Skip to content

Commit

Permalink
Remove experimental label from Istio policy config flag (#192)
Browse files Browse the repository at this point in the history
  • Loading branch information
orishoshan committed May 24, 2023
1 parent 0828724 commit 01a3f5f
Show file tree
Hide file tree
Showing 11 changed files with 82 additions and 23 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -9,10 +9,14 @@ import (
"github.com/otterize/intents-operator/src/watcher/reconcilers"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/suite"
istiosecurityscheme "istio.io/client-go/pkg/apis/security/v1beta1"
v1 "k8s.io/api/networking/v1"
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
"k8s.io/apimachinery/pkg/api/errors"
"k8s.io/apimachinery/pkg/types"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
"k8s.io/client-go/kubernetes"
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
"k8s.io/client-go/tools/record"
"path/filepath"
ctrl "sigs.k8s.io/controller-runtime"
Expand Down Expand Up @@ -41,8 +45,10 @@ func (s *ExternalNetworkPolicyReconcilerTestSuite) SetupSuite() {
s.Require().NoError(err)
s.Require().NotNil(s.K8sDirectClient)

err = otterizev1alpha2.AddToScheme(s.TestEnv.Scheme)
s.Require().NoError(err)
utilruntime.Must(apiextensionsv1.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(clientgoscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(istiosecurityscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(otterizev1alpha2.AddToScheme(s.TestEnv.Scheme))
}

func (s *ExternalNetworkPolicyReconcilerTestSuite) SetupTest() {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,10 +9,14 @@ import (
"github.com/otterize/intents-operator/src/watcher/reconcilers"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/suite"
istiosecurityscheme "istio.io/client-go/pkg/apis/security/v1beta1"
v1 "k8s.io/api/networking/v1"
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
"k8s.io/apimachinery/pkg/api/errors"
"k8s.io/apimachinery/pkg/types"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
"k8s.io/client-go/kubernetes"
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
"k8s.io/client-go/tools/record"
"path/filepath"
ctrl "sigs.k8s.io/controller-runtime"
Expand Down Expand Up @@ -41,8 +45,10 @@ func (s *ExternalNetworkPolicyReconcilerWithNoIntentsTestSuite) SetupSuite() {
s.Require().NoError(err)
s.Require().NotNil(s.K8sDirectClient)

err = otterizev1alpha2.AddToScheme(s.TestEnv.Scheme)
s.Require().NoError(err)
utilruntime.Must(apiextensionsv1.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(clientgoscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(istiosecurityscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(otterizev1alpha2.AddToScheme(s.TestEnv.Scheme))
}

func (s *ExternalNetworkPolicyReconcilerWithNoIntentsTestSuite) SetupTest() {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,8 +7,11 @@ import (
"github.com/samber/lo"
"github.com/stretchr/testify/assert"
istiov1beta1 "istio.io/client-go/pkg/apis/security/v1beta1"
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
"k8s.io/apimachinery/pkg/types"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
"k8s.io/client-go/kubernetes"
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
"k8s.io/client-go/tools/record"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/client"
Expand Down Expand Up @@ -37,8 +40,10 @@ func (s *IstioPolicyReconcilerTestSuite) SetupSuite() {
s.Require().NoError(err)
s.Require().NotNil(s.K8sDirectClient)

err = otterizev1alpha2.AddToScheme(s.TestEnv.Scheme)
s.Require().NoError(err)
utilruntime.Must(apiextensionsv1.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(clientgoscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(istiov1beta1.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(otterizev1alpha2.AddToScheme(s.TestEnv.Scheme))

err = istiov1beta1.AddToScheme(s.TestEnv.Scheme)
s.Require().NoError(err)
Expand Down
10 changes: 8 additions & 2 deletions src/operator/controllers/intents_reconcilers/kafka_acls_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -13,8 +13,12 @@ import (
"github.com/samber/lo"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/suite"
istiosecurityscheme "istio.io/client-go/pkg/apis/security/v1beta1"
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
"k8s.io/apimachinery/pkg/types"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
"k8s.io/client-go/kubernetes"
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
"k8s.io/client-go/tools/record"
"path/filepath"
ctrl "sigs.k8s.io/controller-runtime"
Expand Down Expand Up @@ -55,8 +59,10 @@ func (s *KafkaACLReconcilerTestSuite) SetupSuite() {
s.Require().NoError(err)
s.Require().NotNil(s.K8sDirectClient)

