@@ -19,13 +19,13 @@ package testsuites
19
19
import (
20
20
"context"
21
21
"fmt"
22
- "strings"
23
22
24
23
"github.com/onsi/ginkgo/v2"
25
24
26
25
"sigs.k8s.io/blob-csi-driver/pkg/blob"
27
26
"sigs.k8s.io/blob-csi-driver/test/e2e/driver"
28
- "sigs.k8s.io/blob-csi-driver/test/utils/azure"
27
+
28
+ //"sigs.k8s.io/blob-csi-driver/test/utils/azure"
29
29
30
30
v1 "k8s.io/api/core/v1"
31
31
clientset "k8s.io/client-go/kubernetes"
@@ -41,11 +41,11 @@ type PreProvisionedProvidedCredentiasTest struct {
41
41
}
42
42
43
43
func (t * PreProvisionedProvidedCredentiasTest ) Run (ctx context.Context , client clientset.Interface , namespace * v1.Namespace ) {
44
- kvClient , err := azure .NewKeyVaultClient ()
45
- framework .ExpectNoError (err )
44
+ // kvClient, err := azure.NewKeyVaultClient()
45
+ // framework.ExpectNoError(err)
46
46
47
- authClient , err := azure .NewAuthorizationClient ()
48
- framework .ExpectNoError (err )
47
+ // authClient, err := azure.NewAuthorizationClient()
48
+ // framework.ExpectNoError(err)
49
49
50
50
for _ , pod := range t .Pods {
51
51
for n , volume := range pod .Volumes {
@@ -98,79 +98,80 @@ func (t *PreProvisionedProvidedCredentiasTest) Run(ctx context.Context, client c
98
98
"azurestorageaccountsastoken" : sasToken ,
99
99
}
100
100
run ()
101
+ /*
102
+ // test for service principal
103
+ ginkgo.By("Run for service principal")
104
+ pod.Volumes[n].Attrib = map[string]string{
105
+ "azurestorageauthtype": "SPN",
106
+ "azurestoragespnclientid": kvClient.Cred.AADClientID,
107
+ "azurestoragespntenantid": kvClient.Cred.TenantID,
108
+ }
109
+ secretData = map[string]string{
110
+ "azurestorageaccountname": accountName,
111
+ "azurestoragespnclientsecret": kvClient.Cred.AADClientSecret,
112
+ }
101
113
102
- // test for service principal
103
- ginkgo .By ("Run for service principal" )
104
- pod .Volumes [n ].Attrib = map [string ]string {
105
- "azurestorageauthtype" : "SPN" ,
106
- "azurestoragespnclientid" : kvClient .Cred .AADClientID ,
107
- "azurestoragespntenantid" : kvClient .Cred .TenantID ,
108
- }
109
- secretData = map [string ]string {
110
- "azurestorageaccountname" : accountName ,
111
- "azurestoragespnclientsecret" : kvClient .Cred .AADClientSecret ,
112
- }
113
-
114
- // assign role to service principal
115
- objectID , err := kvClient .GetServicePrincipalObjectID (ctx , kvClient .Cred .AADClientID )
116
- framework .ExpectNoError (err , fmt .Sprintf ("Error GetServicePrincipalObjectID from clientID(%s): %v" , kvClient .Cred .AADClientID , err ))
114
+ // assign role to service principal
115
+ objectID, err := kvClient.GetServicePrincipalObjectID(ctx, kvClient.Cred.AADClientID)
116
+ framework.ExpectNoError(err, fmt.Sprintf("Error GetServicePrincipalObjectID from clientID(%s): %v", kvClient.Cred.AADClientID, err))
117
117
118
- resourceID := fmt .Sprintf ("/subscriptions/%s/resourceGroups/%s/providers/Microsoft.Storage/storageAccounts/%s" , kvClient .Cred .SubscriptionID , kvClient .Cred .ResourceGroup , accountName )
118
+ resourceID := fmt.Sprintf("/subscriptions/%s/resourceGroups/%s/providers/Microsoft.Storage/storageAccounts/%s", kvClient.Cred.SubscriptionID, kvClient.Cred.ResourceGroup, accountName)
119
119
120
- ginkgo .By (fmt .Sprintf ("assign Storage Blob Data Contributor role to the service principal, objectID:%s" , objectID ))
121
- roleDef , err := authClient .GetRoleDefinition (ctx , resourceID , "Storage Blob Data Contributor" )
122
- framework .ExpectNoError (err , fmt .Sprintf ("Error GetRoleDefinition from resourceID(%s): %v" , resourceID , err ))
120
+ ginkgo.By(fmt.Sprintf("assign Storage Blob Data Contributor role to the service principal, objectID:%s", objectID))
121
+ roleDef, err := authClient.GetRoleDefinition(ctx, resourceID, "Storage Blob Data Contributor")
122
+ framework.ExpectNoError(err, fmt.Sprintf("Error GetRoleDefinition from resourceID(%s): %v", resourceID, err))
123
123
124
- roleDefID := * roleDef .ID
125
- _ , err = authClient .AssignRole (ctx , resourceID , objectID , roleDefID )
126
- if err != nil && strings .Contains (err .Error (), "The role assignment already exists" ) {
127
- err = nil
128
- }
129
