mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	straight split of test-cmd
This commit is contained in:
		@@ -20,7 +20,32 @@
 | 
				
			|||||||
sh_library(
 | 
					sh_library(
 | 
				
			||||||
    name = "legacy-script",
 | 
					    name = "legacy-script",
 | 
				
			||||||
    srcs = [
 | 
					    srcs = [
 | 
				
			||||||
 | 
					        "apply.sh",
 | 
				
			||||||
 | 
					        "apps.sh",
 | 
				
			||||||
 | 
					        "authorization.sh",
 | 
				
			||||||
 | 
					        "batch.sh",
 | 
				
			||||||
 | 
					        "certificate.sh",
 | 
				
			||||||
 | 
					        "core.sh",
 | 
				
			||||||
 | 
					        "crd.sh",
 | 
				
			||||||
 | 
					        "create.sh",
 | 
				
			||||||
 | 
					        "diff.sh",
 | 
				
			||||||
 | 
					        "discovery.sh",
 | 
				
			||||||
 | 
					        "generic-resources.sh",
 | 
				
			||||||
 | 
					        "get.sh",
 | 
				
			||||||
 | 
					        "initializers.sh",
 | 
				
			||||||
 | 
					        "kubeconfig.sh",
 | 
				
			||||||
        "legacy-script.sh",
 | 
					        "legacy-script.sh",
 | 
				
			||||||
 | 
					        "node-management.sh",
 | 
				
			||||||
 | 
					        "old-print.sh",
 | 
				
			||||||
 | 
					        "plugins.sh",
 | 
				
			||||||
 | 
					        "proxy.sh",
 | 
				
			||||||
 | 
					        "rbac.sh",
 | 
				
			||||||
 | 
					        "request-timeout.sh",
 | 
				
			||||||
 | 
					        "run.sh",
 | 
				
			||||||
 | 
					        "save-config.sh",
 | 
				
			||||||
 | 
					        "storage.sh",
 | 
				
			||||||
 | 
					        "template-output.sh",
 | 
				
			||||||
 | 
					        "version.sh",
 | 
				
			||||||
    ],
 | 
					    ],
 | 
				
			||||||
    data = ["//pkg/kubectl/validation:testdata/v1/validPod.yaml"],
 | 
					    data = ["//pkg/kubectl/validation:testdata/v1/validPod.yaml"],
 | 
				
			||||||
)
 | 
					)
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										162
									
								
								test/cmd/apply.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										162
									
								
								test/cmd/apply.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,162 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Runs tests related to kubectl apply.
 | 
				
			||||||
 | 
					run_kubectl_apply_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl apply"
 | 
				
			||||||
 | 
					  ## kubectl apply should create the resource that doesn't exist yet
 | 
				
			||||||
 | 
					  # Pre-Condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command: apply a pod "test-pod" (doesn't exist) should create this pod
 | 
				
			||||||
 | 
					  kubectl apply -f hack/testdata/pod.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-Condition: pod "test-pod" is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pods test-pod' "{{${labels_field}.name}}" 'test-pod-label'
 | 
				
			||||||
 | 
					  # Post-Condition: pod "test-pod" has configuration annotation
 | 
				
			||||||
 | 
					  [[ "$(kubectl get pods test-pod -o yaml "${kube_flags[@]}" | grep kubectl.kubernetes.io/last-applied-configuration)" ]]
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete pods test-pod "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## kubectl apply should be able to clear defaulted fields.
 | 
				
			||||||
 | 
					  # Pre-Condition: no deployment exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployments "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command: apply a deployment "test-deployment-retainkeys" (doesn't exist) should create this deployment
 | 
				
			||||||
 | 
					  kubectl apply -f hack/testdata/retainKeys/deployment/deployment-before.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-Condition: deployment "test-deployment-retainkeys" created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployments "{{range.items}}{{$id_field}}{{end}}" 'test-deployment-retainkeys'
 | 
				
			||||||
 | 
					  # Post-Condition: deployment "test-deployment-retainkeys" has defaulted fields
 | 
				
			||||||
 | 
					  [[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep RollingUpdate)" ]]
 | 
				
			||||||
 | 
					  [[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep maxSurge)" ]]
 | 
				
			||||||
 | 
					  [[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep maxUnavailable)" ]]
 | 
				
			||||||
 | 
					  [[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep emptyDir)" ]]
 | 
				
			||||||
 | 
					  # Command: apply a deployment "test-deployment-retainkeys" should clear
 | 
				
			||||||
 | 
					  # defaulted fields and successfully update the deployment
 | 
				
			||||||
 | 
					  [[ "$(kubectl apply -f hack/testdata/retainKeys/deployment/deployment-after.yaml "${kube_flags[@]}")" ]]
 | 
				
			||||||
 | 
					  # Post-Condition: deployment "test-deployment-retainkeys" has updated fields
 | 
				
			||||||
 | 
					  [[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep Recreate)" ]]
 | 
				
			||||||
 | 
					  ! [[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep RollingUpdate)" ]]
 | 
				
			||||||
 | 
					  [[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep hostPath)" ]]
 | 
				
			||||||
 | 
					  ! [[ "$(kubectl get deployments test-deployment-retainkeys -o yaml "${kube_flags[@]}" | grep emptyDir)" ]]
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete deployments test-deployment-retainkeys "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## kubectl apply -f with label selector should only apply matching objects
 | 
				
			||||||
 | 
					  # Pre-Condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # apply
 | 
				
			||||||
 | 
					  kubectl apply -l unique-label=bingbang -f hack/testdata/filter "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # check right pod exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pods selector-test-pod' "{{${labels_field}.name}}" 'selector-test-pod'
 | 
				
			||||||
 | 
					  # check wrong pod doesn't exist
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pods selector-test-pod-dont-apply 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'pods "selector-test-pod-dont-apply" not found'
 | 
				
			||||||
 | 
					  # cleanup
 | 
				
			||||||
 | 
					  kubectl delete pods selector-test-pod
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## kubectl apply --prune
 | 
				
			||||||
 | 
					  # Pre-Condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # apply a
 | 
				
			||||||
 | 
					  kubectl apply --prune -l prune-group=true -f hack/testdata/prune/a.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # check right pod exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pods a' "{{${id_field}}}" 'a'
 | 
				
			||||||
 | 
					  # check wrong pod doesn't exist
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pods b 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'pods "b" not found'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # apply b
 | 
				
			||||||
 | 
					  kubectl apply --prune -l prune-group=true -f hack/testdata/prune/b.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # check right pod exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pods b' "{{${id_field}}}" 'b'
 | 
				
			||||||
 | 
					  # check wrong pod doesn't exist
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pods a 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'pods "a" not found'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # cleanup
 | 
				
			||||||
 | 
					  kubectl delete pods b
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # same thing without prune for a sanity check
 | 
				
			||||||
 | 
					  # Pre-Condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # apply a
 | 
				
			||||||
 | 
					  kubectl apply -l prune-group=true -f hack/testdata/prune/a.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # check right pod exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pods a' "{{${id_field}}}" 'a'
 | 
				
			||||||
 | 
					  # check wrong pod doesn't exist
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pods b 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'pods "b" not found'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # apply b
 | 
				
			||||||
 | 
					  kubectl apply -l prune-group=true -f hack/testdata/prune/b.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # check both pods exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pods a' "{{${id_field}}}" 'a'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pods b' "{{${id_field}}}" 'b'
 | 
				
			||||||
 | 
					  # check wrong pod doesn't exist
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # cleanup
 | 
				
			||||||
 | 
					  kubectl delete pod/a pod/b
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## kubectl apply --prune requires a --all flag to select everything
 | 
				
			||||||
 | 
					  output_message=$(! kubectl apply --prune -f hack/testdata/prune 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" \
 | 
				
			||||||
 | 
					    'all resources selected for prune without explicitly passing --all'
 | 
				
			||||||
 | 
					  # should apply everything
 | 
				
			||||||
 | 
					  kubectl apply --all --prune -f hack/testdata/prune
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pods a' "{{${id_field}}}" 'a'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pods b' "{{${id_field}}}" 'b'
 | 
				
			||||||
 | 
					  kubectl delete pod/a pod/b
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## kubectl apply --prune should fallback to delete for non reapable types
 | 
				
			||||||
 | 
					  kubectl apply --all --prune -f hack/testdata/prune-reap/a.yml 2>&1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pvc a-pvc' "{{${id_field}}}" 'a-pvc'
 | 
				
			||||||
 | 
					  kubectl apply --all --prune -f hack/testdata/prune-reap/b.yml 2>&1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pvc b-pvc' "{{${id_field}}}" 'b-pvc'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kubectl delete pvc b-pvc 2>&1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## kubectl apply --prune --prune-whitelist
 | 
				
			||||||
 | 
					  # Pre-Condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # apply pod a
 | 
				
			||||||
 | 
					  kubectl apply --prune -l prune-group=true -f hack/testdata/prune/a.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # check right pod exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pods a' "{{${id_field}}}" 'a'
 | 
				
			||||||
 | 
					  # apply svc and don't prune pod a by overwriting whitelist
 | 
				
			||||||
 | 
					  kubectl apply --prune -l prune-group=true -f hack/testdata/prune/svc.yaml --prune-whitelist core/v1/Service 2>&1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'service prune-svc' "{{${id_field}}}" 'prune-svc'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pods a' "{{${id_field}}}" 'a'
 | 
				
			||||||
 | 
					  # apply svc and prune pod a with default whitelist
 | 
				
			||||||
 | 
					  kubectl apply --prune -l prune-group=true -f hack/testdata/prune/svc.yaml 2>&1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'service prune-svc' "{{${id_field}}}" 'prune-svc'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # cleanup
 | 
				
			||||||
 | 
					  kubectl delete svc prune-svc 2>&1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										642
									
								
								test/cmd/apps.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										642
									
								
								test/cmd/apps.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,642 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_daemonset_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl(v1:daemonsets)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create a rolling update DaemonSet
 | 
				
			||||||
 | 
					  # Pre-condition: no DaemonSet exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert daemonsets "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl apply -f hack/testdata/rollingupdate-daemonset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Template Generation should be 1
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'daemonsets bind' "{{${template_generation_field}}}" '1'
 | 
				
			||||||
 | 
					  kubectl apply -f hack/testdata/rollingupdate-daemonset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Template Generation should stay 1
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'daemonsets bind' "{{${template_generation_field}}}" '1'
 | 
				
			||||||
 | 
					  # Test set commands
 | 
				
			||||||
 | 
					  kubectl set image daemonsets/bind "${kube_flags[@]}" *=k8s.gcr.io/pause:test-cmd
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'daemonsets bind' "{{${template_generation_field}}}" '2'
 | 
				
			||||||
 | 
					  kubectl set env daemonsets/bind "${kube_flags[@]}" foo=bar
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'daemonsets bind' "{{${template_generation_field}}}" '3'
 | 
				
			||||||
 | 
					  kubectl set resources daemonsets/bind "${kube_flags[@]}" --limits=cpu=200m,memory=512Mi
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'daemonsets bind' "{{${template_generation_field}}}" '4'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete -f hack/testdata/rollingupdate-daemonset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_daemonset_history_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl(v1:daemonsets, v1:controllerrevisions)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test rolling back a DaemonSet
 | 
				
			||||||
 | 
					  # Pre-condition: no DaemonSet or its pods exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert daemonsets "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  # Create a DaemonSet (revision 1)
 | 
				
			||||||
 | 
					  kubectl apply -f hack/testdata/rollingupdate-daemonset.yaml --record "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert controllerrevisions "{{range.items}}{{$annotations_field}}:{{end}}" ".*rollingupdate-daemonset.yaml --record.*"
 | 
				
			||||||
 | 
					  # Rollback to revision 1 - should be no-op
 | 
				
			||||||
 | 
					  kubectl rollout undo daemonset --to-revision=1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert daemonset "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_PAUSE_V2}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert daemonset "{{range.items}}{{$container_len}}{{end}}" "1"
 | 
				
			||||||
 | 
					  # Update the DaemonSet (revision 2)
 | 
				
			||||||
 | 
					  kubectl apply -f hack/testdata/rollingupdate-daemonset-rv2.yaml --record "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert daemonset "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DAEMONSET_R2}:"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert daemonset "{{range.items}}{{$image_field1}}:{{end}}" "${IMAGE_DAEMONSET_R2_2}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert daemonset "{{range.items}}{{$container_len}}{{end}}" "2"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert controllerrevisions "{{range.items}}{{$annotations_field}}:{{end}}" ".*rollingupdate-daemonset-rv2.yaml --record.*"
 | 
				
			||||||
 | 
					  # Rollback to revision 1 with dry-run - should be no-op
 | 
				
			||||||
 | 
					  kubectl rollout undo daemonset --dry-run=true "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert daemonset "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DAEMONSET_R2}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert daemonset "{{range.items}}{{$image_field1}}:{{end}}" "${IMAGE_DAEMONSET_R2_2}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert daemonset "{{range.items}}{{$container_len}}{{end}}" "2"
 | 
				
			||||||
 | 
					  # Rollback to revision 1
 | 
				
			||||||
 | 
					  kubectl rollout undo daemonset --to-revision=1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert daemonset "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_PAUSE_V2}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert daemonset "{{range.items}}{{$container_len}}{{end}}" "1"
 | 
				
			||||||
 | 
					  # Rollback to revision 1000000 - should fail
 | 
				
			||||||
 | 
					  output_message=$(! kubectl rollout undo daemonset --to-revision=1000000 "${kube_flags[@]}" 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "unable to find specified revision"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert daemonset "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_PAUSE_V2}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert daemonset "{{range.items}}{{$container_len}}{{end}}" "1"
 | 
				
			||||||
 | 
					  # Rollback to last revision
 | 
				
			||||||
 | 
					  kubectl rollout undo daemonset "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert daemonset "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DAEMONSET_R2}:"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert daemonset "{{range.items}}{{$image_field1}}:{{end}}" "${IMAGE_DAEMONSET_R2_2}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert daemonset "{{range.items}}{{$container_len}}{{end}}" "2"
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete -f hack/testdata/rollingupdate-daemonset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_kubectl_apply_deployments_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl apply deployments"
 | 
				
			||||||
 | 
					  ## kubectl apply should propagate user defined null values
 | 
				
			||||||
 | 
					  # Pre-Condition: no Deployments, ReplicaSets, Pods exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployments "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kube::test::get_object_assert replicasets "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # apply base deployment
 | 
				
			||||||
 | 
					  kubectl apply -f hack/testdata/null-propagation/deployment-l1.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # check right deployment exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments my-depl' "{{${id_field}}}" 'my-depl'
 | 
				
			||||||
 | 
					  # check right labels exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments my-depl' "{{.spec.template.metadata.labels.l1}}" 'l1'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments my-depl' "{{.spec.selector.matchLabels.l1}}" 'l1'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments my-depl' "{{.metadata.labels.l1}}" 'l1'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # apply new deployment with new template labels
 | 
				
			||||||
 | 
					  kubectl apply -f hack/testdata/null-propagation/deployment-l2.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # check right labels exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments my-depl' "{{.spec.template.metadata.labels.l1}}" '<no value>'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments my-depl' "{{.spec.selector.matchLabels.l1}}" '<no value>'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments my-depl' "{{.metadata.labels.l1}}" '<no value>'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments my-depl' "{{.spec.template.metadata.labels.l2}}" 'l2'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments my-depl' "{{.spec.selector.matchLabels.l2}}" 'l2'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments my-depl' "{{.metadata.labels.l2}}" 'l2'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # cleanup
 | 
				
			||||||
 | 
					  # need to explicitly remove replicasets and pods because we changed the deployment selector and orphaned things
 | 
				
			||||||
 | 
					  kubectl delete deployments,rs,pods --all --cascade=false --grace-period=0
 | 
				
			||||||
 | 
					  # Post-Condition: no Deployments, ReplicaSets, Pods exist
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert deployments "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert replicasets "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # kubectl apply deployment --overwrite=true --force=true
 | 
				
			||||||
 | 
					  # Pre-Condition: no deployment exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployments "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # apply deployment nginx
 | 
				
			||||||
 | 
					  kubectl apply -f hack/testdata/deployment-label-change1.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # check right deployment exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployment nginx' "{{${id_field}}}" 'nginx'
 | 
				
			||||||
 | 
					  # apply deployment with new labels and a conflicting resourceVersion
 | 
				
			||||||
 | 
					  output_message=$(! kubectl apply -f hack/testdata/deployment-label-change2.yaml 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'Error from server (Conflict)'
 | 
				
			||||||
 | 
					  # apply deployment with --force and --overwrite will succeed
 | 
				
			||||||
 | 
					  kubectl apply -f hack/testdata/deployment-label-change2.yaml --overwrite=true  --force=true --grace-period=10
 | 
				
			||||||
 | 
					  # check the changed deployment
 | 
				
			||||||
 | 
					  output_message=$(kubectl apply view-last-applied deploy/nginx -o json 2>&1 "${kube_flags[@]}" |grep nginx2)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" '"name": "nginx2"'
 | 
				
			||||||
 | 
					  # applying a resource (with --force) that is both conflicting and invalid will
 | 
				
			||||||
 | 
					  # cause the server to only return a "Conflict" error when we attempt to patch.
 | 
				
			||||||
 | 
					  # This means that we will delete the existing resource after receiving 5 conflict
 | 
				
			||||||
 | 
					  # errors in a row from the server, and will attempt to create the modified
 | 
				
			||||||
 | 
					  # resource that we are passing to "apply". Since the modified resource is also
 | 
				
			||||||
 | 
					  # invalid, we will receive an invalid error when we attempt to create it, after
 | 
				
			||||||
 | 
					  # having deleted the old resource. Ensure that when this case is reached, the
 | 
				
			||||||
 | 
					  # old resource is restored once again, and the validation error is printed.
 | 
				
			||||||
 | 
					  output_message=$(! kubectl apply -f hack/testdata/deployment-label-change3.yaml --force 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'Invalid value'
 | 
				
			||||||
 | 
					  # Ensure that the old object has been restored
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployment nginx' "{{${template_labels}}}" 'nginx2'
 | 
				
			||||||
 | 
					  # cleanup
 | 
				
			||||||
 | 
					  kubectl delete deployments --all --grace-period=10
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_deployment_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing deployments"
 | 
				
			||||||
 | 
					  # Test kubectl create deployment (using default - old generator)
 | 
				
			||||||
 | 
					  kubectl create deployment test-nginx-extensions --image=k8s.gcr.io/nginx:test-cmd
 | 
				
			||||||
 | 
					  # Post-Condition: Deployment "nginx" is created.
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deploy test-nginx-extensions' "{{$container_name_field}}" 'nginx'
 | 
				
			||||||
 | 
					  # and old generator was used, iow. old defaults are applied
 | 
				
			||||||
 | 
					  output_message=$(kubectl get deployment.extensions/test-nginx-extensions -o jsonpath='{.spec.revisionHistoryLimit}')
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" '2'
 | 
				
			||||||
 | 
					  # Ensure we can interact with deployments through extensions and apps endpoints
 | 
				
			||||||
 | 
					  output_message=$(kubectl get deployment.extensions -o=jsonpath='{.items[0].apiVersion}' 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'extensions/v1beta1'
 | 
				
			||||||
 | 
					  output_message=$(kubectl get deployment.apps -o=jsonpath='{.items[0].apiVersion}' 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'apps/v1'
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete deployment test-nginx-extensions "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test kubectl create deployment
 | 
				
			||||||
 | 
					  kubectl create deployment test-nginx-apps --image=k8s.gcr.io/nginx:test-cmd --generator=deployment-basic/apps.v1beta1
 | 
				
			||||||
 | 
					  # Post-Condition: Deployment "nginx" is created.
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deploy test-nginx-apps' "{{$container_name_field}}" 'nginx'
 | 
				
			||||||
 | 
					  # and new generator was used, iow. new defaults are applied
 | 
				
			||||||
 | 
					  output_message=$(kubectl get deployment/test-nginx-apps -o jsonpath='{.spec.revisionHistoryLimit}')
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" '2'
 | 
				
			||||||
 | 
					  # Ensure we can interact with deployments through extensions and apps endpoints
 | 
				
			||||||
 | 
					  output_message=$(kubectl get deployment.extensions -o=jsonpath='{.items[0].apiVersion}' 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'extensions/v1beta1'
 | 
				
			||||||
 | 
					  output_message=$(kubectl get deployment.apps -o=jsonpath='{.items[0].apiVersion}' 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'apps/v1'
 | 
				
			||||||
 | 
					  # Describe command (resource only) should print detailed information
 | 
				
			||||||
 | 
					  kube::test::describe_resource_assert rs "Name:" "Pod Template:" "Labels:" "Selector:" "Controlled By" "Replicas:" "Pods Status:" "Volumes:"
 | 
				
			||||||
 | 
					  # Describe command (resource only) should print detailed information
 | 
				
			||||||
 | 
					  kube::test::describe_resource_assert pods "Name:" "Image:" "Node:" "Labels:" "Status:" "Controlled By"
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete deployment test-nginx-apps "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl create deployment should not fail validation
 | 
				
			||||||
 | 
					  # Pre-Condition: No deployment exists.
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/deployment-with-UnixUserID.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-Condition: Deployment "deployment-with-unixuserid" is created.
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" 'deployment-with-unixuserid:'
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete deployment deployment-with-unixuserid "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test cascading deletion
 | 
				
			||||||
 | 
					  ## Test that rs is deleted when deployment is deleted.
 | 
				
			||||||
 | 
					  # Pre-condition: no deployment exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Create deployment
 | 
				
			||||||
 | 
					  kubectl create -f test/fixtures/doc-yaml/user-guide/deployment.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Wait for rs to come up.
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert rs "{{range.items}}{{$rs_replicas_field}}{{end}}" '3'
 | 
				
			||||||
 | 
					  # Deleting the deployment should delete the rs.
 | 
				
			||||||
 | 
					  kubectl delete deployment nginx-deployment "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## Test that rs is not deleted when deployment is deleted with cascade set to false.
 | 
				
			||||||
 | 
					  # Pre-condition: no deployment and rs exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Create deployment
 | 
				
			||||||
 | 
					  kubectl create deployment nginx-deployment --image=k8s.gcr.io/nginx:test-cmd
 | 
				
			||||||
 | 
					  # Wait for rs to come up.
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert rs "{{range.items}}{{$rs_replicas_field}}{{end}}" '1'
 | 
				
			||||||
 | 
					  # Delete the deployment with cascade set to false.
 | 
				
			||||||
 | 
					  kubectl delete deployment nginx-deployment "${kube_flags[@]}" --cascade=false
 | 
				
			||||||
 | 
					  # Wait for the deployment to be deleted and then verify that rs is not
 | 
				
			||||||
 | 
					  # deleted.
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rs "{{range.items}}{{$rs_replicas_field}}{{end}}" '1'
 | 
				
			||||||
 | 
					  # Cleanup
 | 
				
			||||||
 | 
					  # Find the name of the rs to be deleted.
 | 
				
			||||||
 | 
					  output_message=$(kubectl get rs "${kube_flags[@]}" -o template --template={{range.items}}{{$id_field}}{{end}})
 | 
				
			||||||
 | 
					  kubectl delete rs ${output_message} "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Auto scale deployment
 | 
				
			||||||
 | 
					  # Pre-condition: no deployment exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create -f test/fixtures/doc-yaml/user-guide/deployment.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" 'nginx-deployment:'
 | 
				
