@@ -47,68 +47,6 @@ def create_connected_cluster(self, resource_group):
4747 "resource_uri" : connected_cluster_resource_uri ,
4848 })
4949
50- @live_only ()
51- @ResourceGroupPreparer (name_prefix = 'k8srttest' , random_name_length = 16 )
52- def test_storage_class_enable_disable (self , resource_group ):
53- self .create_connected_cluster (resource_group )
54-
55- enable_result = self .cmd ("az k8s-runtime storage-class enable --resource-uri {resource_uri}" , checks = [
56- self .check ("extension.name" , sc .STORAGE_CLASS_EXTENSION_NAME ),
57- self .check ("extension.extensionType" , sc .STORAGE_CLASS_EXTENSION_TYPE ),
58- self .check ("extension.provisioningState" , "Succeeded" ),
59- self .check ("extension.identity.type" , "SystemAssigned" ),
60- ]).get_output_in_json ()
61-
62- assert enable_result ["extension" ]["identity" ]["principalId" ] == enable_result ["storage_class_contributor_role_assignment" ]["principalId" ]
63-
64- k8s_ext_contrib_role_assignment = enable_result ["kubernetes_extension_contributor_role_assignment" ]
65-
66- assert k8s_ext_contrib_role_assignment ["id" ].startswith (self .kwargs ["resource_uri" ] + "/providers/Microsoft.Authorization/roleAssignments/" )
67- assert k8s_ext_contrib_role_assignment ["roleDefinitionId" ].endswith (sc .KUBERNETES_EXTENSION_CONTRIBUTOR_ROLE_ID )
68- assert k8s_ext_contrib_role_assignment ["principalId" ] == sc .KUBERNETES_RUNTIME_FPA_APP_ID
69-
70- self .cmd ("az k8s-runtime storage-class disable --resource-uri {resource_uri}" , checks = [
71- self .check ("extension.id" , enable_result ["extension" ]["id" ]),
72- self .check ("storage_class_contributor_role_assignment.id" ,
73- enable_result ["storage_class_contributor_role_assignment" ]["id" ]),
74- self .check ("kubernetes_extension_contributor_role_assignment.id" ,
75- enable_result ["kubernetes_extension_contributor_role_assignment" ]["id" ]),
76- ])
77-
78- os .remove (self .kwargs ["kubeconfig" ])
79-
80- def test_storage_class_enable_disable_only_connected_cluster (self ):
81- self .kwargs ["resource_uri" ] = "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/rg/providers/Microsoft.Kubernetes/managedClusters/cluster"
82-
83- self .cmd ("az k8s-runtime storage-class enable --resource-uri {resource_uri}" , expect_failure = True )
84- self .cmd ("az k8s-runtime storage-class disable --resource-uri {resource_uri}" , expect_failure = True )
85-
86- @live_only ()
87- @ResourceGroupPreparer (name_prefix = 'k8srttest' , random_name_length = 16 )
88- def test_storage_class_delete_storage_class (self , resource_group ):
89- self .create_connected_cluster (resource_group )
90-
91- self .cmd ("az k8s-runtime storage-class enable --resource-uri {resource_uri}" , checks = [
92- self .check ("extension.provisioningState" , "Succeeded" ),
93- ])
94-
95- test_sc = "rwx-test"
96- self .kwargs .update ({"test_sc" : test_sc })
97-
98- # The default storage classes of AKS cannot be deleted.
99- # Has to create a new one and delete it.
100- self .cmd ("az k8s-runtime storage-class create --resource-uri {resource_uri} --storage-class-name {test_sc} --type-properties rwx.backing-storage-class-name=managed" )
101-
102- self .cmd ("az k8s-runtime storage-class delete --yes --resource-uri {resource_uri} --storage-class-name {test_sc}" )
103-
104- self .failIf (
105- subprocess .call (f"kubectl get storageclass { test_sc } --kubeconfig { self .kwargs .get ('kubeconfig' )} " ) == 0 ,
106- "Storage class {test_sc} is not deleted in the AKS cluster"
107- )
108- self .cmd ("az k8s-runtime storage-class show --resource-uri {resource_uri} --storage-class-name {test_sc}" , expect_failure = True )
109-
110- os .remove (self .kwargs ["kubeconfig" ])
111-
11250 @live_only ()
11351 @ResourceGroupPreparer (name_prefix = 'k8srttest' , random_name_length = 16 )
11452 def test_load_balancer_enable_disable (self , resource_group ):
0 commit comments