57..0000000000 --- a/kuttl-test-pdb.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestSuite -artifactsDir: ./tests/_build/artifacts/ -testDirs: - - ./tests/e2e-pdb/ -timeout: 300 diff --git a/kuttl-test-prometheuscr.yaml b/kuttl-test-prometheuscr.yaml deleted file mode 100644 index e3e48a910e..0000000000 --- a/kuttl-test-prometheuscr.yaml +++ /dev/null @@ -1,16 +0,0 @@ -# Make sure that the OT operator after upgrading itself, can upgrade the OT collectors without error. -# The test is based on the version v0.49.0, a breaking change was introduced from PR -# https://github.com/open-telemetry/opentelemetry-operator/pull/797, which added a version label "app.kubernetes.io/version", -# The version label would change between OT operator upgrade, and since at the time, the collector pod selector was the same -# as this labels, resulted in selector being modified during reconciliation which caused error due to the selector is immutable. -# Please be aware of that the collector labels are changeable in various ways, so this issue may happen in any operator < v0.52.0 -# which changed the selector to be a static set of labels. -# The fix for this issue including: -# https://github.com/open-telemetry/opentelemetry-operator/issues/840, make the selector be a static set of labels; -# https://github.com/open-telemetry/opentelemetry-operator/issues/1117, delete the old collector to let the operator -# create a new one when the selector changed. -apiVersion: kuttl.dev/v1beta1 -kind: TestSuite -testDirs: - - ./tests/e2e-prometheuscr/ -timeout: 300 diff --git a/kuttl-test-targetallocator.yaml b/kuttl-test-targetallocator.yaml deleted file mode 100644 index eca8f5336e..0000000000 --- a/kuttl-test-targetallocator.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestSuite -artifactsDir: ./tests/_build/artifacts/ -testDirs: - - ./tests/e2e-targetallocator/ -timeout: 600 diff --git a/kuttl-test-upgrade.yaml b/kuttl-test-upgrade.yaml deleted file mode 100644 index 0c4f7e7d8b..0000000000 --- a/kuttl-test-upgrade.yaml +++ /dev/null @@ -1,19 +0,0 @@ -# Make sure that the OT operator after upgrading itself, can upgrade the OT collectors without error. -# The test is based on the version v0.49.0, a breaking change was introduced from PR -# https://github.com/open-telemetry/opentelemetry-operator/pull/797, which added a version label "app.kubernetes.io/version", -# The version label would change between OT operator upgrade, and since at the time, the collector pod selector was the same -# as this labels, resulted in selector being modified during reconciliation which caused error due to the selector is immutable. -# Please be aware of that the collector labels are changeable in various ways, so this issue may happen in any operator < v0.52.0 -# which changed the selector to be a static set of labels. -# The fix for this issue including: -# https://github.com/open-telemetry/opentelemetry-operator/issues/840, make the selector be a static set of labels; -# https://github.com/open-telemetry/opentelemetry-operator/issues/1117, delete the old collector to let the operator -# create a new one when the selector changed. -apiVersion: kuttl.dev/v1beta1 -kind: TestSuite -commands: - - command: kubectl apply -f ./tests/e2e-upgrade/upgrade-test/opentelemetry-operator-v0.86.0.yaml - - command: go run hack/check-operator-ready.go -testDirs: - - ./tests/e2e-upgrade/ -timeout: 300 diff --git a/kuttl-test.yaml b/kuttl-test.yaml deleted file mode 100644 index 99899bb10d..0000000000 --- a/kuttl-test.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestSuite -artifactsDir: ./tests/_build/artifacts/ -testDirs: - - ./tests/e2e/ -timeout: 300 -parallel: 4 diff --git a/tests/e2e-autoscale/autoscale/03-delete.yaml b/tests/e2e-autoscale/autoscale/03-delete.yaml deleted file mode 100644 index 5e39ab40db..0000000000 --- a/tests/e2e-autoscale/autoscale/03-delete.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -delete: -- apiVersion: batch/v1 - kind: Job - propagationPolicy: Background - metadata: - name: telemetrygen-set-utilization \ No newline at end of file diff --git a/tests/e2e-autoscale/autoscale/chainsaw-test.yaml b/tests/e2e-autoscale/autoscale/chainsaw-test.yaml new file mode 100755 index 0000000000..d61acf4643 --- /dev/null +++ b/tests/e2e-autoscale/autoscale/chainsaw-test.yaml @@ -0,0 +1,35 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: autoscale +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml + - name: step-01 + try: + - apply: + file: 01-install.yaml + - assert: + file: 01-assert.yaml + - name: step-02 + try: + - apply: + file: 02-install.yaml + - assert: + file: 02-assert.yaml + - name: step-03 + try: + - delete: + ref: + apiVersion: batch/v1 + kind: Job + name: telemetrygen-set-utilization + - assert: + file: 03-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-apache-httpd/00-install-collector.yaml b/tests/e2e-instrumentation/instrumentation-apache-httpd/00-install-collector.yaml index 5b0d06576c..e42ef04d1c 100644 --- a/tests/e2e-instrumentation/instrumentation-apache-httpd/00-install-collector.yaml +++ b/tests/e2e-instrumentation/instrumentation-apache-httpd/00-install-collector.yaml @@ -3,7 +3,6 @@ kind: OpenTelemetryCollector metadata: name: sidecar spec: - mode: sidecar config: | receivers: otlp: @@ -19,13 +18,4 @@ spec: receivers: [otlp] processors: [] exporters: [debug] - ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - # Annotate the namespace to allow the application to run using an specific group and user in OpenShift - # https://docs.openshift.com/dedicated/authentication/managing-security-context-constraints.html - # This annotation has no effect in Kubernetes - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.uid-range=1000/1000 --overwrite - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.supplemental-groups=3000/1000 --overwrite + mode: sidecar diff --git a/tests/e2e-instrumentation/instrumentation-apache-httpd/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-apache-httpd/chainsaw-test.yaml new file mode 100755 index 0000000000..4b768642a2 --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-apache-httpd/chainsaw-test.yaml @@ -0,0 +1,36 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-apache-httpd +spec: + steps: + - name: step-00 + try: + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.uid-range=1000/1000 + - --overwrite + entrypoint: kubectl + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.supplemental-groups=3000/1000 + - --overwrite + entrypoint: kubectl + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-apache-multicontainer/00-install-collector.yaml b/tests/e2e-instrumentation/instrumentation-apache-multicontainer/00-install-collector.yaml index ee92c16567..a532d324e2 100644 --- a/tests/e2e-instrumentation/instrumentation-apache-multicontainer/00-install-collector.yaml +++ b/tests/e2e-instrumentation/instrumentation-apache-multicontainer/00-install-collector.yaml @@ -1,22 +1,22 @@ # skipping test, see https://github.com/open-telemetry/opentelemetry-operator/issues/1936 -#apiVersion: opentelemetry.io/v1alpha1 -#kind: OpenTelemetryCollector -#metadata: -# name: sidecar -#spec: -# mode: sidecar -# config: | -# receivers: -# otlp: -# protocols: -# grpc: -# http: -# processors: -# exporters: -# debug: -# service: -# pipelines: -# traces: -# receivers: [otlp] -# processors: [] -# exporters: [debug] +apiVersion: opentelemetry.io/v1alpha1 +kind: OpenTelemetryCollector +metadata: + name: sidecar +spec: + mode: sidecar + config: | + receivers: + otlp: + protocols: + grpc: + http: + processors: + exporters: + debug: + service: + pipelines: + traces: + receivers: [otlp] + processors: [] + exporters: [debug] diff --git a/tests/e2e-instrumentation/instrumentation-apache-multicontainer/00-install-instrumentation.yaml b/tests/e2e-instrumentation/instrumentation-apache-multicontainer/00-install-instrumentation.yaml index 4d7a2b22f3..d778d467e5 100644 --- a/tests/e2e-instrumentation/instrumentation-apache-multicontainer/00-install-instrumentation.yaml +++ b/tests/e2e-instrumentation/instrumentation-apache-multicontainer/00-install-instrumentation.yaml @@ -1,18 +1,18 @@ # skipping test, see https://github.com/open-telemetry/opentelemetry-operator/issues/1936 -#apiVersion: opentelemetry.io/v1alpha1 -#kind: Instrumentation -#metadata: -# name: apache -#spec: -# exporter: -# endpoint: http://localhost:4317 -# propagators: -# - jaeger -# - b3 -# sampler: -# type: parentbased_traceidratio -# argument: "0.25" -# apacheHttpd: -# attrs: -# - name: ApacheModuleOtelMaxQueueSize -# value: "4096" +apiVersion: opentelemetry.io/v1alpha1 +kind: Instrumentation +metadata: + name: apache +spec: + exporter: + endpoint: http://localhost:4317 + propagators: + - jaeger + - b3 + sampler: + type: parentbased_traceidratio + argument: "0.25" + apacheHttpd: + attrs: + - name: ApacheModuleOtelMaxQueueSize + value: "4096" diff --git a/tests/e2e-instrumentation/instrumentation-apache-multicontainer/01-assert.yaml b/tests/e2e-instrumentation/instrumentation-apache-multicontainer/01-assert.yaml index c2f7496e9f..5bc80bbfe2 100644 --- a/tests/e2e-instrumentation/instrumentation-apache-multicontainer/01-assert.yaml +++ b/tests/e2e-instrumentation/instrumentation-apache-multicontainer/01-assert.yaml @@ -1,71 +1,71 @@ # skipping test, see https://github.com/open-telemetry/opentelemetry-operator/issues/1936 -#apiVersion: v1 -#kind: Pod -#metadata: -# annotations: -# sidecar.opentelemetry.io/inject: "true" -# instrumentation.opentelemetry.io/inject-apache-httpd: "true" -# instrumentation.opentelemetry.io/container-names: "myapp,myrabbit" -# labels: -# app: my-apache -#spec: -# containers: -# - env: -# - name: OTEL_SERVICE_NAME -# value: my-apache -# - name: OTEL_EXPORTER_OTLP_ENDPOINT -# value: http://localhost:4317 -# - name: OTEL_RESOURCE_ATTRIBUTES_POD_NAME -# valueFrom: -# fieldRef: -# apiVersion: v1 -# fieldPath: metadata.name -# - name: OTEL_RESOURCE_ATTRIBUTES_NODE_NAME -# valueFrom: -# fieldRef: -# apiVersion: v1 -# fieldPath: spec.nodeName -# - name: OTEL_PROPAGATORS -# value: jaeger,b3 -# - name: OTEL_TRACES_SAMPLER -# value: parentbased_traceidratio -# - name: OTEL_TRACES_SAMPLER_ARG -# value: "0.25" -# - name: OTEL_RESOURCE_ATTRIBUTES -# name: myapp -# volumeMounts: -# - mountPath: /var/run/secrets/kubernetes.io/serviceaccount -# - mountPath: /opt/opentelemetry-webserver/agent -# name: otel-apache-agent -# - mountPath: /usr/local/apache2/conf -# name: otel-apache-conf-dir -# - env: -# - name: OTEL_SERVICE_NAME -# value: my-apache -# - name: OTEL_EXPORTER_OTLP_ENDPOINT -# value: http://localhost:4317 -# - name: OTEL_RESOURCE_ATTRIBUTES_POD_NAME -# valueFrom: -# fieldRef: -# apiVersion: v1 -# fieldPath: metadata.name -# - name: OTEL_RESOURCE_ATTRIBUTES_NODE_NAME -# valueFrom: -# fieldRef: -# apiVersion: v1 -# fieldPath: spec.nodeName -# - name: OTEL_PROPAGATORS -# value: jaeger,b3 -# - name: OTEL_TRACES_SAMPLER -# value: parentbased_traceidratio -# - name: OTEL_TRACES_SAMPLER_ARG -# value: "0.25" -# - name: OTEL_RESOURCE_ATTRIBUTES -# name: myrabbit -# volumeMounts: -# - mountPath: /var/run/secrets/kubernetes.io/serviceaccount -# - args: -# - --config=env:OTEL_CONFIG -# name: otc-container -#status: -# phase: Running +apiVersion: v1 +kind: Pod +metadata: + annotations: + sidecar.opentelemetry.io/inject: "true" + instrumentation.opentelemetry.io/inject-apache-httpd: "true" + instrumentation.opentelemetry.io/container-names: "myapp,myrabbit" + labels: + app: my-apache +spec: + containers: + - env: + - name: OTEL_SERVICE_NAME + value: my-apache + - name: OTEL_EXPORTER_OTLP_ENDPOINT + value: http://localhost:4317 + - name: OTEL_RESOURCE_ATTRIBUTES_POD_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: metadata.name + - name: OTEL_RESOURCE_ATTRIBUTES_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + - name: OTEL_PROPAGATORS + value: jaeger,b3 + - name: OTEL_TRACES_SAMPLER + value: parentbased_traceidratio + - name: OTEL_TRACES_SAMPLER_ARG + value: "0.25" + - name: OTEL_RESOURCE_ATTRIBUTES + name: myapp + volumeMounts: + - mountPath: /var/run/secrets/kubernetes.io/serviceaccount + - mountPath: /opt/opentelemetry-webserver/agent + name: otel-apache-agent + - mountPath: /usr/local/apache2/conf + name: otel-apache-conf-dir + - env: + - name: OTEL_SERVICE_NAME + value: my-apache + - name: OTEL_EXPORTER_OTLP_ENDPOINT + value: http://localhost:4317 + - name: OTEL_RESOURCE_ATTRIBUTES_POD_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: metadata.name + - name: OTEL_RESOURCE_ATTRIBUTES_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + - name: OTEL_PROPAGATORS + value: jaeger,b3 + - name: OTEL_TRACES_SAMPLER + value: parentbased_traceidratio + - name: OTEL_TRACES_SAMPLER_ARG + value: "0.25" + - name: OTEL_RESOURCE_ATTRIBUTES + name: myrabbit + volumeMounts: + - mountPath: /var/run/secrets/kubernetes.io/serviceaccount + - args: + - --config=env:OTEL_CONFIG + name: otc-container +status: + phase: Running diff --git a/tests/e2e-instrumentation/instrumentation-apache-multicontainer/01-install-app.yaml b/tests/e2e-instrumentation/instrumentation-apache-multicontainer/01-install-app.yaml index 1d7fbb0251..32500ce21f 100644 --- a/tests/e2e-instrumentation/instrumentation-apache-multicontainer/01-install-app.yaml +++ b/tests/e2e-instrumentation/instrumentation-apache-multicontainer/01-install-app.yaml @@ -1,36 +1,36 @@ # skipping test, see https://github.com/open-telemetry/opentelemetry-operator/issues/1936 -#apiVersion: apps/v1 -#kind: Deployment -#metadata: -# name: my-apache -#spec: -# selector: -# matchLabels: -# app: my-apache -# replicas: 1 -# template: -# metadata: -# labels: -# app: my-apache -# annotations: -# sidecar.opentelemetry.io/inject: "true" -# instrumentation.opentelemetry.io/inject-apache-httpd: "true" -# instrumentation.opentelemetry.io/container-names: "myapp,myrabbit" -# spec: -# containers: -# - name: myapp -# image: docker.io/chrlic/apache-test@sha256:fad58c6ce7a4f477b455bece2a1980741fa6f81cef1e1093a3b72f9b2ffa7b8e -# # image source at https://github.com/cisco-open/appdynamics-k8s-webhook-instrumentor/tree/main/testWorkloads/apache-httpd -# # licensed under Apache 2.0 -# imagePullPolicy: Always -# ports: -# - containerPort: 8080 -# resources: -# limits: -# cpu: "1" -# memory: 500Mi -# requests: -# cpu: 250m -# memory: 100Mi -# - name: myrabbit -# image: rabbitmq +apiVersion: apps/v1 +kind: Deployment +metadata: + name: my-apache +spec: + selector: + matchLabels: + app: my-apache + replicas: 1 + template: + metadata: + labels: + app: my-apache + annotations: + sidecar.opentelemetry.io/inject: "true" + instrumentation.opentelemetry.io/inject-apache-httpd: "true" + instrumentation.opentelemetry.io/container-names: "myapp,myrabbit" + spec: + containers: + - name: myapp + image: docker.io/chrlic/apache-test@sha256:fad58c6ce7a4f477b455bece2a1980741fa6f81cef1e1093a3b72f9b2ffa7b8e + # image source at https://github.com/cisco-open/appdynamics-k8s-webhook-instrumentor/tree/main/testWorkloads/apache-httpd + # licensed under Apache 2.0 + imagePullPolicy: Always + ports: + - containerPort: 8080 + resources: + limits: + cpu: "1" + memory: 500Mi + requests: + cpu: 250m + memory: 100Mi + - name: myrabbit + image: rabbitmq diff --git a/tests/e2e-instrumentation/instrumentation-apache-multicontainer/02-assert.yaml b/tests/e2e-instrumentation/instrumentation-apache-multicontainer/02-assert.yaml index dd29818998..b3c7882d7f 100644 --- a/tests/e2e-instrumentation/instrumentation-apache-multicontainer/02-assert.yaml +++ b/tests/e2e-instrumentation/instrumentation-apache-multicontainer/02-assert.yaml @@ -1,68 +1,68 @@ # skipping test, see https://github.com/open-telemetry/opentelemetry-operator/issues/1936 -#apiVersion: v1 -#kind: Pod -#metadata: -# annotations: -# instrumentation.opentelemetry.io/inject-apache-httpd: "true" -# sidecar.opentelemetry.io/inject: "true" -# labels: -# app: my-apache -#spec: -# containers: -# - env: -# - name: OTEL_SERVICE_NAME -# value: my-apache -# - name: OTEL_EXPORTER_OTLP_ENDPOINT -# value: http://localhost:4317 -# - name: OTEL_RESOURCE_ATTRIBUTES_POD_NAME -# valueFrom: -# fieldRef: -# apiVersion: v1 -# fieldPath: metadata.name -# - name: OTEL_RESOURCE_ATTRIBUTES_NODE_NAME -# valueFrom: -# fieldRef: -# apiVersion: v1 -# fieldPath: spec.nodeName -# - name: OTEL_PROPAGATORS -# value: jaeger,b3 -# - name: OTEL_TRACES_SAMPLER -# value: parentbased_traceidratio -# - name: OTEL_TRACES_SAMPLER_ARG -# value: "0.25" -# - name: OTEL_RESOURCE_ATTRIBUTES -# name: myapp -# volumeMounts: -# - mountPath: /var/run/secrets/kubernetes.io/serviceaccount -# - mountPath: /opt/opentelemetry-webserver/agent -# name: otel-apache-agent -# - mountPath: /usr/local/apache2/conf -# name: otel-apache-conf-dir -# - env: -# - name: OTEL_SERVICE_NAME -# value: my-apache -# - name: OTEL_EXPORTER_OTLP_ENDPOINT -# value: http://localhost:4317 -# - name: OTEL_RESOURCE_ATTRIBUTES_POD_NAME -# valueFrom: -# fieldRef: -# apiVersion: v1 -# fieldPath: metadata.name -# - name: OTEL_RESOURCE_ATTRIBUTES_NODE_NAME -# valueFrom: -# fieldRef: -# apiVersion: v1 -# fieldPath: spec.nodeName -# - name: OTEL_PROPAGATORS -# value: jaeger,b3 -# - name: OTEL_TRACES_SAMPLER -# value: parentbased_traceidratio -# - name: OTEL_TRACES_SAMPLER_ARG -# value: "0.25" -# - name: OTEL_RESOURCE_ATTRIBUTES -# name: myrabbit -# - args: -# - --config=env:OTEL_CONFIG -# name: otc-container -#status: -# phase: Running +apiVersion: v1 +kind: Pod +metadata: + annotations: + instrumentation.opentelemetry.io/inject-apache-httpd: "true" + sidecar.opentelemetry.io/inject: "true" + labels: + app: my-apache +spec: + containers: + - env: + - name: OTEL_SERVICE_NAME + value: my-apache + - name: OTEL_EXPORTER_OTLP_ENDPOINT + value: http://localhost:4317 + - name: OTEL_RESOURCE_ATTRIBUTES_POD_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: metadata.name + - name: OTEL_RESOURCE_ATTRIBUTES_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + - name: OTEL_PROPAGATORS + value: jaeger,b3 + - name: OTEL_TRACES_SAMPLER + value: parentbased_traceidratio + - name: OTEL_TRACES_SAMPLER_ARG + value: "0.25" + - name: OTEL_RESOURCE_ATTRIBUTES + name: myapp + volumeMounts: + - mountPath: /var/run/secrets/kubernetes.io/serviceaccount + - mountPath: /opt/opentelemetry-webserver/agent + name: otel-apache-agent + - mountPath: /usr/local/apache2/conf + name: otel-apache-conf-dir + - env: + - name: OTEL_SERVICE_NAME + value: my-apache + - name: OTEL_EXPORTER_OTLP_ENDPOINT + value: http://localhost:4317 + - name: OTEL_RESOURCE_ATTRIBUTES_POD_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: metadata.name + - name: OTEL_RESOURCE_ATTRIBUTES_NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + - name: OTEL_PROPAGATORS + value: jaeger,b3 + - name: OTEL_TRACES_SAMPLER + value: parentbased_traceidratio + - name: OTEL_TRACES_SAMPLER_ARG + value: "0.25" + - name: OTEL_RESOURCE_ATTRIBUTES + name: myrabbit + - args: + - --config=env:OTEL_CONFIG + name: otc-container +status: + phase: Running diff --git a/tests/e2e-instrumentation/instrumentation-apache-multicontainer/02-install-app.yaml b/tests/e2e-instrumentation/instrumentation-apache-multicontainer/02-install-app.yaml index 8044cda2f2..3927a33cce 100644 --- a/tests/e2e-instrumentation/instrumentation-apache-multicontainer/02-install-app.yaml +++ b/tests/e2e-instrumentation/instrumentation-apache-multicontainer/02-install-app.yaml @@ -1,36 +1,36 @@ # skipping test, see https://github.com/open-telemetry/opentelemetry-operator/issues/1936 -#apiVersion: apps/v1 -#kind: Deployment -#metadata: -# name: my-apache -#spec: -# selector: -# matchLabels: -# app: my-apache -# replicas: 1 -# template: -# metadata: -# labels: -# app: my-apache -# annotations: -# sidecar.opentelemetry.io/inject: "true" -# instrumentation.opentelemetry.io/inject-apache-httpd: "true" -# instrumentation.opentelemetry.io/container-names: "myrabbit" -# spec: -# containers: -# - name: myapp -# image: docker.io/chrlic/apache-test@sha256:fad58c6ce7a4f477b455bece2a1980741fa6f81cef1e1093a3b72f9b2ffa7b8e -# # image source at https://github.com/cisco-open/appdynamics-k8s-webhook-instrumentor/tree/main/testWorkloads/apache-httpd -# # licensed under Apache 2.0 -# imagePullPolicy: Always -# ports: -# - containerPort: 8080 -# resources: -# limits: -# cpu: "1" -# memory: 500Mi -# requests: -# cpu: 250m -# memory: 100Mi -# - name: myrabbit -# image: rabbitmq +apiVersion: apps/v1 +kind: Deployment +metadata: + name: my-apache +spec: + selector: + matchLabels: + app: my-apache + replicas: 1 + template: + metadata: + labels: + app: my-apache + annotations: + sidecar.opentelemetry.io/inject: "true" + instrumentation.opentelemetry.io/inject-apache-httpd: "true" + instrumentation.opentelemetry.io/container-names: "myrabbit" + spec: + containers: + - name: myapp + image: docker.io/chrlic/apache-test@sha256:fad58c6ce7a4f477b455bece2a1980741fa6f81cef1e1093a3b72f9b2ffa7b8e + # image source at https://github.com/cisco-open/appdynamics-k8s-webhook-instrumentor/tree/main/testWorkloads/apache-httpd + # licensed under Apache 2.0 + imagePullPolicy: Always + ports: + - containerPort: 8080 + resources: + limits: + cpu: "1" + memory: 500Mi + requests: + cpu: 250m + memory: 100Mi + - name: myrabbit + image: rabbitmq diff --git a/tests/e2e-instrumentation/instrumentation-apache-multicontainer/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-apache-multicontainer/chainsaw-test.yaml new file mode 100755 index 0000000000..1167bbc5a6 --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-apache-multicontainer/chainsaw-test.yaml @@ -0,0 +1,28 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-apache-multicontainer +spec: + # skipping test, see https://github.com/open-telemetry/opentelemetry-operator/issues/1936 + skip: true + steps: + - name: step-00 + try: + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml + - name: step-02 + try: + - apply: + file: 02-install-app.yaml + - assert: + file: 02-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-dotnet-multicontainer/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-dotnet-multicontainer/chainsaw-test.yaml new file mode 100755 index 0000000000..23d09b619c --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-dotnet-multicontainer/chainsaw-test.yaml @@ -0,0 +1,26 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-dotnet-multicontainer +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml + - name: step-02 + try: + - apply: + file: 02-install-app.yaml + - assert: + file: 02-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-dotnet-musl/00-install-collector.yaml b/tests/e2e-instrumentation/instrumentation-dotnet-musl/00-install-collector.yaml index b03a72e60e..71b4d56052 100644 --- a/tests/e2e-instrumentation/instrumentation-dotnet-musl/00-install-collector.yaml +++ b/tests/e2e-instrumentation/instrumentation-dotnet-musl/00-install-collector.yaml @@ -3,7 +3,6 @@ kind: OpenTelemetryCollector metadata: name: sidecar spec: - mode: sidecar config: | receivers: otlp: @@ -21,12 +20,4 @@ spec: receivers: [otlp] processors: [] exporters: [logging] ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - # Annotate the namespace to allow the application to run using an specific group and user in OpenShift - # https://docs.openshift.com/dedicated/authentication/managing-security-context-constraints.html - # This annotation has no effect in Kubernetes - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.uid-range=1000/1000 --overwrite - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.supplemental-groups=2000/1000 --overwrite + mode: sidecar diff --git a/tests/e2e-instrumentation/instrumentation-dotnet-musl/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-dotnet-musl/chainsaw-test.yaml new file mode 100755 index 0000000000..80f80bf9fe --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-dotnet-musl/chainsaw-test.yaml @@ -0,0 +1,36 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-dotnet-musl +spec: + steps: + - name: step-00 + try: + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.uid-range=1000/1000 + - --overwrite + entrypoint: kubectl + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.supplemental-groups=2000/1000 + - --overwrite + entrypoint: kubectl + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-dotnet/00-install-collector.yaml b/tests/e2e-instrumentation/instrumentation-dotnet/00-install-collector.yaml index 2875bde640..fe390c6cae 100644 --- a/tests/e2e-instrumentation/instrumentation-dotnet/00-install-collector.yaml +++ b/tests/e2e-instrumentation/instrumentation-dotnet/00-install-collector.yaml @@ -3,7 +3,6 @@ kind: OpenTelemetryCollector metadata: name: sidecar spec: - mode: sidecar config: | receivers: otlp: @@ -21,12 +20,4 @@ spec: receivers: [otlp] processors: [] exporters: [debug] ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - # Annotate the namespace to allow the application to run using an specific group and user in OpenShift - # https://docs.openshift.com/dedicated/authentication/managing-security-context-constraints.html - # This annotation has no effect in Kubernetes - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.uid-range=1000/1000 --overwrite - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.supplemental-groups=2000/1000 --overwrite + mode: sidecar diff --git a/tests/e2e-instrumentation/instrumentation-dotnet/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-dotnet/chainsaw-test.yaml new file mode 100755 index 0000000000..9e601c8a28 --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-dotnet/chainsaw-test.yaml @@ -0,0 +1,36 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-dotnet +spec: + steps: + - name: step-00 + try: + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.uid-range=1000/1000 + - --overwrite + entrypoint: kubectl + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.supplemental-groups=2000/1000 + - --overwrite + entrypoint: kubectl + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-go/01-add-scc.yaml b/tests/e2e-instrumentation/instrumentation-go/01-add-scc.yaml index e8a82d749e..db4b5b8553 100644 --- a/tests/e2e-instrumentation/instrumentation-go/01-add-scc.yaml +++ b/tests/e2e-instrumentation/instrumentation-go/01-add-scc.yaml @@ -1,16 +1,4 @@ -# Create a SA to apply the SCC policy apiVersion: v1 kind: ServiceAccount metadata: name: otel-instrumentation-go ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - # Annotate the namespace to allow the application to run using an specific group and user in OpenShift - # https://docs.openshift.com/dedicated/authentication/managing-security-context-constraints.html - # This annotation has no effect in Kubernetes - - script: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.uid-range=0/0 --overwrite - - script: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.supplemental-groups=2000/1000 --overwrite - # Add the SCC - - script: ./add-scc.sh diff --git a/tests/e2e-instrumentation/instrumentation-go/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-go/chainsaw-test.yaml new file mode 100755 index 0000000000..9a90a86467 --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-go/chainsaw-test.yaml @@ -0,0 +1,32 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-go +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - script: + content: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.uid-range=0/0 + --overwrite + - script: + content: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.supplemental-groups=2000/1000 + --overwrite + - script: + content: ./add-scc.sh + - apply: + file: 01-add-scc.yaml + - name: step-02 + try: + - apply: + file: 02-install-app.yaml + - assert: + file: 02-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-java-multicontainer/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-java-multicontainer/chainsaw-test.yaml new file mode 100755 index 0000000000..b02ba84276 --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-java-multicontainer/chainsaw-test.yaml @@ -0,0 +1,26 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-java-multicontainer +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml + - name: step-02 + try: + - apply: + file: 02-install-app.yaml + - assert: + file: 02-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-java-other-ns/01-cleanup-other-ns.yaml b/tests/e2e-instrumentation/instrumentation-java-other-ns/01-cleanup-other-ns.yaml deleted file mode 100644 index ee6bc7f70e..0000000000 --- a/tests/e2e-instrumentation/instrumentation-java-other-ns/01-cleanup-other-ns.