			||||||
 | 
					  # autoscale 2~3 pods, no CPU utilization specified
 | 
				
			||||||
 | 
					  kubectl-with-retry autoscale deployment nginx-deployment "${kube_flags[@]}" --min=2 --max=3
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'hpa nginx-deployment' "{{$hpa_min_field}} {{$hpa_max_field}} {{$hpa_cpu_field}}" '2 3 80'
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  # Note that we should delete hpa first, otherwise it may fight with the deployment reaper.
 | 
				
			||||||
 | 
					  kubectl delete hpa nginx-deployment "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl delete deployment.extensions nginx-deployment "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Rollback a deployment
 | 
				
			||||||
 | 
					  # Pre-condition: no deployment exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  # Create a deployment (revision 1)
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/deployment-revision1.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" 'nginx:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R1}:"
 | 
				
			||||||
 | 
					  # Rollback to revision 1 - should be no-op
 | 
				
			||||||
 | 
					  kubectl rollout undo deployment nginx --to-revision=1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R1}:"
 | 
				
			||||||
 | 
					  # Update the deployment (revision 2)
 | 
				
			||||||
 | 
					  kubectl apply -f hack/testdata/deployment-revision2.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment.extensions "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R2}:"
 | 
				
			||||||
 | 
					  # Rollback to revision 1 with dry-run - should be no-op
 | 
				
			||||||
 | 
					  kubectl rollout undo deployment nginx --dry-run=true "${kube_flags[@]}" | grep "test-cmd"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment.extensions "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R2}:"
 | 
				
			||||||
 | 
					  # Rollback to revision 1
 | 
				
			||||||
 | 
					  kubectl rollout undo deployment nginx --to-revision=1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  sleep 1
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R1}:"
 | 
				
			||||||
 | 
					  # Rollback to revision 1000000 - should be no-op
 | 
				
			||||||
 | 
					  kubectl rollout undo deployment nginx --to-revision=1000000 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R1}:"
 | 
				
			||||||
 | 
					  # Rollback to last revision
 | 
				
			||||||
 | 
					  kubectl rollout undo deployment nginx "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  sleep 1
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R2}:"
 | 
				
			||||||
 | 
					  # Pause the deployment
 | 
				
			||||||
 | 
					  kubectl-with-retry rollout pause deployment nginx "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # A paused deployment cannot be rolled back
 | 
				
			||||||
 | 
					  ! kubectl rollout undo deployment nginx "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Resume the deployment
 | 
				
			||||||
 | 
					  kubectl-with-retry rollout resume deployment nginx "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # The resumed deployment can now be rolled back
 | 
				
			||||||
 | 
					  kubectl rollout undo deployment nginx "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Check that the new replica set has all old revisions stored in an annotation
 | 
				
			||||||
 | 
					  newrs="$(kubectl describe deployment nginx | grep NewReplicaSet | awk '{print $2}')"
 | 
				
			||||||
 | 
					  kubectl get rs "${newrs}" -o yaml | grep "deployment.kubernetes.io/revision-history: 1,3"
 | 
				
			||||||
 | 
					  # Check that trying to watch the status of a superseded revision returns an error
 | 
				
			||||||
 | 
					  ! kubectl rollout status deployment/nginx --revision=3
 | 
				
			||||||
 | 
					  cat hack/testdata/deployment-revision1.yaml | ${SED} "s/name: nginx$/name: nginx2/" | kubectl create -f - "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Deletion of both deployments should not be blocked
 | 
				
			||||||
 | 
					  kubectl delete deployment nginx2 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete deployment nginx "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Set image of a deployment
 | 
				
			||||||
 | 
					  # Pre-condition: no deployment exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Create a deployment
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/deployment-multicontainer.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" 'nginx-deployment:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R1}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field1}}:{{end}}" "${IMAGE_PERL}:"
 | 
				
			||||||
 | 
					  # Set the deployment's image
 | 
				
			||||||
 | 
					  kubectl set image deployment nginx-deployment nginx="${IMAGE_DEPLOYMENT_R2}" "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R2}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field1}}:{{end}}" "${IMAGE_PERL}:"
 | 
				
			||||||
 | 
					  # Set non-existing container should fail
 | 
				
			||||||
 | 
					  ! kubectl set image deployment nginx-deployment redis=redis "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Set image of deployments without specifying name
 | 
				
			||||||
 | 
					  kubectl set image deployments --all nginx="${IMAGE_DEPLOYMENT_R1}" "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R1}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field1}}:{{end}}" "${IMAGE_PERL}:"
 | 
				
			||||||
 | 
					  # Set image of a deployment specified by file
 | 
				
			||||||
 | 
					  kubectl set image -f hack/testdata/deployment-multicontainer.yaml nginx="${IMAGE_DEPLOYMENT_R2}" "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R2}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field1}}:{{end}}" "${IMAGE_PERL}:"
 | 
				
			||||||
 | 
					  # Set image of a local file without talking to the server
 | 
				
			||||||
 | 
					  kubectl set image -f hack/testdata/deployment-multicontainer.yaml nginx="${IMAGE_DEPLOYMENT_R1}" "${kube_flags[@]}" --local -o yaml
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R2}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field1}}:{{end}}" "${IMAGE_PERL}:"
 | 
				
			||||||
 | 
					  # Set image of all containers of the deployment
 | 
				
			||||||
 | 
					  kubectl set image deployment nginx-deployment "*"="${IMAGE_DEPLOYMENT_R1}" "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R1}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field1}}:{{end}}" "${IMAGE_DEPLOYMENT_R1}:"
 | 
				
			||||||
 | 
					  # Set image of all containners of the deployment again when image not change
 | 
				
			||||||
 | 
					  kubectl set image deployment nginx-deployment "*"="${IMAGE_DEPLOYMENT_R1}" "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R1}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field1}}:{{end}}" "${IMAGE_DEPLOYMENT_R1}:"
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete deployment nginx-deployment "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Set env of a deployment
 | 
				
			||||||
 | 
					  # Pre-condition: no deployment exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Create a deployment
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/deployment-multicontainer.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/configmap.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/secret.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" 'nginx-deployment:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert configmap "{{range.items}}{{$id_field}}:{{end}}" 'test-set-env-config:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert secret "{{range.items}}{{$id_field}}:{{end}}" 'test-set-env-secret:'
 | 
				
			||||||
 | 
					  # Set env of deployments by configmap from keys
 | 
				
			||||||
 | 
					  kubectl set env deployment nginx-deployment --keys=key-2 --from=configmap/test-set-env-config "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Assert correct value in deployment env
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deploy nginx-deployment' "{{ (index (index .spec.template.spec.containers 0).env 0).name}}" 'KEY_2'
 | 
				
			||||||
 | 
					  # Assert single value in deployment env
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deploy nginx-deployment' "{{ len (index .spec.template.spec.containers 0).env }}" '1'
 | 
				
			||||||
 | 
					  # Set env of deployments by configmap
 | 
				
			||||||
 | 
					  kubectl set env deployment nginx-deployment --from=configmap/test-set-env-config "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Assert all values in deployment env
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deploy nginx-deployment' "{{ len (index .spec.template.spec.containers 0).env }}" '2'
 | 
				
			||||||
 | 
					  # Set env of deployments for all container
 | 
				
			||||||
 | 
					  kubectl set env deployment nginx-deployment env=prod "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Set env of deployments for specific container
 | 
				
			||||||
 | 
					  kubectl set env deployment nginx-deployment superenv=superprod -c=nginx "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Set env of deployments by secret from keys
 | 
				
			||||||
 | 
					  kubectl set env deployment nginx-deployment --keys=username --from=secret/test-set-env-secret "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Set env of deployments by secret
 | 
				
			||||||
 | 
					  kubectl set env deployment nginx-deployment --from=secret/test-set-env-secret "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Remove specific env of deployment
 | 
				
			||||||
 | 
					  kubectl set env deployment nginx-deployment env-
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete deployment nginx-deployment "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl delete configmap test-set-env-config "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl delete secret test-set-env-secret "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_statefulset_history_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl(v1:statefulsets, v1:controllerrevisions)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test rolling back a StatefulSet
 | 
				
			||||||
 | 
					  # Pre-condition: no statefulset or its pods exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert statefulset "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  # Create a StatefulSet (revision 1)
 | 
				
			||||||
 | 
					  kubectl apply -f hack/testdata/rollingupdate-statefulset.yaml --record "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert controllerrevisions "{{range.items}}{{$annotations_field}}:{{end}}" ".*rollingupdate-statefulset.yaml --record.*"
 | 
				
			||||||
 | 
					  # Rollback to revision 1 - should be no-op
 | 
				
			||||||
 | 
					  kubectl rollout undo statefulset --to-revision=1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert statefulset "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_STATEFULSET_R1}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert statefulset "{{range.items}}{{$container_len}}{{end}}" "1"
 | 
				
			||||||
 | 
					  # Update the statefulset (revision 2)
 | 
				
			||||||
 | 
					  kubectl apply -f hack/testdata/rollingupdate-statefulset-rv2.yaml --record "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert statefulset "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_STATEFULSET_R2}:"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert statefulset "{{range.items}}{{$image_field1}}:{{end}}" "${IMAGE_PAUSE_V2}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert statefulset "{{range.items}}{{$container_len}}{{end}}" "2"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert controllerrevisions "{{range.items}}{{$annotations_field}}:{{end}}" ".*rollingupdate-statefulset-rv2.yaml --record.*"
 | 
				
			||||||
 | 
					  # Rollback to revision 1 with dry-run - should be no-op
 | 
				
			||||||
 | 
					  kubectl rollout undo statefulset --dry-run=true "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert statefulset "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_STATEFULSET_R2}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert statefulset "{{range.items}}{{$image_field1}}:{{end}}" "${IMAGE_PAUSE_V2}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert statefulset "{{range.items}}{{$container_len}}{{end}}" "2"
 | 
				
			||||||
 | 
					  # Rollback to revision 1
 | 
				
			||||||
 | 
					  kubectl rollout undo statefulset --to-revision=1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert statefulset "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_STATEFULSET_R1}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert statefulset "{{range.items}}{{$container_len}}{{end}}" "1"
 | 
				
			||||||
 | 
					  # Rollback to revision 1000000 - should fail
 | 
				
			||||||
 | 
					  output_message=$(! kubectl rollout undo statefulset --to-revision=1000000 "${kube_flags[@]}" 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "unable to find specified revision"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert statefulset "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_STATEFULSET_R1}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert statefulset "{{range.items}}{{$container_len}}{{end}}" "1"
 | 
				
			||||||
 | 
					  # Rollback to last revision
 | 
				
			||||||
 | 
					  kubectl rollout undo statefulset "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert statefulset "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_STATEFULSET_R2}:"
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert statefulset "{{range.items}}{{$image_field1}}:{{end}}" "${IMAGE_PAUSE_V2}:"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert statefulset "{{range.items}}{{$container_len}}{{end}}" "2"
 | 
				
			||||||
 | 
					  # Clean up - delete newest configuration
 | 
				
			||||||
 | 
					  kubectl delete -f hack/testdata/rollingupdate-statefulset-rv2.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: no pods from statefulset controller
 | 
				
			||||||
 | 
					  wait-for-pods-with-label "app=nginx-statefulset" ""
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_stateful_set_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl(v1:statefulsets)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create and stop statefulset, make sure it doesn't leak pods
 | 
				
			||||||
 | 
					  # Pre-condition: no statefulset exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert statefulset "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command: create statefulset
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/rollingupdate-statefulset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Scale statefulset test with current-replicas and replicas
 | 
				
			||||||
 | 
					  # Pre-condition: 0 replicas
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'statefulset nginx' "{{$statefulset_replicas_field}}" '0'
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert 'statefulset nginx' "{{$statefulset_observed_generation}}" '1'
 | 
				
			||||||
 | 
					  # Command: Scale up
 | 
				
			||||||
 | 
					  kubectl scale --current-replicas=0 --replicas=1 statefulset nginx "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: 1 replica, named nginx-0
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'statefulset nginx' "{{$statefulset_replicas_field}}" '1'
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert 'statefulset nginx' "{{$statefulset_observed_generation}}" '2'
 | 
				
			||||||
 | 
					  # Typically we'd wait and confirm that N>1 replicas are up, but this framework
 | 
				
			||||||
 | 
					  # doesn't start  the scheduler, so pet-0 will block all others.
 | 
				
			||||||
 | 
					  # TODO: test robust scaling in an e2e.
 | 
				
			||||||
 | 
					  wait-for-pods-with-label "app=nginx-statefulset" "nginx-0"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Clean up
 | 
				
			||||||
 | 
					  kubectl delete -f hack/testdata/rollingupdate-statefulset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: no pods from statefulset controller
 | 
				
			||||||
 | 
					  wait-for-pods-with-label "app=nginx-statefulset" ""
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_rs_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl(v1:replicasets)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create and stop a replica set, make sure it doesn't leak pods
 | 
				
			||||||
 | 
					  # Pre-condition: no replica set exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/frontend-replicaset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::log::status "Deleting rs"
 | 
				
			||||||
 | 
					  kubectl delete rs frontend "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: no pods from frontend replica set
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pods -l "tier=frontend"' "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create and then delete a replica set with cascade=false, make sure it doesn't delete pods.
 | 
				
			||||||
 | 
					  # Pre-condition: no replica set exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/frontend-replicaset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::log::status "Deleting rs"
 | 
				
			||||||
 | 
					  kubectl delete rs frontend "${kube_flags[@]}" --cascade=false
 | 
				
			||||||
 | 
					  # Wait for the rs to be deleted.
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Post-condition: All 3 pods still remain from frontend replica set
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pods -l "tier=frontend"' "{{range.items}}{{$pod_container_name_field}}:{{end}}" 'php-redis:php-redis:php-redis:'
 | 
				
			||||||
 | 
					  # Cleanup
 | 
				
			||||||
 | 
					  kubectl delete pods -l "tier=frontend" "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create replica set frontend from YAML
 | 
				
			||||||
 | 
					  # Pre-condition: no replica set exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/frontend-replicaset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: frontend replica set is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" 'frontend:'
 | 
				
			||||||
 | 
					  # Describe command should print detailed information
 | 
				
			||||||
 | 
					  kube::test::describe_object_assert rs 'frontend' "Name:" "Pod Template:" "Labels:" "Selector:" "Replicas:" "Pods Status:" "Volumes:"
 | 
				
			||||||
 | 
					  # Describe command should print events information by default
 | 
				
			||||||
 | 
					  kube::test::describe_object_events_assert rs 'frontend'
 | 
				
			||||||
 | 
					  # Describe command should not print events information when show-events=false
 | 
				
			||||||
 | 
					  kube::test::describe_object_events_assert rs 'frontend' false
 | 
				
			||||||
 | 
					  # Describe command should print events information when show-events=true
 | 
				
			||||||
 | 
					  kube::test::describe_object_events_assert rs 'frontend' true
 | 
				
			||||||
 | 
					  # Describe command (resource only) should print detailed information
 | 
				
			||||||
 | 
					  kube::test::describe_resource_assert rs "Name:" "Pod Template:" "Labels:" "Selector:" "Replicas:" "Pods Status:" "Volumes:"
 | 
				
			||||||
 | 
					  # Describe command should print events information by default
 | 
				
			||||||
 | 
					  kube::test::describe_resource_events_assert rs
 | 
				
			||||||
 | 
					  # Describe command should not print events information when show-events=false
 | 
				
			||||||
 | 
					  kube::test::describe_resource_events_assert rs false
 | 
				
			||||||
 | 
					  # Describe command should print events information when show-events=true
 | 
				
			||||||
 | 
					  kube::test::describe_resource_events_assert rs true
 | 
				
			||||||
 | 
					  # Describe command (resource only) should print detailed information
 | 
				
			||||||
 | 
					  kube::test::describe_resource_assert pods "Name:" "Image:" "Node:" "Labels:" "Status:" "Controlled By"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Scale replica set frontend with current-replicas and replicas
 | 
				
			||||||
 | 
					  # Pre-condition: 3 replicas
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rs frontend' "{{$rs_replicas_field}}" '3'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl scale --current-replicas=3 --replicas=2 replicasets frontend "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: 2 replicas
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rs frontend' "{{$rs_replicas_field}}" '2'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Set up three deploy, two deploy have same label
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/scale-deploy-1.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/scale-deploy-2.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/scale-deploy-3.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deploy scale-1' "{{.spec.replicas}}" '1'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deploy scale-2' "{{.spec.replicas}}" '1'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deploy scale-3' "{{.spec.replicas}}" '1'
 | 
				
			||||||
 | 
					  # Test kubectl scale --selector
 | 
				
			||||||
 | 
					  kubectl scale deploy --replicas=2 -l run=hello
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deploy scale-1' "{{.spec.replicas}}" '2'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deploy scale-2' "{{.spec.replicas}}" '2'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deploy scale-3' "{{.spec.replicas}}" '1'
 | 
				
			||||||
 | 
					  # Test kubectl scale --all
 | 
				
			||||||
 | 
					  kubectl scale deploy --replicas=3 --all
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deploy scale-1' "{{.spec.replicas}}" '3'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deploy scale-2' "{{.spec.replicas}}" '3'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deploy scale-3' "{{.spec.replicas}}" '3'
 | 
				
			||||||
 | 
					  # Clean-up
 | 
				
			||||||
 | 
					  kubectl delete rs frontend "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl delete deploy scale-1 scale-2 scale-3 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Expose replica set as service
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/frontend-replicaset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Pre-condition: 3 replicas
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rs frontend' "{{$rs_replicas_field}}" '3'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl expose rs frontend --port=80 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: service exists and the port is unnamed
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'service frontend' "{{$port_name}} {{$port_field}}" '<no value> 80'
 | 
				
			||||||
 | 
					  # Create a service using service/v1 generator
 | 
				
			||||||
 | 
					  kubectl expose rs frontend --port=80 --name=frontend-2 --generator=service/v1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: service exists and the port is named default.
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'service frontend-2' "{{$port_name}} {{$port_field}}" 'default 80'
 | 
				
			||||||
 | 
					  # Cleanup services
 | 
				
			||||||
 | 
					  kubectl delete service frontend{,-2} "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test set commands
 | 
				
			||||||
 | 
					  # Pre-condition: frontend replica set exists at generation 1
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rs frontend' "{{${generation_field}}}" '1'
 | 
				
			||||||
 | 
					  kubectl set image rs/frontend "${kube_flags[@]}" *=k8s.gcr.io/pause:test-cmd
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rs frontend' "{{${generation_field}}}" '2'
 | 
				
			||||||
 | 
					  kubectl set env rs/frontend "${kube_flags[@]}" foo=bar
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rs frontend' "{{${generation_field}}}" '3'
 | 
				
			||||||
 | 
					  kubectl set resources rs/frontend "${kube_flags[@]}" --limits=cpu=200m,memory=512Mi
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rs frontend' "{{${generation_field}}}" '4'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Delete replica set with id
 | 
				
			||||||
 | 
					  # Pre-condition: frontend replica set exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" 'frontend:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl delete rs frontend "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: no replica set exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create two replica sets
 | 
				
			||||||
 | 
					  # Pre-condition: no replica set exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/frontend-replicaset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/redis-slave-replicaset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: frontend and redis-slave
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" 'frontend:redis-slave:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Delete multiple replica sets at once
 | 
				
			||||||
 | 
					  # Pre-condition: frontend and redis-slave
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" 'frontend:redis-slave:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl delete rs frontend redis-slave "${kube_flags[@]}" # delete multiple replica sets at once
 | 
				
			||||||
 | 
					  # Post-condition: no replica set exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  if kube::test::if_supports_resource "${horizontalpodautoscalers}" ; then
 | 
				
			||||||
 | 
					    ### Auto scale replica set
 | 
				
			||||||
 | 
					    # Pre-condition: no replica set exists
 | 
				
			||||||
 | 
					    kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					    # Command
 | 
				
			||||||
 | 
					    kubectl create -f hack/testdata/frontend-replicaset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					    kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" 'frontend:'
 | 
				
			||||||
 | 
					    # autoscale 1~2 pods, CPU utilization 70%, replica set specified by file
 | 
				
			||||||
 | 
					    kubectl autoscale -f hack/testdata/frontend-replicaset.yaml "${kube_flags[@]}" --max=2 --cpu-percent=70
 | 
				
			||||||
 | 
					    kube::test::get_object_assert 'hpa frontend' "{{$hpa_min_field}} {{$hpa_max_field}} {{$hpa_cpu_field}}" '1 2 70'
 | 
				
			||||||
 | 
					    kubectl delete hpa frontend "${kube_flags[@]}"
 | 
				
			||||||
 | 
					    # autoscale 2~3 pods, no CPU utilization specified, replica set specified by name
 | 
				
			||||||
 | 
					    kubectl autoscale rs frontend "${kube_flags[@]}" --min=2 --max=3
 | 
				
			||||||
 | 
					    kube::test::get_object_assert 'hpa frontend' "{{$hpa_min_field}} {{$hpa_max_field}} {{$hpa_cpu_field}}" '2 3 80'
 | 
				
			||||||
 | 
					    kubectl delete hpa frontend "${kube_flags[@]}"
 | 
				
			||||||
 | 
					    # autoscale without specifying --max should fail
 | 
				
			||||||
 | 
					    ! kubectl autoscale rs frontend "${kube_flags[@]}"
 | 
				
			||||||
 | 
					    # Clean up
 | 
				
			||||||
 | 
					    kubectl delete rs frontend "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										81
									
								
								test/cmd/authorization.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										81
									
								
								test/cmd/authorization.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,81 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_authorization_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing authorization"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check remote authorization endpoint, kubectl doesn't actually display the returned object so this isn't super useful
 | 
				
			||||||
 | 
					  # but it proves that works
 | 
				
			||||||
 | 
					  kubectl create -f test/fixtures/pkg/kubectl/cmd/create/sar-v1.json --validate=false
 | 
				
			||||||
 | 
					  kubectl create -f test/fixtures/pkg/kubectl/cmd/create/sar-v1beta1.json --validate=false
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  SAR_RESULT_FILE="${KUBE_TEMP}/sar-result.json"
 | 
				
			||||||
 | 
					  curl -k -H "Content-Type:" http://localhost:8080/apis/authorization.k8s.io/v1beta1/subjectaccessreviews -XPOST -d @test/fixtures/pkg/kubectl/cmd/create/sar-v1beta1.json > "${SAR_RESULT_FILE}"
 | 
				
			||||||
 | 
					  if grep -q '"allowed": true' "${SAR_RESULT_FILE}"; then
 | 
				
			||||||
 | 
					    kube::log::status "\"authorization.k8s.io/subjectaccessreviews\" returns as expected: $(cat "${SAR_RESULT_FILE}")"
 | 
				
			||||||
 | 
					  else
 | 
				
			||||||
 | 
					    kube::log::status "\"authorization.k8s.io/subjectaccessreviews\" does not return as expected: $(cat "${SAR_RESULT_FILE}")"
 | 
				
			||||||
 | 
					    exit 1
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					  rm "${SAR_RESULT_FILE}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  SAR_RESULT_FILE="${KUBE_TEMP}/sar-result.json"
 | 
				
			||||||
 | 
					  curl -k -H "Content-Type:" http://localhost:8080/apis/authorization.k8s.io/v1/subjectaccessreviews -XPOST -d @test/fixtures/pkg/kubectl/cmd/create/sar-v1.json > "${SAR_RESULT_FILE}"
 | 
				
