mirror of
https://github.com/ceph/ceph-csi.git
synced 2024-11-26 08:10:20 +00:00
e2e: Use utilEncryptionType instead of string in rbd suite
Signed-off-by: Marcel Lauhoff <marcel.lauhoff@suse.com>
This commit is contained in:
parent
eae5b80298
commit
c73cb1980b
84
e2e/rbd.go
84
e2e/rbd.go
@ -235,10 +235,14 @@ func checkClusternameInMetadata(f *framework.Framework, ns, pool, image string)
|
|||||||
// ByFileAndBlockEncryption wraps ginkgo's By to run the test body using file and block encryption specific validators.
|
// ByFileAndBlockEncryption wraps ginkgo's By to run the test body using file and block encryption specific validators.
|
||||||
func ByFileAndBlockEncryption(
|
func ByFileAndBlockEncryption(
|
||||||
text string,
|
text string,
|
||||||
callback func(validator encryptionValidateFunc, pvcValidator validateFunc, encryptionType string),
|
callback func(validator encryptionValidateFunc, pvcValidator validateFunc, encryptionType util.EncryptionType),
|
||||||
) {
|
) {
|
||||||
By(text+" (block)", func() { callback(validateEncryptedPVCAndAppBinding, isBlockEncryptedPVC, "block") })
|
By(text+" (block)", func() {
|
||||||
By(text+" (file)", func() { callback(validateEncryptedFilesystemAndAppBinding, isFileEncryptedPVC, "file") })
|
callback(validateEncryptedPVCAndAppBinding, isBlockEncryptedPVC, util.EncryptionTypeBlock)
|
||||||
|
})
|
||||||
|
By(text+" (file)", func() {
|
||||||
|
callback(validateEncryptedFilesystemAndAppBinding, isFileEncryptedPVC, util.EncryptionTypeFile)
|
||||||
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
var _ = Describe("RBD", func() {
|
var _ = Describe("RBD", func() {
|
||||||
@ -1882,7 +1886,7 @@ var _ = Describe("RBD", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
ByFileAndBlockEncryption("create a PVC and bind it to an app using rbd-nbd mounter with encryption", func(
|
ByFileAndBlockEncryption("create a PVC and bind it to an app using rbd-nbd mounter with encryption", func(
|
||||||
validator encryptionValidateFunc, _ validateFunc, encType string,
|
validator encryptionValidateFunc, _ validateFunc, encType util.EncryptionType,
|
||||||
) {
|
) {
|
||||||
if !testNBD {
|
if !testNBD {
|
||||||
e2elog.Logf("skipping NBD test")
|
e2elog.Logf("skipping NBD test")
|
||||||
@ -1904,7 +1908,7 @@ var _ = Describe("RBD", func() {
|
|||||||
"mapOptions": nbdMapOptions,
|
"mapOptions": nbdMapOptions,
|
||||||
"cephLogStrategy": e2eDefaultCephLogStrategy,
|
"cephLogStrategy": e2eDefaultCephLogStrategy,
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
},
|
},
|
||||||
deletePolicy)
|
deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -1928,7 +1932,7 @@ var _ = Describe("RBD", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
ByFileAndBlockEncryption("create a PVC and bind it to an app with encrypted RBD volume", func(
|
ByFileAndBlockEncryption("create a PVC and bind it to an app with encrypted RBD volume", func(
|
||||||
validator encryptionValidateFunc, _ validateFunc, encType string,
|
validator encryptionValidateFunc, _ validateFunc, encType util.EncryptionType,
|
||||||
) {
|
) {
|
||||||
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -1939,7 +1943,7 @@ var _ = Describe("RBD", func() {
|
|||||||
f,
|
f,
|
||||||
defaultSCName,
|
defaultSCName,
|
||||||
nil,
|
nil,
|
||||||
map[string]string{"encrypted": "true", "encryptionType": encType},
|
map[string]string{"encrypted": "true", "encryptionType": util.EncryptionTypeString(encType)},
|
||||||
deletePolicy)
|
deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
e2elog.Failf("failed to create storageclass: %v", err)
|
e2elog.Failf("failed to create storageclass: %v", err)
|
||||||
@ -1962,7 +1966,7 @@ var _ = Describe("RBD", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
ByFileAndBlockEncryption("Resize Encrypted Block PVC and check Device size", func(
|
ByFileAndBlockEncryption("Resize Encrypted Block PVC and check Device size", func(
|
||||||