- framework .ExpectNoError (err , fmt .Sprintf ("Error AssignRole (roleDefID(%s)) to objectID(%s) to access resource (resourceID(%s)), error: %v" , roleDefID , objectID , resourceID , err ))
124
+ roleDefID := *roleDef.ID
125
+ _, err = authClient.AssignRole(ctx, resourceID, objectID, roleDefID)
126
+ if err != nil && strings.Contains(err.Error(), "The role assignment already exists") {
127
+ err = nil
128
+ }
129
+ framework.ExpectNoError(err, fmt.Sprintf("Error AssignRole (roleDefID(%s)) to objectID(%s) to access resource (resourceID(%s)), error: %v", roleDefID, objectID, resourceID, err))
130
130
131
- run ()
131
+ run()
132
132
133
- // test for managed identity(objectID)
134
- objectID , err = kvClient .GetMSIObjectID (ctx , "blobfuse-csi-driver-e2e-test-id" )
135
- if err != nil {
136
- // only e2e-vmss test job will use msi blobfuse-csi-driver-e2e-test-id, other jobs use service principal, so skip here
137
- return
138
- }
133
+ // test for managed identity(objectID)
134
+ objectID, err = kvClient.GetMSIObjectID(ctx, "blobfuse-csi-driver-e2e-test-id")
135
+ if err != nil {
136
+ // only e2e-vmss test job will use msi blobfuse-csi-driver-e2e-test-id, other jobs use service principal, so skip here
137
+ return
138
+ }
139
139
140
- ginkgo .By (fmt .Sprintf ("Run for managed identity (objectID %s)" , objectID ))
141
- pod .Volumes [n ].Attrib = map [string ]string {
142
- "azurestorageauthtype" : "MSI" ,
143
- "azurestorageidentityobjectid" : objectID ,
144
- }
140
+ ginkgo.By(fmt.Sprintf("Run for managed identity (objectID %s)", objectID))
141
+ pod.Volumes[n].Attrib = map[string]string{
142
+ "azurestorageauthtype": "MSI",
143
+ "azurestorageidentityobjectid": objectID,
144
+ }
145
145
146
- secretData = map [string ]string {
147
- "azurestorageaccountname" : accountName ,
148
- }
149
- ginkgo .By (fmt .Sprintf ("assign Storage Blob Data Contributor role to the managed identity, objectID:%s" , objectID ))
150
- _ , err = authClient .AssignRole (ctx , resourceID , objectID , roleDefID )
151
- if err != nil && strings .Contains (err .Error (), "The role assignment already exists" ) {
152
- err = nil
153
- }
154
- framework .ExpectNoError (err , fmt .Sprintf ("Error AssignRole (roleDefID(%s)) to objectID(%s) to access resource (resourceID(%s)), error: %v" , roleDefID , objectID , resourceID , err ))
146
+ secretData = map[string]string{
147
+ "azurestorageaccountname": accountName,
148
+ }
149
+ ginkgo.By(fmt.Sprintf("assign Storage Blob Data Contributor role to the managed identity, objectID:%s", objectID))
150
+ _, err = authClient.AssignRole(ctx, resourceID, objectID, roleDefID)
151
+ if err != nil && strings.Contains(err.Error(), "The role assignment already exists") {
152
+ err = nil
153
+ }
154
+ framework.ExpectNoError(err, fmt.Sprintf("Error AssignRole (roleDefID(%s)) to objectID(%s) to access resource (resourceID(%s)), error: %v", roleDefID, objectID, resourceID, err))
155
155
156
- run ()
156
+ run()
157
157
158
- // test for managed identity(resourceID)
159
- resourceID , err = kvClient .GetMSIResourceID (ctx , "blobfuse-csi-driver-e2e-test-id" )
160
- if err != nil {
161
- // only e2e-vmss test job will use msi blobfuse-csi-driver-e2e-test-id, other jobs use service principal, so skip here
162
- return
163
- }
164
- ginkgo .By (fmt .Sprintf ("Run for managed identity (resourceID %s)" , resourceID ))
165
- pod .Volumes [n ].Attrib = map [string ]string {
166
- "azurestorageauthtype" : "MSI" ,
167
- "azurestorageidentityresourceid" : resourceID ,
168
- }
169
- secretData = map [string ]string {
170
- "azurestorageaccountname" : accountName ,
171
- }
158
+ // test for managed identity(resourceID)
159
+ resourceID, err = kvClient.GetMSIResourceID(ctx, "blobfuse-csi-driver-e2e-test-id")
160
+ if err != nil {
161
+ // only e2e-vmss test job will use msi blobfuse-csi-driver-e2e-test-id, other jobs use service principal, so skip here
162
+ return
163
+ }
164
+ ginkgo.By(fmt.Sprintf("Run for managed identity (resourceID %s)", resourceID))
165
+ pod.Volumes[n].Attrib = map[string]string{
166
+ "azurestorageauthtype": "MSI",
167
+ "azurestorageidentityresourceid": resourceID,
168
+ }
169
+ secretData = map[string]string{
170
+ "azurestorageaccountname": accountName,
171
+ }
172
172
173
- run ()
173
+ run()
174
+ */
174
175
}
175
176
}
176
177
}
0 commit comments