err = otterizev1alpha2.AddToScheme(s.TestEnv.Scheme)
s.Require().NoError(err)
utilruntime.Must(apiextensionsv1.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(clientgoscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(istiosecurityscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(otterizev1alpha2.AddToScheme(s.TestEnv.Scheme))
}

func (s *KafkaACLReconcilerTestSuite) SetupTest() {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,12 +8,16 @@ import (
"github.com/samber/lo"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/suite"
istiosecurityscheme "istio.io/client-go/pkg/apis/security/v1beta1"
corev1 "k8s.io/api/core/v1"
v1 "k8s.io/api/networking/v1"
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
k8serrors "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
"k8s.io/client-go/kubernetes"
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
"k8s.io/client-go/tools/record"
"path/filepath"
ctrl "sigs.k8s.io/controller-runtime"
Expand All @@ -27,7 +31,6 @@ import (
type NetworkPolicyReconcilerTestSuite struct {
testbase.ControllerManagerTestSuiteBase
Reconciler *NetworkPolicyReconciler
//ReconcilerWithEnforcementDisabled *NetworkPolicyReconciler
}

func (s *NetworkPolicyReconcilerTestSuite) SetupSuite() {
Expand All @@ -43,8 +46,10 @@ func (s *NetworkPolicyReconcilerTestSuite) SetupSuite() {
s.Require().NoError(err)
s.Require().NotNil(s.K8sDirectClient)

err = otterizev1alpha2.AddToScheme(s.TestEnv.Scheme)
s.Require().NoError(err)
utilruntime.Must(apiextensionsv1.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(clientgoscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(istiosecurityscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(otterizev1alpha2.AddToScheme(s.TestEnv.Scheme))
}

func (s *NetworkPolicyReconcilerTestSuite) BeforeTest(_, testName string) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,10 +10,14 @@ import (
"github.com/otterize/intents-operator/src/shared/testbase"
"github.com/samber/lo"
"github.com/stretchr/testify/suite"
istiosecurityscheme "istio.io/client-go/pkg/apis/security/v1beta1"
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
k8serrors "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
"k8s.io/client-go/kubernetes"
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
"path/filepath"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/client"
Expand Down Expand Up @@ -46,8 +50,11 @@ func (s *CloudReconcilerTestSuite) SetupSuite() {
s.Require().NoError(err)
s.Require().NotNil(s.K8sDirectClient)

err = otterizev1alpha2.AddToScheme(s.TestEnv.Scheme)
s.Require().NoError(err)
utilruntime.Must(apiextensionsv1.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(clientgoscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(istiosecurityscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(otterizev1alpha2.AddToScheme(s.TestEnv.Scheme))

}

func (s *CloudReconcilerTestSuite) SetupTest() {
Expand Down
10 changes: 8 additions & 2 deletions src/operator/controllers/intents_reconcilers/pods_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,13 @@ import (
"github.com/samber/lo"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/suite"
istiosecurityscheme "istio.io/client-go/pkg/apis/security/v1beta1"
v1 "k8s.io/api/core/v1"
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
"k8s.io/apimachinery/pkg/types"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
"k8s.io/client-go/kubernetes"
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
"path/filepath"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/client"
Expand All @@ -36,8 +40,10 @@ func (s *PodLabelReconcilerTestSuite) SetupSuite() {
s.Require().NoError(err)
s.Require().NotNil(s.K8sDirectClient)

err = otterizev1alpha2.AddToScheme(s.TestEnv.Scheme)
s.Require().NoError(err)
utilruntime.Must(apiextensionsv1.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(clientgoscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(istiosecurityscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(otterizev1alpha2.AddToScheme(s.TestEnv.Scheme))
}