			||||||
 | 
					  if grep -q '"allowed": true' "${SAR_RESULT_FILE}"; then
 | 
				
			||||||
 | 
					    kube::log::status "\"authorization.k8s.io/subjectaccessreviews\" returns as expected: $(cat "${SAR_RESULT_FILE}")"
 | 
				
			||||||
 | 
					  else
 | 
				
			||||||
 | 
					    kube::log::status "\"authorization.k8s.io/subjectaccessreviews\" does not return as expected: $(cat "${SAR_RESULT_FILE}")"
 | 
				
			||||||
 | 
					    exit 1
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					  rm "${SAR_RESULT_FILE}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_impersonation_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing impersonation"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pods "${kube_flags_with_token[@]}" --as-group=foo 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'without impersonating a user'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  if kube::test::if_supports_resource "${csr}" ; then
 | 
				
			||||||
 | 
					    # --as
 | 
				
			||||||
 | 
					    kubectl create -f hack/testdata/csr.yml "${kube_flags_with_token[@]}" --as=user1
 | 
				
			||||||
 | 
					    kube::test::get_object_assert 'csr/foo' '{{.spec.username}}' 'user1'
 | 
				
			||||||
 | 
					    kube::test::get_object_assert 'csr/foo' '{{range .spec.groups}}{{.}}{{end}}' 'system:authenticated'
 | 
				
			||||||
 | 
					    kubectl delete -f hack/testdata/csr.yml "${kube_flags_with_token[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    # --as-group
 | 
				
			||||||
 | 
					    kubectl create -f hack/testdata/csr.yml "${kube_flags_with_token[@]}" --as=user1 --as-group=group2 --as-group=group1 --as-group=,,,chameleon
 | 
				
			||||||
 | 
					    kube::test::get_object_assert 'csr/foo' '{{len .spec.groups}}' '3'
 | 
				
			||||||
 | 
					    kube::test::get_object_assert 'csr/foo' '{{range .spec.groups}}{{.}} {{end}}' 'group2 group1 ,,,chameleon '
 | 
				
			||||||
 | 
					    kubectl delete -f hack/testdata/csr.yml "${kube_flags_with_token[@]}"
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										63
									
								
								test/cmd/batch.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										63
									
								
								test/cmd/batch.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,63 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_job_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing job"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create a new namespace
 | 
				
			||||||
 | 
					  # Pre-condition: the test-jobs namespace does not exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'namespaces' '{{range.items}}{{ if eq $id_field \"test-jobs\" }}found{{end}}{{end}}:' ':'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create namespace test-jobs
 | 
				
			||||||
 | 
					  # Post-condition: namespace 'test-jobs' is created.
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'namespaces/test-jobs' "{{$id_field}}" 'test-jobs'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create a cronjob in a specific namespace
 | 
				
			||||||
 | 
					  kubectl run pi --schedule="59 23 31 2 *" --namespace=test-jobs --generator=cronjob/v1beta1 "--image=$IMAGE_PERL" --restart=OnFailure -- perl -Mbignum=bpi -wle 'print bpi(20)' "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-Condition: assertion object exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'cronjob/pi --namespace=test-jobs' "{{$id_field}}" 'pi'
 | 
				
			||||||
 | 
					  kubectl get cronjob/pi --namespace=test-jobs
 | 
				
			||||||
 | 
					  kubectl describe cronjob/pi --namespace=test-jobs
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create a job in dry-run mode
 | 
				
			||||||
 | 
					  output_message=$(kubectl create job test-job --from=cronjob/pi --dry-run=true --namespace=test-jobs -o name)
 | 
				
			||||||
 | 
					  # Post-condition: The text 'job.batch/test-job' should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'job.batch/test-job'
 | 
				
			||||||
 | 
					  # Post-condition: The test-job wasn't created actually
 | 
				
			||||||
 | 
					  kube::test::get_object_assert jobs "{{range.items}}{{$id_field}}{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create a job in a specific namespace
 | 
				
			||||||
 | 
					  kubectl create job test-job --from=cronjob/pi --namespace=test-jobs
 | 
				
			||||||
 | 
					  # Post-Condition: assertion object exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'job/test-job --namespace=test-jobs' "{{$id_field}}" 'test-job'
 | 
				
			||||||
 | 
					  kubectl get job/test-job --namespace=test-jobs
 | 
				
			||||||
 | 
					  kubectl describe job/test-job --namespace=test-jobs
 | 
				
			||||||
 | 
					  #Clean up
 | 
				
			||||||
 | 
					  kubectl delete job test-job --namespace=test-jobs
 | 
				
			||||||
 | 
					  kubectl delete cronjob pi --namespace=test-jobs
 | 
				
			||||||
 | 
					  kubectl delete namespace test-jobs
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										63
									
								
								test/cmd/certificate.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										63
									
								
								test/cmd/certificate.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,63 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_certificates_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing certificates"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # approve
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/csr.yml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'csr/foo' '{{range.status.conditions}}{{.type}}{{end}}' ''
 | 
				
			||||||
 | 
					  kubectl certificate approve foo "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl get csr "${kube_flags[@]}" -o json
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'csr/foo' '{{range.status.conditions}}{{.type}}{{end}}' 'Approved'
 | 
				
			||||||
 | 
					  kubectl delete -f hack/testdata/csr.yml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert csr "{{range.items}}{{$id_field}}{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/csr.yml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'csr/foo' '{{range.status.conditions}}{{.type}}{{end}}' ''
 | 
				
			||||||
 | 
					  kubectl certificate approve -f hack/testdata/csr.yml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl get csr "${kube_flags[@]}" -o json
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'csr/foo' '{{range.status.conditions}}{{.type}}{{end}}' 'Approved'
 | 
				
			||||||
 | 
					  kubectl delete -f hack/testdata/csr.yml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert csr "{{range.items}}{{$id_field}}{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # deny
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/csr.yml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'csr/foo' '{{range.status.conditions}}{{.type}}{{end}}' ''
 | 
				
			||||||
 | 
					  kubectl certificate deny foo "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl get csr "${kube_flags[@]}" -o json
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'csr/foo' '{{range.status.conditions}}{{.type}}{{end}}' 'Denied'
 | 
				
			||||||
 | 
					  kubectl delete -f hack/testdata/csr.yml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert csr "{{range.items}}{{$id_field}}{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/csr.yml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'csr/foo' '{{range.status.conditions}}{{.type}}{{end}}' ''
 | 
				
			||||||
 | 
					  kubectl certificate deny -f hack/testdata/csr.yml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl get csr "${kube_flags[@]}" -o json
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'csr/foo' '{{range.status.conditions}}{{.type}}{{end}}' 'Denied'
 | 
				
			||||||
 | 
					  kubectl delete -f hack/testdata/csr.yml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert csr "{{range.items}}{{$id_field}}{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										1372
									
								
								test/cmd/core.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										1372
									
								
								test/cmd/core.sh
									
									
									
									
									
										Executable file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										469
									
								
								test/cmd/crd.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										469
									
								
								test/cmd/crd.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,469 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_crd_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl crd"
 | 
				
			||||||
 | 
					  kubectl "${kube_flags_with_token[@]}" create -f - << __EOF__
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					  "kind": "CustomResourceDefinition",
 | 
				
			||||||
 | 
					  "apiVersion": "apiextensions.k8s.io/v1beta1",
 | 
				
			||||||
 | 
					  "metadata": {
 | 
				
			||||||
 | 
					    "name": "foos.company.com"
 | 
				
			||||||
 | 
					  },
 | 
				
			||||||
 | 
					  "spec": {
 | 
				
			||||||
 | 
					    "group": "company.com",
 | 
				
			||||||
 | 
					    "version": "v1",
 | 
				
			||||||
 | 
					    "scope": "Namespaced",
 | 
				
			||||||
 | 
					    "names": {
 | 
				
			||||||
 | 
					      "plural": "foos",
 | 
				
			||||||
 | 
					      "kind": "Foo"
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					  }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					__EOF__
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Post-Condition: assertion object exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert customresourcedefinitions "{{range.items}}{{$id_field}}:{{end}}" 'foos.company.com:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kubectl "${kube_flags_with_token[@]}" create -f - << __EOF__
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					  "kind": "CustomResourceDefinition",
 | 
				
			||||||
 | 
					  "apiVersion": "apiextensions.k8s.io/v1beta1",
 | 
				
			||||||
 | 
					  "metadata": {
 | 
				
			||||||
 | 
					    "name": "bars.company.com"
 | 
				
			||||||
 | 
					  },
 | 
				
			||||||
 | 
					  "spec": {
 | 
				
			||||||
 | 
					    "group": "company.com",
 | 
				
			||||||
 | 
					    "version": "v1",
 | 
				
			||||||
 | 
					    "scope": "Namespaced",
 | 
				
			||||||
 | 
					    "names": {
 | 
				
			||||||
 | 
					      "plural": "bars",
 | 
				
			||||||
 | 
					      "kind": "Bar"
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					  }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					__EOF__
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Post-Condition: assertion object exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert customresourcedefinitions "{{range.items}}{{$id_field}}:{{end}}" 'bars.company.com:foos.company.com:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # This test ensures that the name printer is able to output a resource
 | 
				
			||||||
 | 
					  # in the proper "kind.group/resource_name" format, and that the
 | 
				
			||||||
 | 
					  # resource builder is able to resolve a GVK when a kind.group pair is given.
 | 
				
			||||||
 | 
					  kubectl "${kube_flags_with_token[@]}" create -f - << __EOF__
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					  "kind": "CustomResourceDefinition",
 | 
				
			||||||
 | 
					  "apiVersion": "apiextensions.k8s.io/v1beta1",
 | 
				
			||||||
 | 
					  "metadata": {
 | 
				
			||||||
 | 
					    "name": "resources.mygroup.example.com"
 | 
				
			||||||
 | 
					  },
 | 
				
			||||||
 | 
					  "spec": {
 | 
				
			||||||
 | 
					    "group": "mygroup.example.com",
 | 
				
			||||||
 | 
					    "version": "v1alpha1",
 | 
				
			||||||
 | 
					    "scope": "Namespaced",
 | 
				
			||||||
 | 
					    "names": {
 | 
				
			||||||
 | 
					      "plural": "resources",
 | 
				
			||||||
 | 
					      "singular": "resource",
 | 
				
			||||||
 | 
					      "kind": "Kind",
 | 
				
			||||||
 | 
					      "listKind": "KindList"
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					  }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					__EOF__
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Post-Condition: assertion crd with non-matching kind and resource exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert customresourcedefinitions "{{range.items}}{{$id_field}}:{{end}}" 'bars.company.com:foos.company.com:resources.mygroup.example.com:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # This test ensures that we can create complex validation without client-side validation complaining
 | 
				
			||||||
 | 
					  kubectl "${kube_flags_with_token[@]}" create -f - << __EOF__
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					  "kind": "CustomResourceDefinition",
 | 
				
			||||||
 | 
					  "apiVersion": "apiextensions.k8s.io/v1beta1",
 | 
				
			||||||
 | 
					  "metadata": {
 | 
				
			||||||
 | 
					    "name": "validfoos.company.com"
 | 
				
			||||||
 | 
					  },
 | 
				
			||||||
 | 
					  "spec": {
 | 
				
			||||||
 | 
					    "group": "company.com",
 | 
				
			||||||
 | 
					    "version": "v1",
 | 
				
			||||||
 | 
					    "scope": "Namespaced",
 | 
				
			||||||
 | 
					    "names": {
 | 
				
			||||||
 | 
					      "plural": "validfoos",
 | 
				
			||||||
 | 
					      "kind": "ValidFoo"
 | 
				
			||||||
 | 
					    },
 | 
				
			||||||
 | 
					    "validation": {
 | 
				
			||||||
 | 
					      "openAPIV3Schema": {
 | 
				
			||||||
 | 
					        "properties": {
 | 
				
			||||||
 | 
					          "spec": {
 | 
				
			||||||
 | 
					            "type": "array",
 | 
				
			||||||
 | 
					            "items": {
 | 
				
			||||||
 | 
					              "type": "number"
 | 
				
			||||||
 | 
					            }
 | 
				
			||||||
 | 
					          }
 | 
				
			||||||
 | 
					        }
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					  }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					__EOF__
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Post-Condition: assertion crd with non-matching kind and resource exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert customresourcedefinitions "{{range.items}}{{$id_field}}:{{end}}" 'bars.company.com:foos.company.com:resources.mygroup.example.com:validfoos.company.com:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  run_non_native_resource_tests
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # teardown
 | 
				
			||||||
 | 
					  kubectl delete customresourcedefinitions/foos.company.com "${kube_flags_with_token[@]}"
 | 
				
			||||||
 | 
					  kubectl delete customresourcedefinitions/bars.company.com "${kube_flags_with_token[@]}"
 | 
				
			||||||
 | 
					  kubectl delete customresourcedefinitions/resources.mygroup.example.com "${kube_flags_with_token[@]}"
 | 
				
			||||||
 | 
					  kubectl delete customresourcedefinitions/validfoos.company.com "${kube_flags_with_token[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					kube::util::non_native_resources() {
 | 
				
			||||||
 | 
					  local times
 | 
				
			||||||
 | 
					  local wait
 | 
				
			||||||
 | 
					  local failed
 | 
				
			||||||
 | 
					  times=30
 | 
				
			||||||
 | 
					  wait=10
 | 
				
			||||||
 | 
					  local i
 | 
				
			||||||
 | 
					  for i in $(seq 1 $times); do
 | 
				
			||||||
 | 
					    failed=""
 | 
				
			||||||
 | 
					    kubectl "${kube_flags[@]}" get --raw '/apis/company.com/v1' || failed=true
 | 
				
			||||||
 | 
					    kubectl "${kube_flags[@]}" get --raw '/apis/company.com/v1/foos' || failed=true
 | 
				
			||||||
 | 
					    kubectl "${kube_flags[@]}" get --raw '/apis/company.com/v1/bars' || failed=true
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    if [ -z "${failed}" ]; then
 | 
				
			||||||
 | 
					      return 0
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    sleep ${wait}
 | 
				
			||||||
 | 
					  done
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::error "Timed out waiting for non-native-resources; tried ${times} waiting ${wait}s between each"
 | 
				
			||||||
 | 
					  return 1
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_non_native_resource_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl non-native resources"
 | 
				
			||||||
 | 
					  kube::util::non_native_resources
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that we can list this new CustomResource (foos)
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that we can list this new CustomResource (bars)
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that we can list this new CustomResource (resources)
 | 
				
			||||||
 | 
					  kube::test::get_object_assert resources "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that we can create a new resource of type Kind
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" create -f hack/testdata/CRD/resource.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that -o name returns kind.group/resourcename
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" get resource/myobj -o name)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'kind.mygroup.example.com/myobj'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" get resources/myobj -o name)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'kind.mygroup.example.com/myobj'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" get kind.mygroup.example.com/myobj -o name)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'kind.mygroup.example.com/myobj'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Delete the resource with cascade.
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" delete resources myobj --cascade=true
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Make sure it's gone
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert resources "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that we can create a new resource of type Foo
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" create -f hack/testdata/CRD/foo.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that we can list this new custom resource
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos "{{range.items}}{{$id_field}}:{{end}}" 'test:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test alternate forms
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foo                 "{{range.items}}{{$id_field}}:{{end}}" 'test:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos.company.com    "{{range.items}}{{$id_field}}:{{end}}" 'test:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos.v1.company.com "{{range.items}}{{$id_field}}:{{end}}" 'test:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test all printers, with lists and individual items
 | 
				
			||||||
 | 
					  kube::log::status "Testing CustomResource printing"
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos/test
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos      -o name
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos/test -o name
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos      -o wide
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos/test -o wide
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos      -o json
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos/test -o json
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos      -o yaml
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos/test -o yaml
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos      -o "jsonpath={.items[*].someField}" --allow-missing-template-keys=false
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos/test -o "jsonpath={.someField}"          --allow-missing-template-keys=false
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos      -o "go-template={{range .items}}{{.someField}}{{end}}" --allow-missing-template-keys=false
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos/test -o "go-template={{.someField}}"                        --allow-missing-template-keys=false
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" get foos/test -o name)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo.company.com/test'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test patching
 | 
				
			||||||
 | 
					  kube::log::status "Testing CustomResource patching"
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" patch foos/test -p '{"patched":"value1"}' --type=merge
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test "{{.patched}}" 'value1'
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" patch foos/test -p '{"patched":"value2"}' --type=merge --record
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test "{{.patched}}" 'value2'
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" patch foos/test -p '{"patched":null}' --type=merge --record
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test "{{.patched}}" '<no value>'
 | 
				
			||||||
 | 
					  # Get local version
 | 
				
			||||||
 | 
					  CRD_RESOURCE_FILE="${KUBE_TEMP}/crd-foos-test.json"
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" get foos/test -o json > "${CRD_RESOURCE_FILE}"
 | 
				
			||||||
 | 
					  # cannot apply strategic patch locally
 | 
				
			||||||
 | 
					  CRD_PATCH_ERROR_FILE="${KUBE_TEMP}/crd-foos-test-error"
 | 
				
			||||||
 | 
					  ! kubectl "${kube_flags[@]}" patch --local -f "${CRD_RESOURCE_FILE}" -p '{"patched":"value3"}' 2> "${CRD_PATCH_ERROR_FILE}"
 | 
				
			||||||
 | 
					  if grep -q "try --type merge" "${CRD_PATCH_ERROR_FILE}"; then
 | 
				
			||||||
 | 
					    kube::log::status "\"kubectl patch --local\" returns error as expected for CustomResource: $(cat ${CRD_PATCH_ERROR_FILE})"
 | 
				
			||||||
 | 
					  else
 | 
				
			||||||
 | 
					    kube::log::status "\"kubectl patch --local\" returns unexpected error or non-error: $(cat ${CRD_PATCH_ERROR_FILE})"
 | 
				
			||||||
 | 
					    exit 1
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					  # can apply merge patch locally
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" patch --local -f "${CRD_RESOURCE_FILE}" -p '{"patched":"value3"}' --type=merge -o json
 | 
				
			||||||
 | 
					  # can apply merge patch remotely
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" patch --record -f "${CRD_RESOURCE_FILE}" -p '{"patched":"value3"}' --type=merge -o json
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test "{{.patched}}" 'value3'
 | 
				
			||||||
 | 
					  rm "${CRD_RESOURCE_FILE}"
 | 
				
			||||||
 | 
					  rm "${CRD_PATCH_ERROR_FILE}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test labeling
 | 
				
			||||||
 | 
					  kube::log::status "Testing CustomResource labeling"
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" label foos --all listlabel=true
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" label foo/test itemlabel=true
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test annotating
 | 
				
			||||||
 | 
					  kube::log::status "Testing CustomResource annotating"
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" annotate foos --all listannotation=true
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" annotate foo/test itemannotation=true
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test describing
 | 
				
			||||||
 | 
					  kube::log::status "Testing CustomResource describing"
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" describe foos
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" describe foos/test
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" describe foos | grep listlabel=true
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" describe foos | grep itemlabel=true
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Delete the resource with cascade.
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" delete foos test --cascade=true
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Make sure it's gone
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert foos "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that we can create a new resource of type Bar
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" create -f hack/testdata/CRD/bar.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that we can list this new custom resource
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars "{{range.items}}{{$id_field}}:{{end}}" 'test:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that we can watch the resource.
 | 
				
			||||||
 | 
					  # Start watcher in background with process substitution,
 | 
				
			||||||
 | 
					  # so we can read from stdout asynchronously.
 | 
				
			||||||
 | 
					  kube::log::status "Testing CustomResource watching"
 | 
				
			||||||
 | 
					  exec 3< <(kubectl "${kube_flags[@]}" get bars --request-timeout=1m --watch-only -o name & echo $! ; wait)
 | 
				
			||||||
 | 
					  local watch_pid
 | 
				
			||||||
 | 
					  read <&3 watch_pid
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # We can't be sure when the watch gets established,
 | 
				
			||||||
 | 
					  # so keep triggering events (in the background) until something comes through.
 | 
				
			||||||
 | 
					  local tries=0
 | 
				
			||||||
 | 
					  while [ ${tries} -lt 10 ]; do
 | 
				
			||||||
 | 
					    tries=$((tries+1))
 | 
				
			||||||
 | 
					    kubectl "${kube_flags[@]}" patch bars/test -p "{\"patched\":\"${tries}\"}" --type=merge
 | 
				
			||||||
 | 
					    sleep 1
 | 
				
			||||||
 | 
					  done &
 | 
				
			||||||
 | 
					  local patch_pid=$!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Wait up to 30s for a complete line of output.
 | 
				
			||||||
 | 
					  local watch_output
 | 
				
			||||||
 | 
					  read <&3 -t 30 watch_output
 | 
				
			||||||
 | 
					  # Stop the watcher and the patch loop.
 | 
				
			||||||
 | 
					  kill -9 ${watch_pid}
 | 
				
			||||||
 | 
					  kill -9 ${patch_pid}
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${watch_output}" 'bar.company.com/test'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Delete the resource without cascade.
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" delete bars test --cascade=false
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Make sure it's gone
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert bars "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that we can create single item via apply
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" apply -f hack/testdata/CRD/foo.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that we have create a foo named test
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos "{{range.items}}{{$id_field}}:{{end}}" 'test:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that the field has the expected value
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test '{{.someField}}' 'field1'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that apply an empty patch doesn't change fields
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" apply -f hack/testdata/CRD/foo.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that the field has the same value after re-apply
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test '{{.someField}}' 'field1'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that apply has updated the subfield
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test '{{.nestedField.someSubfield}}' 'subfield1'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Update a subfield and then apply the change
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" apply -f hack/testdata/CRD/foo-updated-subfield.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that apply has updated the subfield
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test '{{.nestedField.someSubfield}}' 'modifiedSubfield'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that the field has the expected value
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test '{{.nestedField.otherSubfield}}' 'subfield2'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Delete a subfield and then apply the change
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" apply -f hack/testdata/CRD/foo-deleted-subfield.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that apply has deleted the field
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test '{{.nestedField.otherSubfield}}' '<no value>'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that the field does not exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test '{{.nestedField.newSubfield}}' '<no value>'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Add a field and then apply the change
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" apply -f hack/testdata/CRD/foo-added-subfield.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that apply has added the field
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test '{{.nestedField.newSubfield}}' 'subfield3'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Delete the resource
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" delete -f hack/testdata/CRD/foo.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Make sure it's gone
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that we can create list via apply
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" apply -f hack/testdata/CRD/multi-crd-list.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that we have create a foo and a bar from a list
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos "{{range.items}}{{$id_field}}:{{end}}" 'test-list:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars "{{range.items}}{{$id_field}}:{{end}}" 'test-list:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that the field has the expected value
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test-list '{{.someField}}' 'field1'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars/test-list '{{.someField}}' 'field1'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that re-apply an list doesn't change anything
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" apply -f hack/testdata/CRD/multi-crd-list.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that the field has the same value after re-apply
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test-list '{{.someField}}' 'field1'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars/test-list '{{.someField}}' 'field1'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that the fields have the expected value
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test-list '{{.someField}}' 'field1'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars/test-list '{{.someField}}' 'field1'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Update fields and then apply the change
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" apply -f hack/testdata/CRD/multi-crd-list-updated-field.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that apply has updated the fields
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test-list '{{.someField}}' 'modifiedField'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars/test-list '{{.someField}}' 'modifiedField'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that the field has the expected value
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test-list '{{.otherField}}' 'field2'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars/test-list '{{.otherField}}' 'field2'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Delete fields and then apply the change
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" apply -f hack/testdata/CRD/multi-crd-list-deleted-field.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that apply has deleted the fields
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test-list '{{.otherField}}' '<no value>'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars/test-list '{{.otherField}}' '<no value>'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that the fields does not exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test-list '{{.newField}}' '<no value>'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars/test-list '{{.newField}}' '<no value>'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Add a field and then apply the change
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" apply -f hack/testdata/CRD/multi-crd-list-added-field.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that apply has added the field
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos/test-list '{{.newField}}' 'field3'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars/test-list '{{.newField}}' 'field3'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Delete the resource
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" delete -f hack/testdata/CRD/multi-crd-list.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Make sure it's gone
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## kubectl apply --prune
 | 
				
