|
| 1 | +# yaml-language-server: $schema=https://raw.githubusercontent.com/kyverno/chainsaw/main/.schemas/json/test-chainsaw-v1alpha1.json |
| 2 | +apiVersion: chainsaw.kyverno.io/v1alpha1 |
| 3 | +kind: Test |
| 4 | +metadata: |
| 5 | + name: lb-fw-delete-acl |
| 6 | +spec: |
| 7 | + namespace: "lb-fw-delete-acl" |
| 8 | + steps: |
| 9 | + - name: Check if CCM is deployed |
| 10 | + try: |
| 11 | + - assert: |
| 12 | + file: ../assert-ccm-resources.yaml |
| 13 | + - name: Create pods and services |
| 14 | + try: |
| 15 | + - apply: |
| 16 | + file: create-pods-services.yaml |
| 17 | + catch: |
| 18 | + - describe: |
| 19 | + apiVersion: v1 |
| 20 | + kind: Pod |
| 21 | + - describe: |
| 22 | + apiVersion: v1 |
| 23 | + kind: Service |
| 24 | + - name: Check that loadbalancer ip is assigned |
| 25 | + try: |
| 26 | + - assert: |
| 27 | + resource: |
| 28 | + apiVersion: v1 |
| 29 | + kind: Service |
| 30 | + metadata: |
| 31 | + name: svc-test |
| 32 | + status: |
| 33 | + (loadBalancer.ingress[0].ip != null): true |
| 34 | + - name: Fetch Nodebalancer ID, make sure it has firewall attached |
| 35 | + try: |
| 36 | + - script: |
| 37 | + content: | |
| 38 | + set -e |
| 39 | +
|
| 40 | + for i in {1..10}; do |
| 41 | + nbid=$(KUBECONFIG=$KUBECONFIG NAMESPACE=$NAMESPACE LINODE_TOKEN=$LINODE_TOKEN ../scripts/get-nb-id.sh) |
| 42 | +
|
| 43 | + fw=$(curl -s --request GET \ |
| 44 | + -H "Authorization: Bearer $LINODE_TOKEN" \ |
| 45 | + -H "Content-Type: application/json" \ |
| 46 | + -H "accept: application/json" \ |
| 47 | + "https://api.linode.com/v4/nodebalancers/${nbid}/firewalls" || true) |
| 48 | + |
| 49 | + fwCount=$(echo $fw | jq '.data | length') |
| 50 | + ips=$(echo $fw | jq '.data[].rules.inbound[].addresses.ipv4[]') |
| 51 | + if [[ $fwCount -eq 1 && -n $ips && $ips == *"7.7.7.7/32"* ]]; then |
| 52 | + echo "firewall attached and rule has specified ip" |
| 53 | + break |
| 54 | + fi |
| 55 | + sleep 10 |
| 56 | + done |
| 57 | + check: |
| 58 | + ($error == null): true |
| 59 | + (contains($stdout, 'firewall attached and rule has specified ip')): true |
| 60 | + - name: Delete ACL and check that firewall no longer exists |
| 61 | + try: |
| 62 | + - script: |
| 63 | + content: | |
| 64 | + set -e |
| 65 | +
|
| 66 | + for i in {1..10}; do |
| 67 | + nbid=$(KUBECONFIG=$KUBECONFIG NAMESPACE=$NAMESPACE LINODE_TOKEN=$LINODE_TOKEN ../scripts/get-nb-id.sh) |
| 68 | +
|
| 69 | + fw=$(curl -s --request GET \ |
| 70 | + -H "Authorization: Bearer $LINODE_TOKEN" \ |
| 71 | + -H "Content-Type: application/json" \ |
| 72 | + -H "accept: application/json" \ |
| 73 | + "https://api.linode.com/v4/nodebalancers/${nbid}/firewalls" || true) |
| 74 | + |
| 75 | + fwid=$(echo $fw | jq -r '.data[].id') |
| 76 | +
|
| 77 | + # Patch service to remove ACL annotation |
| 78 | + kubectl patch service svc-test -n $NAMESPACE --type=json -p='[{"op": "remove", "path": "/metadata/annotations/service.beta.kubernetes.io~1linode-loadbalancer-firewall-acl"}]' |
| 79 | + sleep 5 |
| 80 | +
|
