Skip to content

Commit 1be9ab0

Browse files
committed
Update tests to use policy apiVersion v1
1 parent 29fcfb2 commit 1be9ab0

15 files changed

+25
-25
lines changed

tests/data/access-control/policies/access-control-policy-allow.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
apiVersion: k8s.nginx.org/v1alpha1
1+
apiVersion: k8s.nginx.org/v1
22
kind: Policy
33
metadata:
44
name: allow-policy

tests/data/access-control/policies/access-control-policy-deny.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
apiVersion: k8s.nginx.org/v1alpha1
1+
apiVersion: k8s.nginx.org/v1
22
kind: Policy
33
metadata:
44
name: deny-policy

tests/data/access-control/policies/access-control-policy-invalid.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
apiVersion: k8s.nginx.org/v1alpha1
1+
apiVersion: k8s.nginx.org/v1
22
kind: Policy
33
metadata:
44
name: invalid-policy

tests/data/jwt-policy/policies/jwt-policy-invalid-secret.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
apiVersion: k8s.nginx.org/v1alpha1
1+
apiVersion: k8s.nginx.org/v1
22
kind: Policy
33
metadata:
44
name: jwt-policy-invalid-secret

tests/data/jwt-policy/policies/jwt-policy-invalid.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
apiVersion: k8s.nginx.org/v1alpha1
1+
apiVersion: k8s.nginx.org/v1
22
kind: Policy
33
metadata:
44
name: jwt-policy-invalid

tests/data/jwt-policy/policies/jwt-policy-valid-multi.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
apiVersion: k8s.nginx.org/v1alpha1
1+
apiVersion: k8s.nginx.org/v1
22
kind: Policy
33
metadata:
44
name: jwt-policy-valid-multi

tests/data/jwt-policy/policies/jwt-policy-valid.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
apiVersion: k8s.nginx.org/v1alpha1
1+
apiVersion: k8s.nginx.org/v1
22
kind: Policy
33
metadata:
44
name: jwt-policy-valid

tests/data/rate-limit/policies/rate-limit-invalid.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
apiVersion: k8s.nginx.org/v1alpha1
1+
apiVersion: k8s.nginx.org/v1
22
kind: Policy
33
metadata:
44
name: rate-limit-invalid

tests/data/rate-limit/policies/rate-limit-primary.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
apiVersion: k8s.nginx.org/v1alpha1
1+
apiVersion: k8s.nginx.org/v1
22
kind: Policy
33
metadata:
44
name: rate-limit-primary

tests/data/rate-limit/policies/rate-limit-secondary.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
apiVersion: k8s.nginx.org/v1alpha1
1+
apiVersion: k8s.nginx.org/v1
22
kind: Policy
33
metadata:
44
name: rate-limit-secondary

tests/suite/custom_resources_utils.py

+9-9
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ def read_crd(custom_objects: CustomObjectsApi, namespace, plural, name) -> objec
8383
return response
8484

8585
except ApiException:
86-
logging.exception(f"Exception occured while getting reading CRD")
86+
logging.exception(f"Exception occurred while reading CRD")
8787
raise
8888

8989

@@ -104,7 +104,7 @@ def read_ap_crd(custom_objects: CustomObjectsApi, namespace, plural, name) -> ob
104104
return response
105105

106106
except ApiException:
107-
logging.exception(f"Exception occured while getting reading CRD")
107+
logging.exception(f"Exception occurred while reading CRD")
108108
raise
109109

110110

@@ -122,12 +122,12 @@ def create_policy_from_yaml(custom_objects: CustomObjectsApi, yaml_manifest, nam
122122
dep = yaml.safe_load(f)
123123
try:
124124
custom_objects.create_namespaced_custom_object(
125-
"k8s.nginx.org", "v1alpha1", namespace, "policies", dep
125+
"k8s.nginx.org", "v1", namespace, "policies", dep
126126
)
127127
print(f"Policy created with name '{dep['metadata']['name']}'")
128128
return dep["metadata"]["name"]
129129
except ApiException:
130-
logging.exception(f"Exception occured while creating Policy: {dep['metadata']['name']}")
130+
logging.exception(f"Exception occurred while creating Policy: {dep['metadata']['name']}")
131131
raise
132132