			||||||
 | 
					  # Test that no foo or bar exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # apply --prune on foo.yaml that has foo/test
 | 
				
			||||||
 | 
					  kubectl apply --prune -l pruneGroup=true -f hack/testdata/CRD/foo.yaml "${kube_flags[@]}" --prune-whitelist=company.com/v1/Foo --prune-whitelist=company.com/v1/Bar
 | 
				
			||||||
 | 
					  # check right crds exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos "{{range.items}}{{$id_field}}:{{end}}" 'test:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # apply --prune on bar.yaml that has bar/test
 | 
				
			||||||
 | 
					  kubectl apply --prune -l pruneGroup=true -f hack/testdata/CRD/bar.yaml "${kube_flags[@]}" --prune-whitelist=company.com/v1/Foo --prune-whitelist=company.com/v1/Bar
 | 
				
			||||||
 | 
					  # check right crds exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars "{{range.items}}{{$id_field}}:{{end}}" 'test:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Delete the resource
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" delete -f hack/testdata/CRD/bar.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Make sure it's gone
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test 'kubectl create' with namespace, and namespace cleanup.
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" create namespace non-native-resources
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" create -f hack/testdata/CRD/bar.yaml --namespace=non-native-resources
 | 
				
			||||||
 | 
					  kube::test::get_object_assert bars '{{len .items}}' '1' --namespace=non-native-resources
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" delete namespace non-native-resources
 | 
				
			||||||
 | 
					  # Make sure objects go away.
 | 
				
			||||||
 | 
					  kube::test::wait_object_assert bars '{{len .items}}' '0' --namespace=non-native-resources
 | 
				
			||||||
 | 
					  # Make sure namespace goes away.
 | 
				
			||||||
 | 
					  local tries=0
 | 
				
			||||||
 | 
					  while kubectl "${kube_flags[@]}" get namespace non-native-resources && [ ${tries} -lt 10 ]; do
 | 
				
			||||||
 | 
					    tries=$((tries+1))
 | 
				
			||||||
 | 
					    sleep ${tries}
 | 
				
			||||||
 | 
					  done
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										74
									
								
								test/cmd/create.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										74
									
								
								test/cmd/create.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,74 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Runs tests related to kubectl create --filename(-f) --selector(-l).
 | 
				
			||||||
 | 
					run_kubectl_create_filter_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl create filter"
 | 
				
			||||||
 | 
					  ## kubectl create -f with label selector should only create matching objects
 | 
				
			||||||
 | 
					  # Pre-Condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # create
 | 
				
			||||||
 | 
					  kubectl create -l unique-label=bingbang -f hack/testdata/filter "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # check right pod exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'pods selector-test-pod' "{{${labels_field}.name}}" 'selector-test-pod'
 | 
				
			||||||
 | 
					  # check wrong pod doesn't exist
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pods selector-test-pod-dont-apply 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'pods "selector-test-pod-dont-apply" not found'
 | 
				
			||||||
 | 
					  # cleanup
 | 
				
			||||||
 | 
					  kubectl delete pods selector-test-pod
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_kubectl_create_error_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl create with error"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Passing no arguments to create is an error
 | 
				
			||||||
 | 
					  ! kubectl create
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## kubectl create should not panic on empty string lists in a template
 | 
				
			||||||
 | 
					  ERROR_FILE="${KUBE_TEMP}/validation-error"
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/invalid-rc-with-empty-args.yaml "${kube_flags[@]}" 2> "${ERROR_FILE}" || true
 | 
				
			||||||
 | 
					  # Post-condition: should get an error reporting the empty string
 | 
				
			||||||
 | 
					  if grep -q "unknown object type \"nil\" in ReplicationController" "${ERROR_FILE}"; then
 | 
				
			||||||
 | 
					    kube::log::status "\"kubectl create with empty string list returns error as expected: $(cat ${ERROR_FILE})"
 | 
				
			||||||
 | 
					  else
 | 
				
			||||||
 | 
					    kube::log::status "\"kubectl create with empty string list returns unexpected error or non-error: $(cat ${ERROR_FILE})"
 | 
				
			||||||
 | 
					    exit 1
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					  rm "${ERROR_FILE}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Posting a pod to namespaces should fail.  Also tests --raw forcing the post location
 | 
				
			||||||
 | 
					  [ "$( kubectl convert -f test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml -o json | kubectl create "${kube_flags[@]}" --raw /api/v1/namespaces -f - --v=8 2>&1 | grep 'cannot be handled as a Namespace: converting (v1.Pod)')" ]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  [ "$( kubectl create "${kube_flags[@]}" --raw /api/v1/namespaces -f test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml --edit 2>&1 | grep 'raw and --edit are mutually exclusive')" ]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										52
									
								
								test/cmd/diff.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										52
									
								
								test/cmd/diff.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,52 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Runs tests for kubectl alpha diff
 | 
				
			||||||
 | 
					run_kubectl_diff_tests() {
 | 
				
			||||||
 | 
					    set -o nounset
 | 
				
			||||||
 | 
					    set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    create_and_use_new_namespace
 | 
				
			||||||
 | 
					    kube::log::status "Testing kubectl alpha diff"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    kubectl apply -f hack/testdata/pod.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    # Ensure that selfLink has been added, and shown in the diff
 | 
				
			||||||
 | 
					    output_message=$(kubectl alpha diff -f hack/testdata/pod.yaml)
 | 
				
			||||||
 | 
					    kube::test::if_has_string "${output_message}" 'selfLink'
 | 
				
			||||||
 | 
					    output_message=$(kubectl alpha diff LOCAL LIVE -f hack/testdata/pod.yaml)
 | 
				
			||||||
 | 
					    kube::test::if_has_string "${output_message}" 'selfLink'
 | 
				
			||||||
 | 
					    output_message=$(kubectl alpha diff LOCAL MERGED -f hack/testdata/pod.yaml)
 | 
				
			||||||
 | 
					    kube::test::if_has_string "${output_message}" 'selfLink'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    output_message=$(kubectl alpha diff MERGED MERGED -f hack/testdata/pod.yaml)
 | 
				
			||||||
 | 
					    kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					    output_message=$(kubectl alpha diff LIVE LIVE -f hack/testdata/pod.yaml)
 | 
				
			||||||
 | 
					    kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					    output_message=$(kubectl alpha diff LAST LAST -f hack/testdata/pod.yaml)
 | 
				
			||||||
 | 
					    kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					    output_message=$(kubectl alpha diff LOCAL LOCAL -f hack/testdata/pod.yaml)
 | 
				
			||||||
 | 
					    kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    kubectl delete -f  hack/testdata/pod.yaml
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    set +o nounset
 | 
				
			||||||
 | 
					    set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										130
									
								
								test/cmd/discovery.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										130
									
								
								test/cmd/discovery.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,130 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_RESTMapper_evaluation_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing RESTMapper"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  RESTMAPPER_ERROR_FILE="${KUBE_TEMP}/restmapper-error"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Non-existent resource type should give a recognizeable error
 | 
				
			||||||
 | 
					  # Pre-condition: None
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl get "${kube_flags[@]}" unknownresourcetype 2>${RESTMAPPER_ERROR_FILE} || true
 | 
				
			||||||
 | 
					  if grep -q "the server doesn't have a resource type" "${RESTMAPPER_ERROR_FILE}"; then
 | 
				
			||||||
 | 
					    kube::log::status "\"kubectl get unknownresourcetype\" returns error as expected: $(cat ${RESTMAPPER_ERROR_FILE})"
 | 
				
			||||||
 | 
					  else
 | 
				
			||||||
 | 
					    kube::log::status "\"kubectl get unknownresourcetype\" returns unexpected error or non-error: $(cat ${RESTMAPPER_ERROR_FILE})"
 | 
				
			||||||
 | 
					    exit 1
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					  rm "${RESTMAPPER_ERROR_FILE}"
 | 
				
			||||||
 | 
					  # Post-condition: None
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_assert_short_name_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing assert short name"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing propagation of short names for resources"
 | 
				
			||||||
 | 
					  output_message=$(kubectl get --raw=/api/v1)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## test if a short name is exported during discovery
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" '{"name":"configmaps","singularName":"","namespaced":true,"kind":"ConfigMap","verbs":\["create","delete","deletecollection","get","list","patch","update","watch"\],"shortNames":\["cm"\]}'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_assert_categories_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing propagation of categories for resources"
 | 
				
			||||||
 | 
					  output_message=$(kubectl get --raw=/api/v1 | grep -o '"name":"pods"[^}]*}')
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" '"categories":\["all"\]'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_resource_aliasing_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing resource aliasing"
 | 
				
			||||||
 | 
					  kubectl create -f test/e2e/testing-manifests/statefulset/cassandra/controller.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl create -f test/e2e/testing-manifests/statefulset/cassandra/service.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  object="all -l'app=cassandra'"
 | 
				
			||||||
 | 
					  request="{{range.items}}{{range .metadata.labels}}{{.}}:{{end}}{{end}}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # all 4 cassandra's might not be in the request immediately...
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "$object" "$request" 'cassandra:cassandra:cassandra:cassandra:' || \
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "$object" "$request" 'cassandra:cassandra:cassandra:' || \
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "$object" "$request" 'cassandra:cassandra:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kubectl delete all -l app=cassandra "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_kubectl_explain_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl(v1:explain)"
 | 
				
			||||||
 | 
					  kubectl explain pods
 | 
				
			||||||
 | 
					  # shortcuts work
 | 
				
			||||||
 | 
					  kubectl explain po
 | 
				
			||||||
 | 
					  kubectl explain po.status.message
 | 
				
			||||||
 | 
					  # cronjob work
 | 
				
			||||||
 | 
					  kubectl explain cronjob
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_swagger_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing swagger"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Verify schema
 | 
				
			||||||
 | 
					  file="${KUBE_TEMP}/schema-v1.json"
 | 
				
			||||||
 | 
					  curl -s "http://127.0.0.1:${API_PORT}/swaggerapi/api/v1" > "${file}"
 | 
				
			||||||
 | 
					  [[ "$(grep "list of returned" "${file}")" ]]
 | 
				
			||||||
 | 
					  [[ "$(grep "List of services" "${file}")" ]]
 | 
				
			||||||
 | 
					  [[ "$(grep "Watch for changes to the described resources" "${file}")" ]]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										472
									
								
								test/cmd/generic-resources.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										472
									
								
								test/cmd/generic-resources.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,472 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_multi_resources_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl(v1:multiple resources)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  FILES="hack/testdata/multi-resource-yaml
 | 
				
			||||||
 | 
					  hack/testdata/multi-resource-list
 | 
				
			||||||
 | 
					  hack/testdata/multi-resource-json
 | 
				
			||||||
 | 
					  hack/testdata/multi-resource-rclist
 | 
				
			||||||
 | 
					  hack/testdata/multi-resource-svclist"
 | 
				
			||||||
 | 
					  YAML=".yaml"
 | 
				
			||||||
 | 
					  JSON=".json"
 | 
				
			||||||
 | 
					  for file in $FILES; do
 | 
				
			||||||
 | 
					    if [ -f $file$YAML ]
 | 
				
			||||||
 | 
					    then
 | 
				
			||||||
 | 
					      file=$file$YAML
 | 
				
			||||||
 | 
					      replace_file="${file%.yaml}-modify.yaml"
 | 
				
			||||||
 | 
					    else
 | 
				
			||||||
 | 
					      file=$file$JSON
 | 
				
			||||||
 | 
					      replace_file="${file%.json}-modify.json"
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    has_svc=true
 | 
				
			||||||
 | 
					    has_rc=true
 | 
				
			||||||
 | 
					    two_rcs=false
 | 
				
			||||||
 | 
					    two_svcs=false
 | 
				
			||||||
 | 
					    if [[ "${file}" == *rclist* ]]; then
 | 
				
			||||||
 | 
					      has_svc=false
 | 
				
			||||||
 | 
					      two_rcs=true
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    if [[ "${file}" == *svclist* ]]; then
 | 
				
			||||||
 | 
					      has_rc=false
 | 
				
			||||||
 | 
					      two_svcs=true
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    ### Create, get, describe, replace, label, annotate, and then delete service nginxsvc and replication controller my-nginx from 5 types of files:
 | 
				
			||||||
 | 
					    ### 1) YAML, separated by ---; 2) JSON, with a List type; 3) JSON, with JSON object concatenation
 | 
				
			||||||
 | 
					    ### 4) JSON, with a ReplicationControllerList type; 5) JSON, with a ServiceList type
 | 
				
			||||||
 | 
					    echo "Testing with file ${file} and replace with file ${replace_file}"
 | 
				
			||||||
 | 
					    # Pre-condition: no service (other than default kubernetes services) or replication controller exists
 | 
				
			||||||
 | 
					    kube::test::get_object_assert services "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					    kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					    # Command
 | 
				
			||||||
 | 
					    kubectl create -f "${file}" "${kube_flags[@]}"
 | 
				
			||||||
 | 
					    # Post-condition: mock service (and mock2) exists
 | 
				
			||||||
 | 
					    if [ "$has_svc" = true ]; then
 | 
				
			||||||
 | 
					      if [ "$two_svcs" = true ]; then
 | 
				
			||||||
 | 
					        kube::test::get_object_assert services "{{range.items}}{{$id_field}}:{{end}}" 'mock:mock2:'
 | 
				
			||||||
 | 
					      else
 | 
				
			||||||
 | 
					        kube::test::get_object_assert services "{{range.items}}{{$id_field}}:{{end}}" 'mock:'
 | 
				
			||||||
 | 
					      fi
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    # Post-condition: mock rc (and mock2) exists
 | 
				
			||||||
 | 
					    if [ "$has_rc" = true ]; then
 | 
				
			||||||
 | 
					      if [ "$two_rcs" = true ]; then
 | 
				
			||||||
 | 
					        kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" 'mock:mock2:'
 | 
				
			||||||
 | 
					      else
 | 
				
			||||||
 | 
					        kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" 'mock:'
 | 
				
			||||||
 | 
					      fi
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    # Command
 | 
				
			||||||
 | 
					    kubectl get -f "${file}" "${kube_flags[@]}"
 | 
				
			||||||
 | 
					    # Command: watching multiple resources should return "not supported" error
 | 
				
			||||||
 | 
					    WATCH_ERROR_FILE="${KUBE_TEMP}/kubectl-watch-error"
 | 
				
			||||||
 | 
					    kubectl get -f "${file}" "${kube_flags[@]}" "--watch" 2> ${WATCH_ERROR_FILE} || true
 | 
				
			||||||
 | 
					    if ! grep -q "watch is only supported on individual resources and resource collections" "${WATCH_ERROR_FILE}"; then
 | 
				
			||||||
 | 
					      kube::log::error_exit "kubectl watch multiple resource returns unexpected error or non-error: $(cat ${WATCH_ERROR_FILE})" "1"
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    kubectl describe -f "${file}" "${kube_flags[@]}"
 | 
				
			||||||
 | 
					    # Command
 | 
				
			||||||
 | 
					    kubectl replace -f $replace_file --force --cascade "${kube_flags[@]}"
 | 
				
			||||||
 | 
					    # Post-condition: mock service (and mock2) and mock rc (and mock2) are replaced
 | 
				
			||||||
 | 
					    if [ "$has_svc" = true ]; then
 | 
				
			||||||
 | 
					      kube::test::get_object_assert 'services mock' "{{${labels_field}.status}}" 'replaced'
 | 
				
			||||||
 | 
					      if [ "$two_svcs" = true ]; then
 | 
				
			||||||
 | 
					        kube::test::get_object_assert 'services mock2' "{{${labels_field}.status}}" 'replaced'
 | 
				
			||||||
 | 
					      fi
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    if [ "$has_rc" = true ]; then
 | 
				
			||||||
 | 
					      kube::test::get_object_assert 'rc mock' "{{${labels_field}.status}}" 'replaced'
 | 
				
			||||||
 | 
					      if [ "$two_rcs" = true ]; then
 | 
				
			||||||
 | 
					        kube::test::get_object_assert 'rc mock2' "{{${labels_field}.status}}" 'replaced'
 | 
				
			||||||
 | 
					      fi
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    # Command: kubectl edit multiple resources
 | 
				
			||||||
 | 
					    temp_editor="${KUBE_TEMP}/tmp-editor.sh"
 | 
				
			||||||
 | 
					    echo -e "#!/usr/bin/env bash\n${SED} -i \"s/status\:\ replaced/status\:\ edited/g\" \$@" > "${temp_editor}"
 | 
				
			||||||
 | 
					    chmod +x "${temp_editor}"
 | 
				
			||||||
 | 
					    EDITOR="${temp_editor}" kubectl edit "${kube_flags[@]}" -f "${file}"
 | 
				
			||||||
 | 
					    # Post-condition: mock service (and mock2) and mock rc (and mock2) are edited
 | 
				
			||||||
 | 
					    if [ "$has_svc" = true ]; then
 | 
				
			||||||
 | 
					      kube::test::get_object_assert 'services mock' "{{${labels_field}.status}}" 'edited'
 | 
				
			||||||
 | 
					      if [ "$two_svcs" = true ]; then
 | 
				
			||||||
 | 
					        kube::test::get_object_assert 'services mock2' "{{${labels_field}.status}}" 'edited'
 | 
				
			||||||
 | 
					      fi
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    if [ "$has_rc" = true ]; then
 | 
				
			||||||
 | 
					      kube::test::get_object_assert 'rc mock' "{{${labels_field}.status}}" 'edited'
 | 
				
			||||||
 | 
					      if [ "$two_rcs" = true ]; then
 | 
				
			||||||
 | 
					        kube::test::get_object_assert 'rc mock2' "{{${labels_field}.status}}" 'edited'
 | 
				
			||||||
 | 
					      fi
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    # cleaning
 | 
				
			||||||
 | 
					    rm "${temp_editor}"
 | 
				
			||||||
 | 
					    # Command
 | 
				
			||||||
 | 
					    # We need to set --overwrite, because otherwise, if the first attempt to run "kubectl label"
 | 
				
			||||||
 | 
					    # fails on some, but not all, of the resources, retries will fail because it tries to modify
 | 
				
			||||||
 | 
					    # existing labels.
 | 
				
			||||||
 | 
					    kubectl-with-retry label -f $file labeled=true --overwrite "${kube_flags[@]}"
 | 
				
			||||||
 | 
					    # Post-condition: mock service and mock rc (and mock2) are labeled
 | 
				
			||||||
 | 
					    if [ "$has_svc" = true ]; then
 | 
				
			||||||
 | 
					      kube::test::get_object_assert 'services mock' "{{${labels_field}.labeled}}" 'true'
 | 
				
			||||||
 | 
					      if [ "$two_svcs" = true ]; then
 | 
				
			||||||
 | 
					        kube::test::get_object_assert 'services mock2' "{{${labels_field}.labeled}}" 'true'
 | 
				
			||||||
 | 
					      fi
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    if [ "$has_rc" = true ]; then
 | 
				
			||||||
 | 
					      kube::test::get_object_assert 'rc mock' "{{${labels_field}.labeled}}" 'true'
 | 
				
			||||||
 | 
					      if [ "$two_rcs" = true ]; then
 | 
				
			||||||
 | 
					        kube::test::get_object_assert 'rc mock2' "{{${labels_field}.labeled}}" 'true'
 | 
				
			||||||
 | 
					      fi
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    # Command
 | 
				
			||||||
 | 
					    # Command
 | 
				
			||||||
 | 
					    # We need to set --overwrite, because otherwise, if the first attempt to run "kubectl annotate"
 | 
				
			||||||
 | 
					    # fails on some, but not all, of the resources, retries will fail because it tries to modify
 | 
				
			||||||
 | 
					    # existing annotations.
 | 
				
			||||||
 | 
					    kubectl-with-retry annotate -f $file annotated=true --overwrite "${kube_flags[@]}"
 | 
				
			||||||
 | 
					    # Post-condition: mock service (and mock2) and mock rc (and mock2) are annotated
 | 
				
			||||||
 | 
					    if [ "$has_svc" = true ]; then
 | 
				
			||||||
 | 
					      kube::test::get_object_assert 'services mock' "{{${annotations_field}.annotated}}" 'true'
 | 
				
			||||||
 | 
					      if [ "$two_svcs" = true ]; then
 | 
				
			||||||
 | 
					        kube::test::get_object_assert 'services mock2' "{{${annotations_field}.annotated}}" 'true'
 | 
				
			||||||
 | 
					      fi
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    if [ "$has_rc" = true ]; then
 | 
				
			||||||
 | 
					      kube::test::get_object_assert 'rc mock' "{{${annotations_field}.annotated}}" 'true'
 | 
				
			||||||
 | 
					      if [ "$two_rcs" = true ]; then
 | 
				
			||||||
 | 
					        kube::test::get_object_assert 'rc mock2' "{{${annotations_field}.annotated}}" 'true'
 | 
				
			||||||
 | 
					      fi
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    # Cleanup resources created
 | 
				
			||||||
 | 
					    kubectl delete -f "${file}" "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  done
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  #############################
 | 
				
			||||||
 | 
					  # Multiple Resources via URL#
 | 
				
			||||||
 | 
					  #############################
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Pre-condition: no service (other than default kubernetes services) or replication controller exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert services "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create -f https://raw.githubusercontent.com/kubernetes/kubernetes/master/hack/testdata/multi-resource-yaml.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Post-condition: service(mock) and rc(mock) exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert services "{{range.items}}{{$id_field}}:{{end}}" 'mock:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" 'mock:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete -f https://raw.githubusercontent.com/kubernetes/kubernetes/master/hack/testdata/multi-resource-yaml.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Post-condition: no service (other than default kubernetes services) or replication controller exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert services "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_recursive_resources_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing recursive resources"
 | 
				
			||||||
 | 
					  ### Create multiple busybox PODs recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: no POD exists
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl create -f hack/testdata/recursive/pod --recursive 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 PODs are created, and since busybox2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'error validating data: kind not set'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## Edit multiple busybox PODs by updating the image field of multiple PODs recursively from a directory. tmp-editor.sh is a fake editor
 | 
				
			||||||
 | 
					  # Pre-condition: busybox0 & busybox1 PODs exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  echo -e '#!/usr/bin/env bash\nsed -i "s/image: busybox/image: prom\/busybox/g" $1' > /tmp/tmp-editor.sh
 | 
				
			||||||
 | 
					  chmod +x /tmp/tmp-editor.sh
 | 
				
			||||||
 | 
					  output_message=$(! EDITOR=/tmp/tmp-editor.sh kubectl edit -f hack/testdata/recursive/pod --recursive 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 PODs are not edited, and since busybox2 is malformed, it should error
 | 
				