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -delete: -- apiVersion: v1 - kind: Namespace - name: my-other-ns diff --git a/tests/e2e-instrumentation/instrumentation-java-other-ns/02-install-collector.yaml b/tests/e2e-instrumentation/instrumentation-java-other-ns/02-install-collector.yaml index 2875bde640..fe390c6cae 100644 --- a/tests/e2e-instrumentation/instrumentation-java-other-ns/02-install-collector.yaml +++ b/tests/e2e-instrumentation/instrumentation-java-other-ns/02-install-collector.yaml @@ -3,7 +3,6 @@ kind: OpenTelemetryCollector metadata: name: sidecar spec: - mode: sidecar config: | receivers: otlp: @@ -21,12 +20,4 @@ spec: receivers: [otlp] processors: [] exporters: [debug] ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - # Annotate the namespace to allow the application to run using an specific group and user in OpenShift - # https://docs.openshift.com/dedicated/authentication/managing-security-context-constraints.html - # This annotation has no effect in Kubernetes - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.uid-range=1000/1000 --overwrite - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.supplemental-groups=2000/1000 --overwrite + mode: sidecar diff --git a/tests/e2e-instrumentation/instrumentation-java-other-ns/04-cleanup-other-ns.yaml b/tests/e2e-instrumentation/instrumentation-java-other-ns/04-cleanup-other-ns.yaml deleted file mode 100644 index ee6bc7f70e..0000000000 --- a/tests/e2e-instrumentation/instrumentation-java-other-ns/04-cleanup-other-ns.yaml +++ /dev/null @@ -1,6 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -delete: -- apiVersion: v1 - kind: Namespace - name: my-other-ns diff --git a/tests/e2e-instrumentation/instrumentation-java-other-ns/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-java-other-ns/chainsaw-test.yaml new file mode 100755 index 0000000000..da1b86d44f --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-java-other-ns/chainsaw-test.yaml @@ -0,0 +1,50 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-java-other-ns +spec: + steps: + - name: step-01 + try: + - delete: + ref: + apiVersion: v1 + kind: Namespace + name: my-other-ns + - name: step-02 + try: + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.uid-range=1000/1000 + - --overwrite + entrypoint: kubectl + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.supplemental-groups=2000/1000 + - --overwrite + entrypoint: kubectl + - apply: + file: 02-install-collector.yaml + - apply: + file: 02-install-instrumentation.yaml + - name: step-03 + try: + - apply: + file: 03-install-app.yaml + - assert: + file: 03-assert.yaml + - name: step-04 + try: + - delete: + ref: + apiVersion: v1 + kind: Namespace + name: my-other-ns diff --git a/tests/e2e-instrumentation/instrumentation-java/00-install-collector.yaml b/tests/e2e-instrumentation/instrumentation-java/00-install-collector.yaml index 2875bde640..fe390c6cae 100644 --- a/tests/e2e-instrumentation/instrumentation-java/00-install-collector.yaml +++ b/tests/e2e-instrumentation/instrumentation-java/00-install-collector.yaml @@ -3,7 +3,6 @@ kind: OpenTelemetryCollector metadata: name: sidecar spec: - mode: sidecar config: | receivers: otlp: @@ -21,12 +20,4 @@ spec: receivers: [otlp] processors: [] exporters: [debug] ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - # Annotate the namespace to allow the application to run using an specific group and user in OpenShift - # https://docs.openshift.com/dedicated/authentication/managing-security-context-constraints.html - # This annotation has no effect in Kubernetes - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.uid-range=1000/1000 --overwrite - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.supplemental-groups=2000/1000 --overwrite + mode: sidecar diff --git a/tests/e2e-instrumentation/instrumentation-java/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-java/chainsaw-test.yaml new file mode 100755 index 0000000000..a535ea3b42 --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-java/chainsaw-test.yaml @@ -0,0 +1,36 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-java +spec: + steps: + - name: step-00 + try: + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.uid-range=1000/1000 + - --overwrite + entrypoint: kubectl + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.supplemental-groups=2000/1000 + - --overwrite + entrypoint: kubectl + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-nginx-contnr-secctx/00-install-collector.yaml b/tests/e2e-instrumentation/instrumentation-nginx-contnr-secctx/00-install-collector.yaml index c18f418bfb..812f4358c0 100644 --- a/tests/e2e-instrumentation/instrumentation-nginx-contnr-secctx/00-install-collector.yaml +++ b/tests/e2e-instrumentation/instrumentation-nginx-contnr-secctx/00-install-collector.yaml @@ -3,7 +3,6 @@ kind: OpenTelemetryCollector metadata: name: sidecar spec: - mode: sidecar config: | receivers: otlp: @@ -19,13 +18,4 @@ spec: receivers: [otlp] processors: [] exporters: [logging] - ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - # Annotate the namespace to allow the application to run using an specific group and user in OpenShift - # https://docs.openshift.com/dedicated/authentication/managing-security-context-constraints.html - # This annotation has no effect in Kubernetes - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.uid-range=1000/1000 --overwrite - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.supplemental-groups=3000/1000 --overwrite + mode: sidecar diff --git a/tests/e2e-instrumentation/instrumentation-nginx-contnr-secctx/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-nginx-contnr-secctx/chainsaw-test.yaml new file mode 100755 index 0000000000..7f1948aa5b --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-nginx-contnr-secctx/chainsaw-test.yaml @@ -0,0 +1,36 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-nginx-contnr-secctx +spec: + steps: + - name: step-00 + try: + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.uid-range=1000/1000 + - --overwrite + entrypoint: kubectl + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.supplemental-groups=3000/1000 + - --overwrite + entrypoint: kubectl + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-nginx-multicontainer/00-install-collector.yaml b/tests/e2e-instrumentation/instrumentation-nginx-multicontainer/00-install-collector.yaml index cb02aa005d..812f4358c0 100644 --- a/tests/e2e-instrumentation/instrumentation-nginx-multicontainer/00-install-collector.yaml +++ b/tests/e2e-instrumentation/instrumentation-nginx-multicontainer/00-install-collector.yaml @@ -1,32 +1,21 @@ -# skipping test, see https://github.com/open-telemetry/opentelemetry-operator/issues/1936 apiVersion: opentelemetry.io/v1alpha1 kind: OpenTelemetryCollector metadata: - name: sidecar + name: sidecar spec: - mode: sidecar - config: | - receivers: - otlp: - protocols: - grpc: - http: - processors: - exporters: - logging: - service: - pipelines: - traces: - receivers: [otlp] - processors: [] - exporters: [logging] - ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - # Annotate the namespace to allow the application to run using an specific group and user in OpenShift - # https://docs.openshift.com/dedicated/authentication/managing-security-context-constraints.html - # This annotation has no effect in Kubernetes - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.uid-range=1000/1000 --overwrite - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.supplemental-groups=3000/1000 --overwrite + config: | + receivers: + otlp: + protocols: + grpc: + http: + processors: + exporters: + logging: + service: + pipelines: + traces: + receivers: [otlp] + processors: [] + exporters: [logging] + mode: sidecar diff --git a/tests/e2e-instrumentation/instrumentation-nginx-multicontainer/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-nginx-multicontainer/chainsaw-test.yaml new file mode 100755 index 0000000000..47349ca018 --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-nginx-multicontainer/chainsaw-test.yaml @@ -0,0 +1,42 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-nginx-multicontainer +spec: + steps: + - name: step-00 + try: + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.uid-range=1000/1000 + - --overwrite + entrypoint: kubectl + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.supplemental-groups=3000/1000 + - --overwrite + entrypoint: kubectl + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml + - name: step-02 + try: + - apply: + file: 02-install-app.yaml + - assert: + file: 02-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-nginx/00-install-collector.yaml b/tests/e2e-instrumentation/instrumentation-nginx/00-install-collector.yaml index c18f418bfb..812f4358c0 100644 --- a/tests/e2e-instrumentation/instrumentation-nginx/00-install-collector.yaml +++ b/tests/e2e-instrumentation/instrumentation-nginx/00-install-collector.yaml @@ -3,7 +3,6 @@ kind: OpenTelemetryCollector metadata: name: sidecar spec: - mode: sidecar config: | receivers: otlp: @@ -19,13 +18,4 @@ spec: receivers: [otlp] processors: [] exporters: [logging] - ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - # Annotate the namespace to allow the application to run using an specific group and user in OpenShift - # https://docs.openshift.com/dedicated/authentication/managing-security-context-constraints.html - # This annotation has no effect in Kubernetes - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.uid-range=1000/1000 --overwrite - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.supplemental-groups=3000/1000 --overwrite + mode: sidecar diff --git a/tests/e2e-instrumentation/instrumentation-nginx/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-nginx/chainsaw-test.yaml new file mode 100755 index 0000000000..5ad0986285 --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-nginx/chainsaw-test.yaml @@ -0,0 +1,36 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-nginx +spec: + steps: + - name: step-00 + try: + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.uid-range=1000/1000 + - --overwrite + entrypoint: kubectl + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.supplemental-groups=3000/1000 + - --overwrite + entrypoint: kubectl + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-nodejs-multicontainer/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-nodejs-multicontainer/chainsaw-test.yaml new file mode 100755 index 0000000000..d4a34896b2 --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-nodejs-multicontainer/chainsaw-test.yaml @@ -0,0 +1,26 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-nodejs-multicontainer +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml + - name: step-02 + try: + - apply: + file: 02-install-app.yaml + - assert: + file: 02-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-nodejs/00-install-collector.yaml b/tests/e2e-instrumentation/instrumentation-nodejs/00-install-collector.yaml index 2875bde640..fe390c6cae 100644 --- a/tests/e2e-instrumentation/instrumentation-nodejs/00-install-collector.yaml +++ b/tests/e2e-instrumentation/instrumentation-nodejs/00-install-collector.yaml @@ -3,7 +3,6 @@ kind: OpenTelemetryCollector metadata: name: sidecar spec: - mode: sidecar config: | receivers: otlp: @@ -21,12 +20,4 @@ spec: receivers: [otlp] processors: [] exporters: [debug] ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - # Annotate the namespace to allow the application to run using an specific group and user in OpenShift - # https://docs.openshift.com/dedicated/authentication/managing-security-context-constraints.html - # This annotation has no effect in Kubernetes - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.uid-range=1000/1000 --overwrite - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.supplemental-groups=2000/1000 --overwrite + mode: sidecar diff --git a/tests/e2e-instrumentation/instrumentation-nodejs/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-nodejs/chainsaw-test.yaml new file mode 100755 index 0000000000..656604f597 --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-nodejs/chainsaw-test.yaml @@ -0,0 +1,36 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-nodejs +spec: + steps: + - name: step-00 + try: + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.uid-range=1000/1000 + - --overwrite + entrypoint: kubectl + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.supplemental-groups=2000/1000 + - --overwrite + entrypoint: kubectl + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-python-multicontainer/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-python-multicontainer/chainsaw-test.yaml new file mode 100755 index 0000000000..c39ad549b7 --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-python-multicontainer/chainsaw-test.yaml @@ -0,0 +1,26 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-python-multicontainer +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml + - name: step-02 + try: + - apply: + file: 02-install-app.yaml + - assert: + file: 02-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-python/00-install-collector.yaml b/tests/e2e-instrumentation/instrumentation-python/00-install-collector.yaml index 2875bde640..fe390c6cae 100644 --- a/tests/e2e-instrumentation/instrumentation-python/00-install-collector.yaml +++ b/tests/e2e-instrumentation/instrumentation-python/00-install-collector.yaml @@ -3,7 +3,6 @@ kind: OpenTelemetryCollector metadata: name: sidecar spec: - mode: sidecar config: | receivers: otlp: @@ -21,12 +20,4 @@ spec: receivers: [otlp] processors: [] exporters: [debug] ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - # Annotate the namespace to allow the application to run using an specific group and user in OpenShift - # https://docs.openshift.com/dedicated/authentication/managing-security-context-constraints.html - # This annotation has no effect in Kubernetes - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.uid-range=1000/1000 --overwrite - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.supplemental-groups=2000/1000 --overwrite + mode: sidecar diff --git a/tests/e2e-instrumentation/instrumentation-python/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-python/chainsaw-test.yaml new file mode 100755 index 0000000000..2c70f182f3 --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-python/chainsaw-test.yaml @@ -0,0 +1,36 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-python +spec: + steps: + - name: step-00 + try: + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.uid-range=1000/1000 + - --overwrite + entrypoint: kubectl + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.supplemental-groups=2000/1000 + - --overwrite + entrypoint: kubectl + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-instrumentation/instrumentation-sdk/00-install-collector.yaml b/tests/e2e-instrumentation/instrumentation-sdk/00-install-collector.yaml index 2875bde640..fe390c6cae 100644 --- a/tests/e2e-instrumentation/instrumentation-sdk/00-install-collector.yaml +++ b/tests/e2e-instrumentation/instrumentation-sdk/00-install-collector.yaml @@ -3,7 +3,6 @@ kind: OpenTelemetryCollector metadata: name: sidecar spec: - mode: sidecar config: | receivers: otlp: @@ -21,12 +20,4 @@ spec: receivers: [otlp] processors: [] exporters: [debug] ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - # Annotate the namespace to allow the application to run using an specific group and user in OpenShift - # https://docs.openshift.com/dedicated/authentication/managing-security-context-constraints.html - # This annotation has no effect in Kubernetes - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.uid-range=1000/1000 --overwrite - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.supplemental-groups=2000/1000 --overwrite + mode: sidecar diff --git a/tests/e2e-instrumentation/instrumentation-sdk/chainsaw-test.yaml b/tests/e2e-instrumentation/instrumentation-sdk/chainsaw-test.yaml new file mode 100755 index 0000000000..0bd1c74890 --- /dev/null +++ b/tests/e2e-instrumentation/instrumentation-sdk/chainsaw-test.yaml @@ -0,0 +1,36 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-sdk +spec: + steps: + - name: step-00 + try: + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.uid-range=1000/1000 + - --overwrite + entrypoint: kubectl + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.supplemental-groups=2000/1000 + - --overwrite + entrypoint: kubectl + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-multi-instrumentation/instrumentation-multi-multicontainer/chainsaw-test.yaml b/tests/e2e-multi-instrumentation/instrumentation-multi-multicontainer/chainsaw-test.yaml new file mode 100755 index 0000000000..e5303719f6 --- /dev/null +++ b/tests/e2e-multi-instrumentation/instrumentation-multi-multicontainer/chainsaw-test.yaml @@ -0,0 +1,20 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-multi-multicontainer +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-multi-instrumentation/instrumentation-multi-no-containers/chainsaw-test.yaml b/tests/e2e-multi-instrumentation/instrumentation-multi-no-containers/chainsaw-test.yaml new file mode 100755 index 0000000000..c79b2a8815 --- /dev/null +++ b/tests/e2e-multi-instrumentation/instrumentation-multi-no-containers/chainsaw-test.yaml @@ -0,0 +1,20 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-multi-no-containers +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-multi-instrumentation/instrumentation-single-instr-first-container/chainsaw-test.yaml b/tests/e2e-multi-instrumentation/instrumentation-single-instr-first-container/chainsaw-test.yaml new file mode 100755 index 0000000000..e9d5115609 --- /dev/null +++ b/tests/e2e-multi-instrumentation/instrumentation-single-instr-first-container/chainsaw-test.yaml @@ -0,0 +1,20 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: instrumentation-single-instr-first-container +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install-collector.yaml + - apply: + file: 00-install-instrumentation.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-opampbridge/opampbridge/00-assert.yaml b/tests/e2e-opampbridge/opampbridge/00-assert.yaml index f4022a72d4..bc576139e3 100644 --- a/tests/e2e-opampbridge/opampbridge/00-assert.yaml +++ b/tests/e2e-opampbridge/opampbridge/00-assert.yaml @@ -6,30 +6,27 @@ spec: template: spec: containers: - - name: opamp-bridge-container - env: - - name: OTELCOL_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - volumeMounts: - - mountPath: /conf - name: opamp-bridge-internal - volumes: - - configMap: - items: - - key: remoteconfiguration.yaml - path: remoteconfiguration.yaml - name: test-opamp-bridge + - env: + - name: OTELCOL_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + name: opamp-bridge-container + volumeMounts: + - mountPath: /conf name: opamp-bridge-internal + volumes: + - configMap: + items: + - key: remoteconfiguration.yaml + path: remoteconfiguration.yaml + name: test-opamp-bridge + name: opamp-bridge-internal status: - replicas: 1 readyReplicas: 1 + replicas: 1 --- apiVersion: v1 -kind: ConfigMap -metadata: - name: test-opamp-bridge data: remoteconfiguration.yaml: | capabilities: @@ -52,6 +49,9 @@ data: receivers: - otlp endpoint: ws://opamp-server:4320/v1/opamp +kind: ConfigMap +metadata: + name: test-opamp-bridge --- apiVersion: v1 kind: Service @@ -63,8 +63,3 @@ spec: port: 80 protocol: TCP targetPort: 8080 ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -opampbridges: - - selector: app.kubernetes.io/component=opentelemetry-opamp-bridge diff --git a/tests/e2e-opampbridge/opampbridge/00-install.yaml b/tests/e2e-opampbridge/opampbridge/00-install.yaml index 3bfbf50e88..f76946e125 100644 --- a/tests/e2e-opampbridge/opampbridge/00-install.yaml +++ b/tests/e2e-opampbridge/opampbridge/00-install.yaml @@ -1,8 +1,8 @@ apiVersion: v1 +automountServiceAccountToken: true kind: ServiceAccount metadata: name: opamp-bridge -automountServiceAccountToken: true --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role @@ -16,24 +16,18 @@ rules: verbs: - '*' - apiGroups: - - '' + - "" resources: - pods verbs: - - 'list' - - 'get' ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - - command: kubectl -n $NAMESPACE create rolebinding default-opamp-bridge-$NAMESPACE --role=opamp-bridge --serviceaccount=$NAMESPACE:opamp-bridge + - list + - get --- apiVersion: opentelemetry.io/v1alpha1 kind: OpAMPBridge metadata: name: test spec: - endpoint: ws://opamp-server:4320/v1/opamp capabilities: AcceptsOpAMPConnectionSettings: true AcceptsOtherConnectionSettings: true @@ -47,9 +41,10 @@ spec: ReportsRemoteConfig: true ReportsStatus: true componentsAllowed: - receivers: - - otlp + exporters: + - logging processors: - memory_limiter - exporters: - - logging \ No newline at end of file + receivers: + - otlp + endpoint: ws://opamp-server:4320/v1/opamp diff --git a/tests/e2e-opampbridge/opampbridge/chainsaw-test.yaml b/tests/e2e-opampbridge/opampbridge/chainsaw-test.yaml new file mode 100755 index 0000000000..18649d9007 --- /dev/null +++ b/tests/e2e-opampbridge/opampbridge/chainsaw-test.yaml @@ -0,0 +1,17 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: opampbridge +spec: + steps: + - catch: + - podLogs: + selector: app.kubernetes.io/component=opentelemetry-opamp-bridge + name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml diff --git a/tests/e2e-openshift/kafka/05-assert.yaml b/tests/e2e-openshift/kafka/05-assert.yaml deleted file mode 100644 index 0dfd963f94..0000000000 --- a/tests/e2e-openshift/kafka/05-assert.yaml +++ /dev/null @@ -1,6 +0,0 @@ ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -timeout: 30 -commands: -- script: ./tests/e2e-openshift/kafka/check_traces.sh diff --git a/tests/e2e-openshift/kafka/chainsaw-test.yaml b/tests/e2e-openshift/kafka/chainsaw-test.yaml new file mode 100755 index 0000000000..35da907129 --- /dev/null +++ b/tests/e2e-openshift/kafka/chainsaw-test.yaml @@ -0,0 +1,43 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: kafka +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-create-kafka-instance.yaml + - assert: + file: 00-assert.yaml + - name: step-01 + try: + - apply: + file: 01-create-kafka-topics.yaml + - assert: + file: 01-assert.yaml + - name: step-02 + try: + - apply: + file: 02-otel-kakfa-receiver.yaml + - assert: + file: 02-assert.yaml + - name: step-03 + try: + - apply: + file: 03-otel-kakfa-exporter.yaml + - assert: + file: 03-assert.yaml + - name: step-04 + try: + - apply: + file: 04-generate-traces.yaml + - assert: + file: 04-assert.yaml + - catch: + - script: + content: ./tests/e2e-openshift/kafka/check_traces.sh + name: step-05 + try: null diff --git a/tests/e2e-openshift/monitoring/00-assert.yaml b/tests/e2e-openshift/monitoring/00-assert.yaml deleted file mode 100644 index f9cbcf22cc..0000000000 --- a/tests/e2e-openshift/monitoring/00-assert.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -commands: -- script: ./tests/e2e-openshift/monitoring/check_user_workload_monitoring.sh diff --git a/tests/e2e-openshift/monitoring/03-assert.yaml b/tests/e2e-openshift/monitoring/03-assert.yaml index 2f1f82d416..24386d9d70 100644 --- a/tests/e2e-openshift/monitoring/03-assert.yaml +++ b/tests/e2e-openshift/monitoring/03-assert.yaml @@ -11,7 +11,6 @@ rules: - get - list - watch - --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding @@ -25,9 +24,3 @@ subjects: - kind: ServiceAccount name: prometheus-user-workload namespace: openshift-user-workload-monitoring - ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -commands: -- script: ./tests/e2e-openshift/monitoring/check_metrics.sh diff --git a/tests/e2e-openshift/monitoring/chainsaw-test.yaml b/tests/e2e-openshift/monitoring/chainsaw-test.yaml new file mode 100755 index 0000000000..3a8ffdd9fd --- /dev/null +++ b/tests/e2e-openshift/monitoring/chainsaw-test.yaml @@ -0,0 +1,36 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: monitoring +spec: + steps: + - catch: + - script: + content: ./tests/e2e-openshift/monitoring/check_user_workload_monitoring.sh + name: step-00 + try: + - apply: + file: 00-workload-monitoring.yaml + - name: step-01 + try: + - apply: + file: 01-otel-collector.yaml + - assert: + file: 01-assert.yaml + - name: step-02 + try: + - apply: + file: 02-generate-traces.yaml + - assert: + file: 02-assert.yaml + - catch: + - script: + content: ./tests/e2e-openshift/monitoring/check_metrics.sh + name: step-03 + try: + - apply: + file: 03-create-monitoring-roles.yaml + - assert: + file: 03-assert.yaml diff --git a/tests/e2e-openshift/multi-cluster/02-otlp-receiver.yaml b/tests/e2e-openshift/multi-cluster/02-otlp-receiver.yaml index d300458082..46f39a7b89 100644 --- a/tests/e2e-openshift/multi-cluster/02-otlp-receiver.yaml +++ b/tests/e2e-openshift/multi-cluster/02-otlp-receiver.yaml @@ -1,27 +1,9 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: -- script: ./generate_certs.sh - ---- apiVersion: opentelemetry.io/v1alpha1 kind: OpenTelemetryCollector metadata: name: otlp-receiver namespace: kuttl-multi-cluster-receive spec: - mode: "deployment" - ingress: - type: route - route: - termination: "passthrough" - volumes: - - name: kuttl-certs - configMap: - name: kuttl-certs - volumeMounts: - - name: kuttl-certs - mountPath: /certs config: | receivers: otlp: @@ -47,3 +29,15 @@ spec: receivers: [otlp] processors: [] exporters: [otlp] + ingress: + route: + termination: passthrough + type: route + mode: deployment + volumeMounts: + - mountPath: /certs + name: kuttl-certs + volumes: + - configMap: + name: kuttl-certs + name: kuttl-certs diff --git a/tests/e2e-openshift/multi-cluster/03-otlp-sender.yaml b/tests/e2e-openshift/multi-cluster/03-otlp-sender.yaml index 2c1d45273f..6b561b4875 100644 --- a/tests/e2e-openshift/multi-cluster/03-otlp-sender.yaml +++ b/tests/e2e-openshift/multi-cluster/03-otlp-sender.yaml @@ -1,46 +1,57 @@ ---- apiVersion: v1 kind: ServiceAccount metadata: name: kuttl-multi-cluster namespace: kuttl-multi-cluster-send - --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: kuttl-multi-cluster rules: -- apiGroups: ["config.openshift.io"] - resources: ["infrastructures", "infrastructures/status"] - verbs: ["get", "watch", "list"] -- apiGroups: ["apps"] - resources: ["replicasets"] - verbs: ["get", "watch", "list"] -- apiGroups: [""] - resources: ["pods"] - verbs: ["get", "watch", "list"] -- apiGroups: [""] - resources: ["namespaces"] - verbs: ["get", "watch", "list"] - +- apiGroups: + - config.openshift.io + resources: + - infrastructures + - infrastructures/status + verbs: + - get + - watch + - list +- apiGroups: + - apps + resources: + - replicasets + verbs: + - get + - watch + - list +- apiGroups: + - "" + resources: + - pods + verbs: + - get + - watch + - list +- apiGroups: + - "" + resources: + - namespaces + verbs: + - get + - watch + - list --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: kuttl-multi-cluster +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: kuttl-multi-cluster subjects: - kind: ServiceAccount name: kuttl-multi-cluster namespace: kuttl-multi-cluster-send -roleRef: - kind: ClusterRole - name: kuttl-multi-cluster - apiGroup: rbac.authorization.k8s.io - ---- ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: -- script: ./create_otlp_sender.sh diff --git a/tests/e2e-openshift/multi-cluster/05-assert.yaml b/tests/e2e-openshift/multi-cluster/05-assert.yaml deleted file mode 100644 index 73befbcd29..0000000000 --- a/tests/e2e-openshift/multi-cluster/05-assert.yaml +++ /dev/null @@ -1,6 +0,0 @@ ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -timeout: 30 -commands: -- script: ./tests/e2e-openshift/multi-cluster/check_traces.sh diff --git a/tests/e2e-openshift/multi-cluster/chainsaw-test.yaml b/tests/e2e-openshift/multi-cluster/chainsaw-test.yaml new file mode 100755 index 0000000000..4fe86735ad --- /dev/null +++ b/tests/e2e-openshift/multi-cluster/chainsaw-test.yaml @@ -0,0 +1,47 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: multi-cluster +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-create-namespaces.yaml + - assert: + file: 00-assert.yaml + - name: step-01 + try: + - apply: + file: 01-create-jaeger.yaml + - assert: + file: 01-assert.yaml + - name: step-02 + try: + - script: + content: ./generate_certs.sh + - apply: + file: 02-otlp-receiver.yaml + - assert: + file: 02-assert.yaml + - name: step-03 + try: + - script: + content: ./create_otlp_sender.sh + - apply: + file: 03-otlp-sender.yaml + - assert: + file: 03-assert.yaml + - name: step-04 + try: + - apply: + file: 04-generate-traces.yaml + - assert: + file: 04-assert.yaml + - catch: + - script: + content: ./tests/e2e-openshift/multi-cluster/check_traces.sh + name: step-05 + try: null diff --git a/tests/e2e-openshift/otlp-metrics-traces/01-assert.yaml b/tests/e2e-openshift/otlp-metrics-traces/01-assert.yaml deleted file mode 100644 index b7e3849892..0000000000 --- a/tests/e2e-openshift/otlp-metrics-traces/01-assert.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -commands: -- script: ./tests/e2e-openshift/otlp-metrics-traces/check_user_workload_monitoring.sh diff --git a/tests/e2e-openshift/otlp-metrics-traces/04-assert.yaml b/tests/e2e-openshift/otlp-metrics-traces/04-assert.yaml deleted file mode 100644 index 9bec95f449..0000000000 --- a/tests/e2e-openshift/otlp-metrics-traces/04-assert.yaml +++ /dev/null @@ -1,6 +0,0 @@ ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -timeout: 30 -commands: -- script: ./tests/e2e-openshift/otlp-metrics-traces/check_traces.sh diff --git a/tests/e2e-openshift/otlp-metrics-traces/05-assert.yaml b/tests/e2e-openshift/otlp-metrics-traces/05-assert.yaml deleted file mode 100644 index 79570e05a4..0000000000 --- a/tests/e2e-openshift/otlp-metrics-traces/05-assert.yaml +++ /dev/null @@ -1,5 +0,0 @@ ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -commands: -- script: ./tests/e2e-openshift/otlp-metrics-traces/check_metrics.sh diff --git a/tests/e2e-openshift/otlp-metrics-traces/chainsaw-test.yaml b/tests/e2e-openshift/otlp-metrics-traces/chainsaw-test.yaml new file mode 100755 index 0000000000..22ee039c00 --- /dev/null +++ b/tests/e2e-openshift/otlp-metrics-traces/chainsaw-test.yaml @@ -0,0 +1,43 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: otlp-metrics-traces +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install-jaeger.yaml + - assert: + file: 00-assert.yaml + - catch: + - script: + content: ./tests/e2e-openshift/otlp-metrics-traces/check_user_workload_monitoring.sh + name: step-01 + try: + - apply: + file: 01-workload-monitoring.yaml + - name: step-02 + try: + - apply: + file: 02-otel-metrics-collector.yaml + - assert: + file: 02-assert.yaml + - name: step-03 + try: + - apply: + file: 03-metrics-traces-gen.yaml + - assert: + file: 03-assert.yaml + - catch: + - script: + content: ./tests/e2e-openshift/otlp-metrics-traces/check_traces.sh + name: step-04 + try: null + - catch: + - script: + content: ./tests/e2e-openshift/otlp-metrics-traces/check_metrics.sh + name: step-05 + try: null diff --git a/tests/e2e-openshift/route/01-report-empty-otlphttp-spans.yaml b/tests/e2e-openshift/route/01-report-empty-otlphttp-spans.yaml deleted file mode 100644 index 406d66cef2..0000000000 --- a/tests/e2e-openshift/route/01-report-empty-otlphttp-spans.yaml +++ /dev/null @@ -1,9 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - - script: | - #!/bin/bash - set -ex - # Export empty payload and check of collector accepted it with 2xx status code - otlp_http_host=$(kubectl get route otlp-http-simplest-route -n $NAMESPACE -o jsonpath='{.spec.host}') - for i in {1..40}; do curl --fail -ivX POST http://${otlp_http_host}:80/v1/traces -H "Content-Type: application/json" -d '{}' && break || sleep 1; done diff --git a/tests/e2e-openshift/route/chainsaw-test.yaml b/tests/e2e-openshift/route/chainsaw-test.yaml new file mode 100755 index 0000000000..56b00052ae --- /dev/null +++ b/tests/e2e-openshift/route/chainsaw-test.yaml @@ -0,0 +1,23 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: route +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml + - name: step-01 + try: + - script: + content: | + #!/bin/bash + set -ex + # Export empty payload and check of collector accepted it with 2xx status code + otlp_http_host=$(kubectl get route otlp-http-simplest-route -n $NAMESPACE -o jsonpath='{.spec.host}') + for i in {1..40}; do curl --fail -ivX POST http://${otlp_http_host}:80/v1/traces -H "Content-Type: application/json" -d '{}' && break || sleep 1; done diff --git a/tests/e2e-pdb/pdb/chainsaw-test.yaml b/tests/e2e-pdb/pdb/chainsaw-test.yaml new file mode 100755 index 0000000000..d5e7025f54 --- /dev/null +++ b/tests/e2e-pdb/pdb/chainsaw-test.yaml @@ -0,0 +1,14 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: pdb +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml diff --git a/tests/e2e-pdb/target-allocator/chainsaw-test.yaml b/tests/e2e-pdb/target-allocator/chainsaw-test.yaml new file mode 100755 index 0000000000..dff97e4129 --- /dev/null +++ b/tests/e2e-pdb/target-allocator/chainsaw-test.yaml @@ -0,0 +1,14 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: target-allocator +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml diff --git a/tests/e2e-prometheuscr/create-pm-prometheus-exporters/chainsaw-test.yaml b/tests/e2e-prometheuscr/create-pm-prometheus-exporters/chainsaw-test.yaml new file mode 100755 index 0000000000..314e498921 --- /dev/null +++ b/tests/e2e-prometheuscr/create-pm-prometheus-exporters/chainsaw-test.yaml @@ -0,0 +1,18 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: create-pm-prometheus-exporters +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-prometheuscr/create-sm-prometheus-exporters/07-delete.yaml b/tests/e2e-prometheuscr/create-sm-prometheus-exporters/07-delete.yaml deleted file mode 100644 index 76798588bb..0000000000 --- a/tests/e2e-prometheuscr/create-sm-prometheus-exporters/07-delete.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -delete: - - apiVersion: opentelemetry.io/v1alpha1 - kind: OpenTelemetryCollector - metadata: - name: simplest - namespace: create-sm-prometheus \ No newline at end of file diff --git a/tests/e2e-prometheuscr/create-sm-prometheus-exporters/08-install.yaml b/tests/e2e-prometheuscr/create-sm-prometheus-exporters/08-install.yaml index 7c808af177..141227a65c 100644 --- a/tests/e2e-prometheuscr/create-sm-prometheus-exporters/08-install.yaml +++ b/tests/e2e-prometheuscr/create-sm-prometheus-exporters/08-install.yaml @@ -1,66 +1,68 @@ apiVersion: v1 +automountServiceAccountToken: true kind: ServiceAccount metadata: name: ta namespace: create-sm-prometheus -automountServiceAccountToken: true --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: create-sm-prometheus rules: -- apiGroups: [""] +- apiGroups: + - "" resources: - - pods - - nodes - - services - - endpoints - - configmaps - - secrets - - namespaces + - pods + - nodes + - services + - endpoints + - configmaps + - secrets + - namespaces verbs: - - get - - watch - - list -- apiGroups: ["apps"] + - get + - watch + - list +- apiGroups: + - apps resources: - - statefulsets - - services - - endpoints + - statefulsets + - services + - endpoints verbs: - - get - - watch - - list -- apiGroups: ["discovery.k8s.io"] + - get + - watch + - list +- apiGroups: + - discovery.k8s.io resources: - - endpointslices + - endpointslices verbs: - - get - - watch - - list -- apiGroups: ["networking.k8s.io"] + - get + - watch + - list +- apiGroups: + - networking.k8s.io resources: - - ingresses + - ingresses verbs: - - get - - watch - - list -- apiGroups: ["monitoring.coreos.com"] + - get + - watch + - list +- apiGroups: + - monitoring.coreos.com resources: - - servicemonitors - - podmonitors + - servicemonitors + - podmonitors verbs: - - get - - watch - - list -- nonResourceURLs: ["/metrics"] - verbs: ["get"] ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - - command: kubectl create clusterrolebinding simplest-targetallocator-create-sm-prometheus --clusterrole=create-sm-prometheus --serviceaccount=create-sm-prometheus:ta + - get + - watch + - list +- nonResourceURLs: + - /metrics + verbs: + - get --- apiVersion: opentelemetry.io/v1alpha1 kind: OpenTelemetryCollector @@ -68,15 +70,6 @@ metadata: name: simplest namespace: create-sm-prometheus spec: - mode: statefulset - targetAllocator: - serviceAccount: ta - enabled: true - prometheusCR: - enabled: true - observability: - metrics: - enableMetrics: true config: | receivers: prometheus: @@ -94,6 +87,15 @@ spec: receivers: [prometheus] processors: [] exporters: [prometheus] + mode: statefulset + targetAllocator: + enabled: true + observability: + metrics: + enableMetrics: true + prometheusCR: + enabled: true + serviceAccount: ta --- apiVersion: batch/v1 kind: Job @@ -103,11 +105,11 @@ metadata: spec: template: spec: - restartPolicy: OnFailure containers: - - name: check-metrics - image: curlimages/curl - args: - - /bin/sh - - -c - - curl -s http://simplest-targetallocator/jobs | grep "targetallocator" + - args: + - /bin/sh + - -c + - curl -s http://simplest-targetallocator/jobs | grep "targetallocator" + image: curlimages/curl + name: check-metrics + restartPolicy: OnFailure diff --git a/tests/e2e-prometheuscr/create-sm-prometheus-exporters/chainsaw-test.yaml b/tests/e2e-prometheuscr/create-sm-prometheus-exporters/chainsaw-test.yaml new file mode 100755 index 0000000000..770da34d9e --- /dev/null +++ b/tests/e2e-prometheuscr/create-sm-prometheus-exporters/chainsaw-test.yaml @@ -0,0 +1,74 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: create-sm-prometheus-exporters +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - name: step-01 + try: + - apply: + file: 01-install.yaml + - assert: + file: 01-assert.yaml + - name: step-02 + try: + - apply: + file: 02-install.yaml + - assert: + file: 02-assert.yaml + - name: step-03 + try: + - apply: + file: 03-install.yaml + - assert: + file: 03-assert.yaml + - name: step-04 + try: + - apply: + file: 04-error.yaml + - apply: + file: 04-install.yaml + - name: step-05 + try: + - apply: + file: 05-error.yaml + - apply: + file: 05-install.yaml + - assert: + file: 05-assert.yaml + - name: step-06 + try: + - apply: + file: 06-install.yaml + - assert: + file: 06-assert.yaml + - name: step-07 + try: + - delete: + ref: + apiVersion: opentelemetry.io/v1alpha1 + kind: OpenTelemetryCollector + name: simplest + namespace: create-sm-prometheus + - apply: + file: 07-error.yaml + - name: step-08 + try: + - command: + args: + - create + - clusterrolebinding + - simplest-targetallocator-create-sm-prometheus + - --clusterrole=create-sm-prometheus + - --serviceaccount=create-sm-prometheus:ta + entrypoint: kubectl + - apply: + file: 08-install.yaml + - assert: + file: 08-assert.yaml diff --git a/tests/e2e-targetallocator/targetallocator-features/00-assert.yaml b/tests/e2e-targetallocator/targetallocator-features/00-assert.yaml index 8c917edfd5..823f435484 100644 --- a/tests/e2e-targetallocator/targetallocator-features/00-assert.yaml +++ b/tests/e2e-targetallocator/targetallocator-features/00-assert.yaml @@ -6,24 +6,24 @@ spec: podManagementPolicy: Parallel template: spec: - containers: - - args: - - --config=/conf/collector.yaml - name: otc-container - volumeMounts: - - mountPath: /conf - name: otc-internal - - mountPath: /usr/share/testvolume - name: testvolume - volumes: - - configMap: - items: - - key: collector.yaml - path: collector.yaml - name: stateful-collector - name: otc-internal - - emptyDir: {} - name: testvolume + containers: + - args: + - --config=/conf/collector.yaml + name: otc-container + volumeMounts: + - mountPath: /conf + name: otc-internal + - mountPath: /usr/share/testvolume + name: testvolume + volumes: + - configMap: + items: + - key: collector.yaml + path: collector.yaml + name: stateful-collector + name: otc-internal + - emptyDir: {} + name: testvolume volumeClaimTemplates: - apiVersion: v1 kind: PersistentVolumeClaim @@ -37,8 +37,8 @@ spec: storage: 1Gi volumeMode: Filesystem status: - replicas: 1 readyReplicas: 1 + replicas: 1 --- apiVersion: apps/v1 kind: Deployment @@ -51,70 +51,64 @@ spec: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - - matchExpressions: - - key: ingress-ready - operator: In - values: - - "true" + - matchExpressions: + - key: ingress-ready + operator: In + values: + - "true" + containers: + - args: + - --enable-prometheus-cr-watcher + env: + - name: TEST_ENV + value: test + - name: OTELCOL_NAMESPACE + valueFrom: + fieldRef: + fieldPath: metadata.namespace + livenessProbe: + failureThreshold: 3 + httpGet: + path: /livez + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + name: ta-container + readinessProbe: + failureThreshold: 3 + httpGet: + path: /readyz + periodSeconds: 10 + successThreshold: 1 + timeoutSeconds: 1 + securityContext: + capabilities: + add: + - NET_BIND_SERVICE + drop: + - ALL + privileged: false + runAsGroup: 1000 + runAsUser: 1000 + volumeMounts: + - mountPath: /conf + name: ta-internal securityContext: - runAsUser: 1000 - runAsGroup: 3000 fsGroup: 3000 - containers: - - name: ta-container - args: - - --enable-prometheus-cr-watcher - env: - - name: TEST_ENV - value: "test" - - name: OTELCOL_NAMESPACE - valueFrom: - fieldRef: - fieldPath: metadata.namespace - volumeMounts: - - mountPath: /conf - name: ta-internal - readinessProbe: - httpGet: - path: /readyz - successThreshold: 1 - failureThreshold: 3 - timeoutSeconds: 1 - periodSeconds: 10 - securityContext: - runAsUser: 1000 - runAsGroup: 1000 - privileged: false - capabilities: - add: - - NET_BIND_SERVICE - drop: - - ALL - livenessProbe: - httpGet: - path: /livez - successThreshold: 1 - failureThreshold: 3 - timeoutSeconds: 1 - periodSeconds: 10 + runAsGroup: 3000 + runAsUser: 1000 volumes: - - configMap: - items: - - key: targetallocator.yaml - path: targetallocator.yaml - name: stateful-targetallocator - name: ta-internal + - configMap: + items: + - key: targetallocator.yaml + path: targetallocator.yaml + name: stateful-targetallocator + name: ta-internal status: - replicas: 1 readyReplicas: 1 + replicas: 1 --- apiVersion: v1 kind: ConfigMap metadata: name: stateful-targetallocator ---- -# Print TA pod logs if test fails -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -collectors: - - selector: app.kubernetes.io/component=opentelemetry-targetallocator diff --git a/tests/e2e-targetallocator/targetallocator-features/00-install.yaml b/tests/e2e-targetallocator/targetallocator-features/00-install.yaml index 735a23f8a0..d57bf7c1b7 100644 --- a/tests/e2e-targetallocator/targetallocator-features/00-install.yaml +++ b/tests/e2e-targetallocator/targetallocator-features/00-install.yaml @@ -1,112 +1,89 @@ apiVersion: v1 +automountServiceAccountToken: true kind: ServiceAccount metadata: name: ta -automountServiceAccountToken: true --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: targetallocator-features rules: -- apiGroups: [""] - resources: [ "pods", "namespaces" ] - verbs: [ "get", "list", "watch"] -- apiGroups: ["monitoring.coreos.com"] - resources: ["servicemonitors"] - verbs: ["get", "list", "watch"] ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - - command: kubectl -n $NAMESPACE create clusterrolebinding default-view-$NAMESPACE --clusterrole=targetallocator-features --serviceaccount=$NAMESPACE:ta - # Annotate the namespace to allow the application to run using an specific group and user in OpenShift - # https://docs.openshift.com/dedicated/authentication/managing-security-context-constraints.html - # This annotation has no effect in Kubernetes - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.uid-range=1000/1000 --overwrite - - command: kubectl annotate namespace ${NAMESPACE} openshift.io/sa.scc.supplemental-groups=3000/1000 --overwrite +- apiGroups: + - "" + resources: + - pods + - namespaces + verbs: + - get + - list + - watch +- apiGroups: + - monitoring.coreos.com + resources: + - servicemonitors + verbs: + - get + - list + - watch --- apiVersion: opentelemetry.io/v1alpha1 kind: OpenTelemetryCollector metadata: name: stateful spec: + config: "receivers:\n jaeger:\n protocols:\n grpc:\n\n # Collect own + metrics\n prometheus:\n config:\n scrape_configs:\n - job_name: + 'otel-collector'\n scrape_interval: 10s\n static_configs:\n - + targets: [ '0.0.0.0:8888' ]\n relabel_configs:\n - regex: __meta_kubernetes_node_label_(.+)\n + \ action: labelmap\n replacement: $$1\n - regex: test_.*\n + \ action: labeldrop \n - regex: 'metrica_*|metricb.*'\n action: + labelkeep\n replacement: $$1\n\nprocessors:\n\nexporters:\n debug:\nservice:\n + \ pipelines:\n traces:\n receivers: [jaeger]\n processors: []\n exporters: + [debug]\n" mode: statefulset - volumes: - - name: testvolume - volumeMounts: - - name: testvolume - mountPath: /usr/share/testvolume - volumeClaimTemplates: - - metadata: - name: testvolume - spec: - accessModes: [ "ReadWriteOnce" ] - resources: - requests: - storage: 1Gi targetAllocator: + affinity: + nodeAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + nodeSelectorTerms: + - matchExpressions: + - key: ingress-ready + operator: In + values: + - "true" enabled: true - serviceAccount: ta - securityContext: + env: + - name: TEST_ENV + value: test + podSecurityContext: + fsGroup: 3000 + runAsGroup: 3000 runAsUser: 1000 - runAsGroup: 1000 - privileged: false + prometheusCR: + enabled: true + filterStrategy: "" + securityContext: capabilities: add: - NET_BIND_SERVICE drop: - ALL - podSecurityContext: + privileged: false + runAsGroup: 1000 runAsUser: 1000 - runAsGroup: 3000 - fsGroup: 3000 - affinity: - nodeAffinity: - requiredDuringSchedulingIgnoredDuringExecution: - nodeSelectorTerms: - - matchExpressions: - - key: ingress-ready - operator: In - values: - - "true" - prometheusCR: - enabled: true - filterStrategy: "" - env: - - name: TEST_ENV - value: "test" - config: | - receivers: - jaeger: - protocols: - grpc: - - # Collect own metrics - prometheus: - config: - scrape_configs: - - job_name: 'otel-collector' - scrape_interval: 10s - static_configs: - - targets: [ '0.0.0.0:8888' ] - relabel_configs: - - regex: __meta_kubernetes_node_label_(.+) - action: labelmap - replacement: $$1 - - regex: test_.* - action: labeldrop - - regex: 'metrica_*|metricb.*' - action: labelkeep - replacement: $$1 - - processors: - - exporters: - debug: - service: - pipelines: - traces: - receivers: [jaeger] - processors: [] - exporters: [debug] + serviceAccount: ta + volumeClaimTemplates: + - metadata: + name: testvolume + spec: + accessModes: + - ReadWriteOnce + resources: + requests: + storage: 1Gi + volumeMounts: + - mountPath: /usr/share/testvolume + name: testvolume + volumes: + - name: testvolume diff --git a/tests/e2e-targetallocator/targetallocator-features/01-assert.yaml b/tests/e2e-targetallocator/targetallocator-features/01-assert.yaml index 7e1a837f98..5e87569820 100644 --- a/tests/e2e-targetallocator/targetallocator-features/01-assert.yaml +++ b/tests/e2e-targetallocator/targetallocator-features/01-assert.yaml @@ -1,8 +1,3 @@ -# waiting for liveness probe to work -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -timeout: 5 ---- apiVersion: v1 kind: Pod metadata: @@ -10,5 +5,5 @@ metadata: app.kubernetes.io/component: opentelemetry-targetallocator status: containerStatuses: - - name: ta-container - restartCount: 0 + - name: ta-container + restartCount: 0 diff --git a/tests/e2e-targetallocator/targetallocator-features/01-liveness.yaml b/tests/e2e-targetallocator/targetallocator-features/01-liveness.yaml deleted file mode 100644 index db15c603f3..0000000000 --- a/tests/e2e-targetallocator/targetallocator-features/01-liveness.yaml +++ /dev/null @@ -1,5 +0,0 @@ -# waiting for liveness probe to work -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: -- command: sleep 35 diff --git a/tests/e2e-targetallocator/targetallocator-features/chainsaw-test.yaml b/tests/e2e-targetallocator/targetallocator-features/chainsaw-test.yaml new file mode 100755 index 0000000000..1d1fc397c4 --- /dev/null +++ b/tests/e2e-targetallocator/targetallocator-features/chainsaw-test.yaml @@ -0,0 +1,49 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: targetallocator-features +spec: + steps: + - catch: + - podLogs: + selector: app.kubernetes.io/component=opentelemetry-targetallocator + name: step-00 + try: + - command: + args: + - -n + - $NAMESPACE + - create + - clusterrolebinding + - default-view-$NAMESPACE + - --clusterrole=targetallocator-features + - --serviceaccount=$NAMESPACE:ta + entrypoint: kubectl + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.uid-range=1000/1000 + - --overwrite + entrypoint: kubectl + - command: + args: + - annotate + - namespace + - ${NAMESPACE} + - openshift.io/sa.scc.supplemental-groups=3000/1000 + - --overwrite + entrypoint: kubectl + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml + - name: step-01 + try: + - sleep: + duration: 35s + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-targetallocator/targetallocator-kubernetessd/00-assert.yaml b/tests/e2e-targetallocator/targetallocator-kubernetessd/00-assert.yaml index 3875ffb539..fc3f8623b7 100644 --- a/tests/e2e-targetallocator/targetallocator-kubernetessd/00-assert.yaml +++ b/tests/e2e-targetallocator/targetallocator-kubernetessd/00-assert.yaml @@ -1,18 +1,11 @@ -# This KUTTL assert uses the check-daemonset.sh script to ensure the number of ready pods in a daemonset matches the desired count, retrying until successful or a timeout occurs. The script is needed as the number of Kubernetes cluster nodes can vary and we cannot statically set desiredNumberScheduled and numberReady in the assert for daemonset status. - -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -commands: -- script: ./tests/e2e/smoke-daemonset/check-daemonset.sh ---- apiVersion: apps/v1 kind: Deployment metadata: name: prometheus-kubernetessd-targetallocator status: - replicas: 1 - readyReplicas: 1 observedGeneration: 1 + readyReplicas: 1 + replicas: 1 --- apiVersion: v1 kind: ConfigMap @@ -20,9 +13,6 @@ metadata: name: prometheus-kubernetessd-targetallocator --- apiVersion: v1 -kind: ConfigMap -metadata: - name: prometheus-kubernetessd-collector data: collector.yaml: | exporters: @@ -43,9 +33,6 @@ data: processors: [] receivers: - prometheus ---- -# Print TA pod logs if test fails -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -collectors: - - selector: app.kubernetes.io/managed-by=opentelemetry-operator +kind: ConfigMap +metadata: + name: prometheus-kubernetessd-collector diff --git a/tests/e2e-targetallocator/targetallocator-kubernetessd/00-install.yaml b/tests/e2e-targetallocator/targetallocator-kubernetessd/00-install.yaml index 6b4b2f1c18..fdb195de06 100644 --- a/tests/e2e-targetallocator/targetallocator-kubernetessd/00-install.yaml +++ b/tests/e2e-targetallocator/targetallocator-kubernetessd/00-install.yaml @@ -1,105 +1,102 @@ apiVersion: v1 +automountServiceAccountToken: true kind: ServiceAccount metadata: name: ta -automountServiceAccountToken: true --- apiVersion: v1 +automountServiceAccountToken: true kind: ServiceAccount metadata: name: collector -automountServiceAccountToken: true --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: targetallocator-kubernetessd rules: -- apiGroups: [""] +- apiGroups: + - "" resources: - - pods - - nodes - - services - - endpoints - - configmaps - - secrets - - namespaces + - pods + - nodes + - services + - endpoints + - configmaps + - secrets + - namespaces verbs: - - get - - watch - - list -- apiGroups: ["apps"] + - get + - watch + - list +- apiGroups: + - apps resources: - - statefulsets - - daemonsets - - services - - endpoints + - statefulsets + - daemonsets + - services + - endpoints verbs: - - get - - watch - - list -- apiGroups: ["discovery.k8s.io"] + - get + - watch + - list +- apiGroups: + - discovery.k8s.io resources: - - endpointslices + - endpointslices verbs: - - get - - watch - - list -- apiGroups: ["networking.k8s.io"] + - get + - watch + - list +- apiGroups: + - networking.k8s.io resources: - - ingresses + - ingresses + verbs: + - get + - watch + - list +- nonResourceURLs: + - /metrics verbs: - - get - - watch - - list -- nonResourceURLs: ["/metrics"] - verbs: ["get"] + - get --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: collector-kubernetessd rules: -- apiGroups: [""] +- apiGroups: + - "" resources: - - pods - - nodes - - nodes/metrics - - services - - endpoints + - pods + - nodes + - nodes/metrics + - services + - endpoints verbs: - - get - - watch - - list -- apiGroups: ["networking.k8s.io"] + - get + - watch + - list +- apiGroups: + - networking.k8s.io resources: - - ingresses + - ingresses verbs: - - get - - watch - - list -- nonResourceURLs: ["/metrics", "/metrics/cadvisor"] - verbs: ["get"] ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - - command: kubectl create clusterrolebinding ta-$NAMESPACE --clusterrole=targetallocator-kubernetessd --serviceaccount=$NAMESPACE:ta - - command: kubectl create clusterrolebinding collector-$NAMESPACE --clusterrole=collector-kubernetessd --serviceaccount=$NAMESPACE:collector + - get + - watch + - list +- nonResourceURLs: + - /metrics + - /metrics/cadvisor + verbs: + - get --- apiVersion: opentelemetry.io/v1alpha1 kind: OpenTelemetryCollector metadata: name: prometheus-kubernetessd spec: - mode: daemonset - serviceAccount: collector - targetAllocator: - enabled: true - allocationStrategy: "per-node" - serviceAccount: ta - prometheusCR: - enabled: false config: | receivers: prometheus: @@ -131,3 +128,11 @@ spec: receivers: [prometheus] processors: [] exporters: [prometheus] + mode: daemonset + serviceAccount: collector + targetAllocator: + allocationStrategy: per-node + enabled: true + prometheusCR: + enabled: false + serviceAccount: ta diff --git a/tests/e2e-targetallocator/targetallocator-kubernetessd/chainsaw-test.yaml b/tests/e2e-targetallocator/targetallocator-kubernetessd/chainsaw-test.yaml new file mode 100755 index 0000000000..ef0a954af4 --- /dev/null +++ b/tests/e2e-targetallocator/targetallocator-kubernetessd/chainsaw-test.yaml @@ -0,0 +1,41 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: targetallocator-kubernetessd +spec: + steps: + - catch: + - script: + content: ./tests/e2e/smoke-daemonset/check-daemonset.sh + - podLogs: + selector: app.kubernetes.io/managed-by=opentelemetry-operator + name: step-00 + try: + - command: + args: + - create + - clusterrolebinding + - ta-$NAMESPACE + - --clusterrole=targetallocator-kubernetessd + - --serviceaccount=$NAMESPACE:ta + entrypoint: kubectl + - command: + args: + - create + - clusterrolebinding + - collector-$NAMESPACE + - --clusterrole=collector-kubernetessd + - --serviceaccount=$NAMESPACE:collector + entrypoint: kubectl + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml + - name: step-01 + try: + - apply: + file: 01-install.