@@ -129,10 +129,14 @@ helm-destroy:
129129.PHONY : e2e
130130e2e : e2e-build e2e-install e2e-exec
131131
132- .PHONY : e2e-exec
133- e2e-exec :
132+ .PHONY : e2e-legacy- exec
133+ e2e-legacy- exec :
134134 @./e2e/run.bash $$ {CLIENT_TEST:-kubectl}-$$ {CAPSULE_PROXY_MODE:-https}
135135
136+ .PHONY : e2e-exec
137+ e2e-exec : ginkgo
138+ $(GINKGO ) -v -tags e2e ./e2e
139+
136140.PHONY : e2e-build
137141e2e-build :
138142 @echo " Building kubernetes env using Kind $$ {KIND_K8S_VERSION:-v1.27.0}..."
@@ -151,7 +155,7 @@ e2e-install: install-capsule install-capsule-proxy rbac-fix
151155.PHONY : e2e-load-image
152156e2e-load-image : ko-build-all
153157 @echo " Loading Docker image..."
154- @kind load docker-image --name capsule --nodes capsule-worker $(CAPSULE_PROXY_IMG ) :$(VERSION )
158+ @kind load docker-image --name capsule $(CAPSULE_PROXY_IMG ) :$(VERSION )
155159
156160.PHONY : e2e-destroy
157161e2e-destroy :
@@ -185,7 +189,8 @@ ifeq ($(CAPSULE_PROXY_MODE),http)
185189 --set "kind=DaemonSet" \
186190 --set "daemonset.hostNetwork=true" \
187191 --set "serviceMonitor.enabled=false" \
188- --set "options.generateCertificates=false"
192+ --set "options.generateCertificates=false" \
193+ --set "options.extraArgs={--feature-gates=ProxyClusterScoped=true,--feature-gates=ProxyAllNamespaced=true}"
189194else
190195 @echo "Running in HTTPS mode"
191196 @echo "capsule proxy certificates..."
@@ -194,19 +199,19 @@ else
194199 && kubectl --namespace capsule-system create secret generic capsule-proxy --from-file=tls.key=./127.0.0.1-key.pem --from-file=tls.crt=./127.0.0.1.pem --from-literal=ca=$$(cat $(ROOTCA) | base64 |tr -d '\n')
195200 @echo "kubeconfig configurations..."
196201 @cd hack \
197- && curl -s https://raw.githubusercontent.com/projectcapsule/capsule/main/hack/create-user.sh | bash -s -- alice oil capsule.clastix.io \
202+ && curl -s https://raw.githubusercontent.com/projectcapsule/capsule/main/hack/create-user.sh | bash -s -- alice oil projectcapsule.dev, capsule.clastix.io \
198203 && mv alice-oil.kubeconfig alice.kubeconfig \
199204 && KUBECONFIG=alice.kubeconfig kubectl config set clusters.kind-capsule.certificate-authority-data $$(cat $(ROOTCA) | base64 |tr -d '\n') \
200205 && KUBECONFIG=alice.kubeconfig kubectl config set clusters.kind-capsule.server https://127.0.0.1:9001 \
201- && curl -s https://raw.githubusercontent.com/projectcapsule/capsule/main/hack/create-user.sh | bash -s -- bob gas capsule.clastix.io \
206+ && curl -s https://raw.githubusercontent.com/projectcapsule/capsule/main/hack/create-user.sh | bash -s -- bob gas projectcapsule.dev, capsule.clastix.io \
202207 && mv bob-gas.kubeconfig bob.kubeconfig \
203208 && KUBECONFIG=bob.kubeconfig kubectl config set clusters.kind-capsule.certificate-authority-data $$(cat $(ROOTCA) | base64 |tr -d '\n') \
204209 && KUBECONFIG=bob.kubeconfig kubectl config set clusters.kind-capsule.server https://127.0.0.1:9001 \
205- && curl -s https://raw.githubusercontent.com/projectcapsule/capsule/main/hack/create-user.sh | bash -s -- joe gas capsule.clastix.io,foo.clastix.io \
210+ && curl -s https://raw.githubusercontent.com/projectcapsule/capsule/main/hack/create-user.sh | bash -s -- joe gas projectcapsule.dev, capsule.clastix.io,foo.clastix.io \
206211 && mv joe-gas.kubeconfig foo.clastix.io.kubeconfig \
207212 && KUBECONFIG=foo.clastix.io.kubeconfig kubectl config set clusters.kind-capsule.certificate-authority-data $$(cat $(ROOTCA) | base64 |tr -d '\n') \
208213 && KUBECONFIG=foo.clastix.io.kubeconfig kubectl config set clusters.kind-capsule.server https://127.0.0.1:9001 \
209- && curl -s https://raw.githubusercontent.com/projectcapsule/capsule/main/hack/create-user.sh | bash -s -- dave soil capsule.clastix.io,bar.clastix.io \
214+ && curl -s https://raw.githubusercontent.com/projectcapsule/capsule/main/hack/create-user.sh | bash -s -- dave soil projectcapsule.dev, capsule.clastix.io,bar.clastix.io \
210215 && mv dave-soil.kubeconfig dave.kubeconfig \
211216 && kubectl --kubeconfig=dave.kubeconfig config set clusters.kind-capsule.certificate-authority-data $$(cat $(ROOTCA) | base64 |tr -d '\n') \
212217 && kubectl --kubeconfig=dave.kubeconfig config set clusters.kind-capsule.server https://127.0.0.1:9001
@@ -219,8 +224,10 @@ else
219224 --set "service.nodePort=" \
220225 --set "kind=DaemonSet" \
221226 --set "daemonset.hostNetwork=true" \
222- --set "serviceMonitor.enabled=false"
227+ --set "serviceMonitor.enabled=false" \
228+ --set "options.extraArgs={--feature-gates=ProxyClusterScoped=true,--feature-gates=ProxyAllNamespaced=true}"
223229endif
230+ @kubectl rollout restart ds capsule-proxy -n capsule-system || true
224231
225232rbac-fix :
226233 @echo " RBAC customization..."
@@ -258,6 +265,11 @@ CONTROLLER_GEN_VERSION = v0.8.0
258265controller-gen : # # Download controller-gen locally if necessary.
259266 $(call go-install-tool,$(CONTROLLER_GEN ) ,sigs.k8s.io/controller-tools/cmd/controller-gen@$(CONTROLLER_GEN_VERSION ) )
260267
268+ GINKGO := $(shell pwd) /bin/ginkgo
269+ GINKGO_VERSION = 2.19.0
270+ ginkgo : # # Download ginkgo locally if necessary.
271+ $(call go-install-tool,$(GINKGO ) ,github.com/onsi/ginkgo/v2/ginkgo@$(GINKGO_VERSION ) )
272+
261273MKCERT = $(shell pwd) /bin/mkcert
262274MKCERT_VERSION = v1.4.4
263275mkcert : # # Download mkcert locally if necessary.
0 commit comments