			||||||
 | 
					  # The reason why busybox0 & busybox1 PODs are not edited is because the editor tries to load all objects in
 | 
				
			||||||
 | 
					  # a list but since it contains invalid objects, it will never open.
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$image_field}}:{{end}}" 'busybox:busybox:'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					  # cleaning
 | 
				
			||||||
 | 
					  rm /tmp/tmp-editor.sh
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## Replace multiple busybox PODs recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: busybox0 & busybox1 PODs exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl replace -f hack/testdata/recursive/pod-modify --recursive 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 PODs are replaced, and since busybox2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{${labels_field}.status}}:{{end}}" 'replaced:replaced:'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'error validating data: kind not set'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## Describe multiple busybox PODs recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: busybox0 & busybox1 PODs exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl describe -f hack/testdata/recursive/pod --recursive 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 PODs are described, and since busybox2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "app=busybox0"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "app=busybox1"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## Annotate multiple busybox PODs recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: busybox0 & busybox1 PODs exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl annotate -f hack/testdata/recursive/pod annotatekey='annotatevalue' --recursive 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 PODs are annotated, and since busybox2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{${annotations_field}.annotatekey}}:{{end}}" 'annotatevalue:annotatevalue:'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## Apply multiple busybox PODs recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: busybox0 & busybox1 PODs exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl apply -f hack/testdata/recursive/pod-modify --recursive 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 PODs are updated, and since busybox2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{${labels_field}.status}}:{{end}}" 'replaced:replaced:'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'error validating data: kind not set'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Convert deployment YAML file locally without affecting the live deployment.
 | 
				
			||||||
 | 
					  # Pre-condition: no deployments exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  # Create a deployment (revision 1)
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/deployment-revision1.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" 'nginx:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_DEPLOYMENT_R1}:"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl convert --local -f hack/testdata/deployment-revision1.yaml --output-version=apps/v1beta1 -o yaml "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: apiVersion is still extensions/v1beta1 in the live deployment, but command output is the new value
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployment nginx' "{{ .apiVersion }}" 'extensions/v1beta1'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "apps/v1beta1"
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete deployment nginx "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## Convert multiple busybox PODs recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: busybox0 & busybox1 PODs exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl convert -f hack/testdata/recursive/pod --recursive 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 PODs are converted, and since busybox2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## Get multiple busybox PODs recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: busybox0 & busybox1 PODs exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get -f hack/testdata/recursive/pod --recursive 2>&1 "${kube_flags[@]}" -o go-template="{{range.items}}{{$id_field}}:{{end}}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 PODs are retrieved, but because busybox2 is malformed, it should not show up
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "busybox0:busybox1:"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## Label multiple busybox PODs recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: busybox0 & busybox1 PODs exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl label -f hack/testdata/recursive/pod mylabel='myvalue' --recursive 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  echo $output_message
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 PODs are labeled, but because busybox2 is malformed, it should not show up
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{${labels_field}.mylabel}}:{{end}}" 'myvalue:myvalue:'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## Patch multiple busybox PODs recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: busybox0 & busybox1 PODs exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl patch -f hack/testdata/recursive/pod -p='{"spec":{"containers":[{"name":"busybox","image":"prom/busybox"}]}}' --recursive 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  echo $output_message
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 PODs are patched, but because busybox2 is malformed, it should not show up
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$image_field}}:{{end}}" 'prom/busybox:prom/busybox:'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Delete multiple busybox PODs recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: busybox0 & busybox1 PODs exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl delete -f hack/testdata/recursive/pod --recursive --grace-period=0 --force 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 PODs are deleted, and since busybox2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create replication controller recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: no replication controller exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  ! kubectl create -f hack/testdata/recursive/rc --recursive "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: frontend replication controller is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Autoscale multiple replication controllers recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: busybox0 & busybox1 replication controllers exist & 1
 | 
				
			||||||
 | 
					  # replica each
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rc busybox0' "{{$rc_replicas_field}}" '1'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rc busybox1' "{{$rc_replicas_field}}" '1'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl autoscale --min=1 --max=2 -f hack/testdata/recursive/rc --recursive 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox replication controllers are autoscaled
 | 
				
			||||||
 | 
					  # with min. of 1 replica & max of 2 replicas, and since busybox2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'hpa busybox0' "{{$hpa_min_field}} {{$hpa_max_field}} {{$hpa_cpu_field}}" '1 2 80'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'hpa busybox1' "{{$hpa_min_field}} {{$hpa_max_field}} {{$hpa_cpu_field}}" '1 2 80'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					  kubectl delete hpa busybox0 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl delete hpa busybox1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Expose multiple replication controllers as service recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: busybox0 & busybox1 replication controllers exist & 1
 | 
				
			||||||
 | 
					  # replica each
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rc busybox0' "{{$rc_replicas_field}}" '1'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rc busybox1' "{{$rc_replicas_field}}" '1'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl expose -f hack/testdata/recursive/rc --recursive --port=80 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: service exists and the port is unnamed
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'service busybox0' "{{$port_name}} {{$port_field}}" '<no value> 80'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'service busybox1' "{{$port_name}} {{$port_field}}" '<no value> 80'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Scale multiple replication controllers recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: busybox0 & busybox1 replication controllers exist & 1
 | 
				
			||||||
 | 
					  # replica each
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rc busybox0' "{{$rc_replicas_field}}" '1'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rc busybox1' "{{$rc_replicas_field}}" '1'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl scale --current-replicas=1 --replicas=2 -f hack/testdata/recursive/rc --recursive 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 replication controllers are scaled to 2 replicas, and since busybox2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rc busybox0' "{{$rc_replicas_field}}" '2'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'rc busybox1' "{{$rc_replicas_field}}" '2'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Delete multiple busybox replication controllers recursively from directory of YAML files
 | 
				
			||||||
 | 
					  # Pre-condition: busybox0 & busybox1 PODs exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl delete -f hack/testdata/recursive/rc --recursive --grace-period=0 --force 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 replication controllers are deleted, and since busybox2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Rollout on multiple deployments recursively
 | 
				
			||||||
 | 
					  # Pre-condition: no deployments exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  # Create deployments (revision 1) recursively from directory of YAML files
 | 
				
			||||||
 | 
					  ! kubectl create -f hack/testdata/recursive/deployment --recursive "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" 'nginx0-deployment:nginx1-deployment:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_NGINX}:${IMAGE_NGINX}:"
 | 
				
			||||||
 | 
					  ## Rollback the deployments to revision 1 recursively
 | 
				
			||||||
 | 
					  output_message=$(! kubectl rollout undo -f hack/testdata/recursive/deployment --recursive --to-revision=1 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: nginx0 & nginx1 should be a no-op, and since nginx2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$image_field0}}:{{end}}" "${IMAGE_NGINX}:${IMAGE_NGINX}:"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					  ## Pause the deployments recursively
 | 
				
			||||||
 | 
					  PRESERVE_ERR_FILE=true
 | 
				
			||||||
 | 
					  kubectl-with-retry rollout pause -f hack/testdata/recursive/deployment --recursive "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  output_message=$(cat ${ERROR_FILE})
 | 
				
			||||||
 | 
					  # Post-condition: nginx0 & nginx1 should both have paused set to true, and since nginx2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{.spec.paused}}:{{end}}" "true:true:"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					  ## Resume the deployments recursively
 | 
				
			||||||
 | 
					  kubectl-with-retry rollout resume -f hack/testdata/recursive/deployment --recursive "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  output_message=$(cat ${ERROR_FILE})
 | 
				
			||||||
 | 
					  # Post-condition: nginx0 & nginx1 should both have paused set to nothing, and since nginx2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{.spec.paused}}:{{end}}" "<no value>:<no value>:"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					  ## Retrieve the rollout history of the deployments recursively
 | 
				
			||||||
 | 
					  output_message=$(! kubectl rollout history -f hack/testdata/recursive/deployment --recursive 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: nginx0 & nginx1 should both have a history, and since nginx2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "nginx0-deployment"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "nginx1-deployment"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  unset PRESERVE_ERR_FILE
 | 
				
			||||||
 | 
					  rm "${ERROR_FILE}"
 | 
				
			||||||
 | 
					  ! kubectl delete -f hack/testdata/recursive/deployment --recursive "${kube_flags[@]}" --grace-period=0 --force
 | 
				
			||||||
 | 
					  sleep 1
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Rollout on multiple replication controllers recursively - these tests ensure that rollouts cannot be performed on resources that don't support it
 | 
				
			||||||
 | 
					  # Pre-condition: no replication controller exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  # Create replication controllers recursively from directory of YAML files
 | 
				
			||||||
 | 
					  ! kubectl create -f hack/testdata/recursive/rc --recursive "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" 'busybox0:busybox1:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  ## Attempt to rollback the replication controllers to revision 1 recursively
 | 
				
			||||||
 | 
					  output_message=$(! kubectl rollout undo -f hack/testdata/recursive/rc --recursive --to-revision=1 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 should error as they are RC's, and since busybox2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'no rollbacker has been implemented for {"" "ReplicationController"}'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					  ## Attempt to pause the replication controllers recursively
 | 
				
			||||||
 | 
					  output_message=$(! kubectl rollout pause -f hack/testdata/recursive/rc --recursive 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 should error as they are RC's, and since busybox2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'replicationcontrollers "busybox0" pausing is not supported'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'replicationcontrollers "busybox1" pausing is not supported'
 | 
				
			||||||
 | 
					  ## Attempt to resume the replication controllers recursively
 | 
				
			||||||
 | 
					  output_message=$(! kubectl rollout resume -f hack/testdata/recursive/rc --recursive 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: busybox0 & busybox1 should error as they are RC's, and since busybox2 is malformed, it should error
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Object 'Kind' is missing"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'replicationcontrollers "busybox0" resuming is not supported'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'replicationcontrollers "busybox0" resuming is not supported'
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  ! kubectl delete -f hack/testdata/recursive/rc --recursive "${kube_flags[@]}" --grace-period=0 --force
 | 
				
			||||||
 | 
					  sleep 1
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_lists_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl(v1:lists)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create a List with objects from multiple versions
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/list.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Delete the List with objects from multiple versions
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl delete service/list-service-test deployment/list-deployment-test
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										337
									
								
								test/cmd/get.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										337
									
								
								test/cmd/get.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,337 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_kubectl_get_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl get"
 | 
				
			||||||
 | 
					  ### Test retrieval of non-existing pods
 | 
				
			||||||
 | 
					  # Pre-condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pods abc 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: POD abc should error since it doesn't exist
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'pods "abc" not found'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test retrieval of non-existing POD with output flag specified
 | 
				
			||||||
 | 
					  # Pre-condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pods abc 2>&1 "${kube_flags[@]}" -o name)
 | 
				
			||||||
 | 
					  # Post-condition: POD abc should error since it doesn't exist
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'pods "abc" not found'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test retrieval of pods when none exist with non-human readable output format flag specified
 | 
				
			||||||
 | 
					  # Pre-condition: no pods exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods 2>&1 "${kube_flags[@]}" -o json)
 | 
				
			||||||
 | 
					  # Post-condition: The text "No resources found" should not be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'No resources found'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods 2>&1 "${kube_flags[@]}" -o yaml)
 | 
				
			||||||
 | 
					  # Post-condition: The text "No resources found" should not be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'No resources found'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods 2>&1 "${kube_flags[@]}" -o name)
 | 
				
			||||||
 | 
					  # Post-condition: The text "No resources found" should not be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'No resources found'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods 2>&1 "${kube_flags[@]}" -o jsonpath='{.items}')
 | 
				
			||||||
 | 
					  # Post-condition: The text "No resources found" should not be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'No resources found'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods 2>&1 "${kube_flags[@]}" -o go-template='{{.items}}')
 | 
				
			||||||
 | 
					  # Post-condition: The text "No resources found" should not be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'No resources found'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods 2>&1 "${kube_flags[@]}" -o custom-columns=NAME:.metadata.name)
 | 
				
			||||||
 | 
					  # Post-condition: The text "No resources found" should not be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'No resources found'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test retrieval of pods when none exist, with human-readable output format flag specified
 | 
				
			||||||
 | 
					  # Pre-condition: no pods exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "No resources found" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'No resources found'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods --ignore-not-found 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "No resources found" should not be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'No resources found'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods 2>&1 "${kube_flags[@]}" -o wide)
 | 
				
			||||||
 | 
					  # Post-condition: The text "No resources found" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'No resources found'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test retrieval of non-existing POD with json output flag specified
 | 
				
			||||||
 | 
					  # Pre-condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pods abc 2>&1 "${kube_flags[@]}" -o json)
 | 
				
			||||||
 | 
					  # Post-condition: POD abc should error since it doesn't exist
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'pods "abc" not found'
 | 
				
			||||||
 | 
					  # Post-condition: make sure we don't display an empty List
 | 
				
			||||||
 | 
					  if kube::test::if_has_string "${output_message}" 'List'; then
 | 
				
			||||||
 | 
					    echo 'Unexpected List output'
 | 
				
			||||||
 | 
					    echo "${LINENO} $(basename $0)"
 | 
				
			||||||
 | 
					    exit 1
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl get all
 | 
				
			||||||
 | 
					  output_message=$(kubectl --v=6 --namespace default get all --chunk-size=0 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: Check if we get 200 OK from all the url(s)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "/api/v1/namespaces/default/pods 200 OK"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "/api/v1/namespaces/default/replicationcontrollers 200 OK"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "/api/v1/namespaces/default/services 200 OK"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "/apis/apps/v1/namespaces/default/daemonsets 200 OK"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "/apis/apps/v1/namespaces/default/deployments 200 OK"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "/apis/apps/v1/namespaces/default/replicasets 200 OK"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "/apis/apps/v1/namespaces/default/statefulsets 200 OK"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "/apis/autoscaling/v1/namespaces/default/horizontalpodautoscalers 200"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "/apis/batch/v1/namespaces/default/jobs 200 OK"
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" "/apis/extensions/v1beta1/namespaces/default/daemonsets 200 OK"
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" "/apis/extensions/v1beta1/namespaces/default/deployments 200 OK"
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" "/apis/extensions/v1beta1/namespaces/default/replicasets 200 OK"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl get chunk size
 | 
				
			||||||
 | 
					  output_message=$(kubectl --v=6 get clusterrole --chunk-size=10 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: Check if we get a limit and continue
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "/clusterroles?limit=10 200 OK"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "/v1/clusterroles?continue="
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl get chunk size defaults to 500
 | 
				
			||||||
 | 
					  output_message=$(kubectl --v=6 get clusterrole 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: Check if we get a limit and continue
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "/clusterroles?limit=500 200 OK"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl get chunk size does not result in a --watch error when resource list is served in multiple chunks
 | 
				
			||||||
 | 
					  # Pre-condition: no ConfigMaps exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert configmap "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Post-condition: Create three configmaps and ensure that we can --watch them with a --chunk-size of 1
 | 
				
			||||||
 | 
					  kubectl create cm one "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl create cm two "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl create cm three "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  output_message=$(kubectl get configmap --chunk-size=1 --watch --request-timeout=1s 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" "watch is only supported on individual resources"
 | 
				
			||||||
 | 
					  output_message=$(kubectl get configmap --chunk-size=1 --watch-only --request-timeout=1s 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" "watch is only supported on individual resources"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test --allow-missing-template-keys
 | 
				
			||||||
 | 
					  # Pre-condition: no POD exists
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create -f test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: valid-pod POD is created
 | 
				
			||||||
 | 
					  kubectl get "${kube_flags[@]}" pods -o json
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'valid-pod:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## check --allow-missing-template-keys defaults to true for jsonpath templates
 | 
				
			||||||
 | 
					  kubectl get "${kube_flags[@]}" pod valid-pod -o jsonpath='{.missing}'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## check --allow-missing-template-keys defaults to true for go templates
 | 
				
			||||||
 | 
					  kubectl get "${kube_flags[@]}" pod valid-pod -o go-template='{{.missing}}'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## check --template flag causes go-template to be printed, even when no --output value is provided
 | 
				
			||||||
 | 
					  output_message=$(kubectl get "${kube_flags[@]}" pod valid-pod --template="{{$id_field}}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'valid-pod:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## check --allow-missing-template-keys=false results in an error for a missing key with jsonpath
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pod valid-pod --allow-missing-template-keys=false -o jsonpath='{.missing}' "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'missing is not found'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## check --allow-missing-template-keys=false results in an error for a missing key with go
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pod valid-pod --allow-missing-template-keys=false -o go-template='{{.missing}}' "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'map has no entry for key "missing"'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl get watch
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods -w --request-timeout=1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'STATUS'    # headers
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'valid-pod' # pod details
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods/valid-pod -o name -w --request-timeout=1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'STATUS' # no headers
 | 
				
			||||||
 | 
					  kube::test::if_has_string     "${output_message}" 'pod/valid-pod' # resource name
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods/valid-pod -o yaml -w --request-timeout=1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'STATUS'          # no headers
 | 
				
			||||||
 | 
					  kube::test::if_has_string     "${output_message}" 'name: valid-pod' # yaml
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pods/invalid-pod -w --request-timeout=1 "${kube_flags[@]}" 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" '"invalid-pod" not found'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # cleanup
 | 
				
			||||||
 | 
					  kubectl delete pods valid-pod "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test 'kubectl get -f <file> -o <non default printer>' prints all the items in the file's list
 | 
				
			||||||
 | 
					  # Pre-condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create -f test/fixtures/doc-yaml/user-guide/multi-pod.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: PODs redis-master and valid-pod exist
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Check that all items in the list are printed
 | 
				
			||||||
 | 
					  output_message=$(kubectl get -f test/fixtures/doc-yaml/user-guide/multi-pod.yaml -o jsonpath="{..metadata.name}" "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "redis-master valid-pod"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # cleanup
 | 
				
			||||||
 | 
					  kubectl delete pods redis-master valid-pod "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_retrieve_multiple_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # switch back to the default namespace
 | 
				
			||||||
 | 
					  kubectl config set-context "${CONTEXT}" --namespace=""
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl(v1:multiget)"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'nodes/127.0.0.1 service/kubernetes' "{{range.items}}{{$id_field}}:{{end}}" '127.0.0.1:kubernetes:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_kubectl_sort_by_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl --sort-by"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### sort-by should not panic if no pod exists
 | 
				
			||||||
 | 
					  # Pre-condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl get pods --sort-by="{metadata.name}"
 | 
				
			||||||
 | 
					  kubectl get pods --sort-by="{metadata.creationTimestamp}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### sort-by should works if pod exists
 | 
				
			||||||
 | 
					  # Create POD
 | 
				
			||||||
 | 
					  # Pre-condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" -f test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml
 | 
				
			||||||
 | 
					  # Post-condition: valid-pod is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'valid-pod:'
 | 
				
			||||||
 | 
					  # Check output of sort-by
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods --sort-by="{metadata.name}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "valid-pod"
 | 
				
			||||||
 | 
					  ### Clean up
 | 
				
			||||||
 | 
					  # Pre-condition: valid-pod exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'valid-pod:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl delete "${kube_flags[@]}" pod valid-pod --grace-period=0 --force
 | 
				
			||||||
 | 
					  # Post-condition: valid-pod doesn't exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### sort-by should works by sorting by name
 | 
				
			||||||
 | 
					  # Create three PODs
 | 
				
			||||||
 | 
					  # Pre-condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" -f hack/testdata/sorted-pods/sorted-pod1.yaml
 | 
				
			||||||
 | 
					  # Post-condition: sorted-pod1 is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'sorted-pod1:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" -f hack/testdata/sorted-pods/sorted-pod2.yaml
 | 
				
			||||||
 | 
					  # Post-condition: sorted-pod1 is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'sorted-pod1:sorted-pod2:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" -f hack/testdata/sorted-pods/sorted-pod3.yaml
 | 
				
			||||||
 | 
					  # Post-condition: sorted-pod1 is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'sorted-pod1:sorted-pod2:sorted-pod3:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Check output of sort-by '{metadata.name}'
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods --sort-by="{metadata.name}")
 | 
				
			||||||
 | 
					  kube::test::if_sort_by_has_correct_order "${output_message}" "sorted-pod1:sorted-pod2:sorted-pod3:"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Check output of sort-by '{metadata.labels.name}'
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods --sort-by="{metadata.labels.name}")
 | 
				
			||||||
 | 
					  kube::test::if_sort_by_has_correct_order "${output_message}" "sorted-pod3:sorted-pod2:sorted-pod1:"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Clean up
 | 
				
			||||||
 | 
					  # Pre-condition: valid-pod exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'sorted-pod1:sorted-pod2:sorted-pod3:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl delete "${kube_flags[@]}" pod --grace-period=0 --force --all
 | 
				
			||||||
 | 
					  # Post-condition: valid-pod doesn't exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_kubectl_all_namespace_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl --all-namespace"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Pre-condition: the "default" namespace exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert namespaces "{{range.items}}{{if eq $id_field \\\"default\\\"}}{{$id_field}}:{{end}}{{end}}" 'default:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create POD
 | 
				
			||||||
 | 
					  # Pre-condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" -f test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml
 | 
				
			||||||
 | 
					  # Post-condition: valid-pod is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'valid-pod:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Verify a specific namespace is ignored when all-namespaces is provided
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl get pods --all-namespaces --namespace=default
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Check --all-namespaces option shows namespaces
 | 
				
			||||||
 | 
					  # Create objects in multiple namespaces
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" namespace all-ns-test-1
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" serviceaccount test -n all-ns-test-1
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" namespace all-ns-test-2
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" serviceaccount test -n all-ns-test-2
 | 
				
			||||||
 | 
					  # Ensure listing across namespaces displays the namespace
 | 
				
			||||||
 | 
					  output_message=$(kubectl get serviceaccounts --all-namespaces "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "all-ns-test-1"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "all-ns-test-2"
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete "${kube_flags[@]}" namespace all-ns-test-1
 | 
				
			||||||
 | 
					  kubectl delete "${kube_flags[@]}" namespace all-ns-test-2
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Clean up
 | 
				
			||||||
 | 
					  # Pre-condition: valid-pod exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'valid-pod:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl delete "${kube_flags[@]}" pod valid-pod --grace-period=0 --force
 | 
				
			||||||
 | 
					  # Post-condition: valid-pod doesn't exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Verify flag all-namespaces is ignored for rootScoped resources
 | 
				
			||||||
 | 
					  # Pre-condition: node exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert nodes "{{range.items}}{{$id_field}}:{{end}}" '127.0.0.1:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl get nodes --all-namespaces 2>&1)
 | 
				
			||||||
 | 
					  # Post-condition: output with no NAMESPACE field
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" "NAMESPACE"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										285
									
								
								test/cmd/initializers.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										285
									
								
								test/cmd/initializers.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,285 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_initializer_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing --include-uninitialized"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create a deployment
 | 
				
			||||||
 | 
					  kubectl create --request-timeout=1 -f hack/testdata/initializer-deployments.yaml 2>&1 "${kube_flags[@]}" || true
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl get --include-uninitialized
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl get deployments 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "No resources found" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'No resources found'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl get deployments --include-uninitialized=false 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "No resources found" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'No resources found'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl get deployments --include-uninitialized 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: I assume "web" is the deployment name
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'web'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl get deployments web 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: I assume "web" is the deployment name
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'web'
 | 
				