func (s *PodLabelReconcilerTestSuite) SetupTest() {
Expand Down
10 changes: 8 additions & 2 deletions src/operator/controllers/kafkaserverconfig_controller_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -13,10 +13,14 @@ import (
serviceidresolvermocks "github.com/otterize/intents-operator/src/shared/serviceidresolver/mocks"
"github.com/otterize/intents-operator/src/shared/testbase"
"github.com/stretchr/testify/suite"
istiosecurityscheme "istio.io/client-go/pkg/apis/security/v1beta1"
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
k8serrors "k8s.io/apimachinery/pkg/api/errors"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
"k8s.io/client-go/kubernetes"
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
"path/filepath"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/envtest"
Expand Down Expand Up @@ -55,8 +59,10 @@ func (s *KafkaServerConfigReconcilerTestSuite) SetupSuite() {
s.Require().NoError(err)
s.Require().NotNil(s.K8sDirectClient)

err = otterizev1alpha2.AddToScheme(s.TestEnv.Scheme)
s.Require().NoError(err)
utilruntime.Must(apiextensionsv1.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(clientgoscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(istiosecurityscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(otterizev1alpha2.AddToScheme(s.TestEnv.Scheme))
}

func (s *KafkaServerConfigReconcilerTestSuite) SetupTest() {
Expand Down
10 changes: 8 additions & 2 deletions src/operator/webhooks/webhook_suite_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,11 @@ import (
otterizev1alpha2 "github.com/otterize/intents-operator/src/operator/api/v1alpha2"
"github.com/otterize/intents-operator/src/shared/testbase"
"github.com/stretchr/testify/suite"
istiosecurityscheme "istio.io/client-go/pkg/apis/security/v1beta1"
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
"k8s.io/client-go/kubernetes"
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
"path/filepath"
"sigs.k8s.io/controller-runtime/pkg/envtest"
"testing"
Expand Down Expand Up @@ -52,8 +56,10 @@ func (s *ValidationWebhookTestSuite) SetupSuite() {
s.Require().NoError(err)
s.Require().NotNil(s.K8sDirectClient)

err = otterizev1alpha2.AddToScheme(s.TestEnv.Scheme)
s.Require().NoError(err)
utilruntime.Must(apiextensionsv1.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(clientgoscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(istiosecurityscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(otterizev1alpha2.AddToScheme(s.TestEnv.Scheme))

}

Expand Down
4 changes: 2 additions & 2 deletions src/shared/operatorconfig/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -32,8 +32,8 @@ const (
AutoCreateNetworkPoliciesForExternalTrafficNoIntentsRequiredDefault = false
EnableNetworkPolicyKey = "enable-network-policy-creation" // Whether to enable Intents network policy creation
EnableNetworkPolicyDefault = true
EnableIstioPolicyKey = "experimental-enable-istio-policy-creation" // Whether to enable istio authorization policy creation
EnableIstioPolicyDefault = false
EnableIstioPolicyKey = "enable-istio-policy-creation" // Whether to enable Istio authorization policy creation
EnableIstioPolicyDefault = true
EnableKafkaACLKey = "enable-kafka-acl-creation" // Whether to disable Intents Kafka ACL creation
EnableKafkaACLDefault = true
IntentsOperatorPodNameKey = "pod-name"
Expand Down
10 changes: 8 additions & 2 deletions src/watcher/reconcilers/pods_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -7,9 +7,13 @@ import (
"github.com/otterize/intents-operator/src/shared/testbase"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/suite"
istiosecurityscheme "istio.io/client-go/pkg/apis/security/v1beta1"
v1 "k8s.io/api/core/v1"
apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
"k8s.io/apimachinery/pkg/types"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
"k8s.io/client-go/kubernetes"
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
"path/filepath"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/envtest"
Expand All @@ -34,8 +38,10 @@ func (s *WatcherPodLabelReconcilerTestSuite) SetupSuite() {
s.Require().NoError(err)
s.Require().NotNil(s.K8sDirectClient)

err = otterizev1alpha2.AddToScheme(s.TestEnv.Scheme)
s.Require().NoError(err)
utilruntime.Must(apiextensionsv1.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(clientgoscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(istiosecurityscheme.AddToScheme(s.TestEnv.Scheme))
utilruntime.Must(otterizev1alpha2.AddToScheme(s.TestEnv.Scheme))
}

func (s *WatcherPodLabelReconcilerTestSuite) SetupTest() {
Expand Down

0 comments on commit 01a3f5f

Please sign in to comment.