From 5e12d7452cc9fa7ba3b0a1034afb2dc5c86ad8bc Mon Sep 17 00:00:00 2001 From: Christian Coffield Date: Tue, 15 Oct 2024 17:04:29 +0530 Subject: [PATCH] E2E for PowerScale driver with all modules (#729) --- .../minimal-testfiles/scenarios.yaml | 299 ++++++++++++++++++ .../storage_csm_powerscale.yaml | 65 ++++ .../storage_csm_powerscale_auth.yaml | 37 +++ .../storage_csm_powerscale_auth2.0.yaml | 37 +++ .../storage_csm_powerscale_observability.yaml | 37 +++ ...erscale_observability_top_custom_cert.yaml | 45 +++ .../storage_csm_powerscale_replica.yaml | 31 ++ .../storage_csm_powerscale_resiliency.yaml | 31 ++ 8 files changed, 582 insertions(+) create mode 100644 tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale.yaml create mode 100644 tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_auth.yaml create mode 100644 tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_auth2.0.yaml create mode 100644 tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_observability.yaml create mode 100644 tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_observability_top_custom_cert.yaml create mode 100644 tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_replica.yaml create mode 100644 tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_resiliency.yaml diff --git a/tests/e2e/testfiles/minimal-testfiles/scenarios.yaml b/tests/e2e/testfiles/minimal-testfiles/scenarios.yaml index 80b9fcdf9..dfa015692 100644 --- a/tests/e2e/testfiles/minimal-testfiles/scenarios.yaml +++ b/tests/e2e/testfiles/minimal-testfiles/scenarios.yaml @@ -276,3 +276,302 @@ - "Delete custom resource [1]" - "Restore template [testfiles/powerflex-templates/powerflex-secret-template.yaml] for [pflex]" - "Restore template [testfiles/powerflex-templates/powerflex-storageclass-template.yaml] for [pflex]" +- scenario: "Install PowerScale Driver(Standalone)" + paths: + - "testfiles/minimal-testfiles/storage_csm_powerscale.yaml" + tags: + - "powerscale" + - "sanity" + steps: + - "Given an environment with k8s or openshift, and CSM operator installed" + - "Create storageclass with name [op-e2e-isilon] and template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" + - "Set up secret with template [testfiles/powerscale-templates/powerscale-secret-template.yaml] name [isilon-creds] in namespace [isilon] for [pscale]" + - "Apply custom resource [1]" + - "Validate custom resource [1]" + - "Validate [powerscale] driver from CR [1] is installed" + - "Run custom test" + # cleanup + - "Enable forceRemoveDriver on CR [1]" + - "Delete custom resource [1]" + - "Restore template [testfiles/powerscale-templates/powerscale-secret-template.yaml] for [pscale]" + - "Restore template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" + customTest: + name: Cert CSI + run: + - cert-csi test vio --sc op-e2e-isilon --chainNumber 2 --chainLength 2 + +- scenario: "Install PowerScale Driver(Standalone), Enable/Disable Resiliency" + paths: + - "testfiles/minimal-testfiles/storage_csm_powerscale.yaml" + tags: + - "powerscale" + - "resiliency" + - "sanity" + steps: + - "Given an environment with k8s or openshift, and CSM operator installed" + - "Set up secret with template [testfiles/powerscale-templates/powerscale-secret-template.yaml] name [isilon-creds] in namespace [isilon] for [pscale]" + - "Apply custom resource [1]" + - "Validate custom resource [1]" + - "Validate [powerscale] driver from CR [1] is installed" + - "Validate [resiliency] module from CR [1] is not installed" + - "Enable [resiliency] module from CR [1]" + - "Validate [powerscale] driver from CR [1] is installed" + - "Validate [resiliency] module from CR [1] is installed" + - "Disable [resiliency] module from CR [1]" + - "Validate [powerscale] driver from CR [1] is installed" + - "Validate [resiliency] module from CR [1] is not installed" + # cleanup + - "Enable forceRemoveDriver on CR [1]" + - "Delete custom resource [1]" + - "Restore template [testfiles/powerscale-templates/powerscale-secret-template.yaml] for [pscale]" + +- scenario: "Install PowerScale Driver(With Resiliency)" + paths: + - "testfiles/minimal-testfiles/storage_csm_powerscale_resiliency.yaml" + tags: + - "powerscale" + - "resiliency" + steps: + - "Given an environment with k8s or openshift, and CSM operator installed" + - "Set up secret with template [testfiles/powerscale-templates/powerscale-secret-template.yaml] name [isilon-creds] in namespace [isilon] for [pscale]" + - "Apply custom resource [1]" + - "Validate custom resource [1]" + - "Validate [powerscale] driver from CR [1] is installed" + - "Validate [resiliency] module from CR [1] is installed" + - "Run custom test" + # cleanup + - "Enable forceRemoveDriver on CR [1]" + - "Delete custom resource [1]" + - "Restore template [testfiles/powerscale-templates/powerscale-secret-template.yaml] for [pscale]" + customTest: + name: CustomTest + run: + - echo "no current test for resiliency" + +- scenario: "Install PowerScale Driver(With Replication)" + paths: + - "testfiles/minimal-testfiles/storage_csm_powerscale_replica.yaml" + tags: + - "powerscale" + - "replication" + steps: + - "Given an environment with k8s or openshift, and CSM operator installed" + - "Create storageclass with name [op-e2e-isilon] and template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" + - "Set up secret with template [testfiles/powerscale-templates/powerscale-secret-template.yaml] name [isilon-creds] in namespace [isilon] for [pscale]" + - "Apply custom resource [1]" + - "Validate custom resource [1]" + - "Validate [powerscale] driver from CR [1] is installed" + - "Validate [replication] module from CR [1] is installed" + - "Run custom test" + # cleanup + - "Enable forceRemoveDriver on CR [1]" + - "Delete custom resource [1]" + customTest: + name: HelloWorld + run: + - echo "no current test implemented for replication" + +- scenario: "Install PowerScale Driver(Standalone), Enable/Disable Replication" + paths: + - "testfiles/minimal-testfiles/storage_csm_powerscale.yaml" + - "testfiles/minimal-testfiles/storage_csm_powerscale_replica.yaml" + tags: + - "powerscale" + - "replication" + steps: + - "Given an environment with k8s or openshift, and CSM operator installed" + - "Create storageclass with name [op-e2e-isilon] and template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" + - "Set up secret with template [testfiles/powerscale-templates/powerscale-secret-template.yaml] name [isilon-creds] in namespace [isilon] for [pscale]" + - "Apply custom resource [1]" + - "Validate custom resource [1]" + - "Validate [powerscale] driver from CR [1] is installed" + - "Validate [replication] module from CR [1] is not installed" + - "Enable [replication] module from CR [2]" + - "Validate [powerscale] driver from CR [2] is installed" + - "Validate [replication] module from CR [2] is installed" + - "Run custom test" + - "Disable [replication] module from CR [1]" + - "Validate [replication] driver from CR [1] is installed" + - "Validate [replication] module from CR [1] is not installed" + # cleanup + - "Enable forceRemoveDriver on CR [2]" + - "Delete custom resource [2]" + customTest: + name: HelloWorld + run: + - echo "no current test implemented for replication" + +- scenario: "Uninstall PowerScale Driver" + paths: + - "testfiles/minimal-testfiles/storage_csm_powerscale.yaml" + tags: + - "powerscale" + - "sanity" + steps: + - "Given an environment with k8s or openshift, and CSM operator installed" + - "Set up secret with template [testfiles/powerscale-templates/powerscale-secret-template.yaml] name [isilon-creds] in namespace [isilon] for [pscale]" + - "Apply custom resource [1]" + - "Validate custom resource [1]" + - "Validate [powerscale] driver from CR [1] is installed" + - "Enable forceRemoveDriver on CR [1]" + - "Delete custom resource [1]" + - "Restore template [testfiles/powerscale-templates/powerscale-secret-template.yaml] for [pscale]" + - "Validate [powerscale] driver from CR [1] is not installed" + +- scenario: "Install PowerScale Driver(Standalone), Enable/Disable Observability" + paths: + - "testfiles/minimal-testfiles/storage_csm_powerscale.yaml" + tags: + - "powerscale" + - "observability" + steps: + - "Given an environment with k8s or openshift, and CSM operator installed" + - "Set up secret with template [testfiles/powerscale-templates/powerscale-secret-template.yaml] name [isilon-creds] in namespace [isilon] for [pscale]" + - "Apply custom resource [1]" + - "Validate custom resource [1]" + - "Validate [powerscale] driver from CR [1] is installed" + - "Validate [observability] module from CR [1] is not installed" + - "Enable [observability] module from CR [1]" + - "Validate [powerscale] driver from CR [1] is installed" + - "Validate [observability] module from CR [1] is installed" + - "Disable [observability] module from CR [1]" + - "Validate [powerscale] driver from CR [1] is installed" + - "Validate [observability] module from CR [1] is not installed" + - "Run custom test" + # cleanup + - "Enable forceRemoveDriver on CR [1]" + - "Delete custom resource [1]" + - "Restore template [testfiles/powerscale-templates/powerscale-secret-template.yaml] for [pscale]" + +- scenario: "Install PowerScale Driver(With Observability and Custom Certs)" + paths: + - "testfiles/minimal-testfiles/storage_csm_powerscale_observability_top_custom_cert.yaml" + tags: + - "observability" + steps: + - "Given an environment with k8s or openshift, and CSM operator installed" + - "Create storageclass with name [op-e2e-isilon] and template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" + - "Set up secret with template [testfiles/powerscale-templates/powerscale-secret-template.yaml] name [isilon-creds] in namespace [isilon] for [pscale]" + - "Apply custom resource [1]" + - "Validate custom resource [1]" + - "Validate [powerscale] driver from CR [1] is installed" + - "Validate [observability] module from CR [1] is installed" + # cleanup + - "Enable forceRemoveDriver on CR [1]" + - "Delete custom resource [1]" + - "Restore template [testfiles/powerscale-templates/powerscale-secret-template.yaml] for [pscale]" + - "Restore template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" + +- scenario: "Install PowerScale Driver(With Authorization V1)" + paths: + - "testfiles/authorization-templates/storage_csm_authorization_proxy_server_n_minus_1.yaml" + - "testfiles/minimal-testfiles/storage_csm_powerscale_auth.yaml" + tags: + - "authorizationproxyserver" + - "authorization" + - "powerscale" + steps: + - "Given an environment with k8s or openshift, and CSM operator installed" + - "Create [authorization-proxy-server] prerequisites from CR [1]" + - "Apply custom resource [1]" + - "Validate [authorization-proxy-server] module from CR [1] is installed" + - "Configure authorization-proxy-server for [powerscale] for CR [1]" + - "Set up secret with template [testfiles/powerscale-templates/powerscale-secret-template.yaml] name [isilon-creds] in namespace [isilon] for [pscale]" + - "Create storageclass with name [op-e2e-isilon] and template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" + - "Set up secret with template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] name [isilon-creds-auth] in namespace [isilon] for [pscaleAuth]" + - "Set up secret with template [testfiles/powerscale-templates/karavi-authorization-config.json] name [karavi-authorization-config] in namespace [isilon] for [pscaleAuthSidecar]" + - "Set up secret with template [testfiles/authorization-templates/rootCertificate.pem] name [proxy-server-root-certificate] in namespace [isilon] for [authSidecarCert]" + - "Apply custom resource [2]" + - "Validate custom resource [2]" + - "Validate [powerscale] driver from CR [2] is installed" + - "Validate [authorization] module from CR [2] is installed" + - "Run custom test" + # cleanup + - "Enable forceRemoveDriver on CR [2]" + - "Delete custom resource [2]" + - "Delete custom resource [1]" + - "Restore template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] for [pscaleAuth]" + - "Restore template [testfiles/powerscale-templates/karavi-authorization-config.json] for [pscaleAuthSidecar]" + customTest: + name: Cert CSI + run: + - cert-csi test vio --sc op-e2e-isilon --chainNumber 2 --chainLength 2 + +- scenario: "Install PowerScale Driver, Enable/Disable Authorization V1 module" + paths: + - "testfiles/authorization-templates/storage_csm_authorization_proxy_server_n_minus_1.yaml" + - "testfiles/minimal-testfiles/storage_csm_powerscale.yaml" + tags: + - "authorizationproxyserver" + - "authorization" + - "powerscale" + # - "sanity" + steps: + - "Given an environment with k8s or openshift, and CSM operator installed" + - "Create [authorization-proxy-server] prerequisites from CR [1]" + - "Apply custom resource [1]" + - "Validate [authorization-proxy-server] module from CR [1] is installed" + - "Configure authorization-proxy-server for [powerscale] for CR [1]" + - "Create storageclass with name [op-e2e-isilon] and template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" + - "Set up secret with template [testfiles/powerscale-templates/powerscale-secret-template.yaml] name [isilon-creds] in namespace [isilon] for [pscale]" + - "Apply custom resource [2]" + - "Validate custom resource [2]" + - "Validate [powerscale] driver from CR [2] is installed" + - "Validate [authorization] module from CR [2] is not installed" + - "Enable [authorization] module from CR [2]" + - "Set up secret with template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] name [isilon-creds-auth] in namespace [isilon] for [pscaleAuth]" + - "Set secret for driver from CR [2] to [isilon-creds-auth]" + - "Set up secret with template [testfiles/powerscale-templates/karavi-authorization-config.json] name [karavi-authorization-config] in namespace [isilon] for [pscaleAuthSidecar]" + - "Set up secret with template [testfiles/authorization-templates/rootCertificate.pem] name [proxy-server-root-certificate] in namespace [isilon] for [authSidecarCert]" + - "Validate [powerscale] driver from CR [2] is installed" + - "Validate [authorization] module from CR [2] is installed" + - "Disable [authorization] module from CR [2]" + - "Set secret for driver from CR [2] to [isilon-creds]" + - "Validate [powerscale] driver from CR [2] is installed" + - "Validate [authorization] module from CR [2] is not installed" + # cleanup + - "Enable forceRemoveDriver on CR [2]" + - "Delete custom resource [2]" + - "Delete custom resource [1]" + - "Restore template [testfiles/powerscale-templates/powerscale-secret-template.yaml] for [pscale]" + - "Restore template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] for [pscaleAuth]" + - "Restore