			||||||
 | 
					  # Post-condition: The text "No resources found" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'No resources found'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl describe --include-uninitialized
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl describe deployments 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "run=web" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'run=web'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl describe deployments --include-uninitialized 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "run=web" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'run=web'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl describe deployments --include-uninitialized=false 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl describe deployments web --include-uninitialized 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "run=web" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'run=web'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl describe deployments web --include-uninitialized=false 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "run=web" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'run=web'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl label --include-uninitialized
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl label deployments labelkey1=labelvalue1 --all 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: web is labelled
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'deployment "web" labeled'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments web' "{{${labels_field}.labelkey1}}" 'labelvalue1'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl label deployments labelkey2=labelvalue2 --all --include-uninitialized=false 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl label deployments labelkey3=labelvalue3 -l run=web 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl label deployments labelkey4=labelvalue4 -l run=web --include-uninitialized 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: web is labelled
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'deployment "web" labeled'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments web' "{{${labels_field}.labelkey4}}" 'labelvalue4'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl label deployments labelkey5=labelvalue5 -l run=web --all 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl label deployments labelkey6=labelvalue6 -l run=web --all --include-uninitialized 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: web is labelled
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'deployment "web" labeled'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments web' "{{${labels_field}.labelkey6}}" 'labelvalue6'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl label deployments web labelkey7=labelvalue7 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: web is labelled
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'deployment "web" labeled'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments web' "{{${labels_field}.labelkey7}}" 'labelvalue7'
 | 
				
			||||||
 | 
					  # Found All Labels
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments web' "{{${labels_field}}}" 'map[labelkey1:labelvalue1 labelkey4:labelvalue4 labelkey6:labelvalue6 labelkey7:labelvalue7 run:web]'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl annotate --include-uninitialized
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl annotate deployments annotatekey1=annotatevalue1 --all 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: DEPLOYMENT has annotation
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'deployment "web" annotated'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments web' "{{${annotations_field}.annotatekey1}}" 'annotatevalue1'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl annotate deployments annotatekey2=annotatevalue2 --all --include-uninitialized=false 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl annotate deployments annotatekey3=annotatevalue3 -l run=web 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl annotate deployments annotatekey4=annotatevalue4 -l run=web --include-uninitialized 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: DEPLOYMENT has annotation
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'deployment "web" annotated'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments web' "{{${annotations_field}.annotatekey4}}" 'annotatevalue4'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl annotate deployments annotatekey5=annotatevalue5 -l run=web --all 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl annotate deployments annotatekey6=annotatevalue6 -l run=web --all --include-uninitialized 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: DEPLOYMENT has annotation
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'deployment "web" annotated'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments web' "{{${annotations_field}.annotatekey6}}" 'annotatevalue6'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl annotate deployments web annotatekey7=annotatevalue7 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: web DEPLOYMENT has annotation
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'deployment "web" annotated'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert 'deployments web' "{{${annotations_field}.annotatekey7}}" 'annotatevalue7'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl edit --include-uninitialized
 | 
				
			||||||
 | 
					  [ "$(EDITOR=cat kubectl edit deployments 2>&1 "${kube_flags[@]}" | grep 'edit cancelled, no objects found')" ]
 | 
				
			||||||
 | 
					  [ "$(EDITOR=cat kubectl edit deployments --include-uninitialized 2>&1 "${kube_flags[@]}" | grep 'Edit cancelled, no changes made.')" ]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl set image --include-uninitialized
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set image deployments *=nginx:1.11 --all 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "image updated" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'image updated'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set image deployments *=nginx:1.11 --all --include-uninitialized=false 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set image deployments *=nginx:1.11 -l run=web 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set image deployments *=nginx:1.12 -l run=web --include-uninitialized 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "image updated" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'image updated'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set image deployments *=nginx:1.13 -l run=web --include-uninitialized --all 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "image updated" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'image updated'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl set resources --include-uninitialized
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set resources deployments --limits=cpu=200m,memory=512Mi --requests=cpu=100m,memory=256Mi --all 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "resource requirements updated" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'resource requirements updated'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set resources deployments --limits=cpu=200m,memory=512Mi --requests=cpu=100m,memory=256Mi --all --include-uninitialized=false 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set resources deployments --limits=cpu=200m,memory=512Mi --requests=cpu=100m,memory=256Mi -l run=web 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set resources deployments --limits=cpu=200m,memory=512Mi --requests=cpu=200m,memory=256Mi -l run=web --include-uninitialized 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "resource requirements updated" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'resource requirements updated'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set resources deployments --limits=cpu=200m,memory=512Mi --requests=cpu=100m,memory=512Mi -l run=web --include-uninitialized --all 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "resource requirements updated" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'resource requirements updated'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl set selector --include-uninitialized
 | 
				
			||||||
 | 
					  # Create a service with initializer
 | 
				
			||||||
 | 
					  kubectl create --request-timeout=1 -f hack/testdata/initializer-redis-master-service.yaml 2>&1 "${kube_flags[@]}" || true
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set selector services role=padawan --all 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "selector updated" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'selector updated'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set selector services role=padawan --all --include-uninitialized=false 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl set subject --include-uninitialized
 | 
				
			||||||
 | 
					  # Create a create clusterrolebinding with initializer
 | 
				
			||||||
 | 
					  kubectl create --request-timeout=1 -f hack/testdata/initializer-clusterrolebinding.yaml 2>&1 "${kube_flags[@]}" || true
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/super-admin "{{range.subjects}}{{.name}}:{{end}}" 'super-admin:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set subject clusterrolebinding --user=foo --all 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "subjects updated" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'subjects updated'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set subject clusterrolebinding --user=foo --all --include-uninitialized=false 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set subject clusterrolebinding --user=foo -l clusterrolebinding=super 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set subject clusterrolebinding --user=foo -l clusterrolebinding=super --include-uninitialized 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "subjects updated" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'subjects updated'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set subject clusterrolebinding --user=foo -l clusterrolebinding=super --include-uninitialized --all 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "subjects updated" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'subjects updated'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl set serviceaccount --include-uninitialized
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set serviceaccount deployment serviceaccount1 --all 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "serviceaccount updated" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'serviceaccount updated'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl set serviceaccount deployment serviceaccount1 --all --include-uninitialized=false 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The output should be empty
 | 
				
			||||||
 | 
					  kube::test::if_empty_string "${output_message}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl delete --include-uninitialized
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/super-admin "{{range.subjects}}{{.name}}:{{end}}" 'super-admin:'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl delete clusterrolebinding --all --include-uninitialized=false 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "No resources found" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'No resources found'
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(kubectl delete clusterrolebinding --all 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: The text "deleted" should be part of the output
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'deleted'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/super-admin "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test kubectl apply --include-uninitialized
 | 
				
			||||||
 | 
					  # Pre-Condition: no POD exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # apply pod a
 | 
				
			||||||
 | 
					  kubectl apply --prune --request-timeout=20 --include-uninitialized=false --all -f hack/testdata/prune/a.yaml "${kube_flags[@]}" 2>&1
 | 
				
			||||||
 | 
					  # check right pod exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods/a "{{${id_field}}}" 'a'
 | 
				
			||||||
 | 
					  # Post-condition: Other uninitialized resources should not be pruned
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployments "{{range.items}}{{$id_field}}:{{end}}" 'web'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert services/redis-master "{{range.items}}{{$id_field}}:{{end}}" 'redis-master'
 | 
				
			||||||
 | 
					  # cleanup
 | 
				
			||||||
 | 
					  kubectl delete pod a
 | 
				
			||||||
 | 
					  # apply pod a and prune uninitialized deployments web
 | 
				
			||||||
 | 
					  kubectl apply --prune --request-timeout=20 --all -f hack/testdata/prune/a.yaml "${kube_flags[@]}" 2>&1
 | 
				
			||||||
 | 
					  # check right pod exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods/a "{{${id_field}}}" 'a'
 | 
				
			||||||
 | 
					  # Post-condition: Other uninitialized resources should not be pruned
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployments/web "{{range.items}}{{$id_field}}:{{end}}" 'web'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert services/redis-master "{{range.items}}{{$id_field}}:{{end}}" 'redis-master'
 | 
				
			||||||
 | 
					  # cleanup
 | 
				
			||||||
 | 
					  kubectl delete pod a
 | 
				
			||||||
 | 
					  # apply pod a and prune uninitialized deployments web
 | 
				
			||||||
 | 
					  kubectl apply --prune --request-timeout=20 --include-uninitialized --all -f hack/testdata/prune/a.yaml "${kube_flags[@]}" 2>&1
 | 
				
			||||||
 | 
					  # check right pod exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods/a "{{${id_field}}}" 'a'
 | 
				
			||||||
 | 
					  # Post-condition: Other uninitialized resources should not be pruned
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployments/web "{{range.items}}{{$id_field}}:{{end}}" 'web'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert services/redis-master "{{range.items}}{{$id_field}}:{{end}}" 'redis-master'
 | 
				
			||||||
 | 
					  # cleanup
 | 
				
			||||||
 | 
					  kubectl delete pod a
 | 
				
			||||||
 | 
					  kubectl delete --request-timeout=1 deploy web
 | 
				
			||||||
 | 
					  kubectl delete --request-timeout=1 service redis-master
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										96
									
								
								test/cmd/kubeconfig.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										96
									
								
								test/cmd/kubeconfig.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,96 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_kubectl_config_set_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl(v1:config set)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kubectl config set-cluster test-cluster --server="https://does-not-work"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Get the api cert and add a comment to avoid flag parsing problems
 | 
				
			||||||
 | 
					  cert_data=$(echo "#Comment" && cat "${TMPDIR:-/tmp}/apiserver.crt")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kubectl config set clusters.test-cluster.certificate-authority-data "$cert_data" --set-raw-bytes
 | 
				
			||||||
 | 
					  r_written=$(kubectl config view --raw -o jsonpath='{.clusters[?(@.name == "test-cluster")].cluster.certificate-authority-data}')
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  encoded=$(echo -n "$cert_data" | base64)
 | 
				
			||||||
 | 
					  kubectl config set clusters.test-cluster.certificate-authority-data "$encoded"
 | 
				
			||||||
 | 
					  e_written=$(kubectl config view --raw -o jsonpath='{.clusters[?(@.name == "test-cluster")].cluster.certificate-authority-data}')
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  test "$e_written" == "$r_written"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_client_config_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing client config"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  # Pre-condition: kubeconfig "missing" is not a file or directory
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pod --context="" --kubeconfig=missing 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "missing: no such file or directory"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Pre-condition: kubeconfig "missing" is not a file or directory
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pod --user="" --kubeconfig=missing 2>&1)
 | 
				
			||||||
 | 
					  # Post-condition: --user contains a valid / empty value, missing config file returns error
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "missing: no such file or directory"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pod --cluster="" --kubeconfig=missing 2>&1)
 | 
				
			||||||
 | 
					  # Post-condition: --cluster contains a "valid" value, missing config file returns error
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "missing: no such file or directory"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Pre-condition: context "missing-context" does not exist
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pod --context="missing-context" 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'context was not found for specified context: missing-context'
 | 
				
			||||||
 | 
					  # Post-condition: invalid or missing context returns error
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Pre-condition: cluster "missing-cluster" does not exist
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pod --cluster="missing-cluster" 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'no server found for cluster "missing-cluster"'
 | 
				
			||||||
 | 
					  # Post-condition: invalid or missing cluster returns error
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Pre-condition: user "missing-user" does not exist
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pod --user="missing-user" 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'auth info "missing-user" does not exist'
 | 
				
			||||||
 | 
					  # Post-condition: invalid or missing user returns error
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # test invalid config
 | 
				
			||||||
 | 
					  kubectl config view | sed -E "s/apiVersion: .*/apiVersion: v-1/g" > "${TMPDIR:-/tmp}"/newconfig.yaml
 | 
				
			||||||
 | 
					  output_message=$(! "${KUBE_OUTPUT_HOSTBIN}/kubectl" get pods --context="" --user="" --kubeconfig="${TMPDIR:-/tmp}"/newconfig.yaml 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "Error loading config file"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pod --kubeconfig=missing-config 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'no such file or directory'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										149
									
								
								test/cmd/node-management.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										149
									
								
								test/cmd/node-management.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,149 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_cluster_management_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing cluster-management commands"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::test::get_object_assert nodes "{{range.items}}{{$id_field}}:{{end}}" '127.0.0.1:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # create test pods we can work with
 | 
				
			||||||
 | 
					  kubectl create -f - "${kube_flags[@]}" << __EOF__
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					  "kind": "Pod",
 | 
				
			||||||
 | 
					  "apiVersion": "v1",
 | 
				
			||||||
 | 
					  "metadata": {
 | 
				
			||||||
 | 
					    "name": "test-pod-1",
 | 
				
			||||||
 | 
					    "labels": {
 | 
				
			||||||
 | 
					      "e": "f"
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					  },
 | 
				
			||||||
 | 
					  "spec": {
 | 
				
			||||||
 | 
					    "containers": [
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					        "name": "container-1",
 | 
				
			||||||
 | 
					        "resources": {},
 | 
				
			||||||
 | 
					        "image": "test-image"
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					    ]
 | 
				
			||||||
 | 
					  }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					__EOF__
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kubectl create -f - "${kube_flags[@]}" << __EOF__
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					  "kind": "Pod",
 | 
				
			||||||
 | 
					  "apiVersion": "v1",
 | 
				
			||||||
 | 
					  "metadata": {
 | 
				
			||||||
 | 
					    "name": "test-pod-2",
 | 
				
			||||||
 | 
					    "labels": {
 | 
				
			||||||
 | 
					      "c": "d"
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					  },
 | 
				
			||||||
 | 
					  "spec": {
 | 
				
			||||||
 | 
					    "containers": [
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					        "name": "container-1",
 | 
				
			||||||
 | 
					        "resources": {},
 | 
				
			||||||
 | 
					        "image": "test-image"
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					    ]
 | 
				
			||||||
 | 
					  }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					__EOF__
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # taint/untaint
 | 
				
			||||||
 | 
					  # Pre-condition: node has no taints
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "nodes 127.0.0.1" "{{.spec.taints}}" '<no value>'
 | 
				
			||||||
 | 
					  # taint can add a taint
 | 
				
			||||||
 | 
					  kubectl taint node 127.0.0.1 dedicated=foo:PreferNoSchedule
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "nodes 127.0.0.1" '{{range .spec.taints}}{{.effect}}{{end}}' 'PreferNoSchedule'
 | 
				
			||||||
 | 
					  # taint can remove a taint
 | 
				
			||||||
 | 
					  kubectl taint node 127.0.0.1 dedicated-
 | 
				
			||||||
 | 
					  # Post-condition: node has no taints
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "nodes 127.0.0.1" "{{.spec.taints}}" '<no value>'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### kubectl cordon update with --dry-run does not mark node unschedulable
 | 
				
			||||||
 | 
					  # Pre-condition: node is schedulable
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "nodes 127.0.0.1" "{{.spec.unschedulable}}" '<no value>'
 | 
				
			||||||
 | 
					  kubectl cordon "127.0.0.1" --dry-run
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "nodes 127.0.0.1" "{{.spec.unschedulable}}" '<no value>'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### kubectl drain update with --dry-run does not mark node unschedulable
 | 
				
			||||||
 | 
					  # Pre-condition: node is schedulable
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "nodes 127.0.0.1" "{{.spec.unschedulable}}" '<no value>'
 | 
				
			||||||
 | 
					  kubectl drain "127.0.0.1" --dry-run
 | 
				
			||||||
 | 
					  # Post-condition: node still exists, node is still schedulable
 | 
				
			||||||
 | 
					  kube::test::get_object_assert nodes "{{range.items}}{{$id_field}}:{{end}}" '127.0.0.1:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "nodes 127.0.0.1" "{{.spec.unschedulable}}" '<no value>'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### kubectl drain with --pod-selector only evicts pods that match the given selector
 | 
				
			||||||
 | 
					  # Pre-condition: node is schedulable
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "nodes 127.0.0.1" "{{.spec.unschedulable}}" '<no value>'
 | 
				
			||||||
 | 
					  # Pre-condition: test-pod-1 and test-pod-2 exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "pods" "{{range .items}}{{.metadata.name}},{{end}}" 'test-pod-1,test-pod-2,'
 | 
				
			||||||
 | 
					  kubectl drain "127.0.0.1" --pod-selector 'e in (f)'
 | 
				
			||||||
 | 
					  # only "test-pod-1" should have been matched and deleted - test-pod-2 should still exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "pods/test-pod-2" "{{.metadata.name}}" 'test-pod-2'
 | 
				
			||||||
 | 
					  # delete pod no longer in use
 | 
				
			||||||
 | 
					  kubectl delete pod/test-pod-2
 | 
				
			||||||
 | 
					  # Post-condition: node is schedulable
 | 
				
			||||||
 | 
					  kubectl uncordon "127.0.0.1"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "nodes 127.0.0.1" "{{.spec.unschedulable}}" '<no value>'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### kubectl uncordon update with --dry-run is a no-op
 | 
				
			||||||
 | 
					  # Pre-condition: node is already schedulable
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "nodes 127.0.0.1" "{{.spec.unschedulable}}" '<no value>'
 | 
				
			||||||
 | 
					  response=$(kubectl uncordon "127.0.0.1" --dry-run)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${response}" 'already uncordoned'
 | 
				
			||||||
 | 
					  # Post-condition: node is still schedulable
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "nodes 127.0.0.1" "{{.spec.unschedulable}}" '<no value>'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### kubectl drain command fails when both --selector and a node argument are given
 | 
				
			||||||
 | 
					  # Pre-condition: node exists and contains label test=label
 | 
				
			||||||
 | 
					  kubectl label node "127.0.0.1" "test=label"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "nodes 127.0.0.1" '{{.metadata.labels.test}}' 'label'
 | 
				
			||||||
 | 
					  response=$(! kubectl drain "127.0.0.1" --selector test=label 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${response}" 'cannot specify both a node name'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### kubectl cordon command fails when no arguments are passed
 | 
				
			||||||
 | 
					  # Pre-condition: node exists
 | 
				
			||||||
 | 
					  response=$(! kubectl cordon 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${response}" 'error\: USAGE\: cordon NODE'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### kubectl cordon selects no nodes with an empty --selector=
 | 
				
			||||||
 | 
					  # Pre-condition: node "127.0.0.1" is uncordoned
 | 
				
			||||||
 | 
					  kubectl uncordon "127.0.0.1"
 | 
				
			||||||
 | 
					  response=$(! kubectl cordon --selector= 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${response}" 'must provide one or more resources'
 | 
				
			||||||
 | 
					  # test=label matches our node
 | 
				
			||||||
 | 
					  response=$(kubectl cordon --selector test=label)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${response}" 'node/127.0.0.1 cordoned'
 | 
				
			||||||
 | 
					  # invalid=label does not match any nodes
 | 
				
			||||||
 | 
					  response=$(kubectl cordon --selector invalid=label)
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${response}" 'cordoned'
 | 
				
			||||||
 | 
					  # Post-condition: node "127.0.0.1" is cordoned
 | 
				
			||||||
 | 
					  kube::test::get_object_assert "nodes 127.0.0.1" "{{.spec.unschedulable}}" 'true'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										140
									
								
								test/cmd/old-print.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										140
									
								
								test/cmd/old-print.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,140 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_kubectl_old_print_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl get --server-print=false"
 | 
				
			||||||
 | 
					  ### Test retrieval of all types in discovery
 | 
				
			||||||
 | 
					  # Pre-condition: no resources exist
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pods --server-print=false 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  # Post-condition: Expect text indicating no resources were found
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'No resources found.'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test retrieval of pods against server-side printing
 | 
				
			||||||
 | 
					  kubectl create -f test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: valid-pod POD is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'valid-pod:'
 | 
				
			||||||
 | 
					  # Compare "old" output with experimental output and ensure both are the same
 | 
				
			||||||
 | 
					  # remove the last column, as it contains the object's AGE, which could cause a mismatch.
 | 
				
			||||||
 | 
					  expected_output=$(kubectl get pod "${kube_flags[@]}" | awk 'NF{NF--};1')
 | 
				
			||||||
 | 
					  actual_output=$(kubectl get pod --server-print=false "${kube_flags[@]}" | awk 'NF{NF--};1')
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${actual_output}" "${expected_output}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test printing objects with --use-openapi-print-columns
 | 
				
			||||||
 | 
					  actual_output=$(kubectl get namespaces --use-openapi-print-columns --v=7 "${kube_flags[@]}" 2>&1)
 | 
				
			||||||
 | 
					  # it should request full objects (not server-side printing)
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${actual_output}" 'application/json;as=Table'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${actual_output}"     'application/json'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test retrieval of daemonsets against server-side printing
 | 
				
			||||||
 | 
					  kubectl apply -f hack/testdata/rollingupdate-daemonset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: daemonset is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert ds "{{range.items}}{{$id_field}}:{{end}}" 'bind:'
 | 
				
			||||||
 | 
					  # Compare "old" output with experimental output and ensure both are the same
 | 
				
			||||||
 | 
					  # remove the last column, as it contains the object's AGE, which could cause a mismatch.
 | 
				
			||||||
 | 
					  expected_output=$(kubectl get ds "${kube_flags[@]}" | awk 'NF{NF--};1')
 | 
				
			||||||
 | 
					  actual_output=$(kubectl get ds --server-print=false "${kube_flags[@]}" | awk 'NF{NF--};1')
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${actual_output}" "${expected_output}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test retrieval of replicationcontrollers against server-side printing
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/frontend-controller.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: frontend replication controller is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" 'frontend:'
 | 
				
			||||||
 | 
					  # Compare "old" output with experimental output and ensure both are the same
 | 
				
			||||||
 | 
					  # remove the last column, as it contains the object's AGE, which could cause a mismatch.
 | 
				
			||||||
 | 
					  expected_output=$(kubectl get rc "${kube_flags[@]}" | awk 'NF{NF--};1')
 | 
				
			||||||
 | 
					  actual_output=$(kubectl get rc --server-print=false "${kube_flags[@]}" | awk 'NF{NF--};1')
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${actual_output}" "${expected_output}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test retrieval of replicasets against server-side printing
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/frontend-replicaset.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: frontend replica set is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rs "{{range.items}}{{$id_field}}:{{end}}" 'frontend:'
 | 
				
			||||||
 | 
					  # Compare "old" output with experimental output and ensure both are the same
 | 
				
			||||||
 | 
					  # remove the last column, as it contains the object's AGE, which could cause a mismatch.
 | 
				
			||||||
 | 
					  expected_output=$(kubectl get rs "${kube_flags[@]}" | awk 'NF{NF--};1')
 | 
				
			||||||
 | 
					  actual_output=$(kubectl get rs --server-print=false "${kube_flags[@]}" | awk 'NF{NF--};1')
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${actual_output}" "${expected_output}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test retrieval of jobs against server-side printing
 | 
				
			||||||
 | 
					  kubectl run pi --generator=job/v1 "--image=$IMAGE_PERL" --restart=OnFailure -- perl -Mbignum=bpi -wle 'print bpi(20)' "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-Condition: assertion object exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert jobs "{{range.items}}{{$id_field}}:{{end}}" 'pi:'
 | 
				
			||||||
 | 
					  # Compare "old" output with experimental output and ensure both are the same
 | 
				
			||||||
 | 
					  # remove the last column, as it contains the object's AGE, which could cause a mismatch.
 | 
				
			||||||
 | 
					  expected_output=$(kubectl get jobs/pi "${kube_flags[@]}" | awk 'NF{NF--};1')
 | 
				
