diff --git a/operatorconfig/moduleconfig/authorization/v1.10.0/deployment.yaml b/operatorconfig/moduleconfig/authorization/v1.10.0/deployment.yaml index 25051dd6d..e6f3c7992 100644 --- a/operatorconfig/moduleconfig/authorization/v1.10.0/deployment.yaml +++ b/operatorconfig/moduleconfig/authorization/v1.10.0/deployment.yaml @@ -270,7 +270,7 @@ spec: name: grpc env: - name: NAMESPACE - value: authorization + value: volumeMounts: - name: storage-volume mountPath: /etc/karavi-authorization/storage diff --git a/operatorconfig/moduleconfig/authorization/v1.8.0/deployment.yaml b/operatorconfig/moduleconfig/authorization/v1.8.0/deployment.yaml index 25051dd6d..e6f3c7992 100644 --- a/operatorconfig/moduleconfig/authorization/v1.8.0/deployment.yaml +++ b/operatorconfig/moduleconfig/authorization/v1.8.0/deployment.yaml @@ -270,7 +270,7 @@ spec: name: grpc env: - name: NAMESPACE - value: authorization + value: volumeMounts: - name: storage-volume mountPath: /etc/karavi-authorization/storage diff --git a/operatorconfig/moduleconfig/authorization/v1.9.0/deployment.yaml b/operatorconfig/moduleconfig/authorization/v1.9.0/deployment.yaml index c171dd8e6..814901a43 100644 --- a/operatorconfig/moduleconfig/authorization/v1.9.0/deployment.yaml +++ b/operatorconfig/moduleconfig/authorization/v1.9.0/deployment.yaml @@ -270,7 +270,7 @@ spec: name: grpc env: - name: NAMESPACE - value: authorization + value: volumeMounts: - name: storage-volume mountPath: /etc/karavi-authorization/storage diff --git a/operatorconfig/moduleconfig/authorization/v1.9.1/deployment.yaml b/operatorconfig/moduleconfig/authorization/v1.9.1/deployment.yaml index 22ce47e52..634c51b15 100644 --- a/operatorconfig/moduleconfig/authorization/v1.9.1/deployment.yaml +++ b/operatorconfig/moduleconfig/authorization/v1.9.1/deployment.yaml @@ -270,7 +270,7 @@ spec: name: grpc env: - name: NAMESPACE - value: authorization + value: volumeMounts: - name: storage-volume mountPath: /etc/karavi-authorization/storage diff --git a/pkg/utils/status.go b/pkg/utils/status.go index b8e4be001..f5b7924d9 100644 --- a/pkg/utils/status.go +++ b/pkg/utils/status.go @@ -985,8 +985,10 @@ func authProxyStatusCheck(ctx context.Context, instance *csmv1.ContainerStorageM } } + authNamespace := instance.GetNamespace() + opts := []client.ListOption{ - client.InNamespace(instance.GetNamespace()), + client.InNamespace(authNamespace), } deploymentList := &appsv1.DeploymentList{} err := r.GetClient().List(ctx, deploymentList, opts...) @@ -1001,7 +1003,7 @@ func authProxyStatusCheck(ctx context.Context, instance *csmv1.ContainerStorageM for _, deployment := range deploymentList.Items { deployment := deployment switch deployment.Name { - case "authorization-ingress-nginx-controller": + case fmt.Sprintf("%s-ingress-nginx-controller", authNamespace): if nginxEnabled { if !checkFn(&deployment) { log.Info("%s component not running in auth proxy deployment", deployment.Name) diff --git a/tests/e2e/steps/step_common.go b/tests/e2e/steps/step_common.go index 40b12690c..cccaad1af 100644 --- a/tests/e2e/steps/step_common.go +++ b/tests/e2e/steps/step_common.go @@ -501,16 +501,17 @@ func checkAuthorizationProxyServerNoRunningPods(ctx context.Context, namespace s return nil } -func getPortContainerizedAuth() (string, error) { +func getPortContainerizedAuth(namespace string) (string, error) { port := "" + service := namespace + "-ingress-nginx-controller" b, err := exec.Command( "kubectl", "get", - "service", "authorization-ingress-nginx-controller", - "-n", "authorization", + "service", service, + "-n", namespace, "-o", `jsonpath="{.spec.ports[1].nodePort}"`, ).CombinedOutput() if err != nil { - return "", fmt.Errorf("failed to get authorization-ingress-nginx-controller port: %s", b) + return "", fmt.Errorf("failed to get %s-ingress-nginx-controller port in namespace: %s: %s", namespace, namespace, b) } port = strings.Replace(string(b), `"`, "", -1) return port, nil diff --git a/tests/e2e/steps/steps_def.go b/tests/e2e/steps/steps_def.go index 57fa6966a..3b5356cb5 100644 --- a/tests/e2e/steps/steps_def.go +++ b/tests/e2e/steps/steps_def.go @@ -864,7 +864,7 @@ func (step *Step) validateAuthorizationProxyServerInstalled(cr csmv1.ContainerSt } for _, cluster := range clusterClients { // check AuthorizationProxyServer in all clusters - if err := checkAuthorizationProxyServerPods(context.TODO(), utils.AuthorizationNamespace, cluster.ClusterK8sClient); err != nil { + if err := checkAuthorizationProxyServerPods(context.TODO(), cr.Namespace, cluster.ClusterK8sClient); err != nil { return fmt.Errorf("failed to check for AuthorizationProxyServer installation in %s: %v", cluster.ClusterID, err) } } @@ -887,7 +887,7 @@ func (step *Step) validateAuthorizationProxyServerNotInstalled(cr csmv1.Containe } for _, cluster := range clusterClients { // check AuthorizationProxyServer is not installed - if err := checkAuthorizationProxyServerNoRunningPods(context.TODO(), utils.AuthorizationNamespace, cluster.ClusterK8sClient); err != nil { + if err := checkAuthorizationProxyServerNoRunningPods(context.TODO(), cr.Namespace, cluster.ClusterK8sClient); err != nil { return fmt.Errorf("failed AuthorizationProxyServer installation check %s: %v", cluster.ClusterID, err) } } @@ -929,10 +929,10 @@ func (step *Step) validateAppMobInstalled(cr csmv1.ContainerStorageModule) error func (step *Step) authProxyServerPrereqs(cr csmv1.ContainerStorageModule) error { fmt.Println("=== Creating Authorization Proxy Server Prerequisites ===") - cmd := exec.Command("kubectl", "get", "ns", "authorization") + cmd := exec.Command("kubectl", "get", "ns", cr.Namespace) err := cmd.Run() if err == nil { - cmd = exec.Command("kubectl", "delete", "ns", "authorization") + cmd = exec.Command("kubectl", "delete", "ns", cr.Namespace) b, err := cmd.CombinedOutput() if err != nil { return fmt.Errorf("failed to delete authorization namespace: %v\nErrMessage:\n%s", err, string(b)) @@ -940,7 +940,7 @@ func (step *Step) authProxyServerPrereqs(cr csmv1.ContainerStorageModule) error } cmd = exec.Command("kubectl", "create", - "ns", "authorization", + "ns", cr.Namespace, ) b, err := cmd.CombinedOutput() if err != nil { @@ -960,7 +960,7 @@ func (step *Step) authProxyServerPrereqs(cr csmv1.ContainerStorageModule) error cmd = exec.Command("kubectl", "create", "secret", "generic", "karavi-config-secret", - "-n", "authorization", + "-n", cr.Namespace, "--from-file=config.yaml=testfiles/authorization-templates/csm_authorization_config.yaml", ) b, err = cmd.CombinedOutput() @@ -968,7 +968,7 @@ func (step *Step) authProxyServerPrereqs(cr csmv1.ContainerStorageModule) error return fmt.Errorf("failed to create config secret for JWT: %v\nErrMessage:\n%s", err, string(b)) } - cmd = exec.Command("kubectl", "create", + cmd = exec.Command("kubectl", "create", "-n", cr.Namespace, "-f", "testfiles/authorization-templates/csm_authorization_storage_secret.yaml", ) b, err = cmd.CombinedOutput() @@ -994,7 +994,7 @@ func (step *Step) authProxyServerPrereqs(cr csmv1.ContainerStorageModule) error return fmt.Errorf("failed to create local storage for redis: %v\nErrMessage:\n%s", err, string(b)) } - cmd = exec.Command("kubectl", "create", + cmd = exec.Command("kubectl", "create", "-n", cr.Namespace, "-f", "testfiles/authorization-templates/csm_authorization_certificate.yaml", ) b, err = cmd.CombinedOutput() @@ -1005,9 +1005,12 @@ func (step *Step) authProxyServerPrereqs(cr csmv1.ContainerStorageModule) error return nil } -func (step *Step) configureAuthorizationProxyServer(res Resource, driver string) error { +func (step *Step) configureAuthorizationProxyServer(res Resource, driver string, crNumStr string) error { fmt.Println("=== Configuring Authorization Proxy Server ===") + crNum, _ := strconv.Atoi(crNumStr) + cr := res.CustomResource[crNum-1] + var b []byte var err error @@ -1070,7 +1073,7 @@ func (step *Step) configureAuthorizationProxyServer(res Resource, driver string) proxyHost = os.Getenv("PROXY_HOST") - port, err := getPortContainerizedAuth() + port, err := getPortContainerizedAuth(cr.Namespace) if err != nil { return err } diff --git a/tests/e2e/steps/steps_runner.go b/tests/e2e/steps/steps_runner.go