template [testfiles/powerscale-templates/karavi-authorization-config.json] for [pscaleAuthSidecar]" + - "Restore template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" + - "Restore template [testfiles/powerscale-templates/rootCertificate.pem] for [authSidecarCert]" + +- scenario: "Install PowerScale Driver (With Authorization V2)" + paths: + - "testfiles/authorization-templates/storage_csm_authorization_proxy_server.yaml" + - "testfiles/minimal-testfiles/storage_csm_powerscale_auth2.0.yaml" + - "testfiles/authorization-templates/storage_csm_authorization_crds.yaml" + tags: + - "authorization" + - "authorizationproxyserver" + - "powerscale" + steps: + - "Given an environment with k8s or openshift, and CSM operator installed" + - "Install Authorization CRDs [3]" + - "Create [authorization-proxy-server] prerequisites from CR [1]" + - "Apply custom resource [1]" + - "Validate [authorization-proxy-server] module from CR [1] is installed" + - "Configure authorization-proxy-server for [powerscale] for CR [1]" + - "Create storageclass with name [op-e2e-isilon] and template [testfiles/powerscale-templates/powerscale-storageclass-template.yaml] for [pscale]" + - "Set up secret with template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] name [isilon-creds] in namespace [isilon] for [pscaleAuth]" + - "Set up secret with template [testfiles/powerscale-templates/karavi-authorization-config.json] name [karavi-authorization-config] in namespace [isilon] for [pscaleAuthSidecar]" + - "Apply custom resource [2]" + - "Validate custom resource [2]" + - "Validate [powerscale] driver from CR [2] is installed" + - "Validate [authorization] module from CR [2] is installed" + - "Run custom test" + # cleanup + - "Enable forceRemoveDriver on CR [2]" + - "Delete custom resource [2]" + - "Delete Authorization CRs for [powerscale]" + - "Delete custom resource [1]" + - "Delete Authorization CRDs [3]" + - "Restore template [testfiles/powerscale-templates/powerscale-auth-secret-template.yaml] for [pscaleAuth]" + - "Restore template [testfiles/powerscale-templates/karavi-authorization-config.json] for [pscaleAuthSidecar]" + customTest: + name: Cert CSI + run: + - cert-csi test vio --sc op-e2e-isilon --chainNumber 2 --chainLength 2 diff --git a/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale.yaml b/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale.yaml new file mode 100644 index 000000000..5030777aa --- /dev/null +++ b/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale.yaml @@ -0,0 +1,65 @@ +apiVersion: storage.dell.com/v1 +kind: ContainerStorageModule +metadata: + name: isilon + namespace: isilon +spec: + driver: + csiDriverType: "isilon" + configVersion: v2.12.0 + forceRemoveDriver: true + common: + image: "dellemc/csi-isilon:nightly" + modules: + # Authorization: enable csm-authorization for RBAC + - name: authorization + # enable: Enable/Disable csm-authorization + enabled: false + # For Auth 2.0, use v2.0.0 as configVersion + configVersion: v1.12.0 + components: + - name: karavi-authorization-proxy + image: dellemc/csm-authorization-sidecar:nightly + envs: + # proxyHost: hostname of the csm-authorization server + - name: "PROXY_HOST" + value: "authorization-ingress-nginx-controller.authorization.svc.cluster.local" + # skipCertificateValidation: Enable/Disable certificate validation of the csm-authorization server + - name: "SKIP_CERTIFICATE_VALIDATION" + value: "true" + - name: resiliency + # enabled: Enable/Disable Resiliency feature + # Allowed values: + # true: enable Resiliency feature(deploy podmon sidecar) + # false: disable Resiliency feature(do not deploy podmon sidecar) + # Default value: false + enabled: false + components: + - name: podmon-controller + image: dellemc/podmon:nightly + - name: podmon-node + image: dellemc/podmon:nightly + - name: replication + enabled: false + components: + - name: dell-csi-replicator + image: dellemc/dell-csi-replicator:nightly + - name: dell-replication-controller-manager + image: dellemc/dell-replication-controller:nightly + - name: dell-replication-controller-init + image: dellemc/dell-replication-init:v1.0.0 + - name: observability + # enabled: Enable/Disable observability + enabled: false + components: + - name: topology + enabled: true + image: dellemc/csm-topology:nightly + - name: otel-collector + enabled: true + image: otel/opentelemetry-collector:0.42.0 + - name: cert-manager + enabled: false + - name: metrics-powerscale + enabled: true + image: dellemc/csm-metrics-powerscale:nightly diff --git a/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_auth.yaml b/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_auth.yaml new file mode 100644 index 000000000..99b0c90de --- /dev/null +++ b/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_auth.yaml @@ -0,0 +1,37 @@ +apiVersion: storage.dell.com/v1 +kind: ContainerStorageModule +metadata: + name: isilon + namespace: isilon +spec: + driver: + csiDriverType: "isilon" + configVersion: v2.12.0 + replicas: 1 + forceRemoveDriver: true + common: + image: "dellemc/csi-isilon:nightly" + modules: + # Authorization: enable csm-authorization for RBAC + - name: authorization + # enable: Enable/Disable csm-authorization + enabled: true + # For Auth 2.0, use v2.0.0 as configVersion + configVersion: v1.12.0 + components: + - name: karavi-authorization-proxy + image: dellemc/csm-authorization-sidecar:nightly + envs: + # proxyHost: hostname of the csm-authorization server + - name: "PROXY_HOST" + value: "authorization-ingress-nginx-controller.authorization.svc.cluster.local" + # skipCertificateValidation: Enable/Disable certificate validation of the csm-authorization server + - name: "SKIP_CERTIFICATE_VALIDATION" + value: "true" + - name: resiliency + enabled: false + - name: replication + enabled: false + - name: observability + # enabled: Enable/Disable observability + enabled: false diff --git a/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_auth2.0.yaml b/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_auth2.0.yaml new file mode 100644 index 000000000..377357a53 --- /dev/null +++ b/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_auth2.0.yaml @@ -0,0 +1,37 @@ +apiVersion: storage.dell.com/v1 +kind: ContainerStorageModule +metadata: + name: isilon + namespace: isilon +spec: + driver: + csiDriverType: "isilon" + configVersion: v2.12.0 + replicas: 1 + forceRemoveDriver: true + common: + image: "dellemc/csi-isilon:nightly" + modules: + # Authorization: enable csm-authorization for RBAC + - name: authorization + # enable: Enable/Disable csm-authorization + enabled: true + # For Auth 2.0, use v2.0.0 as configVersion + configVersion: v2.0.0 + components: + - name: karavi-authorization-proxy + image: dellemc/csm-authorization-sidecar:nightly + envs: + # proxyHost: hostname of the csm-authorization server + - name: "PROXY_HOST" + value: "authorization-ingress-nginx-controller.authorization.svc.cluster.local" + # skipCertificateValidation: Enable/Disable certificate validation of the csm-authorization server + - name: "SKIP_CERTIFICATE_VALIDATION" + value: "true" + - name: resiliency + enabled: false + - name: replication + enabled: false + - name: observability + # enabled: Enable/Disable observability + enabled: false diff --git a/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_observability.yaml