@@ -69,10 +69,18 @@ var _ = Describe("Intrusion Detection rendering tests", func() {
6969 cli client.Client
7070 )
7171
72- expectedIDPolicyForUnmanaged := testutils .GetExpectedPolicyFromFile ("testutils/expected_policies/intrusion-detection-controller_unmanaged .json" )
72+ expectedIDPolicyForStandalone := testutils .GetExpectedPolicyFromFile ("testutils/expected_policies/intrusion-detection-controller_standalone .json" )
7373 expectedIDPolicyForManaged := testutils .GetExpectedPolicyFromFile ("testutils/expected_policies/intrusion-detection-controller_managed.json" )
74- expectedIDPolicyForUnmanagedOCP := testutils .GetExpectedPolicyFromFile ("testutils/expected_policies/intrusion-detection-controller_unmanaged_ocp .json" )
74+ expectedIDPolicyForStandaloneOCP := testutils .GetExpectedPolicyFromFile ("testutils/expected_policies/intrusion-detection-controller_standalone_ocp .json" )
7575 expectedIDPolicyForManagedOCP := testutils .GetExpectedPolicyFromFile ("testutils/expected_policies/intrusion-detection-controller_managed_ocp.json" )
76+ expectedIDPolicyForManagement := testutils .GetExpectedPolicyFromFileWithReplacements ("testutils/expected_policies/intrusion-detection-controller_management.json" , map [string ]string {
77+ "MANAGER_NAMESPACE" : render .ManagerNamespace ,
78+ "MANAGER_NAME" : render .ManagerServiceName ,
79+ })
80+ expectedIDPolicyForManagementOCP := testutils .GetExpectedPolicyFromFileWithReplacements ("testutils/expected_policies/intrusion-detection-controller_management_ocp.json" , map [string ]string {
81+ "MANAGER_NAMESPACE" : render .ManagerNamespace ,
82+ "MANAGER_NAME" : render .ManagerServiceName ,
83+ })
7684
7785 BeforeEach (func () {
7886 scheme := runtime .NewScheme ()
@@ -477,10 +485,14 @@ var _ = Describe("Intrusion Detection rendering tests", func() {
477485 getExpectedPolicy := func (policyName types.NamespacedName , scenario testutils.AllowTigeraScenario ) * v3.NetworkPolicy {
478486 if policyName .Name == "allow-tigera.intrusion-detection-controller" {
479487 return testutils .SelectPolicyByClusterTypeAndProvider (scenario ,
480- expectedIDPolicyForUnmanaged ,
481- expectedIDPolicyForUnmanagedOCP ,
482- expectedIDPolicyForManaged ,
483- expectedIDPolicyForManagedOCP ,
488+ map [string ]* v3.NetworkPolicy {
489+ "standalone" : expectedIDPolicyForStandalone ,
490+ "standalone-openshift" : expectedIDPolicyForStandaloneOCP ,
491+ "managed" : expectedIDPolicyForManaged ,
492+ "managed-openshift" : expectedIDPolicyForManagedOCP ,
493+ "management" : expectedIDPolicyForManagement ,
494+ "management-openshift" : expectedIDPolicyForManagementOCP ,
495+ },
484496 )
485497 }
486498
@@ -491,6 +503,7 @@ var _ = Describe("Intrusion Detection rendering tests", func() {
491503 func (scenario testutils.AllowTigeraScenario ) {
492504 cfg .OpenShift = scenario .OpenShift
493505 cfg .ManagedCluster = scenario .ManagedCluster
506+ cfg .ManagementCluster = scenario .ManagementCluster
494507 component := render .IntrusionDetection (cfg )
495508 resources , _ := component .Objects ()
496509
@@ -500,10 +513,12 @@ var _ = Describe("Intrusion Detection rendering tests", func() {
500513 Expect (policy ).To (Equal (expectedPolicy ))
501514 }
502515 },
503- Entry ("for management/standalone, kube-dns" , testutils.AllowTigeraScenario {ManagedCluster : false , OpenShift : false }),
504- Entry ("for management/standalone, openshift-dns" , testutils.AllowTigeraScenario {ManagedCluster : false , OpenShift : true }),
505- Entry ("for managed, kube-dns" , testutils.AllowTigeraScenario {ManagedCluster : true , OpenShift : false }),
506- Entry ("for managed, openshift-dns" , testutils.AllowTigeraScenario {ManagedCluster : true , OpenShift : true }),
516+ Entry ("for standalone, kube-dns" , testutils.AllowTigeraScenario {ManagedCluster : false , OpenShift : false , ManagementCluster : false }),
517+ Entry ("for standalone, openshift-dns" , testutils.AllowTigeraScenario {ManagedCluster : false , OpenShift : true , ManagementCluster : false }),
518+ Entry ("for managed, kube-dns" , testutils.AllowTigeraScenario {ManagedCluster : true , OpenShift : false , ManagementCluster : false }),
519+ Entry ("for managed, openshift-dns" , testutils.AllowTigeraScenario {ManagedCluster : true , OpenShift : true , ManagementCluster : false }),
520+ Entry ("for management, kube-dns" , testutils.AllowTigeraScenario {ManagedCluster : false , OpenShift : false , ManagementCluster : true }),
521+ Entry ("for management, openshift-dns" , testutils.AllowTigeraScenario {ManagedCluster : false , OpenShift : true , ManagementCluster : true }),
507522 )
508523 })
509524
0 commit comments