This repository was archived by the owner on Oct 11, 2024. It is now read-only.
Merged
Conversation
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
it will return SecurityPolicy spec. Signed-off-by: Burak Sekili <buraksekili@gmail.com>
… TT-3695/fix-policy-migration
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
… TT-3695/fix-policy-migration
…gies/tyk-operator into TT-3695/fix-policy-migration
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Collaborator
|
fix #357 |
…urityPolicy. Add new e2e tests cases for migration Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Controller. Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
…gies/tyk-operator into TT-3695/fix-policy-migration
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
…ison with already-defined function. Compare previous and new ID after restoring from drifts. Remove redundant conditions in wait.For() function Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
…se to decide new Policy ID Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
komalsukhani
approved these changes
Dec 28, 2022
Signed-off-by: Burak Sekili <buraksekili@gmail.com>
|
Kudos, SonarCloud Quality Gate passed! |
buger
pushed a commit
that referenced
this pull request
May 22, 2024
* Add security policies for tyk oss Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Update integration tests Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Add control over gw version for security policy tests Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Add if check to understand the existence of mongo id Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Update CHANGELOG Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Update current CR based on existing policy Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Update create method of SecurityPolicy Reconciler. So that, from now on it will return SecurityPolicy spec. Signed-off-by: Burak Sekili <buraksekili@gmail.com> * use CR's AccessRightsArray field instead of generating it Signed-off-by: Burak Sekili <buraksekili@gmail.com> * add initial e2e tests for securitypolicy controller Signed-off-by: Burak Sekili <buraksekili@gmail.com> * fix linter issue, add additional error checks for type assertions Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Add a logic to recover from unintended deletes from Dashboard for SecurityPolicy. Add new e2e tests cases for migration Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Fix issues on v3.2 Signed-off-by: Burak Sekili <buraksekili@gmail.com> * generate random name for securitypolicy Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Wait for resource is updated properly Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Add new test cases to cover different scenarios of SecurityPolicy Controller. Signed-off-by: Burak Sekili <buraksekili@gmail.com> * remove integration tests Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Merge upstream Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Revert changes and update tests accordingly Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Fix linter issue - remove extra new line Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Use unused StatusID in comparison function. Replace duplicated comparison with already-defined function. Compare previous and new ID after restoring from drifts. Remove redundant conditions in wait.For() function Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Update tests cases to prevent direct comparison between IDs Signed-off-by: Burak Sekili <buraksekili@gmail.com> * remove parsepolicy function to decide policy. Instead, use API response to decide new Policy ID Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Remove redundant white space Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Update tests for CE Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Rename helper functions Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Wait for until resources are created on Tyk Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Change comparison value for ID Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Add CHANGELOG entry for new changes Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Update Policy documentation Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Run tests against Tyk v4.2 Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Skip CE tests for Security Policies if the version is lower than 4.1 Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Fix version check in integration tests Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Update default Tyk version in e2e tests Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Update log statement in e2e test Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Update reconciler logic Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Fix invalid assignment of TYK_VERSION env variable in CE mode. Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Randomize policy names in e2e tests Signed-off-by: Burak Sekili <buraksekili@gmail.com> * control test flow Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Rename variable according to feedback Signed-off-by: Burak Sekili <buraksekili@gmail.com> * remove additional reconciliation Signed-off-by: Burak Sekili <buraksekili@gmail.com> * Remove redundant retries in e2e tests to verify Api updates Signed-off-by: Burak Sekili <buraksekili@gmail.com> Signed-off-by: Burak Sekili <buraksekili@gmail.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.








Description
This PR adds support for Security Policies API in CE mode. This API was introduced in Tyk GW version 4.1.
With this change, users will be able to manage Policy objects in CE mode.
Related Issue
Resolves #357
https://tyktech.atlassian.net/browse/TT-3677
Motivation and Context
Test Coverage For This Change
Screenshots (if appropriate)
Types of changes
Checklist
master!masterbranch (left side). Also, it would be best if you started your change off our latestmaster.make manifestsmake helmgofmt -s -w .go vet ./...golangci-lint run