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-targetallocator/targetallocator-prometheuscr/00-assert.yaml b/tests/e2e-targetallocator/targetallocator-prometheuscr/00-assert.yaml index 98b57419d4..66a10f2f1d 100644 --- a/tests/e2e-targetallocator/targetallocator-prometheuscr/00-assert.yaml +++ b/tests/e2e-targetallocator/targetallocator-prometheuscr/00-assert.yaml @@ -3,17 +3,17 @@ kind: StatefulSet metadata: name: prometheus-cr-collector status: - replicas: 1 readyReplicas: 1 + replicas: 1 --- apiVersion: apps/v1 kind: Deployment metadata: name: prometheus-cr-targetallocator status: - replicas: 1 - readyReplicas: 1 observedGeneration: 1 + readyReplicas: 1 + replicas: 1 --- apiVersion: v1 kind: ConfigMap @@ -21,9 +21,6 @@ metadata: name: prometheus-cr-targetallocator --- apiVersion: v1 -kind: ConfigMap -metadata: - name: prometheus-cr-collector data: collector.yaml: | exporters: @@ -44,9 +41,6 @@ data: processors: [] receivers: - prometheus ---- -# Print TA pod logs if test fails -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -collectors: - - selector: app.kubernetes.io/managed-by=opentelemetry-operator +kind: ConfigMap +metadata: + name: prometheus-cr-collector diff --git a/tests/e2e-targetallocator/targetallocator-prometheuscr/00-install.yaml b/tests/e2e-targetallocator/targetallocator-prometheuscr/00-install.yaml index ea2bc1ed86..0ba6aa6b42 100644 --- a/tests/e2e-targetallocator/targetallocator-prometheuscr/00-install.yaml +++ b/tests/e2e-targetallocator/targetallocator-prometheuscr/00-install.yaml @@ -1,113 +1,111 @@ apiVersion: v1 +automountServiceAccountToken: true kind: ServiceAccount metadata: name: ta -automountServiceAccountToken: true --- apiVersion: v1 +automountServiceAccountToken: true kind: ServiceAccount metadata: name: collector -automountServiceAccountToken: true --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: targetallocator-prometheuscr rules: -- apiGroups: [""] +- apiGroups: + - "" resources: - - pods - - nodes - - services - - endpoints - - configmaps - - secrets - - namespaces + - pods + - nodes + - services + - endpoints + - configmaps + - secrets + - namespaces verbs: - - get - - watch - - list -- apiGroups: ["apps"] + - get + - watch + - list +- apiGroups: + - apps resources: - - statefulsets - - services - - endpoints + - statefulsets + - services + - endpoints verbs: - - get - - watch - - list -- apiGroups: ["discovery.k8s.io"] + - get + - watch + - list +- apiGroups: + - discovery.k8s.io resources: - - endpointslices + - endpointslices verbs: - - get - - watch - - list -- apiGroups: ["networking.k8s.io"] + - get + - watch + - list +- apiGroups: + - networking.k8s.io resources: - - ingresses + - ingresses verbs: - - get - - watch - - list -- apiGroups: ["monitoring.coreos.com"] + - get + - watch + - list +- apiGroups: + - monitoring.coreos.com resources: - - servicemonitors - - podmonitors + - servicemonitors + - podmonitors + verbs: + - get + - watch + - list +- nonResourceURLs: + - /metrics verbs: - - get - - watch - - list -- nonResourceURLs: ["/metrics"] - verbs: ["get"] + - get --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: collector-prometheuscr rules: -- apiGroups: [""] +- apiGroups: + - "" resources: - - pods - - nodes - - nodes/metrics - - services - - endpoints - - namespaces + - pods + - nodes + - nodes/metrics + - services + - endpoints + - namespaces verbs: - - get - - watch - - list -- apiGroups: ["networking.k8s.io"] + - get + - watch + - list +- apiGroups: + - networking.k8s.io resources: - - ingresses + - ingresses verbs: - - get - - watch - - list -- nonResourceURLs: ["/metrics", "/metrics/cadvisor"] - verbs: ["get"] ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - - command: kubectl create clusterrolebinding ta-$NAMESPACE --clusterrole=targetallocator-prometheuscr --serviceaccount=$NAMESPACE:ta - - command: kubectl create clusterrolebinding collector-$NAMESPACE --clusterrole=collector-prometheuscr --serviceaccount=$NAMESPACE:collector + - get + - watch + - list +- nonResourceURLs: + - /metrics + - /metrics/cadvisor + verbs: + - get --- apiVersion: opentelemetry.io/v1alpha1 kind: OpenTelemetryCollector metadata: name: prometheus-cr spec: - mode: statefulset - serviceAccount: collector - targetAllocator: - enabled: true - serviceAccount: ta - scrapeInterval: 1s - prometheusCR: - enabled: true config: | receivers: prometheus: @@ -125,6 +123,14 @@ spec: receivers: [prometheus] processors: [] exporters: [prometheus] + mode: statefulset + serviceAccount: collector + targetAllocator: + enabled: true + prometheusCR: + enabled: true + scrapeInterval: 1s + serviceAccount: ta --- apiVersion: monitoring.coreos.com/v1 kind: ServiceMonitor diff --git a/tests/e2e-targetallocator/targetallocator-prometheuscr/chainsaw-test.yaml b/tests/e2e-targetallocator/targetallocator-prometheuscr/chainsaw-test.yaml new file mode 100755 index 0000000000..8c93661ca2 --- /dev/null +++ b/tests/e2e-targetallocator/targetallocator-prometheuscr/chainsaw-test.yaml @@ -0,0 +1,39 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: targetallocator-prometheuscr +spec: + steps: + - catch: + - podLogs: + selector: app.kubernetes.io/managed-by=opentelemetry-operator + name: step-00 + try: + - command: + args: + - create + - clusterrolebinding + - ta-$NAMESPACE + - --clusterrole=targetallocator-prometheuscr + - --serviceaccount=$NAMESPACE:ta + entrypoint: kubectl + - command: + args: + - create + - clusterrolebinding + - collector-$NAMESPACE + - --clusterrole=collector-prometheuscr + - --serviceaccount=$NAMESPACE:collector + entrypoint: kubectl + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml + - name: step-01 + try: + - apply: + file: 01-install.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e-upgrade/upgrade-test/01-upgrade-operator.yaml b/tests/e2e-upgrade/upgrade-test/01-upgrade-operator.yaml deleted file mode 100644 index 248ffb6a9a..0000000000 --- a/tests/e2e-upgrade/upgrade-test/01-upgrade-operator.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - - script: cd ../../../ && make deploy VERSION=e2e diff --git a/tests/e2e-upgrade/upgrade-test/chainsaw-test.yaml b/tests/e2e-upgrade/upgrade-test/chainsaw-test.yaml new file mode 100755 index 0000000000..ee9ce0d75b --- /dev/null +++ b/tests/e2e-upgrade/upgrade-test/chainsaw-test.yaml @@ -0,0 +1,25 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: upgrade-test +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml + - name: step-01 + try: + - script: + timeout: 5m + content: cd ../../../ && make deploy VERSION=e2e + - name: step-02 + try: + - apply: + file: 02-upgrade-collector.yaml + - assert: + file: 02-assert.yaml diff --git a/tests/e2e/daemonset-features/00-add-scc.yaml b/tests/e2e/daemonset-features/00-add-scc.yaml deleted file mode 100644 index 63d417ea96..0000000000 --- a/tests/e2e/daemonset-features/00-add-scc.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - - script: ./add-scc-openshift.sh diff --git a/tests/e2e/daemonset-features/03-add-sa-collector.yaml b/tests/e2e/daemonset-features/03-add-sa-collector.yaml deleted file mode 100644 index 1da56ca212..0000000000 --- a/tests/e2e/daemonset-features/03-add-sa-collector.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - - script: ./add-sa-collector.sh diff --git a/tests/e2e/daemonset-features/chainsaw-test.yaml b/tests/e2e/daemonset-features/chainsaw-test.yaml new file mode 100755 index 0000000000..10802fc758 --- /dev/null +++ b/tests/e2e/daemonset-features/chainsaw-test.yaml @@ -0,0 +1,26 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: daemonset-features +spec: + steps: + - name: step-00 + try: + - script: + content: ./add-scc-openshift.sh + - name: step-01 + try: + - apply: + file: 01-install.yaml + - name: step-02 + try: + - assert: + file: 02-assert.yaml + - name: step-03 + try: + - script: + content: ./add-sa-collector.sh + - assert: + file: 03-assert.yaml diff --git a/tests/e2e/ingress-subdomains/01-report-empty-otlphttp-spans.yaml b/tests/e2e/ingress-subdomains/01-report-empty-otlphttp-spans.yaml deleted file mode 100644 index b20290f8a7..0000000000 --- a/tests/e2e/ingress-subdomains/01-report-empty-otlphttp-spans.yaml +++ /dev/null @@ -1,8 +0,0 @@ -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - - script: | - #!/bin/bash - set -ex - # Export empty payload and check of collector accepted it with 2xx status code - for i in {1..40}; do curl --fail -ivX POST --resolve 'otlp-http.test.otel:80:127.0.0.1' http://otlp-http.test.otel:80/v1/traces -H "Content-Type: application/json" -d '{}' && break || sleep 1; done diff --git a/tests/e2e/ingress-subdomains/chainsaw-test.yaml b/tests/e2e/ingress-subdomains/chainsaw-test.yaml new file mode 100755 index 0000000000..32b38ccec6 --- /dev/null +++ b/tests/e2e/ingress-subdomains/chainsaw-test.yaml @@ -0,0 +1,22 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: ingress-subdomains +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml + - name: step-01 + try: + - script: + content: | + #!/bin/bash + set -ex + # Export empty payload and check of collector accepted it with 2xx status code + for i in {1..40}; do curl --fail -ivX POST --resolve 'otlp-http.test.otel:80:127.0.0.1' http://otlp-http.test.otel:80/v1/traces -H "Content-Type: application/json" -d '{}' && break || sleep 1; done diff --git a/tests/e2e/ingress/chainsaw-test.yaml b/tests/e2e/ingress/chainsaw-test.yaml new file mode 100755 index 0000000000..72a7fa61e6 --- /dev/null +++ b/tests/e2e/ingress/chainsaw-test.yaml @@ -0,0 +1,14 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: ingress +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml diff --git a/tests/e2e/managed-reconcile/chainsaw-test.yaml b/tests/e2e/managed-reconcile/chainsaw-test.yaml new file mode 100755 index 0000000000..85d09e17c7 --- /dev/null +++ b/tests/e2e/managed-reconcile/chainsaw-test.yaml @@ -0,0 +1,26 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: managed-reconcile +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml + - name: step-01 + try: + - apply: + file: 01-disable-reconciliation.yaml + - assert: + file: 01-assert.yaml + - name: step-02 + try: + - apply: + file: 02-enable-reconciliation.yaml + - assert: + file: 02-assert.yaml diff --git a/tests/e2e/multiple-configmaps/chainsaw-test.yaml b/tests/e2e/multiple-configmaps/chainsaw-test.yaml new file mode 100755 index 0000000000..889c80424b --- /dev/null +++ b/tests/e2e/multiple-configmaps/chainsaw-test.yaml @@ -0,0 +1,14 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: multiple-configmaps +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml diff --git a/tests/e2e/prometheus-config-validation/00-assert.yaml b/tests/e2e/prometheus-config-validation/00-assert.yaml index 3f4f177968..db1ec4004a 100644 --- a/tests/e2e/prometheus-config-validation/00-assert.yaml +++ b/tests/e2e/prometheus-config-validation/00-assert.yaml @@ -3,23 +3,13 @@ kind: StatefulSet metadata: name: promreceiver-allocatorconfig-collector status: - replicas: 1 readyReplicas: 1 + replicas: 1 --- apiVersion: apps/v1 kind: Deployment metadata: name: promreceiver-allocatorconfig-targetallocator status: - replicas: 1 readyReplicas: 1 ---- -# Print TA and operator logs if test fails -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -collectors: - - selector: app.kubernetes.io/component=opentelemetry-targetallocator - - selector: app.kubernetes.io/component=opentelemetry-collector - - selector: app.kubernetes.io/name=opentelemetry-operator - namespace: opentelemetry-operator-system - container: manager + replicas: 1 diff --git a/tests/e2e/prometheus-config-validation/00-promreceiver-allocatorconfig.yaml b/tests/e2e/prometheus-config-validation/00-promreceiver-allocatorconfig.yaml