| 81 | + # Check that firewall is no longer attached to nb |
| 82 | + fw=$(curl -s --request GET \ |
| 83 | + -H "Authorization: Bearer $LINODE_TOKEN" \ |
| 84 | + -H "Content-Type: application/json" \ |
| 85 | + -H "accept: application/json" \ |
| 86 | + "https://api.linode.com/v4/nodebalancers/${nbid}/firewalls" || true) |
| 87 | + |
| 88 | + fwCount=$(echo $fw | jq -r '.data | length') |
| 89 | +
|
| 90 | + # Check if firewall is deleted |
| 91 | + fwRespCode=$(curl -s -o /dev/null -w "%{http_code}" \ |
| 92 | + --request GET \ |
| 93 | + -H "Authorization: Bearer $LINODE_TOKEN" \ |
| 94 | + -H "accept: application/json" \ |
| 95 | + "https://api.linode.com/v4/networking/firewalls/${fwid}" || true) |
| 96 | +
|
| 97 | + if [[ $fwCount -eq 0 && $fwRespCode -eq "404" ]]; then |
| 98 | + echo "firewall detatched and deleted" |
| 99 | + break |
| 100 | + fi |
| 101 | + sleep 10 |
| 102 | + done |
| 103 | + check: |
| 104 | + ($error == null): true |
| 105 | + (contains($stdout, 'firewall detatched and deleted')): true |
| 106 | + - name: Refresh service by adding the ACL again |
| 107 | + try: |
| 108 | + - apply: |
| 109 | + file: create-pods-services.yaml |
| 110 | + catch: |
| 111 | + - describe: |
| 112 | + apiVersion: v1 |
| 113 | + kind: Service |
| 114 | + - name: Delete service and make sure nb and fw are deleted automatically |
| 115 | + try: |
| 116 | + - script: |
| 117 | + content: | |
| 118 | + set -e |
| 119 | +
|
| 120 | + for i in {1..10}; do |
| 121 | + nbid=$(KUBECONFIG=$KUBECONFIG NAMESPACE=$NAMESPACE LINODE_TOKEN=$LINODE_TOKEN ../scripts/get-nb-id.sh) |
| 122 | +
|
| 123 | + fw=$(curl -s --request GET \ |
| 124 | + -H "Authorization: Bearer $LINODE_TOKEN" \ |
| 125 | + -H "Content-Type: application/json" \ |
| 126 | + -H "accept: application/json" \ |
| 127 | + "https://api.linode.com/v4/nodebalancers/${nbid}/firewalls" || true) |
| 128 | + |
| 129 | + fwid=$(echo $fw | jq -r '.data[].id') |
| 130 | +
|
| 131 | + # Remove service |
| 132 | + kubectl delete service svc-test -n $NAMESPACE --ignore-not-found |
| 133 | + sleep 5 |
| 134 | +
|
| 135 | + # Check if nodebalancer is deleted |
| 136 | + nbRespCode=$(curl -s -o /dev/null -w "%{http_code}" \ |
| 137 | + --request GET \ |
| 138 | + -H "Authorization: Bearer $LINODE_TOKEN" \ |
| 139 | + -H "accept: application/json" \ |
| 140 | + "https://api.linode.com/v4/nodebalancers/${nbid}" || true) |
| 141 | +
|
| 142 | + # Check if firewall is deleted |
| 143 | + fwRespCode=$(curl -s -o /dev/null -w "%{http_code}" \ |
| 144 | + --request GET \ |
| 145 | + -H "Authorization: Bearer $LINODE_TOKEN" \ |
| 146 | + -H "accept: application/json" \ |
| 147 | + "https://api.linode.com/v4/networking/firewalls/${fwid}" || true) |
| 148 | + if [[ $nbRespCode == "404" && $fwRespCode == "404" ]]; then |
| 149 | + echo "nb and fw deleted" |
| 150 | + break |
| 151 | + fi |
| 152 | + sleep 10 |
| 153 | + done |
| 154 | + check: |
| 155 | + ($error == null): true |
| 156 | + (contains($stdout, 'nb and fw deleted')): true |
0 commit comments