validator encryptionValidateFunc, _ validateFunc, encType string,
|
validator encryptionValidateFunc, _ validateFunc, encType util.EncryptionType,
|
||||||
) {
|
) {
|
||||||
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -1973,7 +1977,7 @@ var _ = Describe("RBD", func() {
|
|||||||
f,
|
f,
|
||||||
defaultSCName,
|
defaultSCName,
|
||||||
nil,
|
nil,
|
||||||
map[string]string{"encrypted": "true", "encryptionType": encType},
|
map[string]string{"encrypted": "true", "encryptionType": util.EncryptionTypeString(encType)},
|
||||||
deletePolicy)
|
deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
e2elog.Failf("failed to create storageclass: %v", err)
|
e2elog.Failf("failed to create storageclass: %v", err)
|
||||||
@ -1988,7 +1992,7 @@ var _ = Describe("RBD", func() {
|
|||||||
validateRBDImageCount(f, 0, defaultRBDPool)
|
validateRBDImageCount(f, 0, defaultRBDPool)
|
||||||
validateOmapCount(f, 0, rbdType, defaultRBDPool, volumesType)
|
validateOmapCount(f, 0, rbdType, defaultRBDPool, volumesType)
|
||||||
|
|
||||||
if encType != "file" {
|
if encType != util.EncryptionTypeFile {
|
||||||
// Block PVC resize
|
// Block PVC resize
|
||||||
err = resizePVCAndValidateSize(rawPvcPath, rawAppPath, f)
|
err = resizePVCAndValidateSize(rawPvcPath, rawAppPath, f)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2009,7 +2013,7 @@ var _ = Describe("RBD", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
ByFileAndBlockEncryption("create a PVC and bind it to an app with encrypted RBD volume with VaultKMS", func(
|
ByFileAndBlockEncryption("create a PVC and bind it to an app with encrypted RBD volume with VaultKMS", func(
|
||||||
validator encryptionValidateFunc, _ validateFunc, encType string,
|
validator encryptionValidateFunc, _ validateFunc, encType util.EncryptionType,
|
||||||
) {
|
) {
|
||||||
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2018,7 +2022,7 @@ var _ = Describe("RBD", func() {
|
|||||||
scOpts := map[string]string{
|
scOpts := map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionKMSID": "vault-test",
|
"encryptionKMSID": "vault-test",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
}
|
}
|
||||||
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2042,7 +2046,7 @@ var _ = Describe("RBD", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
ByFileAndBlockEncryption("create a PVC and bind it to an app with encrypted RBD volume with VaultTokensKMS", func(
|
ByFileAndBlockEncryption("create a PVC and bind it to an app with encrypted RBD volume with VaultTokensKMS", func(
|
||||||
validator encryptionValidateFunc, _ validateFunc, encType string,
|
validator encryptionValidateFunc, _ validateFunc, encType util.EncryptionType,
|
||||||
) {
|
) {
|
||||||
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2051,7 +2055,7 @@ var _ = Describe("RBD", func() {
|
|||||||
scOpts := map[string]string{
|
scOpts := map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionKMSID": "vault-tokens-test",
|
"encryptionKMSID": "vault-tokens-test",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
}
|
}
|
||||||
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2096,7 +2100,7 @@ var _ = Describe("RBD", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
ByFileAndBlockEncryption("create a PVC and bind it to an app with encrypted RBD volume with VaultTenantSA KMS", func(
|
ByFileAndBlockEncryption("create a PVC and bind it to an app with encrypted RBD volume with VaultTenantSA KMS", func(
|
||||||
validator encryptionValidateFunc, _ validateFunc, encType string,
|
validator encryptionValidateFunc, _ validateFunc, encType util.EncryptionType,
|
||||||
) {
|
) {
|
||||||
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2105,7 +2109,7 @@ var _ = Describe("RBD", func() {
|
|||||||
scOpts := map[string]string{
|
scOpts := map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionKMSID": "vault-tenant-sa-test",
|
"encryptionKMSID": "vault-tenant-sa-test",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