index e9f30ea39..a54e1cfb3 100644 --- a/tests/e2e/steps/steps_runner.go +++ b/tests/e2e/steps/steps_runner.go @@ -72,7 +72,7 @@ func StepRunnerInit(runner *Runner, ctrlClient client.Client, clientSet *kuberne runner.addStep(`^Create \[([^"]*)\] prerequisites from CR \[(\d+)\]$`, step.createPrereqs) // Configure authorization-proxy-server for [powerflex] - runner.addStep(`^Configure authorization-proxy-server for \[([^"]*)\]$`, step.configureAuthorizationProxyServer) + runner.addStep(`^Configure authorization-proxy-server for \[([^"]*)\] for CR \[(\d+)\]$`, step.configureAuthorizationProxyServer) runner.addStep(`^Set up application mobility CR \[([^"]*)\]$`, step.configureAMInstall) // Connectivity Client steps diff --git a/tests/e2e/testfiles/authorization-templates/csm_authorization_certificate.yaml b/tests/e2e/testfiles/authorization-templates/csm_authorization_certificate.yaml index ce02da22e..a2044e105 100644 --- a/tests/e2e/testfiles/authorization-templates/csm_authorization_certificate.yaml +++ b/tests/e2e/testfiles/authorization-templates/csm_authorization_certificate.yaml @@ -2,7 +2,6 @@ apiVersion: cert-manager.io/v1 kind: Issuer metadata: name: selfsigned - namespace: authorization spec: selfSigned: {} --- @@ -10,7 +9,6 @@ apiVersion: cert-manager.io/v1 kind: Certificate metadata: name: karavi-auth - namespace: authorization spec: secretName: karavi-auth-tls duration: 2160h # 90d diff --git a/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_alt_ns.yaml b/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_alt_ns.yaml new file mode 100644 index 000000000..4cc6af321 --- /dev/null +++ b/tests/e2e/testfiles/authorization-templates/csm_authorization_proxy_server_alt_ns.yaml @@ -0,0 +1,74 @@ +apiVersion: storage.dell.com/v1 +kind: ContainerStorageModule +metadata: + name: authorization + namespace: proxy-ns +spec: + modules: + # Authorization: enable csm-authorization proxy server for RBAC + - name: authorization-proxy-server + # enable: Enable/Disable csm-authorization + enabled: true + configVersion: v1.9.1 + forceRemoveModule: true + components: + - name: karavi-authorization-proxy-server + # enable: Enable/Disable csm-authorization proxy server + enabled: true + proxyService: dellemc/csm-authorization-proxy:nightly + tenantService: dellemc/csm-authorization-tenant:nightly + roleService: dellemc/csm-authorization-role:nightly + storageService: dellemc/csm-authorization-storage:nightly + redis: redis:6.0.8-alpine + commander: rediscommander/redis-commander:latest + opa: openpolicyagent/opa + opaKubeMgmt: openpolicyagent/kube-mgmt:0.11 + envs: + # base hostname for the ingress rules that expose the services + # the proxy-server ingress will use this hostname + # the storage-service ingress will use storage.hostname + # Allowed values: string + # Default value: csm-authorization.com + - name: "PROXY_HOST" + value: "csm-authorization.com" + + # Proxy-service ingress configuration + # Default value: nginx + - name: "PROXY_INGRESS_CLASSNAME" + value: "nginx" + # An additional host rule for the proxy-server ingress + # Default value: authorization-ingress-nginx-controller.namespace.svc.cluster.local + - name: "PROXY_INGRESS_HOST" + value: "authorization-ingress-nginx-controller.authorization.svc.cluster.local" + + # Specify storage class for redis. Otherwise, default storage class is used. + # Default value: None + - name: "REDIS_STORAGE_CLASS" + value: "local-storage" + + # enabled: Enable/Disable nginx ingress + # Allowed values: + # true: enable deployment of nginx ingress controller + # false: disable deployment of nginx ingress only if you have your own ingress controller + # Default value: true + - name: ingress-nginx + enabled: true + + # enabled: Enable/Disable cert-manager + # Allowed values: + # true: enable deployment of cert-manager + # false: disable deployment of cert-manager only if it's already deployed + # Default value: true + - name: cert-manager + enabled: true + +--- +apiVersion: v1 +kind: ConfigMap +metadata: + name: csm-config-params + namespace: proxy-ns +data: + csm-config-params.yaml: | + CONCURRENT_POWERFLEX_REQUESTS: 10 + LOG_LEVEL: debug diff --git a/tests/e2e/testfiles/authorization-templates/csm_authorization_storage_secret.yaml b/tests/e2e/testfiles/authorization-templates/csm_authorization_storage_secret.yaml index c53a65591..2db2764b0 100644 --- a/tests/e2e/testfiles/authorization-templates/csm_authorization_storage_secret.yaml +++ b/tests/e2e/testfiles/authorization-templates/csm_authorization_storage_secret.yaml @@ -3,6 +3,5 @@ kind: Secret type: Opaque metadata: name: karavi-storage-secret - namespace: authorization data: storage-systems.yaml: c3RvcmFnZToK diff --git a/tests/e2e/testfiles/pflex-pscale-values.yaml b/tests/e2e/testfiles/pflex-pscale-values.yaml index e02a6ab37..e1f0f8155 100644 --- a/tests/e2e/testfiles/pflex-pscale-values.yaml +++ b/tests/e2e/testfiles/pflex-pscale-values.yaml @@ -84,7 +84,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerflex]" + - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Create storageclass with name [op-e2e-vxflexos] and template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Set up secret with template [testfiles/powerflex-templates/csm-authorization-config.json] name [karavi-authorization-config] in namespace [test-vxflexos] for [pflexAuthSidecar]" - "Set up secret with template [testfiles/powerflex-templates/powerflex-secret-template.yaml] name [test-vxflexos-config] in namespace [test-vxflexos] for [pflexAuth]" @@ -116,7 +116,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerflex]" + - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Set up secret with template [testfiles/powerflex-templates/csm-authorization-config.json] name [karavi-authorization-config] in namespace [test-vxflexos] for [pflexAuthSidecar]" - "Create storageclass with name [op-e2e-vxflexos] and template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Set up secret with template [testfiles/powerflex-templates/powerflex-secret-template.yaml] name [test-vxflexos-config] in namespace [test-vxflexos] for [pflex]" @@ -154,7 +154,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerflex]" + - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Set up secret with template [testfiles/powerflex-templates/csm-authorization-config.json] name [karavi-authorization-config] in namespace [test-vxflexos] for [pflexAuthSidecar]" - "Create storageclass with name [op-e2e-vxflexos] and template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Set up secret with template [testfiles/powerflex-templates/powerflex-secret-template.yaml] name [test-vxflexos-config] in namespace [test-vxflexos] for [pflexAuth]" diff --git a/tests/e2e/testfiles/values.yaml b/tests/e2e/testfiles/values.yaml index 493aa6990..62d34c70f 100644 --- a/tests/e2e/testfiles/values.yaml +++ b/tests/e2e/testfiles/values.yaml @@ -9,8 +9,8 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerscale]" - - "Configure authorization-proxy-server for [powerflex]" + - "Configure authorization-proxy-server for [powerscale] for CR [1]" + - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Delete custom resource [1]" - scenario: "Install Authorization Proxy Server With Default Redis Storage Class" @@ -27,6 +27,20 @@ - "Configure authorization-proxy-server for [powerflex]" - "Delete custom resource [1]" +- scenario: "Install Authorization Proxy Server with alternate namespace" + paths: + - "testfiles/authorization-templates/csm_authorization_proxy_server_alt_ns.yaml" + modules: + - "authorizationproxyserver" + steps: + - "Given an environment with k8s or openshift, and CSM operator installed" + - "Create [authorization-proxy-server] prerequisites from CR [1]" + - "Apply custom resource [1]" + - "Validate [authorization-proxy-server] module from CR [1] is installed" + - "Configure authorization-proxy-server for [powerscale] for CR [1]" + - "Configure authorization-proxy-server for [powerflex] for CR [1]" + - "Delete custom resource [1]" + - scenario: "Install PowerScale Driver(Standalone)" paths: - "testfiles/storage_csm_powerscale.yaml" @@ -155,7 +169,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerscale]" + - "Configure authorization-proxy-server for [powerscale] for CR [1]" - "Create storageclass with name [op-e2e-isilon] and template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" - "Set up secret with template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] name [isilon-creds-auth] in namespace [isilon] for [pscaleAuth]" - "Set up secret with template [testfiles/powerscale-templates/karavi-authorization-config.json] name [karavi-authorization-config] in namespace [isilon] for [pscaleAuthSidecar]" @@ -188,7 +202,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerscale]" + - "Configure authorization-proxy-server for [powerscale] for CR [1]" - "Create storageclass with name [op-e2e-isilon] and template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" - "Set up secret with template [testfiles/powerscale-templates/powerscale-secret-template.yaml] name [isilon-creds] in namespace [isilon] for [pscale]" - "Apply custom resource [2]" @@ -288,7 +302,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerscale]" + - "Configure authorization-proxy-server for [powerscale] for CR [1]" - "Create storageclass with name [op-e2e-isilon] and template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" - "Set up secret with template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] name [isilon-creds-auth] in namespace [isilon] for [pscaleAuth]" - "Set up secret with template [testfiles/powerscale-templates/karavi-authorization-config.json] name [karavi-authorization-config] in namespace [isilon] for [pscaleAuthSidecar]" @@ -404,7 +418,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerscale]" + - "Configure authorization-proxy-server for [powerscale] for CR [1]" - "Create storageclass with name [op-e2e-isilon] and template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" - "Set up secret with template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] name [isilon-creds-auth] in namespace [isilon] for [pscaleAuth]" - "Set up secret with template [testfiles/powerscale-templates/karavi-authorization-config.json] name [karavi-authorization-config] in namespace [isilon] for [pscaleAuthSidecar]" @@ -442,7 +456,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerscale]" + - "Configure authorization-proxy-server for [powerscale] for CR [1]" - "Create storageclass with name [op-e2e-isilon] and template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" - "Set up secret with template [testfiles/powerscale-templates/powerscale-secret-template.yaml] name [isilon-creds] in namespace [isilon] for [pscale]" - "Apply custom resource [2]" @@ -482,7 +496,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerscale]" + - "Configure authorization-proxy-server for [powerscale] for CR [1]" - "Create storageclass with name [op-e2e-isilon] and template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" - "Set up secret with template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] name [isilon-creds-auth] in namespace [isilon] for [pscaleAuth]" - "Set up secret with template [testfiles/powerscale-templates/karavi-authorization-config.json] name [karavi-authorization-config] in namespace [isilon] for [pscaleAuthSidecar]" @@ -529,7 +543,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerscale]" + - "Configure authorization-proxy-server for [powerscale] for CR [1]" - "Create storageclass with name [op-e2e-isilon] and template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" - "Set up secret with template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] name [isilon-creds-auth] in namespace [isilon] for [pscaleAuth]" - "Set up secret with template [testfiles/powerscale-templates/karavi-authorization-config.json] name [karavi-authorization-config] in namespace [isilon] for [pscaleAuthSidecar]" @@ -729,7 +743,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerflex]" + - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Create storageclass with name [op-e2e-vxflexos] and template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Set