index c57c26f167..5b07314ad5 100644 --- a/tests/e2e/prometheus-config-validation/00-promreceiver-allocatorconfig.yaml +++ b/tests/e2e/prometheus-config-validation/00-promreceiver-allocatorconfig.yaml @@ -1,33 +1,29 @@ apiVersion: v1 +automountServiceAccountToken: true kind: ServiceAccount metadata: name: ta -automountServiceAccountToken: true --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: promreceiver-allocatorconfig rules: -- apiGroups: [""] - resources: [ "pods", "namespaces" ] - verbs: [ "get", "list", "watch"] ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - - command: kubectl -n $NAMESPACE create clusterrolebinding default-view-$NAMESPACE --clusterrole=promreceiver-allocatorconfig --serviceaccount=$NAMESPACE:ta +- apiGroups: + - "" + resources: + - pods + - namespaces + verbs: + - get + - list + - watch --- apiVersion: opentelemetry.io/v1alpha1 kind: OpenTelemetryCollector metadata: name: promreceiver-allocatorconfig spec: - mode: statefulset - targetAllocator: - enabled: true - serviceAccount: ta - config: | receivers: jaeger: @@ -64,3 +60,7 @@ spec: receivers: [jaeger] processors: [] exporters: [debug] + mode: statefulset + targetAllocator: + enabled: true + serviceAccount: ta diff --git a/tests/e2e/prometheus-config-validation/02-assert.yaml b/tests/e2e/prometheus-config-validation/02-assert.yaml index 33727878de..c60931bb18 100644 --- a/tests/e2e/prometheus-config-validation/02-assert.yaml +++ b/tests/e2e/prometheus-config-validation/02-assert.yaml @@ -3,23 +3,13 @@ kind: StatefulSet metadata: name: promreceiver-allocatorconfig-extra-collector status: - replicas: 1 readyReplicas: 1 + replicas: 1 --- apiVersion: apps/v1 kind: Deployment metadata: name: promreceiver-allocatorconfig-extra-targetallocator status: - replicas: 1 readyReplicas: 1 ---- -# Print TA and operator logs if test fails -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -collectors: - - selector: app.kubernetes.io/component=opentelemetry-targetallocator - - selector: app.kubernetes.io/component=opentelemetry-collector - - selector: app.kubernetes.io/name=opentelemetry-operator - namespace: opentelemetry-operator-system - container: manager + replicas: 1 diff --git a/tests/e2e/prometheus-config-validation/03-assert.yaml b/tests/e2e/prometheus-config-validation/03-assert.yaml index b9c6d5d5eb..7edc6dd893 100644 --- a/tests/e2e/prometheus-config-validation/03-assert.yaml +++ b/tests/e2e/prometheus-config-validation/03-assert.yaml @@ -3,23 +3,13 @@ kind: StatefulSet metadata: name: promreceiver-nopromconfig-collector status: - replicas: 1 readyReplicas: 1 + replicas: 1 --- apiVersion: apps/v1 kind: Deployment metadata: name: promreceiver-nopromconfig-targetallocator status: - replicas: 1 readyReplicas: 1 ---- -# Print TA and operator logs if test fails -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -collectors: - - selector: app.kubernetes.io/component=opentelemetry-targetallocator - - selector: app.kubernetes.io/component=opentelemetry-collector - - selector: app.kubernetes.io/name=opentelemetry-operator - namespace: opentelemetry-operator-system - container: manager + replicas: 1 diff --git a/tests/e2e/prometheus-config-validation/chainsaw-test.yaml b/tests/e2e/prometheus-config-validation/chainsaw-test.yaml new file mode 100755 index 0000000000..72b50ea243 --- /dev/null +++ b/tests/e2e/prometheus-config-validation/chainsaw-test.yaml @@ -0,0 +1,54 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: prometheus-config-validation +spec: + steps: + - name: step-00 + try: + - script: + content: | + kubectl -n $NAMESPACE \ + create clusterrolebinding default-view-$NAMESPACE \ + --clusterrole=promreceiver-allocatorconfig \ + --serviceaccount=$NAMESPACE:ta + - apply: + file: 00-promreceiver-allocatorconfig.yaml + - assert: + file: 00-assert.yaml + - name: step-01 + try: + - apply: + file: 01-promreceiver-labeldrop.yaml + - catch: + - podLogs: + selector: app.kubernetes.io/component=opentelemetry-targetallocator + - podLogs: + selector: app.kubernetes.io/component=opentelemetry-collector + - podLogs: + container: manager + namespace: opentelemetry-operator-system + selector: app.kubernetes.io/name=opentelemetry-operator + name: step-02 + try: + - apply: + file: 02-promreceiver-allocatorconfig-extra.yaml + - assert: + file: 02-assert.yaml + - catch: + - podLogs: + selector: app.kubernetes.io/component=opentelemetry-targetallocator + - podLogs: + selector: app.kubernetes.io/component=opentelemetry-collector + - podLogs: + container: manager + namespace: opentelemetry-operator-system + selector: app.kubernetes.io/name=opentelemetry-operator + name: step-03 + try: + - apply: + file: 03-promreceiver-nopromconfig.yaml + - assert: + file: 03-assert.yaml diff --git a/tests/e2e/smoke-daemonset/00-assert.yaml b/tests/e2e/smoke-daemonset/00-assert.yaml index 7dff619578..e38cf19ee9 100644 --- a/tests/e2e/smoke-daemonset/00-assert.yaml +++ b/tests/e2e/smoke-daemonset/00-assert.yaml @@ -4,17 +4,9 @@ metadata: name: daemonset-test-collector spec: updateStrategy: - type: RollingUpdate rollingUpdate: maxSurge: 0 maxUnavailable: 1 + type: RollingUpdate status: numberMisscheduled: 0 - ---- -# This KUTTL assert uses the check-daemonset.sh script to ensure the number of ready pods in a daemonset matches the desired count, retrying until successful or a timeout occurs. The script is needed as the number of Kubernetes cluster nodes can vary and we cannot statically set desiredNumberScheduled and numberReady in the assert for daemonset status. - -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -commands: -- script: ./tests/e2e/smoke-daemonset/check-daemonset.sh diff --git a/tests/e2e/smoke-daemonset/chainsaw-test.yaml b/tests/e2e/smoke-daemonset/chainsaw-test.yaml new file mode 100755 index 0000000000..2a01a5fb5e --- /dev/null +++ b/tests/e2e/smoke-daemonset/chainsaw-test.yaml @@ -0,0 +1,17 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: smoke-daemonset +spec: + steps: + - catch: + - script: + content: ./tests/e2e/smoke-daemonset/check-daemonset.sh + name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml diff --git a/tests/e2e/smoke-init-containers/chainsaw-test.yaml b/tests/e2e/smoke-init-containers/chainsaw-test.yaml new file mode 100755 index 0000000000..1bd1eecc0b --- /dev/null +++ b/tests/e2e/smoke-init-containers/chainsaw-test.yaml @@ -0,0 +1,14 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: smoke-init-containers +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml diff --git a/tests/e2e/smoke-pod-annotations/chainsaw-test.yaml b/tests/e2e/smoke-pod-annotations/chainsaw-test.yaml new file mode 100755 index 0000000000..671d28ace3 --- /dev/null +++ b/tests/e2e/smoke-pod-annotations/chainsaw-test.yaml @@ -0,0 +1,14 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: smoke-pod-annotations +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml diff --git a/tests/e2e/smoke-pod-labels/chainsaw-test.yaml b/tests/e2e/smoke-pod-labels/chainsaw-test.yaml new file mode 100755 index 0000000000..6f57a92dc5 --- /dev/null +++ b/tests/e2e/smoke-pod-labels/chainsaw-test.yaml @@ -0,0 +1,14 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: smoke-pod-labels +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml diff --git a/tests/e2e/smoke-restarting-deployment/chainsaw-test.yaml b/tests/e2e/smoke-restarting-deployment/chainsaw-test.yaml new file mode 100755 index 0000000000..c1a05a4e71 --- /dev/null +++ b/tests/e2e/smoke-restarting-deployment/chainsaw-test.yaml @@ -0,0 +1,22 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: smoke-restarting-deployment +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml + - error: + file: 00-errors.yaml + - name: step-01 + try: + - apply: + file: 01-assert-second-config.yaml + - apply: + file: 01-install-second-config.yaml diff --git a/tests/e2e/smoke-shareprocessnamespace/chainsaw-test.yaml b/tests/e2e/smoke-shareprocessnamespace/chainsaw-test.yaml new file mode 100755 index 0000000000..a1097bfac4 --- /dev/null +++ b/tests/e2e/smoke-shareprocessnamespace/chainsaw-test.yaml @@ -0,0 +1,14 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: smoke-shareprocessnamespace +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml diff --git a/tests/e2e/smoke-sidecar-other-namespace/chainsaw-test.yaml b/tests/e2e/smoke-sidecar-other-namespace/chainsaw-test.yaml new file mode 100755 index 0000000000..3003608d9e --- /dev/null +++ b/tests/e2e/smoke-sidecar-other-namespace/chainsaw-test.yaml @@ -0,0 +1,18 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: smoke-sidecar-other-namespace +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e/smoke-sidecar/chainsaw-test.yaml b/tests/e2e/smoke-sidecar/chainsaw-test.yaml new file mode 100755 index 0000000000..654385eef6 --- /dev/null +++ b/tests/e2e/smoke-sidecar/chainsaw-test.yaml @@ -0,0 +1,18 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: smoke-sidecar +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - name: step-01 + try: + - apply: + file: 01-install-app.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e/smoke-simplest/chainsaw-test.yaml b/tests/e2e/smoke-simplest/chainsaw-test.yaml new file mode 100755 index 0000000000..988d0cd7e3 --- /dev/null +++ b/tests/e2e/smoke-simplest/chainsaw-test.yaml @@ -0,0 +1,14 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: smoke-simplest +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml diff --git a/tests/e2e/smoke-statefulset/chainsaw-test.yaml b/tests/e2e/smoke-statefulset/chainsaw-test.yaml new file mode 100755 index 0000000000..79ae83450d --- /dev/null +++ b/tests/e2e/smoke-statefulset/chainsaw-test.yaml @@ -0,0 +1,14 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: smoke-statefulset +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml diff --git a/tests/e2e/smoke-targetallocator/00-assert.yaml b/tests/e2e/smoke-targetallocator/00-assert.yaml index 12d69b49ea..35a1d6356f 100644 --- a/tests/e2e/smoke-targetallocator/00-assert.yaml +++ b/tests/e2e/smoke-targetallocator/00-assert.yaml @@ -3,17 +3,17 @@ kind: StatefulSet metadata: name: stateful-collector status: - replicas: 1 readyReplicas: 1 + replicas: 1 --- apiVersion: apps/v1 kind: Deployment metadata: name: stateful-targetallocator status: - replicas: 1 - readyReplicas: 1 observedGeneration: 1 + readyReplicas: 1 + replicas: 1 --- apiVersion: v1 kind: ConfigMap @@ -21,9 +21,6 @@ metadata: name: stateful-targetallocator --- apiVersion: v1 -kind: ConfigMap -metadata: - name: stateful-collector data: collector.yaml: | exporters: @@ -46,9 +43,6 @@ data: processors: [] receivers: - jaeger ---- -# Print TA pod logs if test fails -apiVersion: kuttl.dev/v1beta1 -kind: TestAssert -collectors: - - selector: app.kubernetes.io/component=opentelemetry-targetallocator +kind: ConfigMap +metadata: + name: stateful-collector diff --git a/tests/e2e/smoke-targetallocator/00-install.yaml b/tests/e2e/smoke-targetallocator/00-install.yaml index 1e87777118..880bcb1118 100644 --- a/tests/e2e/smoke-targetallocator/00-install.yaml +++ b/tests/e2e/smoke-targetallocator/00-install.yaml @@ -1,32 +1,29 @@ apiVersion: v1 +automountServiceAccountToken: true kind: ServiceAccount metadata: name: ta -automountServiceAccountToken: true --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: smoke-targetallocator rules: -- apiGroups: [""] - resources: [ "pods", "namespaces" ] - verbs: [ "get", "list", "watch"] ---- -apiVersion: kuttl.dev/v1beta1 -kind: TestStep -commands: - - command: kubectl -n $NAMESPACE create clusterrolebinding default-view-$NAMESPACE --clusterrole=smoke-targetallocator --serviceaccount=$NAMESPACE:ta +- apiGroups: + - "" + resources: + - pods + - namespaces + verbs: + - get + - list + - watch --- apiVersion: opentelemetry.io/v1alpha1 kind: OpenTelemetryCollector metadata: name: stateful spec: - mode: statefulset - targetAllocator: - enabled: true - serviceAccount: ta config: | receivers: jaeger: @@ -52,3 +49,7 @@ spec: receivers: [jaeger] processors: [] exporters: [debug] + mode: statefulset + targetAllocator: + enabled: true + serviceAccount: ta diff --git a/tests/e2e/smoke-targetallocator/chainsaw-test.yaml b/tests/e2e/smoke-targetallocator/chainsaw-test.yaml new file mode 100755 index 0000000000..a4aa2006de --- /dev/null +++ b/tests/e2e/smoke-targetallocator/chainsaw-test.yaml @@ -0,0 +1,33 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: smoke-targetallocator +spec: + steps: + - catch: + - podLogs: + selector: app.kubernetes.io/component=opentelemetry-targetallocator + name: step-00 + try: + - command: + args: + - -n + - $NAMESPACE + - create + - clusterrolebinding + - default-view-$NAMESPACE + - --clusterrole=smoke-targetallocator + - --serviceaccount=$NAMESPACE:ta + entrypoint: kubectl + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml + - name: step-01 + try: + - apply: + file: 01-change-ta-config.yaml + - assert: + file: 01-assert.yaml diff --git a/tests/e2e/statefulset-features/chainsaw-test.yaml b/tests/e2e/statefulset-features/chainsaw-test.yaml new file mode 100755 index 0000000000..c73d8ae7d2 --- /dev/null +++ b/tests/e2e/statefulset-features/chainsaw-test.yaml @@ -0,0 +1,20 @@ +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json +apiVersion: chainsaw.kyverno.io/v1alpha1 +kind: Test +metadata: + creationTimestamp: null + name: statefulset-features +spec: + steps: + - name: step-00 + try: + - apply: + file: 00-install.yaml + - assert: + file: 00-assert.yaml + - name: step-01 + try: + - apply: + file: 01-update-volume-claim-templates.yaml + - assert: + file: 01-assert.yaml