}
|
}
|
||||||
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2136,7 +2140,7 @@ var _ = Describe("RBD", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
ByFileAndBlockEncryption("create a PVC and bind it to an app with encrypted RBD volume with SecretsMetadataKMS",
|
ByFileAndBlockEncryption("create a PVC and bind it to an app with encrypted RBD volume with SecretsMetadataKMS",
|
||||||
func(validator encryptionValidateFunc, _ validateFunc, encType string) {
|
func(validator encryptionValidateFunc, _ validateFunc, encType util.EncryptionType) {
|
||||||
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
e2elog.Failf("failed to delete storageclass: %v", err)
|
e2elog.Failf("failed to delete storageclass: %v", err)
|
||||||
@ -2144,7 +2148,7 @@ var _ = Describe("RBD", func() {
|
|||||||
scOpts := map[string]string{
|
scOpts := map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionKMSID": "secrets-metadata-test",
|
"encryptionKMSID": "secrets-metadata-test",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
}
|
}
|
||||||
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2168,7 +2172,7 @@ var _ = Describe("RBD", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
ByFileAndBlockEncryption("test RBD volume encryption with user secrets based SecretsMetadataKMS", func(
|
ByFileAndBlockEncryption("test RBD volume encryption with user secrets based SecretsMetadataKMS", func(
|
||||||
validator encryptionValidateFunc, _ validateFunc, encType string,
|
validator encryptionValidateFunc, _ validateFunc, encType util.EncryptionType,
|
||||||
) {
|
) {
|
||||||
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2177,7 +2181,7 @@ var _ = Describe("RBD", func() {
|
|||||||
scOpts := map[string]string{
|
scOpts := map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionKMSID": "user-ns-secrets-metadata-test",
|
"encryptionKMSID": "user-ns-secrets-metadata-test",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
}
|
}
|
||||||
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2223,7 +2227,7 @@ var _ = Describe("RBD", func() {
|
|||||||
|
|
||||||
ByFileAndBlockEncryption(
|
ByFileAndBlockEncryption(
|
||||||
"test RBD volume encryption with user secrets based SecretsMetadataKMS with tenant namespace",
|
"test RBD volume encryption with user secrets based SecretsMetadataKMS with tenant namespace",
|
||||||
func(validator encryptionValidateFunc, isEncryptedPVC validateFunc, encType string) {
|
func(validator encryptionValidateFunc, isEncryptedPVC validateFunc, encType util.EncryptionType) {
|
||||||
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
e2elog.Failf("failed to delete storageclass: %v", err)
|
e2elog.Failf("failed to delete storageclass: %v", err)
|
||||||
@ -2231,7 +2235,7 @@ var _ = Describe("RBD", func() {
|
|||||||
scOpts := map[string]string{
|
scOpts := map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionKMSID": "user-secrets-metadata-test",
|
"encryptionKMSID": "user-secrets-metadata-test",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
}
|
}
|
||||||
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2349,7 +2353,7 @@ var _ = Describe("RBD", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
ByFileAndBlockEncryption("create an encrypted PVC snapshot and restore it for an app with VaultKMS", func(
|
ByFileAndBlockEncryption("create an encrypted PVC snapshot and restore it for an app with VaultKMS", func(
|
||||||
validator encryptionValidateFunc, isEncryptedPVC validateFunc, encType string,
|
validator encryptionValidateFunc, isEncryptedPVC validateFunc, encType util.EncryptionType,
|
||||||
) {
|
) {
|
||||||
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2358,7 +2362,7 @@ var _ = Describe("RBD", func() {
|
|||||||
scOpts := map[string]string{
|
scOpts := map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionKMSID": "vault-test",
|
"encryptionKMSID": "vault-test",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
}
|
}
