mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-10-31 10:18:13 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			462 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			462 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2014 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package examples_test
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"io/ioutil"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 	"regexp"
 | |
| 	"strings"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/golang/glog"
 | |
| 	"k8s.io/kubernetes/pkg/api"
 | |
| 	"k8s.io/kubernetes/pkg/api/testapi"
 | |
| 	"k8s.io/kubernetes/pkg/api/validation"
 | |
| 	"k8s.io/kubernetes/pkg/apis/apps"
 | |
| 	appsvalidation "k8s.io/kubernetes/pkg/apis/apps/validation"
 | |
| 	"k8s.io/kubernetes/pkg/apis/batch"
 | |
| 	"k8s.io/kubernetes/pkg/apis/extensions"
 | |
| 	expvalidation "k8s.io/kubernetes/pkg/apis/extensions/validation"
 | |
| 	"k8s.io/kubernetes/pkg/capabilities"
 | |
| 	"k8s.io/kubernetes/pkg/registry/batch/job"
 | |
| 	"k8s.io/kubernetes/pkg/runtime"
 | |
| 	"k8s.io/kubernetes/pkg/types"
 | |
| 	"k8s.io/kubernetes/pkg/util/validation/field"
 | |
| 	"k8s.io/kubernetes/pkg/util/yaml"
 | |
| 	schedulerapi "k8s.io/kubernetes/plugin/pkg/scheduler/api"
 | |
| 	schedulerapilatest "k8s.io/kubernetes/plugin/pkg/scheduler/api/latest"
 | |
| )
 | |
| 
 | |
| func validateObject(obj runtime.Object) (errors field.ErrorList) {
 | |
| 	switch t := obj.(type) {
 | |
| 	case *api.ReplicationController:
 | |
| 		if t.Namespace == "" {
 | |
| 			t.Namespace = api.NamespaceDefault
 | |
| 		}
 | |
| 		errors = validation.ValidateReplicationController(t)
 | |
| 	case *api.ReplicationControllerList:
 | |
| 		for i := range t.Items {
 | |
| 			errors = append(errors, validateObject(&t.Items[i])...)
 | |
| 		}
 | |
| 	case *api.Service:
 | |
| 		if t.Namespace == "" {
 | |
| 			t.Namespace = api.NamespaceDefault
 | |
| 		}
 | |
| 		errors = validation.ValidateService(t)
 | |
| 	case *api.ServiceList:
 | |
| 		for i := range t.Items {
 | |
| 			errors = append(errors, validateObject(&t.Items[i])...)
 | |
| 		}
 | |
| 	case *api.Pod:
 | |
| 		if t.Namespace == "" {
 | |
| 			t.Namespace = api.NamespaceDefault
 | |
| 		}
 | |
| 		errors = validation.ValidatePod(t)
 | |
| 	case *api.PodList:
 | |
| 		for i := range t.Items {
 | |
| 			errors = append(errors, validateObject(&t.Items[i])...)
 | |
| 		}
 | |
| 	case *api.PersistentVolume:
 | |
| 		errors = validation.ValidatePersistentVolume(t)
 | |
| 	case *api.PersistentVolumeClaim:
 | |
| 		if t.Namespace == "" {
 | |
| 			t.Namespace = api.NamespaceDefault
 | |
| 		}
 | |
| 		errors = validation.ValidatePersistentVolumeClaim(t)
 | |
| 	case *api.PodTemplate:
 | |
| 		if t.Namespace == "" {
 | |
| 			t.Namespace = api.NamespaceDefault
 | |
| 		}
 | |
| 		errors = validation.ValidatePodTemplate(t)
 | |
| 	case *api.Endpoints:
 | |
| 		if t.Namespace == "" {
 | |
| 			t.Namespace = api.NamespaceDefault
 | |
| 		}
 | |
| 		errors = validation.ValidateEndpoints(t)
 | |
| 	case *api.Namespace:
 | |
| 		errors = validation.ValidateNamespace(t)
 | |
| 	case *api.Secret:
 | |
| 		if t.Namespace == "" {
 | |
| 			t.Namespace = api.NamespaceDefault
 | |
| 		}
 | |
| 		errors = validation.ValidateSecret(t)
 | |
| 	case *api.LimitRange:
 | |
| 		if t.Namespace == "" {
 | |
| 			t.Namespace = api.NamespaceDefault
 | |
| 		}
 | |
| 		errors = validation.ValidateLimitRange(t)
 | |
| 	case *api.ResourceQuota:
 | |
| 		if t.Namespace == "" {
 | |
| 			t.Namespace = api.NamespaceDefault
 | |
| 		}
 | |
| 		errors = validation.ValidateResourceQuota(t)
 | |
| 	case *extensions.Deployment:
 | |
| 		if t.Namespace == "" {
 | |
| 			t.Namespace = api.NamespaceDefault
 | |
| 		}
 | |
| 		errors = expvalidation.ValidateDeployment(t)
 | |
| 	case *batch.Job:
 | |
| 		if t.Namespace == "" {
 | |
| 			t.Namespace = api.NamespaceDefault
 | |
| 		}
 | |
| 		// Job needs generateSelector called before validation, and job.Validate does this.