			||||||
 | 
					  actual_output=$(kubectl get jobs/pi --server-print=false "${kube_flags[@]}" | awk 'NF{NF--};1')
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${actual_output}" "${expected_output}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test retrieval of clusterroles against server-side printing
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" clusterrole sample-role --verb=* --resource=pods
 | 
				
			||||||
 | 
					  # Post-Condition: assertion object exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrole/sample-role "{{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}" 'pods:'
 | 
				
			||||||
 | 
					  # Compare "old" output with experimental output and ensure both are the same
 | 
				
			||||||
 | 
					  # remove the last column, as it contains the object's AGE, which could cause a mismatch.
 | 
				
			||||||
 | 
					  expected_output=$(kubectl get clusterroles/sample-role "${kube_flags[@]}" | awk 'NF{NF--};1')
 | 
				
			||||||
 | 
					  actual_output=$(kubectl get clusterroles/sample-role --server-print=false "${kube_flags[@]}" | awk 'NF{NF--};1')
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${actual_output}" "${expected_output}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Test retrieval of crds against server-side printing
 | 
				
			||||||
 | 
					  kubectl "${kube_flags_with_token[@]}" create -f - << __EOF__
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					  "kind": "CustomResourceDefinition",
 | 
				
			||||||
 | 
					  "apiVersion": "apiextensions.k8s.io/v1beta1",
 | 
				
			||||||
 | 
					  "metadata": {
 | 
				
			||||||
 | 
					    "name": "foos.company.com"
 | 
				
			||||||
 | 
					  },
 | 
				
			||||||
 | 
					  "spec": {
 | 
				
			||||||
 | 
					    "group": "company.com",
 | 
				
			||||||
 | 
					    "version": "v1",
 | 
				
			||||||
 | 
					    "scope": "Namespaced",
 | 
				
			||||||
 | 
					    "names": {
 | 
				
			||||||
 | 
					      "plural": "foos",
 | 
				
			||||||
 | 
					      "kind": "Foo"
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					  }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					__EOF__
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Post-Condition: assertion object exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert customresourcedefinitions "{{range.items}}{{$id_field}}:{{end}}" 'foos.company.com:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that we can list this new CustomResource
 | 
				
			||||||
 | 
					  kube::test::get_object_assert foos "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Compare "old" output with experimental output and ensure both are the same
 | 
				
			||||||
 | 
					  expected_output=$(kubectl get foos "${kube_flags[@]}" | awk 'NF{NF--};1')
 | 
				
			||||||
 | 
					  actual_output=$(kubectl get foos --server-print=false "${kube_flags[@]}" | awk 'NF{NF--};1')
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${actual_output}" "${expected_output}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # teardown
 | 
				
			||||||
 | 
					  kubectl delete customresourcedefinitions/foos.company.com "${kube_flags_with_token[@]}"
 | 
				
			||||||
 | 
					  kubectl delete clusterroles/sample-role "${kube_flags_with_token[@]}"
 | 
				
			||||||
 | 
					  kubectl delete jobs pi "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl delete rs frontend "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl delete rc frontend "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl delete ds bind "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl delete pod valid-pod "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										105
									
								
								test/cmd/plugins.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										105
									
								
								test/cmd/plugins.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,105 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_plugins_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl plugins"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # top-level plugin command
 | 
				
			||||||
 | 
					  output_message=$(KUBECTL_PLUGINS_PATH=test/fixtures/pkg/kubectl/plugins kubectl -h 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'plugin\s\+Runs a command-line plugin'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # no plugins
 | 
				
			||||||
 | 
					  output_message=$(! kubectl plugin 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'no plugins installed'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # single plugins path
 | 
				
			||||||
 | 
					  output_message=$(! KUBECTL_PLUGINS_PATH=test/fixtures/pkg/kubectl/plugins kubectl plugin 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'echo\s\+Echoes for test-cmd'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'get\s\+The wonderful new plugin-based get!'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'error\s\+The tremendous plugin that always fails!'
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'The hello plugin'
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'Incomplete plugin'
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'no plugins installed'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # multiple plugins path
 | 
				
			||||||
 | 
					  output_message=$(KUBECTL_PLUGINS_PATH=test/fixtures/pkg/kubectl/plugins/:test/fixtures/pkg/kubectl/plugins2/ kubectl plugin -h 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'echo\s\+Echoes for test-cmd'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'get\s\+The wonderful new plugin-based get!'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'error\s\+The tremendous plugin that always fails!'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'hello\s\+The hello plugin'
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'Incomplete plugin'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # don't override existing commands
 | 
				
			||||||
 | 
					  output_message=$(KUBECTL_PLUGINS_PATH=test/fixtures/pkg/kubectl/plugins/:test/fixtures/pkg/kubectl/plugins2/ kubectl get -h 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'Display one or many resources'
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "$output_message{output_message}" 'The wonderful new plugin-based get'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # plugin help
 | 
				
			||||||
 | 
					  output_message=$(KUBECTL_PLUGINS_PATH=test/fixtures/pkg/kubectl/plugins/:test/fixtures/pkg/kubectl/plugins2/ kubectl plugin hello -h 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'The hello plugin is a new plugin used by test-cmd to test multiple plugin locations.'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'Usage:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # run plugin
 | 
				
			||||||
 | 
					  output_message=$(KUBECTL_PLUGINS_PATH=test/fixtures/pkg/kubectl/plugins/:test/fixtures/pkg/kubectl/plugins2/ kubectl plugin hello 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" '#hello#'
 | 
				
			||||||
 | 
					  output_message=$(KUBECTL_PLUGINS_PATH=test/fixtures/pkg/kubectl/plugins/:test/fixtures/pkg/kubectl/plugins2/ kubectl plugin echo 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'This plugin works!'
 | 
				
			||||||
 | 
					  output_message=$(! KUBECTL_PLUGINS_PATH=test/fixtures/pkg/kubectl/plugins/ kubectl plugin hello 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'unknown command'
 | 
				
			||||||
 | 
					  output_message=$(! KUBECTL_PLUGINS_PATH=test/fixtures/pkg/kubectl/plugins/ kubectl plugin error 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'error: exit status 1'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # plugin tree
 | 
				
			||||||
 | 
					  output_message=$(! KUBECTL_PLUGINS_PATH=test/fixtures/pkg/kubectl/plugins kubectl plugin tree 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'Plugin with a tree of commands'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'child1\s\+The first child of a tree'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'child2\s\+The second child of a tree'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'child3\s\+The third child of a tree'
 | 
				
			||||||
 | 
					  output_message=$(KUBECTL_PLUGINS_PATH=test/fixtures/pkg/kubectl/plugins kubectl plugin tree child1 --help 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'The first child of a tree'
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'The second child'
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'child2'
 | 
				
			||||||
 | 
					  output_message=$(KUBECTL_PLUGINS_PATH=test/fixtures/pkg/kubectl/plugins kubectl plugin tree child1 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'child one'
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'child1'
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" 'The first child'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # plugin env
 | 
				
			||||||
 | 
					  output_message=$(KUBECTL_PLUGINS_PATH=test/fixtures/pkg/kubectl/plugins kubectl plugin env -h 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "This is a flag 1"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "This is a flag 2"
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "This is a flag 3"
 | 
				
			||||||
 | 
					  output_message=$(KUBECTL_PLUGINS_PATH=test/fixtures/pkg/kubectl/plugins kubectl plugin env --test1=value1 -t value2 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'KUBECTL_PLUGINS_CURRENT_NAMESPACE'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'KUBECTL_PLUGINS_CALLER'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'KUBECTL_PLUGINS_DESCRIPTOR_COMMAND=./env.sh'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'KUBECTL_PLUGINS_DESCRIPTOR_SHORT_DESC=The plugin envs plugin'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'KUBECTL_PLUGINS_GLOBAL_FLAG_KUBECONFIG'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'KUBECTL_PLUGINS_GLOBAL_FLAG_REQUEST_TIMEOUT=0'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'KUBECTL_PLUGINS_LOCAL_FLAG_TEST1=value1'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'KUBECTL_PLUGINS_LOCAL_FLAG_TEST2=value2'
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'KUBECTL_PLUGINS_LOCAL_FLAG_TEST3=default'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										56
									
								
								test/cmd/proxy.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										56
									
								
								test/cmd/proxy.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,56 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_kubectl_local_proxy_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl local proxy"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  start-proxy
 | 
				
			||||||
 | 
					  check-curl-proxy-code /api/kubernetes 404
 | 
				
			||||||
 | 
					  check-curl-proxy-code /api/v1/namespaces 200
 | 
				
			||||||
 | 
					  if kube::test::if_supports_resource "${metrics}" ; then
 | 
				
			||||||
 | 
					    check-curl-proxy-code /metrics 200
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					  if kube::test::if_supports_resource "${static}" ; then
 | 
				
			||||||
 | 
					    check-curl-proxy-code /static/ 200
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					  stop-proxy
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Make sure the in-development api is accessible by default
 | 
				
			||||||
 | 
					  start-proxy
 | 
				
			||||||
 | 
					  check-curl-proxy-code /apis 200
 | 
				
			||||||
 | 
					  check-curl-proxy-code /apis/extensions/ 200
 | 
				
			||||||
 | 
					  stop-proxy
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Custom paths let you see everything.
 | 
				
			||||||
 | 
					  start-proxy /custom
 | 
				
			||||||
 | 
					  check-curl-proxy-code /custom/api/kubernetes 404
 | 
				
			||||||
 | 
					  check-curl-proxy-code /custom/api/v1/namespaces 200
 | 
				
			||||||
 | 
					  if kube::test::if_supports_resource "${metrics}" ; then
 | 
				
			||||||
 | 
					    check-curl-proxy-code /custom/metrics 200
 | 
				
			||||||
 | 
					  fi
 | 
				
			||||||
 | 
					  check-curl-proxy-code /custom/api/v1/namespaces 200
 | 
				
			||||||
 | 
					  stop-proxy
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										159
									
								
								test/cmd/rbac.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										159
									
								
								test/cmd/rbac.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,159 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_clusterroles_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing clusterroles"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # make sure the server was properly bootstrapped with clusterroles and bindings
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterroles/cluster-admin "{{.metadata.name}}" 'cluster-admin'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebindings/cluster-admin "{{.metadata.name}}" 'cluster-admin'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # test `kubectl create clusterrole`
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" clusterrole pod-admin --verb=* --resource=pods
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrole/pod-admin "{{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}" '\*:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrole/pod-admin "{{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}" 'pods:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrole/pod-admin "{{range.rules}}{{range.apiGroups}}{{.}}:{{end}}{{end}}" ':'
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" clusterrole resource-reader --verb=get,list --resource=pods,deployments.extensions
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrole/resource-reader "{{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}" 'get:list:get:list:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrole/resource-reader "{{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}" 'pods:deployments:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrole/resource-reader "{{range.rules}}{{range.apiGroups}}{{.}}:{{end}}{{end}}" ':extensions:'
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" clusterrole resourcename-reader --verb=get,list --resource=pods --resource-name=foo
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrole/resourcename-reader "{{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}" 'get:list:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrole/resourcename-reader "{{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}" 'pods:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrole/resourcename-reader "{{range.rules}}{{range.apiGroups}}{{.}}:{{end}}{{end}}" ':'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrole/resourcename-reader "{{range.rules}}{{range.resourceNames}}{{.}}:{{end}}{{end}}" 'foo:'
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" clusterrole url-reader --verb=get --non-resource-url=/logs/* --non-resource-url=/healthz/*
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrole/url-reader "{{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}" 'get:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrole/url-reader "{{range.rules}}{{range.nonResourceURLs}}{{.}}:{{end}}{{end}}" '/logs/\*:/healthz/\*:'
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" clusterrole aggregation-reader --aggregation-rule="foo1=foo2"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrole/aggregation-reader "{{$id_field}}" 'aggregation-reader'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # test `kubectl create clusterrolebinding`
 | 
				
			||||||
 | 
					  # test `kubectl set subject clusterrolebinding`
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" clusterrolebinding super-admin --clusterrole=admin --user=super-admin
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/super-admin "{{range.subjects}}{{.name}}:{{end}}" 'super-admin:'
 | 
				
			||||||
 | 
					  kubectl set subject "${kube_flags[@]}" clusterrolebinding super-admin --user=foo
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/super-admin "{{range.subjects}}{{.name}}:{{end}}" 'super-admin:foo:'
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" clusterrolebinding multi-users --clusterrole=admin --user=user-1 --user=user-2
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/multi-users "{{range.subjects}}{{.name}}:{{end}}" 'user-1:user-2:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" clusterrolebinding super-group --clusterrole=admin --group=the-group
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/super-group "{{range.subjects}}{{.name}}:{{end}}" 'the-group:'
 | 
				
			||||||
 | 
					  kubectl set subject "${kube_flags[@]}" clusterrolebinding super-group --group=foo
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/super-group "{{range.subjects}}{{.name}}:{{end}}" 'the-group:foo:'
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" clusterrolebinding multi-groups --clusterrole=admin --group=group-1 --group=group-2
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/multi-groups "{{range.subjects}}{{.name}}:{{end}}" 'group-1:group-2:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" clusterrolebinding super-sa --clusterrole=admin --serviceaccount=otherns:sa-name
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/super-sa "{{range.subjects}}{{.namespace}}:{{end}}" 'otherns:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/super-sa "{{range.subjects}}{{.name}}:{{end}}" 'sa-name:'
 | 
				
			||||||
 | 
					  kubectl set subject "${kube_flags[@]}" clusterrolebinding super-sa --serviceaccount=otherfoo:foo
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/super-sa "{{range.subjects}}{{.namespace}}:{{end}}" 'otherns:otherfoo:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/super-sa "{{range.subjects}}{{.name}}:{{end}}" 'sa-name:foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # test `kubectl set subject clusterrolebinding --all`
 | 
				
			||||||
 | 
					  kubectl set subject "${kube_flags[@]}" clusterrolebinding --all --user=test-all-user
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/super-admin "{{range.subjects}}{{.name}}:{{end}}" 'super-admin:foo:test-all-user:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/super-group "{{range.subjects}}{{.name}}:{{end}}" 'the-group:foo:test-all-user:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert clusterrolebinding/super-sa "{{range.subjects}}{{.name}}:{{end}}" 'sa-name:foo:test-all-user:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # test `kubectl create rolebinding`
 | 
				
			||||||
 | 
					  # test `kubectl set subject rolebinding`
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" rolebinding admin --clusterrole=admin --user=default-admin
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rolebinding/admin "{{.roleRef.kind}}" 'ClusterRole'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rolebinding/admin "{{range.subjects}}{{.name}}:{{end}}" 'default-admin:'
 | 
				
			||||||
 | 
					  kubectl set subject "${kube_flags[@]}" rolebinding admin --user=foo
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rolebinding/admin "{{range.subjects}}{{.name}}:{{end}}" 'default-admin:foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" rolebinding localrole --role=localrole --group=the-group
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rolebinding/localrole "{{.roleRef.kind}}" 'Role'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rolebinding/localrole "{{range.subjects}}{{.name}}:{{end}}" 'the-group:'
 | 
				
			||||||
 | 
					  kubectl set subject "${kube_flags[@]}" rolebinding localrole --group=foo
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rolebinding/localrole "{{range.subjects}}{{.name}}:{{end}}" 'the-group:foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" rolebinding sarole --role=localrole --serviceaccount=otherns:sa-name
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rolebinding/sarole "{{range.subjects}}{{.namespace}}:{{end}}" 'otherns:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rolebinding/sarole "{{range.subjects}}{{.name}}:{{end}}" 'sa-name:'
 | 
				
			||||||
 | 
					  kubectl set subject "${kube_flags[@]}" rolebinding sarole --serviceaccount=otherfoo:foo
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rolebinding/sarole "{{range.subjects}}{{.namespace}}:{{end}}" 'otherns:otherfoo:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rolebinding/sarole "{{range.subjects}}{{.name}}:{{end}}" 'sa-name:foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # test `kubectl set subject rolebinding --all`
 | 
				
			||||||
 | 
					  kubectl set subject "${kube_flags[@]}" rolebinding --all --user=test-all-user
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rolebinding/admin "{{range.subjects}}{{.name}}:{{end}}" 'default-admin:foo:test-all-user:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rolebinding/localrole "{{range.subjects}}{{.name}}:{{end}}" 'the-group:foo:test-all-user:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rolebinding/sarole "{{range.subjects}}{{.name}}:{{end}}" 'sa-name:foo:test-all-user:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_role_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing role"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Create Role from command (only resource)
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" role pod-admin --verb=* --resource=pods
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/pod-admin "{{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}" '\*:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/pod-admin "{{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}" 'pods:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/pod-admin "{{range.rules}}{{range.apiGroups}}{{.}}:{{end}}{{end}}" ':'
 | 
				
			||||||
 | 
					  output_message=$(! kubectl create "${kube_flags[@]}" role invalid-pod-admin --verb=* --resource=invalid-resource 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "the server doesn't have a resource type \"invalid-resource\""
 | 
				
			||||||
 | 
					  # Create Role from command (resource + group)
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" role group-reader --verb=get,list --resource=deployments.extensions
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/group-reader "{{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}" 'get:list:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/group-reader "{{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}" 'deployments:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/group-reader "{{range.rules}}{{range.apiGroups}}{{.}}:{{end}}{{end}}" 'extensions:'
 | 
				
			||||||
 | 
					  output_message=$(! kubectl create "${kube_flags[@]}" role invalid-group --verb=get,list --resource=deployments.invalid-group 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "the server doesn't have a resource type \"deployments\" in group \"invalid-group\""
 | 
				
			||||||
 | 
					  # Create Role from command (resource / subresource)
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" role subresource-reader --verb=get,list --resource=pods/status
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/subresource-reader "{{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}" 'get:list:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/subresource-reader "{{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}" 'pods/status:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/subresource-reader "{{range.rules}}{{range.apiGroups}}{{.}}:{{end}}{{end}}" ':'
 | 
				
			||||||
 | 
					  # Create Role from command (resource + group / subresource)
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" role group-subresource-reader --verb=get,list --resource=replicasets.extensions/scale
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/group-subresource-reader "{{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}" 'get:list:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/group-subresource-reader "{{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}" 'replicasets/scale:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/group-subresource-reader "{{range.rules}}{{range.apiGroups}}{{.}}:{{end}}{{end}}" 'extensions:'
 | 
				
			||||||
 | 
					  output_message=$(! kubectl create "${kube_flags[@]}" role invalid-group --verb=get,list --resource=rs.invalid-group/scale 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" "the server doesn't have a resource type \"rs\" in group \"invalid-group\""
 | 
				
			||||||
 | 
					  # Create Role from command (resource + resourcename)
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" role resourcename-reader --verb=get,list --resource=pods --resource-name=foo
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/resourcename-reader "{{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}" 'get:list:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/resourcename-reader "{{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}" 'pods:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/resourcename-reader "{{range.rules}}{{range.apiGroups}}{{.}}:{{end}}{{end}}" ':'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/resourcename-reader "{{range.rules}}{{range.resourceNames}}{{.}}:{{end}}{{end}}" 'foo:'
 | 
				
			||||||
 | 
					  # Create Role from command (multi-resources)
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" role resource-reader --verb=get,list --resource=pods/status,deployments.extensions
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/resource-reader "{{range.rules}}{{range.verbs}}{{.}}:{{end}}{{end}}" 'get:list:get:list:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/resource-reader "{{range.rules}}{{range.resources}}{{.}}:{{end}}{{end}}" 'pods/status:deployments:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert role/resource-reader "{{range.rules}}{{range.apiGroups}}{{.}}:{{end}}{{end}}" ':extensions:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										57
									
								
								test/cmd/request-timeout.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										57
									
								
								test/cmd/request-timeout.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,57 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_kubectl_request_timeout_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl request timeout"
 | 
				
			||||||
 | 
					  ### Test global request timeout option
 | 
				
			||||||
 | 
					  # Pre-condition: no POD exists
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" -f test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml
 | 
				
			||||||
 | 
					  # Post-condition: valid-pod POD is created
 | 
				
			||||||
 | 
					  kubectl get "${kube_flags[@]}" pods -o json
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'valid-pod:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## check --request-timeout on 'get pod'
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pod valid-pod --request-timeout=1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'valid-pod'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## check --request-timeout on 'get pod' with --watch
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pod valid-pod --request-timeout=1 --watch 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'Timeout exceeded while reading body'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## check --request-timeout value with no time unit
 | 
				
			||||||
 | 
					  output_message=$(kubectl get pod valid-pod --request-timeout=1 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'valid-pod'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ## check --request-timeout value with invalid time unit
 | 
				
			||||||
 | 
					  output_message=$(! kubectl get pod valid-pod --request-timeout="1p" 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'Invalid timeout value'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # cleanup
 | 
				
			||||||
 | 
					  kubectl delete pods valid-pod "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										104
									
								
								test/cmd/run.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										104
									
								
								test/cmd/run.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,104 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_kubectl_run_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl run"
 | 
				
			||||||
 | 
					  ## kubectl run should create deployments, jobs or cronjob
 | 
				
			||||||
 | 
					  # Pre-Condition: no Job exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert jobs "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl run pi --generator=job/v1 "--image=$IMAGE_PERL" --restart=OnFailure -- perl -Mbignum=bpi -wle 'print bpi(20)' "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-Condition: Job "pi" is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert jobs "{{range.items}}{{$id_field}}:{{end}}" 'pi:'
 | 
				
			||||||
 | 
					  # Describe command (resource only) should print detailed information
 | 
				
			||||||
 | 
					  kube::test::describe_resource_assert pods "Name:" "Image:" "Node:" "Labels:" "Status:" "Controlled By"
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete jobs pi "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: no pods exist.
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Pre-Condition: no Deployment exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl run nginx-extensions "--image=$IMAGE_NGINX" "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-Condition: Deployment "nginx" is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment.extensions "{{range.items}}{{$id_field}}:{{end}}" 'nginx-extensions:'
 | 
				
			||||||
 | 
					  # new generator was used
 | 
				
			||||||
 | 
					  output_message=$(kubectl get deployment.extensions/nginx-extensions -o jsonpath='{.spec.revisionHistoryLimit}')
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" '2'
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete deployment nginx-extensions "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl run nginx-apps "--image=$IMAGE_NGINX" --generator=deployment/apps.v1beta1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-Condition: Deployment "nginx" is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert deployment.apps "{{range.items}}{{$id_field}}:{{end}}" 'nginx-apps:'
 | 
				
			||||||
 | 
					  # and new generator was used, iow. new defaults are applied
 | 
				
			||||||
 | 
					  output_message=$(kubectl get deployment/nginx-apps -o jsonpath='{.spec.revisionHistoryLimit}')
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" '2'
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete deployment nginx-apps "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Pre-Condition: no Job exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert cronjobs "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl run pi --schedule="*/5 * * * *" --generator=cronjob/v1beta1 "--image=$IMAGE_PERL" --restart=OnFailure -- perl -Mbignum=bpi -wle 'print bpi(20)' "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-Condition: CronJob "pi" is created
 | 
				
			||||||
 | 
					  kube::test::get_object_assert cronjobs "{{range.items}}{{$id_field}}:{{end}}" 'pi:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Pre-condition: cronjob has perl image, not custom image
 | 
				
			||||||
 | 
					  output_message=$(kubectl get cronjob/pi -o jsonpath='{..image}')
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" "custom-image"
 | 
				
			||||||
 | 
					  kube::test::if_has_string     "${output_message}" "${IMAGE_PERL}"
 | 
				