|
||||||
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2382,7 +2386,7 @@ var _ = Describe("RBD", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
ByFileAndBlockEncryption("Validate PVC restore from vaultKMS to vaultTenantSAKMS", func(
|
ByFileAndBlockEncryption("Validate PVC restore from vaultKMS to vaultTenantSAKMS", func(
|
||||||
validator encryptionValidateFunc, isEncryptedPVC validateFunc, encType string,
|
validator encryptionValidateFunc, isEncryptedPVC validateFunc, encType util.EncryptionType,
|
||||||
) {
|
) {
|
||||||
restoreSCName := "restore-sc"
|
restoreSCName := "restore-sc"
|
||||||
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
||||||
@ -2392,7 +2396,7 @@ var _ = Describe("RBD", func() {
|
|||||||
scOpts := map[string]string{
|
scOpts := map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionKMSID": "vault-test",
|
"encryptionKMSID": "vault-test",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
}
|
}
|
||||||
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2402,7 +2406,7 @@ var _ = Describe("RBD", func() {
|
|||||||
scOpts = map[string]string{
|
scOpts = map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionKMSID": "vault-tenant-sa-test",
|
"encryptionKMSID": "vault-tenant-sa-test",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
}
|
}
|
||||||
err = createRBDStorageClass(f.ClientSet, f, restoreSCName, nil, scOpts, deletePolicy)
|
err = createRBDStorageClass(f.ClientSet, f, restoreSCName, nil, scOpts, deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2442,7 +2446,7 @@ var _ = Describe("RBD", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
ByFileAndBlockEncryption("Validate PVC-PVC clone with different SC from vaultKMS to vaultTenantSAKMS", func(
|
ByFileAndBlockEncryption("Validate PVC-PVC clone with different SC from vaultKMS to vaultTenantSAKMS", func(
|
||||||
validator encryptionValidateFunc, isValidPVC validateFunc, encType string,
|
validator encryptionValidateFunc, isValidPVC validateFunc, encType util.EncryptionType,
|
||||||
) {
|
) {
|
||||||
restoreSCName := "restore-sc"
|
restoreSCName := "restore-sc"
|
||||||
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
||||||
@ -2452,7 +2456,7 @@ var _ = Describe("RBD", func() {
|
|||||||
scOpts := map[string]string{
|
scOpts := map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionKMSID": "vault-test",
|
"encryptionKMSID": "vault-test",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
}
|
}
|
||||||
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2462,7 +2466,7 @@ var _ = Describe("RBD", func() {
|
|||||||
scOpts = map[string]string{
|
scOpts = map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionKMSID": "vault-tenant-sa-test",
|
"encryptionKMSID": "vault-tenant-sa-test",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
}
|
}
|
||||||
err = createRBDStorageClass(f.ClientSet, f, restoreSCName, nil, scOpts, deletePolicy)
|
err = createRBDStorageClass(f.ClientSet, f, restoreSCName, nil, scOpts, deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2506,7 +2510,7 @@ var _ = Describe("RBD", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
ByFileAndBlockEncryption("create an encrypted PVC-PVC clone and bind it to an app", func(
|
ByFileAndBlockEncryption("create an encrypted PVC-PVC clone and bind it to an app", func(
|
||||||
validator encryptionValidateFunc, isValidPVC validateFunc, encType string,
|
validator encryptionValidateFunc, isValidPVC validateFunc, encType util.EncryptionType,
|
||||||
) {
|
) {
|
||||||
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2515,7 +2519,7 @@ var _ = Describe("RBD", func() {
|
|||||||
scOpts := map[string]string{
|
scOpts := map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionKMSID": "secrets-metadata-test",
|
"encryptionKMSID": "secrets-metadata-test",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
}
|
}
|
||||||
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2544,7 +2548,7 @@ var _ = Describe("RBD", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
