Skip to content

Commit 75dd5ea

Browse files
perdasilvaPer Goncalves da Silva
andcommitted
Make PSA catalog tests more resilient (#3645)
Signed-off-by: Per Goncalves da Silva <pegoncal@redhat.com> Co-authored-by: Per Goncalves da Silva <pegoncal@redhat.com> Upstream-repository: operator-lifecycle-manager Upstream-commit: b9e6cce9f3f08aaffa305f3b3add0e71a34cee20
1 parent 15b1211 commit 75dd5ea

File tree

1 file changed

+13
-33
lines changed

1 file changed

+13
-33
lines changed

staging/operator-lifecycle-manager/test/e2e/catalog_e2e_test.go

Lines changed: 13 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -1467,29 +1467,19 @@ var _ = Describe("Starting CatalogSource e2e tests", Label("CatalogSource"), fun
14671467
})
14681468
})
14691469
})
1470-
When("The namespace is labled as Pod Security Admission policy enforce:restricted", func() {
1470+
When("The namespace is labeled as Pod Security Admission policy enforce:restricted", func() {
14711471
BeforeEach(func() {
1472-
var err error
1473-
testNS := &corev1.Namespace{}
14741472
Eventually(func() error {
1475-
testNS, err = c.KubernetesInterface().CoreV1().Namespaces().Get(context.TODO(), generatedNamespace.GetName(), metav1.GetOptions{})
1473+
testNS, err := c.KubernetesInterface().CoreV1().Namespaces().Get(context.TODO(), generatedNamespace.GetName(), metav1.GetOptions{})
14761474
if err != nil {
14771475
return err
14781476
}
1479-
return nil
1480-
}).Should(BeNil())
1481-
1482-
testNS.ObjectMeta.Labels = map[string]string{
1483-
"pod-security.kubernetes.io/enforce": "restricted",
1484-
"pod-security.kubernetes.io/enforce-version": "latest",
1485-
}
1486-
1487-
Eventually(func() error {
1488-
_, err := c.KubernetesInterface().CoreV1().Namespaces().Update(context.TODO(), testNS, metav1.UpdateOptions{})
1489-
if err != nil {
1490-
return err
1477+
testNS.ObjectMeta.Labels = map[string]string{
1478+
"pod-security.kubernetes.io/enforce": "restricted",
1479+
"pod-security.kubernetes.io/enforce-version": "latest",
14911480
}
1492-
return nil
1481+
_, err = c.KubernetesInterface().CoreV1().Namespaces().Update(context.TODO(), testNS, metav1.UpdateOptions{})
1482+
return err
14931483
}).Should(BeNil())
14941484
})
14951485
When("A CatalogSource built with opm v1.21.0 (<v1.23.2)is created with spec.GrpcPodConfig.SecurityContextConfig set to restricted", func() {
@@ -1540,27 +1530,17 @@ var _ = Describe("Starting CatalogSource e2e tests", Label("CatalogSource"), fun
15401530
})
15411531
When("The namespace is labled as Pod Security Admission policy enforce:baseline", func() {
15421532
BeforeEach(func() {
1543-
var err error
1544-
testNS := &corev1.Namespace{}
15451533
Eventually(func() error {
1546-
testNS, err = c.KubernetesInterface().CoreV1().Namespaces().Get(context.TODO(), generatedNamespace.GetName(), metav1.GetOptions{})
1534+
testNS, err := c.KubernetesInterface().CoreV1().Namespaces().Get(context.TODO(), generatedNamespace.GetName(), metav1.GetOptions{})
15471535
if err != nil {
15481536
return err
15491537
}
1550-
return nil
1551-
}).Should(BeNil())
1552-
1553-
testNS.ObjectMeta.Labels = map[string]string{
1554-
"pod-security.kubernetes.io/enforce": "baseline",
1555-
"pod-security.kubernetes.io/enforce-version": "latest",
1556-
}
1557-
1558-
Eventually(func() error {
1559-
_, err := c.KubernetesInterface().CoreV1().Namespaces().Update(context.TODO(), testNS, metav1.UpdateOptions{})
1560-
if err != nil {
1561-
return err
1538+
testNS.ObjectMeta.Labels = map[string]string{
1539+
"pod-security.kubernetes.io/enforce": "baseline",
1540+
"pod-security.kubernetes.io/enforce-version": "latest",
15621541
}
1563-
return nil
1542+
_, err = c.KubernetesInterface().CoreV1().Namespaces().Update(context.TODO(), testNS, metav1.UpdateOptions{})
1543+
return err
15641544
}).Should(BeNil())
15651545
})
15661546
When("A CatalogSource built with opm v1.21.0 (<v1.23.2)is created with spec.GrpcPodConfig.SecurityContextConfig set to legacy", func() {

0 commit comments

Comments
 (0)