up secret with template [testfiles/powerflex-templates/csm-authorization-config.json] name [karavi-authorization-config] in namespace [test-vxflexos] for [pflexAuthSidecar]" - "Set up secret with template [testfiles/powerflex-templates/powerflex-secret-template.yaml] name [test-vxflexos-config] in namespace [test-vxflexos] for [pflex]" @@ -764,7 +778,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerflex]" + - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Set up secret with template [testfiles/powerflex-templates/csm-authorization-config.json] name [karavi-authorization-config] in namespace [test-vxflexos] for [pflexAuthSidecar]" - "Create storageclass with name [op-e2e-vxflexos] and template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Set up secret with template [testfiles/powerflex-templates/powerflex-secret-template.yaml] name [test-vxflexos-config] in namespace [test-vxflexos] for [pflex]" @@ -802,7 +816,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerflex]" + - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Set up secret with template [testfiles/powerflex-templates/csm-authorization-config.json] name [karavi-authorization-config] in namespace [test-vxflexos] for [pflexAuthSidecar]" - "Create storageclass with name [op-e2e-vxflexos] and template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Set up secret with template [testfiles/powerflex-templates/powerflex-secret-template.yaml] name [test-vxflexos-config] in namespace [test-vxflexos] for [pflexAuth]" @@ -975,7 +989,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerflex]" + - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Create storageclass with name [op-e2e-vxflexos] and template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Set up secret with template [testfiles/powerflex-templates/csm-authorization-config.json] name [karavi-authorization-config] in namespace [test-vxflexos] for [pflexAuthSidecar]" - "Set up secret with template [testfiles/powerflex-templates/powerflex-secret-template.yaml] name [test-vxflexos-config] in namespace [test-vxflexos] for [pflex]" @@ -1016,7 +1030,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerflex]" + - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Create storageclass with name [op-e2e-vxflexos] and template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Set up secret with template [testfiles/powerflex-templates/csm-authorization-config.json] name [karavi-authorization-config] in namespace [test-vxflexos] for [pflexAuthSidecar]" - "Set up secret with template [testfiles/powerflex-templates/powerflex-secret-template.yaml] name [test-vxflexos-config] in namespace [test-vxflexos] for [pflex]" @@ -1053,7 +1067,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerflex]" + - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Create storageclass with name [op-e2e-vxflexos] and template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Set up secret with template [testfiles/powerflex-templates/csm-authorization-config.json] name [karavi-authorization-config] in namespace [test-vxflexos] for [pflexAuthSidecar]" - "Set up secret with template [testfiles/powerflex-templates/powerflex-secret-template.yaml] name [test-vxflexos-config] in namespace [test-vxflexos] for [pflex]" @@ -1099,7 +1113,7 @@ - "Create [authorization-proxy-server] prerequisites from CR [1]" - "Apply custom resource [1]" - "Validate [authorization-proxy-server] module from CR [1] is installed" - - "Configure authorization-proxy-server for [powerflex]" + - "Configure authorization-proxy-server for [powerflex] for CR [1]" - "Create storageclass with name [op-e2e-vxflexos] and template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" - "Set up secret with template [testfiles/powerflex-templates/csm-authorization-config.json] name [karavi-authorization-config] in namespace [test-vxflexos] for [pflexAuthSidecar]" - "Set up secret with template [testfiles/powerflex-templates/powerflex-secret-template.yaml] name [test-vxflexos-config] in namespace [test-vxflexos] for [pflex]"