 | |
| 		// See: https://github.com/kubernetes/kubernetes/issues/20951#issuecomment-187787040
 | |
| 		t.ObjectMeta.UID = types.UID("fakeuid")
 | |
| 		errors = job.Strategy.Validate(nil, t)
 | |
| 	case *extensions.Ingress:
 | |
| 		if t.Namespace == "" {
 | |
| 			t.Namespace = api.NamespaceDefault
 | |
| 		}
 | |
| 		errors = expvalidation.ValidateIngress(t)
 | |
| 	case *extensions.DaemonSet:
 | |
| 		if t.Namespace == "" {
 | |
| 			t.Namespace = api.NamespaceDefault
 | |
| 		}
 | |
| 		errors = expvalidation.ValidateDaemonSet(t)
 | |
| 	case *apps.StatefulSet:
 | |
| 		if t.Namespace == "" {
 | |
| 			t.Namespace = api.NamespaceDefault
 | |
| 		}
 | |
| 		errors = appsvalidation.ValidateStatefulSet(t)
 | |
| 	default:
 | |
| 		errors = field.ErrorList{}
 | |
| 		errors = append(errors, field.InternalError(field.NewPath(""), fmt.Errorf("no validation defined for %#v", obj)))
 | |
| 	}
 | |
| 	return errors
 | |
| }
 | |
| 
 | |
| func walkJSONFiles(inDir string, fn func(name, path string, data []byte)) error {
 | |
| 	return filepath.Walk(inDir, func(path string, info os.FileInfo, err error) error {
 | |
| 		if err != nil {
 | |
| 			return err
 | |
| 		}
 | |
| 
 | |
| 		if info.IsDir() && path != inDir {
 | |
| 			return filepath.SkipDir
 | |
| 		}
 | |
| 
 | |
| 		file := filepath.Base(path)
 | |
| 		if ext := filepath.Ext(file); ext == ".json" || ext == ".yaml" {
 | |
| 			glog.Infof("Testing %s", path)
 | |
| 			data, err := ioutil.ReadFile(path)
 | |
| 			if err != nil {
 | |
| 				return err
 | |
| 			}
 | |
| 			name := strings.TrimSuffix(file, ext)
 | |
| 
 | |
| 			if ext == ".yaml" {
 | |
| 				out, err := yaml.ToJSON(data)
 | |
| 				if err != nil {
 | |
| 					return fmt.Errorf("%s: %v", path, err)
 | |
| 				}
 | |
| 				data = out
 | |
| 			}
 | |
| 
 | |
| 			fn(name, path, data)
 | |
| 		}
 | |
| 		return nil
 | |
| 	})
 | |
| }
 | |
| 
 | |
| func TestExampleObjectSchemas(t *testing.T) {
 | |
| 	cases := map[string]map[string]runtime.Object{
 | |
| 		"../examples/guestbook": {
 | |
| 			"frontend-deployment":     &extensions.Deployment{},
 | |
| 			"redis-slave-deployment":  &extensions.Deployment{},
 | |
| 			"redis-master-deployment": &extensions.Deployment{},
 | |
| 			"frontend-service":        &api.Service{},
 | |
| 			"redis-master-service":    &api.Service{},
 | |
| 			"redis-slave-service":     &api.Service{},
 | |
| 		},
 | |
| 		"../examples/guestbook/legacy": {
 | |
| 			"frontend-controller":     &api.ReplicationController{},
 | |
| 			"redis-slave-controller":  &api.ReplicationController{},
 | |
| 			"redis-master-controller": &api.ReplicationController{},
 | |
| 		},
 | |
| 		"../examples/guestbook-go": {
 | |
| 			"guestbook-controller":    &api.ReplicationController{},
 | |
| 			"redis-slave-controller":  &api.ReplicationController{},
 | |
| 			"redis-master-controller": &api.ReplicationController{},
 | |
| 			"guestbook-service":       &api.Service{},
 | |
| 			"redis-master-service":    &api.Service{},
 | |
| 			"redis-slave-service":     &api.Service{},
 | |
| 		},
 | |
| 		"../examples/volumes/iscsi": {
 | |
| 			"iscsi": &api.Pod{},
 | |
| 		},
 | |
| 		"../examples/volumes/glusterfs": {
 | |
| 			"glusterfs-pod":       &api.Pod{},
 | |