			||||||
 | 
					  # Set cronjob image
 | 
				
			||||||
 | 
					  kubectl set image cronjob/pi '*=custom-image'
 | 
				
			||||||
 | 
					  # Post-condition: cronjob has custom image, not perl image
 | 
				
			||||||
 | 
					  output_message=$(kubectl get cronjob/pi -o jsonpath='{..image}')
 | 
				
			||||||
 | 
					  kube::test::if_has_string     "${output_message}" "custom-image"
 | 
				
			||||||
 | 
					  kube::test::if_has_not_string "${output_message}" "${IMAGE_PERL}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete cronjobs pi "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_cmd_with_img_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing cmd with image"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # Test that a valid image reference value is provided as the value of --image in `kubectl run <name> --image`
 | 
				
			||||||
 | 
					  output_message=$(kubectl run test1 --image=validname)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'deployment.apps/test1 created'
 | 
				
			||||||
 | 
					  kubectl delete deployments test1
 | 
				
			||||||
 | 
					  # test invalid image name
 | 
				
			||||||
 | 
					  output_message=$(! kubectl run test2 --image=InvalidImageName 2>&1)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'error: Invalid image name "InvalidImageName": invalid reference format'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										105
									
								
								test/cmd/save-config.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										105
									
								
								test/cmd/save-config.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,105 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Runs tests for --save-config tests.
 | 
				
			||||||
 | 
					run_save_config_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl --save-config"
 | 
				
			||||||
 | 
					  ## Configuration annotations should be set when --save-config is enabled
 | 
				
			||||||
 | 
					  ## 1. kubectl create --save-config should generate configuration annotation
 | 
				
			||||||
 | 
					  # Pre-Condition: no POD exists
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command: create a pod "test-pod"
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/pod.yaml --save-config "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-Condition: pod "test-pod" has configuration annotation
 | 
				
			||||||
 | 
					  [[ "$(kubectl get pods test-pod -o yaml "${kube_flags[@]}" | grep kubectl.kubernetes.io/last-applied-configuration)" ]]
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete -f hack/testdata/pod.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  ## 2. kubectl edit --save-config should generate configuration annotation
 | 
				
			||||||
 | 
					  # Pre-Condition: no POD exists, then create pod "test-pod", which shouldn't have configuration annotation
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/pod.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  ! [[ "$(kubectl get pods test-pod -o yaml "${kube_flags[@]}" | grep kubectl.kubernetes.io/last-applied-configuration)" ]]
 | 
				
			||||||
 | 
					  # Command: edit the pod "test-pod"
 | 
				
			||||||
 | 
					  temp_editor="${KUBE_TEMP}/tmp-editor.sh"
 | 
				
			||||||
 | 
					  echo -e "#!/usr/bin/env bash\n${SED} -i \"s/test-pod-label/test-pod-label-edited/g\" \$@" > "${temp_editor}"
 | 
				
			||||||
 | 
					  chmod +x "${temp_editor}"
 | 
				
			||||||
 | 
					  EDITOR=${temp_editor} kubectl edit pod test-pod --save-config "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-Condition: pod "test-pod" has configuration annotation
 | 
				
			||||||
 | 
					  [[ "$(kubectl get pods test-pod -o yaml "${kube_flags[@]}" | grep kubectl.kubernetes.io/last-applied-configuration)" ]]
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete -f hack/testdata/pod.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  ## 3. kubectl replace --save-config should generate configuration annotation
 | 
				
			||||||
 | 
					  # Pre-Condition: no POD exists, then create pod "test-pod", which shouldn't have configuration annotation
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/pod.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  ! [[ "$(kubectl get pods test-pod -o yaml "${kube_flags[@]}" | grep kubectl.kubernetes.io/last-applied-configuration)" ]]
 | 
				
			||||||
 | 
					  # Command: replace the pod "test-pod"
 | 
				
			||||||
 | 
					  kubectl replace -f hack/testdata/pod.yaml --save-config "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-Condition: pod "test-pod" has configuration annotation
 | 
				
			||||||
 | 
					  [[ "$(kubectl get pods test-pod -o yaml "${kube_flags[@]}" | grep kubectl.kubernetes.io/last-applied-configuration)" ]]
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete -f hack/testdata/pod.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  ## 4. kubectl run --save-config should generate configuration annotation
 | 
				
			||||||
 | 
					  # Pre-Condition: no RC exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command: create the rc "nginx" with image nginx
 | 
				
			||||||
 | 
					  kubectl run nginx "--image=$IMAGE_NGINX" --save-config --generator=run/v1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-Condition: rc "nginx" has configuration annotation
 | 
				
			||||||
 | 
					  [[ "$(kubectl get rc nginx -o yaml "${kube_flags[@]}" | grep kubectl.kubernetes.io/last-applied-configuration)" ]]
 | 
				
			||||||
 | 
					  ## 5. kubectl expose --save-config should generate configuration annotation
 | 
				
			||||||
 | 
					  # Pre-Condition: no service exists
 | 
				
			||||||
 | 
					  kube::test::get_object_assert svc "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command: expose the rc "nginx"
 | 
				
			||||||
 | 
					  kubectl expose rc nginx --save-config --port=80 --target-port=8000 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-Condition: service "nginx" has configuration annotation
 | 
				
			||||||
 | 
					  [[ "$(kubectl get svc nginx -o yaml "${kube_flags[@]}" | grep kubectl.kubernetes.io/last-applied-configuration)" ]]
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  kubectl delete rc,svc nginx
 | 
				
			||||||
 | 
					  ## 6. kubectl autoscale --save-config should generate configuration annotation
 | 
				
			||||||
 | 
					  # Pre-Condition: no RC exists, then create the rc "frontend", which shouldn't have configuration annotation
 | 
				
			||||||
 | 
					  kube::test::get_object_assert rc "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  kubectl create -f hack/testdata/frontend-controller.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  ! [[ "$(kubectl get rc frontend -o yaml "${kube_flags[@]}" | grep kubectl.kubernetes.io/last-applied-configuration)" ]]
 | 
				
			||||||
 | 
					  # Command: autoscale rc "frontend"
 | 
				
			||||||
 | 
					  kubectl autoscale -f hack/testdata/frontend-controller.yaml --save-config "${kube_flags[@]}" --max=2
 | 
				
			||||||
 | 
					  # Post-Condition: hpa "frontend" has configuration annotation
 | 
				
			||||||
 | 
					  [[ "$(kubectl get hpa frontend -o yaml "${kube_flags[@]}" | grep kubectl.kubernetes.io/last-applied-configuration)" ]]
 | 
				
			||||||
 | 
					  # Ensure we can interact with HPA objects in lists through autoscaling/v1 APIs
 | 
				
			||||||
 | 
					  output_message=$(kubectl get hpa -o=jsonpath='{.items[0].apiVersion}' 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'autoscaling/v1'
 | 
				
			||||||
 | 
					  output_message=$(kubectl get hpa.autoscaling -o=jsonpath='{.items[0].apiVersion}' 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'autoscaling/v1'
 | 
				
			||||||
 | 
					  # tests kubectl group prefix matching
 | 
				
			||||||
 | 
					  output_message=$(kubectl get hpa.autoscal -o=jsonpath='{.items[0].apiVersion}' 2>&1 "${kube_flags[@]}")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'autoscaling/v1'
 | 
				
			||||||
 | 
					  # Clean up
 | 
				
			||||||
 | 
					  # Note that we should delete hpa first, otherwise it may fight with the rc reaper.
 | 
				
			||||||
 | 
					  kubectl delete hpa frontend "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl delete rc  frontend "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										110
									
								
								test/cmd/storage.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										110
									
								
								test/cmd/storage.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,110 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_persistent_volumes_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing persistent volumes"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create and delete persistent volume examples
 | 
				
			||||||
 | 
					  # Pre-condition: no persistent volumes currently exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pv "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create -f test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/local-01.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pv "{{range.items}}{{$id_field}}:{{end}}" 'pv0001:'
 | 
				
			||||||
 | 
					  kubectl delete pv pv0001 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl create -f test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/local-02.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pv "{{range.items}}{{$id_field}}:{{end}}" 'pv0002:'
 | 
				
			||||||
 | 
					  kubectl delete pv pv0002 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl create -f test/fixtures/doc-yaml/user-guide/persistent-volumes/volumes/gce.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pv "{{range.items}}{{$id_field}}:{{end}}" 'pv0003:'
 | 
				
			||||||
 | 
					  kubectl delete pv pv0003 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: no PVs
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pv "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_persistent_volume_claims_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::log::status "Testing persistent volumes claims"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create and delete persistent volume claim examples
 | 
				
			||||||
 | 
					  # Pre-condition: no persistent volume claims currently exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pvc "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create -f test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-01.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pvc "{{range.items}}{{$id_field}}:{{end}}" 'myclaim-1:'
 | 
				
			||||||
 | 
					  kubectl delete pvc myclaim-1 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kubectl create -f test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-02.yaml "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pvc "{{range.items}}{{$id_field}}:{{end}}" 'myclaim-2:'
 | 
				
			||||||
 | 
					  kubectl delete pvc myclaim-2 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kubectl create -f test/fixtures/doc-yaml/user-guide/persistent-volumes/claims/claim-03.json "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pvc "{{range.items}}{{$id_field}}:{{end}}" 'myclaim-3:'
 | 
				
			||||||
 | 
					  kubectl delete pvc myclaim-3 "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: no PVCs
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pvc "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_storage_class_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing storage class"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  ### Create and delete storage class
 | 
				
			||||||
 | 
					  # Pre-condition: no storage classes currently exist
 | 
				
			||||||
 | 
					  kube::test::get_object_assert storageclass "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  kubectl create -f - "${kube_flags[@]}" << __EOF__
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					  "kind": "StorageClass",
 | 
				
			||||||
 | 
					  "apiVersion": "storage.k8s.io/v1",
 | 
				
			||||||
 | 
					  "metadata": {
 | 
				
			||||||
 | 
					  "name": "storage-class-name"
 | 
				
			||||||
 | 
					  },
 | 
				
			||||||
 | 
					  "provisioner": "kubernetes.io/fake-provisioner-type",
 | 
				
			||||||
 | 
					  "parameters": {
 | 
				
			||||||
 | 
					  "zone":"us-east-1b",
 | 
				
			||||||
 | 
					  "type":"ssd"
 | 
				
			||||||
 | 
					  }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					__EOF__
 | 
				
			||||||
 | 
					  kube::test::get_object_assert storageclass "{{range.items}}{{$id_field}}:{{end}}" 'storage-class-name:'
 | 
				
			||||||
 | 
					  kube::test::get_object_assert sc "{{range.items}}{{$id_field}}:{{end}}" 'storage-class-name:'
 | 
				
			||||||
 | 
					  kubectl delete storageclass storage-class-name "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  # Post-condition: no storage classes
 | 
				
			||||||
 | 
					  kube::test::get_object_assert storageclass "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										233
									
								
								test/cmd/template-output.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										233
									
								
								test/cmd/template-output.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,233 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					run_template_output_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing --template support on commands"
 | 
				
			||||||
 | 
					  ### Test global request timeout option
 | 
				
			||||||
 | 
					  # Pre-condition: no POD exists
 | 
				
			||||||
 | 
					  create_and_use_new_namespace
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" ''
 | 
				
			||||||
 | 
					  # Command
 | 
				
			||||||
 | 
					  # check that create supports --template output
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" -f test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml
 | 
				
			||||||
 | 
					  # Post-condition: valid-pod POD is created
 | 
				
			||||||
 | 
					  kubectl get "${kube_flags[@]}" pods -o json
 | 
				
			||||||
 | 
					  kube::test::get_object_assert pods "{{range.items}}{{$id_field}}:{{end}}" 'valid-pod:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that patch command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" patch --dry-run pods/valid-pod -p '{"patched":"value3"}' --type=merge --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'valid-pod:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that label command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" label --dry-run pods/valid-pod label=value --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'valid-pod:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that annotate command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" annotate --dry-run pods/valid-pod annotation=value --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'valid-pod:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that apply command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" apply --dry-run -f test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'valid-pod:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that create command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create -f test/fixtures/doc-yaml/admin/limitrange/valid-pod.yaml --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'valid-pod:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that autoscale command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" autoscale --max=2 -f hack/testdata/scale-deploy-1.yaml --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'scale-1:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that expose command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" expose -f hack/testdata/redis-slave-replicaset.yaml --save-config --port=80 --target-port=8000 --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'redis-slave:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that convert command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" convert -f hack/testdata/deployment-revision1.yaml --output-version=apps/v1beta1 --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'nginx:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that run command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" run --dry-run --template="{{ .metadata.name }}:" pi --image=perl --restart=OnFailure -- perl -Mbignum=bpi -wle 'print bpi(2000)')
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'pi:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that taint command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" taint node 127.0.0.1 dedicated=foo:PreferNoSchedule --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" '127.0.0.1:'
 | 
				
			||||||
 | 
					  # untaint node
 | 
				
			||||||
 | 
					  kubectl taint node 127.0.0.1 dedicated-
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "apply set-last-applied" command supports --template output
 | 
				
			||||||
 | 
					  kubectl "${kube_flags[@]}" create -f test/e2e/testing-manifests/statefulset/cassandra/controller.yaml
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" apply set-last-applied -f test/e2e/testing-manifests/statefulset/cassandra/controller.yaml --dry-run --create-annotation --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'cassandra:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "auth reconcile" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" auth reconcile --dry-run -f test/fixtures/pkg/kubectl/cmd/auth/rbac-resource-plus.yaml --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'testing-CR:testing-CRB:testing-RB:testing-R:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create clusterrole" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create clusterrole --template="{{ .metadata.name }}:" --verb get myclusterrole  --non-resource-url /logs/ --resource pods)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'myclusterrole:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create clusterrolebinding" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create clusterrolebinding foo --clusterrole=myclusterrole --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create configmap" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create configmap cm --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'cm:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create deployment" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create deployment deploy --dry-run --image=nginx --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'deploy:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create job" command supports --template output
 | 
				
			||||||
 | 
					  kubectl create "${kube_flags[@]}" -f - <<EOF
 | 
				
			||||||
 | 
					apiVersion: batch/v1beta1
 | 
				
			||||||
 | 
					kind: CronJob
 | 
				
			||||||
 | 
					metadata:
 | 
				
			||||||
 | 
					  name: pi
 | 
				
			||||||
 | 
					spec:
 | 
				
			||||||
 | 
					  schedule: "*/10 * * * *"
 | 
				
			||||||
 | 
					  jobTemplate:
 | 
				
			||||||
 | 
					    spec:
 | 
				
			||||||
 | 
					      template:
 | 
				
			||||||
 | 
					        metadata:
 | 
				
			||||||
 | 
					          labels:
 | 
				
			||||||
 | 
					            parent: "pi"
 | 
				
			||||||
 | 
					        spec:
 | 
				
			||||||
 | 
					          containers:
 | 
				
			||||||
 | 
					          - name: pi
 | 
				
			||||||
 | 
					            image: perl
 | 
				
			||||||
 | 
					            command: ["perl",  "-Mbignum=bpi", "-wle", "print bpi(2000)"]
 | 
				
			||||||
 | 
					          restartPolicy: OnFailure
 | 
				
			||||||
 | 
					EOF
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create job foo --from=cronjob/pi --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create namespace" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create ns bar --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'bar:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create namespace" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create rolebinding foo --clusterrole=myclusterrole --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create role" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create role --dry-run --template="{{ .metadata.name }}:" --verb get myrole --resource pods)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'myrole:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create quota" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create quota foo --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create priorityclass" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create priorityclass foo --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create poddisruptionbudget" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create poddisruptionbudget foo --dry-run --selector=foo --min-available=1 --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create serviceaccount" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create serviceaccount foo --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "set env" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" set env pod/valid-pod --dry-run A=B --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'valid-pod:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "set image" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" set image pod/valid-pod --dry-run kubernetes-serve-hostname=nginx --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'valid-pod:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "set resources" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" set resources pod/valid-pod --limits=memory=256Mi --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'valid-pod:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "set selector" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" set selector -f hack/testdata/kubernetes-service.yaml A=B --local --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'kubernetes:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "set serviceaccount" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" set serviceaccount pod/valid-pod deployer --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'valid-pod:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "set subject" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" set subject clusterrolebinding/foo --user=foo --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create secret docker-registry" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create secret docker-registry foo --docker-username user --docker-password pass --docker-email foo@bar.baz --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create secret generic" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create secret generic foo --from-literal=key1=value1 --dry-run --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create secret tls" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create secret tls --dry-run foo --key=hack/testdata/tls.key --cert=hack/testdata/tls.crt --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create service clusterip" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create service clusterip foo --dry-run --tcp=8080 --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create service externalname" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create service externalname foo --dry-run --external-name=bar --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create service loadbalancer" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create service loadbalancer foo --dry-run --tcp=8080 --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "create service nodeport" command supports --template output
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create service nodeport foo --dry-run --tcp=8080 --template="{{ .metadata.name }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'foo:'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "config view" ouputs "yaml" as its default output format
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" config view)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'kind: Config'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that "config view" command supports --template output
 | 
				
			||||||
 | 
					  # and that commands that set a default output (yaml in this case),
 | 
				
			||||||
 | 
					  # default to "go-template" as their output format when a --template
 | 
				
			||||||
 | 
					  # value is provided, but no explicit --output format is given.
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" config view --template="{{ .kind }}:")
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'Config'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # check that running a command with both a --template flag and a
 | 
				
			||||||
 | 
					  # non-template --output prefers the non-template output value
 | 
				
			||||||
 | 
					  output_message=$(kubectl "${kube_flags[@]}" create configmap cm --dry-run --template="{{ .metadata.name }}:" --output yaml)
 | 
				
			||||||
 | 
					  kube::test::if_has_string "${output_message}" 'kind: ConfigMap'
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # cleanup
 | 
				
			||||||
 | 
					  kubectl delete cronjob pi "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl delete pods --all "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl delete rc cassandra "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl delete clusterrole myclusterrole "${kube_flags[@]}"
 | 
				
			||||||
 | 
					  kubectl delete clusterrolebinding foo "${kube_flags[@]}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										69
									
								
								test/cmd/version.sh
									
									
									
									
									
										Executable file
									
								
							
							
						
						
									
										69
									
								
								test/cmd/version.sh
									
									
									
									
									
										Executable file
									
								
							@@ -0,0 +1,69 @@
 | 
				
			|||||||
 | 
					#!/usr/bin/env bash
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Copyright 2018 The Kubernetes Authors.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Licensed under the Apache License, Version 2.0 (the "License");
 | 
				
			||||||
 | 
					# you may not use this file except in compliance with the License.
 | 
				
			||||||
 | 
					# You may obtain a copy of the License at
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					#     http://www.apache.org/licenses/LICENSE-2.0
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# Unless required by applicable law or agreed to in writing, software
 | 
				
			||||||
 | 
					# distributed under the License is distributed on an "AS IS" BASIS,
 | 
				
			||||||
 | 
					# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
				
			||||||
 | 
					# See the License for the specific language governing permissions and
 | 
				
			||||||
 | 
					# limitations under the License.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set -o errexit
 | 
				
			||||||
 | 
					set -o nounset
 | 
				
			||||||
 | 
					set -o pipefail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					########################################################
 | 
				
			||||||
 | 
					# Kubectl version (--short, --client, --output) #
 | 
				
			||||||
 | 
					########################################################
 | 
				
			||||||
 | 
					run_kubectl_version_tests() {
 | 
				
			||||||
 | 
					  set -o nounset
 | 
				
			||||||
 | 
					  set -o errexit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl version"
 | 
				
			||||||
 | 
					  TEMP="${KUBE_TEMP}"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kubectl get "${kube_flags[@]}" --raw /version
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  # create version files, one for the client, one for the server.
 | 
				
			||||||
 | 
					  # these are the files we will use to ensure that the remainder output is correct
 | 
				
			||||||
 | 
					  kube::test::version::object_to_file "Client" "" "${TEMP}/client_version_test"
 | 
				
			||||||
 | 
					  kube::test::version::object_to_file "Server" "" "${TEMP}/server_version_test"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl version: check client only output matches expected output"
 | 
				
			||||||
 | 
					  kube::test::version::object_to_file "Client" "--client" "${TEMP}/client_only_version_test"
 | 
				
			||||||
 | 
					  kube::test::version::object_to_file "Client" "--client" "${TEMP}/server_client_only_version_test"
 | 
				
			||||||
 | 
					  kube::test::version::diff_assert "${TEMP}/client_version_test" "eq" "${TEMP}/client_only_version_test" "the flag '--client' shows correct client info"
 | 
				
			||||||
 | 
					  kube::test::version::diff_assert "${TEMP}/server_version_test" "ne" "${TEMP}/server_client_only_version_test" "the flag '--client' correctly has no server version info"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl version: verify json output"
 | 
				
			||||||
 | 
					  kube::test::version::json_client_server_object_to_file "" "clientVersion" "${TEMP}/client_json_version_test"
 | 
				
			||||||
 | 
					  kube::test::version::json_client_server_object_to_file "" "serverVersion" "${TEMP}/server_json_version_test"
 | 
				
			||||||
 | 
					  kube::test::version::diff_assert "${TEMP}/client_version_test" "eq" "${TEMP}/client_json_version_test" "--output json has correct client info"
 | 
				
			||||||
 | 
					  kube::test::version::diff_assert "${TEMP}/server_version_test" "eq" "${TEMP}/server_json_version_test" "--output json has correct server info"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl version: verify json output using additional --client flag does not contain serverVersion"
 | 
				
			||||||
 | 
					  kube::test::version::json_client_server_object_to_file "--client" "clientVersion" "${TEMP}/client_only_json_version_test"
 | 
				
			||||||
 | 
					  kube::test::version::json_client_server_object_to_file "--client" "serverVersion" "${TEMP}/server_client_only_json_version_test"
 | 
				
			||||||
 | 
					  kube::test::version::diff_assert "${TEMP}/client_version_test" "eq" "${TEMP}/client_only_json_version_test" "--client --output json has correct client info"
 | 
				
			||||||
 | 
					  kube::test::version::diff_assert "${TEMP}/server_version_test" "ne" "${TEMP}/server_client_only_json_version_test" "--client --output json has no server info"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl version: compare json output using additional --short flag"
 | 
				
			||||||
 | 
					  kube::test::version::json_client_server_object_to_file "--short" "clientVersion" "${TEMP}/client_short_json_version_test"
 | 
				
			||||||
 | 
					  kube::test::version::json_client_server_object_to_file "--short" "serverVersion" "${TEMP}/server_short_json_version_test"
 | 
				
			||||||
 | 
					  kube::test::version::diff_assert "${TEMP}/client_version_test" "eq" "${TEMP}/client_short_json_version_test" "--short --output client json info is equal to non short result"
 | 
				
			||||||
 | 
					  kube::test::version::diff_assert "${TEMP}/server_version_test" "eq" "${TEMP}/server_short_json_version_test" "--short --output server json info is equal to non short result"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  kube::log::status "Testing kubectl version: compare json output with yaml output"
 | 
				
			||||||
 | 
					  kube::test::version::json_object_to_file "" "${TEMP}/client_server_json_version_test"
 | 
				
			||||||
 | 
					  kube::test::version::yaml_object_to_file "" "${TEMP}/client_server_yaml_version_test"
 | 
				
			||||||
 | 
					  kube::test::version::diff_assert "${TEMP}/client_server_json_version_test" "eq" "${TEMP}/client_server_yaml_version_test" "--output json/yaml has identical information"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  set +o nounset
 | 
				
			||||||
 | 
					  set +o errexit
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
		Reference in New Issue
	
	Block a user