b/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_observability.yaml new file mode 100644 index 000000000..35ecbcbe4 --- /dev/null +++ b/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_observability.yaml @@ -0,0 +1,37 @@ +apiVersion: storage.dell.com/v1 +kind: ContainerStorageModule +metadata: + name: isilon + namespace: isilon +spec: + driver: + csiDriverType: "isilon" + configVersion: v2.12.0 + forceRemoveDriver: true + common: + image: "dellemc/csi-isilon:nightly" + modules: + # Authorization: enable csm-authorization for RBAC + - name: authorization + enabled: false + # For Auth 2.0, use v2.0.0 as configVersion + configVersion: v1.11.0 + - name: resiliency + enabled: false + - name: replication + enabled: false + - name: observability + # enabled: Enable/Disable observability + enabled: true + components: + - name: topology + enabled: true + image: dellemc/csm-topology:nightly + - name: otel-collector + enabled: true + image: otel/opentelemetry-collector:0.42.0 + - name: cert-manager + enabled: false + - name: metrics-powerscale + enabled: true + image: dellemc/csm-metrics-powerscale:nightly diff --git a/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_observability_top_custom_cert.yaml b/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_observability_top_custom_cert.yaml new file mode 100644 index 000000000..8f7ee8f90 --- /dev/null +++ b/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_observability_top_custom_cert.yaml @@ -0,0 +1,45 @@ +apiVersion: storage.dell.com/v1 +kind: ContainerStorageModule +metadata: + name: isilon + namespace: isilon +spec: + driver: + csiDriverType: "isilon" + configVersion: v2.12.0 + forceRemoveDriver: true + common: + image: "dellemc/csi-isilon:nightly" + modules: + # Authorization: enable csm-authorization for RBAC + - name: authorization + enabled: false + # For Auth 2.0, use v2.0.0 as configVersion + configVersion: v1.11.0 + - name: resiliency + enabled: false + - name: replication + enabled: false + - name: observability + # enabled: Enable/Disable observability + enabled: true + components: + - name: topology + enabled: true + # certificate: certificate for cert/private-key pair -- please add cert here to use custom certificates + # for self-signed certs, leave empty string + # Allowed values: string + certificate: "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" + # privateKey: private key for cert/private-key pair -- please add cert here to use custom certificates + # for self-signed certs, leave empty string + # Allowed values: string + privateKey: "LS0tLS1CRUdJTiBSU0EgUFJJVkFURSBLRVktLS0tLQpNSUlFcFFJQkFBS0NBUUVBeUl4ZGdOMDQ3Z2ZONU9Id0hxYTI5RzVnd3Q5M2VidnEwZVdnZE5RWXUvUU91YktoCkNyVmFDekFwc0xoUXJ5YThDODlrUzN1ZkRzSzN6N2hySEV4Z25XOGc3Ri9XTjVpaXYzcU9GcDk2ZVc4VFR5UHIKYVZLSld6bGsvcUloVnZIRlRsU25OY3JiU2VuOUZIcWZkeEZwN3ozVUl3bVVrZk8vTTQ1RHkrcDU2cmdqOW4vSQo2L1ZraTFlcWpQSDdXWU52SUFyTWtKb2UwYUhZVUk3amt3RGdTemRNYzJzN1I5NWxQTFY1MDgxdFNCWTJtNno0ClRrdXZLUHRtUWdaTC9ySi9pR1EwS1U5MmJkRVAvVEg1UnhJMkR2dlNwUEs1UkhzTEhPVDdUZWV5NGJXU1VQemIKU0cwUUFBNG9ScjU1djNVWG5pZjBMcDRENDlOcXB0UitFc2ZMdndJREFRQUJBb0lCQUUva2V5dG05ZEw5a094cApoYnJ3TjFwUXpvTlRlc2tvTDNmR3ZwRk1IVDVqRDZxeW1xMGxhZVdqSGppa2RLQVNFait5TXdaUERTSllOOW1zClloODMzaFZadkFmdWRleFlCaDI1dVBrU056eEJIN1FiWHlEcUhJWVc2MEQxWGNyQkxoVHliRnBsb2M1a1JNbnYKdjY4elpMeEdLVWg3L0kvWVJvZEhXWUxXdWhMaTYvVGpKMGNJbWlOVWxMeWhXNHJrUXRveUZmelYvWkZpZGYvWApSYjQwRHRCRk1QbytVdFRBbnJuTlF3UDN2cEF5U09OV2U3MW45dS9XdFlwYzVNeDJGaGZFbm5PcTlZcVNEMVNQCm5hUC9OUndOQ2xOY1BleWZaSU84SytWT3MvbFpBOGErMXREWTZzOFVOTHBvcm42YkRWdEsweU4rTU9YK1FLaXEKTG9KeDZtRUNnWUVBNlU3ZU96OEcybG9wd245ald6YXBobG5TU2RFTHZobS95cllNMy9TN2puTkRYNkd3TkRlKwpFQTFINUs