| 			"glusterfs-endpoints": &api.Endpoints{},
 | |
| 			"glusterfs-service":   &api.Service{},
 | |
| 		},
 | |
| 		"../examples": {
 | |
| 			"scheduler-policy-config":               &schedulerapi.Policy{},
 | |
| 			"scheduler-policy-config-with-extender": &schedulerapi.Policy{},
 | |
| 		},
 | |
| 		"../examples/volumes/rbd/secret": {
 | |
| 			"ceph-secret": &api.Secret{},
 | |
| 		},
 | |
| 		"../examples/volumes/rbd": {
 | |
| 			"rbd":             &api.Pod{},
 | |
| 			"rbd-with-secret": &api.Pod{},
 | |
| 		},
 | |
| 		"../examples/storage/cassandra": {
 | |
| 			"cassandra-daemonset":  &extensions.DaemonSet{},
 | |
| 			"cassandra-controller": &api.ReplicationController{},
 | |
| 			"cassandra-service":    &api.Service{},
 | |
| 			"cassandra-petset":     &apps.StatefulSet{},
 | |
| 		},
 | |
| 		"../examples/cluster-dns": {
 | |
| 			"dns-backend-rc":      &api.ReplicationController{},
 | |
| 			"dns-backend-service": &api.Service{},
 | |
| 			"dns-frontend-pod":    &api.Pod{},
 | |
| 			"namespace-dev":       &api.Namespace{},
 | |
| 			"namespace-prod":      &api.Namespace{},
 | |
| 		},
 | |
| 		"../examples/elasticsearch": {
 | |
| 			"es-rc":           &api.ReplicationController{},
 | |
| 			"es-svc":          &api.Service{},
 | |
| 			"service-account": nil,
 | |
| 		},
 | |
| 		"../examples/explorer": {
 | |
| 			"pod": &api.Pod{},
 | |
| 		},
 | |
| 		"../examples/storage/hazelcast": {
 | |
| 			"hazelcast-controller": &api.ReplicationController{},
 | |
| 			"hazelcast-service":    &api.Service{},
 | |
| 		},
 | |
| 		"../examples/meteor": {
 | |
| 			"meteor-controller": &api.ReplicationController{},
 | |
| 			"meteor-service":    &api.Service{},
 | |
| 			"mongo-pod":         &api.Pod{},
 | |
| 			"mongo-service":     &api.Service{},
 | |
| 		},
 | |
| 		"../examples/mysql-wordpress-pd": {
 | |
| 			"gce-volumes":          &api.PersistentVolume{},
 | |
| 			"local-volumes":        &api.PersistentVolume{},
 | |
| 			"mysql-deployment":     &api.Service{},
 | |
| 			"wordpress-deployment": &api.Service{},
 | |
| 		},
 | |
| 		"../examples/volumes/nfs": {
 | |
| 			"nfs-busybox-rc":     &api.ReplicationController{},
 | |
| 			"nfs-server-rc":      &api.ReplicationController{},
 | |
| 			"nfs-server-service": &api.Service{},
 | |
| 			"nfs-pv":             &api.PersistentVolume{},
 | |
| 			"nfs-pvc":            &api.PersistentVolumeClaim{},
 | |
| 			"nfs-web-rc":         &api.ReplicationController{},
 | |
| 			"nfs-web-service":    &api.Service{},
 | |
| 		},
 | |
| 		"../examples/openshift-origin": {
 | |
| 			"openshift-origin-namespace": &api.Namespace{},
 | |
| 			"openshift-controller":       &api.ReplicationController{},
 | |
| 			"openshift-service":          &api.Service{},
 | |
| 			"etcd-controller":            &api.ReplicationController{},
 | |
| 			"etcd-service":               &api.Service{},
 | |
| 			"etcd-discovery-controller":  &api.ReplicationController{},
 | |
| 			"etcd-discovery-service":     &api.Service{},
 | |
| 			"secret":                     nil,
 | |
| 		},
 | |
| 		"../examples/phabricator": {
 | |
| 			"phabricator-controller": &api.ReplicationController{},
 | |
| 			"phabricator-service":    &api.Service{},
 | |
| 		},
 | |
| 		"../examples/storage/redis": {