133133

@@ -144,12 +144,12 @@ def delete_policy(custom_objects: CustomObjectsApi, name, namespace) -> None:
144144
delete_options = client.V1DeleteOptions()
145145

146146
custom_objects.delete_namespaced_custom_object(
147-
"k8s.nginx.org", "v1alpha1", namespace, "policies", name, delete_options
147+
"k8s.nginx.org", "v1", namespace, "policies", name, delete_options
148148
)
149149
ensure_item_removal(
150150
custom_objects.get_namespaced_custom_object,
151151
"k8s.nginx.org",
152-
"v1alpha1",
152+
"v1",
153153
namespace,
154154
"policies",
155155
name,
@@ -169,13 +169,13 @@ def read_policy(custom_objects: CustomObjectsApi, namespace, name) -> object:
169169
print(f"Getting info for policy {name} in namespace {namespace}")
170170
try:
171171
response = custom_objects.get_namespaced_custom_object(
172-
"k8s.nginx.org", "v1alpha1", namespace, "policies", name
172+
"k8s.nginx.org", "v1", namespace, "policies", name
173173
)
174174
pprint(response)
175175
return response
176176

177177
except ApiException:
178-
logging.exception(f"Exception occured while getting reading Policy")
178+
logging.exception(f"Exception occurred while reading Policy")
179179
raise
180180

181181

@@ -201,7 +201,7 @@ def create_virtual_server_from_yaml(
201201
return dep["metadata"]["name"]
202202
except ApiException as ex:
203203
logging.exception(
204-
f"Exception: {ex} occured while creating VirtualServer: {dep['metadata']['name']}"
204+
f"Exception: {ex} occurred while creating VirtualServer: {dep['metadata']['name']}"
205205
)
206206
raise
207207

tests/suite/test_jwt_policies.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@
5252
(
5353
{
5454
"type": "complete",
55-
"extra_args": [f"-enable-custom-resources", f"-enable-leader-election=false"],
55+
"extra_args": [f"-enable-custom-resources", f"-enable-preview-policies", f"-enable-leader-election=false"],
5656
},
5757
{"example": "virtual-server", "app_type": "simple",},
5858
)

tests/suite/test_jwt_policies_vsr.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@
5959
(
6060
{
6161
"type": "complete",
62-
"extra_args": [f"-enable-custom-resources", f"-enable-leader-election=false"],
62+
"extra_args": [f"-enable-custom-resources", f"-enable-preview-policies", f"-enable-leader-election=false"],
6363
},
6464
{"example": "virtual-server-route"},
6565
)

tests/suite/test_rl_policies.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -33,14 +33,14 @@
3333
(
3434
{
3535
"type": "complete",
36-
"extra_args": [f"-enable-custom-resources", f"-enable-leader-election=false"],
36+
"extra_args": [f"-enable-custom-resources", f"-enable-preview-policies", f"-enable-leader-election=false"],
3737
},
3838
{"example": "rate-limit", "app_type": "simple",},
3939
)
4040
],
4141
indirect=True,
4242
)
43-
class TestRateLimitingPolcies:
43+
class TestRateLimitingPolicies:
4444
def restore_default_vs(self, kube_apis, virtual_server_setup) -> None:
4545
"""
4646
Restore VirtualServer without policy spec

tests/suite/test_rl_policies_vsr.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -40,14 +40,14 @@
4040
(
4141
{
4242
"type": "complete",
43-
"extra_args": [f"-enable-custom-resources", f"-enable-leader-election=false"],
43+
"extra_args": [f"-enable-custom-resources", f"-enable-preview-policies", f"-enable-leader-election=false"],
4444
},
4545
{"example": "virtual-server-route"},
4646
)
4747
],
4848
indirect=True,
4949
)
50-
class TestRateLimitingPolciesVsr:
50+
class TestRateLimitingPoliciesVsr:
5151
def restore_default_vsr(self, kube_apis, v_s_route_setup) -> None:
5252
"""
5353
Function to revert vsr deployments to valid state

0 commit comments

Comments
 (0)