1UDRLNnlleFMvZEllaWo4bDhiRytVb0V3Rm9pOVIxaTdGR21DL1p6WTRpa2IyQXI0MU8yV29kVk9UCkRjNnBjdmlkWnp5ZjJWaGlTMFNLZ3ZodDdzSTlQcjFyZWlyNW9TYXBuUC9hUFhCTkl3dDh3V01DZ1lFQTNBM1AKODNrOUlPdjNNUWhiL1JiUDVBRWZYaW85U0hJNW1oekFLankxY2M1WDdadjI2SmpIc21RNGQrb0s0UjljMGFIWApETDFBRlYrWTkyRTU4ZVE1SXJhQ3JTQVAwYk45bENqLzdEMDFrT2ZnTis5QXJzVy8yc0tFcFRtZENtc3ZGb1JuClNOUzBNYmpDdmQxOEtYdWNFYmdoZzZTcjZwaGN2QWVoaGtpcjZQVUNnWUVBcFl0bXVKZENINUUyYkdIRGVDZFQKSnBkNVZSTlZ4Nit4blA2TUtDVVpLRHkxSTVndzFQeHdpaWRDU2dzOWRtbS9Ed0pyengybXhXdnNNMjBCQXJTdQprcVFNNTNNTVBHbEZwdENjVWRHRUlmSWhCMkpjbzlPSFZwYTdPVzhiRVBPOVlKVU1PZWdLZUdBYWNQMjJRMXhZCmRMa2xvNmt4Vk10ZWFaWFR4ZmdTcjQwQ2dZRUF3K2lnSEZqeHJSK213TVo2YndZaUt4RTh4ZTdCQklCOCs5RmcKMjdtVXFDOVdaTG9YeGRoTzRXa01ST1hlcmJIb1J0SFl6UVNueXQrREphb3Zsa1RqQVI2UGxHWVk3MDduSEVLcwpKYndRdG1OWllUTGwyVE5BclJmRVUvekk3UCtqdWw1Q1BicndlZHZOdEk4OC9RbUpWdFVoTVR3bnVnSFBmYThsCmhKR3FTd2tDZ1lFQW1UKzJQY1VIdVZuYXU1ZjVYMXZPaVI1aGtyNEZYUFhwZVVRZDVyMFZZazBsb01Yc3FQVGsKc0lZN0lmSUlRZ01xbFNnUVhMeVBpbjJPWEN1ZnBKTlVDRlJRamtMV2ZCZW1QbEh6N2hjNURvVHJEU1doOUtETApNak9HL3d4ckRwZGlvRnZmcVA3bldIeGk3UzAxNXpHNHhtbkg2WUZ1TThuaHpyU3NSQzhzV20wPQotLS0tLUVORCBSU0EgUFJJVkFURSBLRVktLS0tLQ==" + image: dellemc/csm-topology:nightly + - name: otel-collector + enabled: true + image: otel/opentelemetry-collector:0.42.0 + - name: cert-manager + enabled: false + - name: metrics-powerscale + enabled: true + image: dellemc/csm-metrics-powerscale:nightly diff --git a/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_replica.yaml b/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_replica.yaml new file mode 100644 index 000000000..c7c96b914 --- /dev/null +++ b/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_replica.yaml @@ -0,0 +1,31 @@ +apiVersion: storage.dell.com/v1 +kind: ContainerStorageModule +metadata: + name: isilon + namespace: isilon +spec: + driver: + csiDriverType: "isilon" + configVersion: v2.12.0 + forceRemoveDriver: true + common: + image: "dellemc/csi-isilon:nightly" + modules: + - name: authorization + enabled: false + # For Auth 2.0, use v2.0.0 as configVersion + configVersion: v1.11.0 + - name: resiliency + enabled: false + - name: replication + enabled: true + components: + - name: dell-csi-replicator + image: dellemc/dell-csi-replicator:nightly + - name: dell-replication-controller-manager + image: dellemc/dell-replication-controller:nightly + # envs: + # - name: "TARGET_CLUSTERS_IDS" + # value: "self" + - name: dell-replication-controller-init + image: dellemc/dell-replication-init:v1.0.0 diff --git a/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_resiliency.yaml b/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_resiliency.yaml new file mode 100644 index 000000000..170506ccd --- /dev/null +++ b/tests/e2e/testfiles/minimal-testfiles/storage_csm_powerscale_resiliency.yaml @@ -0,0 +1,31 @@ +apiVersion: storage.dell.com/v1 +kind: ContainerStorageModule +metadata: + name: isilon + namespace: isilon +spec: + driver: + csiDriverType: "isilon" + configVersion: v2.12.0 + forceRemoveDriver: true + common: + image: "dellemc/csi-isilon:nightly" + modules: + # Authorization: enable csm-authorization for RBAC + - name: authorization + # enable: Enable/Disable csm-authorization + enabled: false + # For Auth 2.0, use v2.0.0 as configVersion + configVersion: v1.11.0 + - name: resiliency + # enabled: Enable/Disable Resiliency feature + # Allowed values: + # true: enable Resiliency feature(deploy podmon sidecar) + # false: disable Resiliency feature(do not deploy podmon sidecar) + # Default value: false + enabled: true + components: + - name: podmon-controller + image: dellemc/podmon:nightly + - name: podmon-node + image: dellemc/podmon:nightly