ByFileAndBlockEncryption("create an encrypted PVC-PVC clone and bind it to an app with VaultKMS", func(
|
ByFileAndBlockEncryption("create an encrypted PVC-PVC clone and bind it to an app with VaultKMS", func(
|
||||||
validator encryptionValidateFunc, isValidPVC validateFunc, encType string,
|
validator encryptionValidateFunc, isValidPVC validateFunc, encType util.EncryptionType,
|
||||||
) {
|
) {
|
||||||
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
err := deleteResource(rbdExamplePath + "storageclass.yaml")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -2553,7 +2557,7 @@ var _ = Describe("RBD", func() {
|
|||||||
scOpts := map[string]string{
|
scOpts := map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionKMSID": "vault-test",
|
"encryptionKMSID": "vault-test",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
}
|
}
|
||||||
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
err = createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -4044,12 +4048,12 @@ var _ = Describe("RBD", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
ByFileAndBlockEncryption("restore snapshot to bigger size encrypted PVC with VaultKMS", func(
|
ByFileAndBlockEncryption("restore snapshot to bigger size encrypted PVC with VaultKMS", func(
|
||||||
_ encryptionValidateFunc, _ validateFunc, encType string,
|
_ encryptionValidateFunc, _ validateFunc, encType util.EncryptionType,
|
||||||
) {
|
) {
|
||||||
scOpts := map[string]string{
|
scOpts := map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionKMSID": "vault-test",
|
"encryptionKMSID": "vault-test",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
}
|
}
|
||||||
err := createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
err := createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -4081,7 +4085,7 @@ var _ = Describe("RBD", func() {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
e2elog.Failf("failed to validate restore bigger size clone: %v", err)
|
e2elog.Failf("failed to validate restore bigger size clone: %v", err)
|
||||||
}
|
}
|
||||||
if encType != "file" {
|
if encType != util.EncryptionTypeFile {
|
||||||
// validate block mode PVC
|
// validate block mode PVC
|
||||||
err = validateBiggerPVCFromSnapshot(f,
|
err = validateBiggerPVCFromSnapshot(f,
|
||||||
rawPvcPath,
|
rawPvcPath,
|
||||||
@ -4107,11 +4111,11 @@ var _ = Describe("RBD", func() {
|
|||||||
|
|
||||||
By("clone PVC to a bigger size PVC", func() {
|
By("clone PVC to a bigger size PVC", func() {
|
||||||
ByFileAndBlockEncryption("clone PVC to bigger size encrypted PVC with VaultKMS", func(
|
ByFileAndBlockEncryption("clone PVC to bigger size encrypted PVC with VaultKMS", func(
|
||||||
validator encryptionValidateFunc, _ validateFunc, encType string,
|
validator encryptionValidateFunc, _ validateFunc, encType util.EncryptionType,
|
||||||
) {
|
) {
|
||||||
scOpts := map[string]string{
|
scOpts := map[string]string{
|
||||||
"encrypted": "true",
|
"encrypted": "true",
|
||||||
"encryptionType": encType,
|
"encryptionType": util.EncryptionTypeString(encType),
|
||||||
"encryptionKMSID": "vault-test",
|
"encryptionKMSID": "vault-test",
|
||||||
}
|
}
|
||||||
err := createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
err := createRBDStorageClass(f.ClientSet, f, defaultSCName, nil, scOpts, deletePolicy)
|
||||||
@ -4134,7 +4138,7 @@ var _ = Describe("RBD", func() {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
e2elog.Failf("failed to validate bigger size clone: %v", err)
|
e2elog.Failf("failed to validate bigger size clone: %v", err)
|
||||||
}
|
}
|
||||||
if encType != "file" {
|
if encType != util.EncryptionTypeFile {
|
||||||
// validate block mode PVC
|
// validate block mode PVC
|
||||||
err = validateBiggerCloneFromPVC(f,
|
err = validateBiggerCloneFromPVC(f,
|
||||||
rawPvcPath,
|
rawPvcPath,
|
||||||
|
Loading…
Reference in New Issue
Block a user