 | |
| 			"redis-controller":          &api.ReplicationController{},
 | |
| 			"redis-master":              &api.Pod{},
 | |
| 			"redis-proxy":               &api.Pod{},
 | |
| 			"redis-sentinel-controller": &api.ReplicationController{},
 | |
| 			"redis-sentinel-service":    &api.Service{},
 | |
| 		},
 | |
| 		"../examples/storage/rethinkdb": {
 | |
| 			"admin-pod":      &api.Pod{},
 | |
| 			"admin-service":  &api.Service{},
 | |
| 			"driver-service": &api.Service{},
 | |
| 			"rc":             &api.ReplicationController{},
 | |
| 		},
 | |
| 		"../examples/spark": {
 | |
| 			"namespace-spark-cluster":   &api.Namespace{},
 | |
| 			"spark-master-controller":   &api.ReplicationController{},
 | |
| 			"spark-master-service":      &api.Service{},
 | |
| 			"spark-ui-proxy-controller": &api.ReplicationController{},
 | |
| 			"spark-ui-proxy-service":    &api.Service{},
 | |
| 			"spark-worker-controller":   &api.ReplicationController{},
 | |
| 			"zeppelin-controller":       &api.ReplicationController{},
 | |
| 			"zeppelin-service":          &api.Service{},
 | |
| 		},
 | |
| 		"../examples/spark/spark-gluster": {
 | |
| 			"spark-master-service":    &api.Service{},
 | |
| 			"spark-master-controller": &api.ReplicationController{},
 | |
| 			"spark-worker-controller": &api.ReplicationController{},
 | |
| 			"glusterfs-endpoints":     &api.Endpoints{},
 | |
| 		},
 | |
| 		"../examples/storm": {
 | |
| 			"storm-nimbus-service":    &api.Service{},
 | |
| 			"storm-nimbus":            &api.Pod{},
 | |
| 			"storm-worker-controller": &api.ReplicationController{},
 | |
| 			"zookeeper-service":       &api.Service{},
 | |
| 			"zookeeper":               &api.Pod{},
 | |
| 		},
 | |
| 		"../examples/volumes/cephfs/": {
 | |
| 			"cephfs":             &api.Pod{},
 | |
| 			"cephfs-with-secret": &api.Pod{},
 | |
| 		},
 | |
| 		"../examples/volumes/fibre_channel": {
 | |
| 			"fc": &api.Pod{},
 | |
| 		},
 | |
| 		"../examples/javaweb-tomcat-sidecar": {
 | |
| 			"javaweb":   &api.Pod{},
 | |
| 			"javaweb-2": &api.Pod{},
 | |
| 		},
 | |
| 		"../examples/volumes/azure_file": {
 | |
| 			"azure": &api.Pod{},
 | |
| 		},
 | |
| 		"../examples/volumes/azure_disk": {
 | |
| 			"azure": &api.Pod{},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	capabilities.SetForTests(capabilities.Capabilities{
 | |
| 		AllowPrivileged: true,
 | |
| 	})
 | |
| 
 | |
| 	for path, expected := range cases {
 | |
| 		tested := 0
 | |
| 		err := walkJSONFiles(path, func(name, path string, data []byte) {
 | |
| 			expectedType, found := expected[name]
 | |
| 			if !found {
 | |
| 				t.Errorf("%s: %s does not have a test case defined", path, name)
 | |
| 				return
 | |
| 			}
 | |
| 			tested++
 | |
| 			if expectedType == nil {
 | |
| 				t.Logf("skipping : %s/%s\n", path, name)
 | |
| 				return
 | |
| 			}
 | |
| 			if strings.Contains(name, "scheduler-policy-config") {
 | |
| 				if err := runtime.DecodeInto(schedulerapilatest.Codec, data, expectedType); err != nil {
 | |
| 					t.Errorf("%s did not decode correctly: %v\n%s", path, err, string(data))
 | |
| 					return
 | |
| 				}
 | |
| 				//TODO: Add validate method for &schedulerapi.Policy
 | |
| 			} else {
 | |
