@@ -11,6 +11,7 @@ import (
11
11
k8serrors "k8s.io/apimachinery/pkg/api/errors"
12
12
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
13
13
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
14
+ "open-cluster-management.io/governance-policy-propagator/test/utils"
14
15
15
16
"github.com/stolostron/governance-policy-framework/test/common"
16
17
)
@@ -107,6 +108,8 @@ var _ = Describe("GRC: [P1][Sev1][policy-grc] Test the ACM Hardening "+
107
108
1 ,
108
109
).Should (BeNil ())
109
110
111
+ eCounter := 0
112
+
110
113
By ("Checking that the policy-managedclusteraddon-available policy " +
111
114
"was propagated to the local-cluster namespace" )
112
115
Eventually (
@@ -117,6 +120,24 @@ var _ = Describe("GRC: [P1][Sev1][policy-grc] Test the ACM Hardening "+
117
120
metav1.GetOptions {},
118
121
)
119
122
123
+ if eCounter > 9 {
124
+ eCounter = 0
125
+
126
+ GinkgoWriter .Print ("placement: " )
127
+ _ , _ = utils .KubectlWithOutput ("get" , "placement" , "-A" , "-ojsonpath={@}" ,
128
+ "--kubeconfig=" + kubeconfigHub )
129
+
130
+ GinkgoWriter .Print ("managedclusterset: " )
131
+ _ , _ = utils .KubectlWithOutput ("get" , "managedclusterset" , "-A" , "-ojsonpath={@}" ,
132
+ "--kubeconfig=" + kubeconfigHub )
133
+
134
+ GinkgoWriter .Print ("managedclustersetbinding: " )
135
+ _ , _ = utils .KubectlWithOutput ("get" , "managedclustersetbinding" , "-A" , "-ojsonpath={@}" ,
136
+ "--kubeconfig=" + kubeconfigHub )
137
+ }
138
+
139
+ eCounter ++
140
+
120
141
return err
121
142
},
122
143
defaultTimeoutSeconds * 2 ,
0 commit comments