| 				codec, err := testapi.GetCodecForObject(expectedType)
 | |
| 				if err != nil {
 | |
| 					t.Errorf("Could not get codec for %s: %s", expectedType, err)
 | |
| 				}
 | |
| 				if err := runtime.DecodeInto(codec, data, expectedType); err != nil {
 | |
| 					t.Errorf("%s did not decode correctly: %v\n%s", path, err, string(data))
 | |
| 					return
 | |
| 				}
 | |
| 				if errors := validateObject(expectedType); len(errors) > 0 {
 | |
| 					t.Errorf("%s did not validate correctly: %v", path, errors)
 | |
| 				}
 | |
| 			}
 | |
| 		})
 | |
| 		if err != nil {
 | |
| 			t.Errorf("Expected no error, Got %v", err)
 | |
| 		}
 | |
| 		if tested != len(expected) {
 | |
| 			t.Errorf("Directory %v: Expected %d examples, Got %d", path, len(expected), tested)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // This regex is tricky, but it works.  For future me, here is the decode:
 | |
| //
 | |
| // Flags: (?ms) = multiline match, allow . to match \n
 | |
| // 1) Look for a line that starts with ``` (a markdown code block)
 | |
| // 2) (?: ... ) = non-capturing group
 | |
| // 3) (P<name>) = capture group as "name"
 | |
| // 4) Look for #1 followed by either:
 | |
| // 4a)    "yaml" followed by any word-characters followed by a newline (e.g. ```yamlfoo\n)
 | |
| // 4b)    "any word-characters followed by a newline (e.g. ```json\n)
 | |
| // 5) Look for either:
 | |
| // 5a)    #4a followed by one or more characters (non-greedy)
 | |
| // 5b)    #4b followed by { followed by one or more characters (non-greedy) followed by }
 | |
| // 6) Look for #5 followed by a newline followed by ``` (end of the code block)
 | |
| //
 | |
| // This could probably be simplified, but is already too delicate.  Before any
 | |
| // real changes, we should have a testscase that just tests this regex.
 | |
| var sampleRegexp = regexp.MustCompile("(?ms)^```(?:(?P<type>yaml)\\w*\\n(?P<content>.+?)|\\w*\\n(?P<content>\\{.+?\\}))\\n^```")
 | |
| var subsetRegexp = regexp.MustCompile("(?ms)\\.{3}")
 | |
| 
 | |
| func TestReadme(t *testing.T) {
 | |
| 	paths := []struct {
 | |
| 		file         string
 | |
| 		expectedType []runtime.Object
 | |
| 	}{
 | |
| 		{"../README.md", []runtime.Object{&api.Pod{}}},
 | |
| 		{"../examples/volumes/iscsi/README.md", []runtime.Object{&api.Pod{}}},
 | |
| 	}
 | |
| 
 | |
| 	for _, path := range paths {
 | |
| 		data, err := ioutil.ReadFile(path.file)
 | |
| 		if err != nil {
 | |
| 			t.Errorf("Unable to read file %s: %v", path, err)
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		matches := sampleRegexp.FindAllStringSubmatch(string(data), -1)
 | |
| 		if matches == nil {
 | |
| 			continue
 | |
| 		}
 | |
| 		ix := 0
 | |
| 		for _, match := range matches {
 | |
| 			var content, subtype string
 | |
| 			for i, name := range sampleRegexp.SubexpNames() {
 | |
| 				if name == "type" {
 | |
| 					subtype = match[i]
 | |
| 				}
 | |
| 				if name == "content" && match[i] != "" {
 | |
| 					content = match[i]
 | |
| 				}
 | |
| 			}
 | |
| 			if subtype == "yaml" && subsetRegexp.FindString(content) != "" {
 | |
| 				t.Logf("skipping (%s): \n%s", subtype, content)
 | |
| 				continue
 | |
| 			}
 | |
| 
 | |
| 			var expectedType runtime.Object
 | |
| 			if len(path.expectedType) == 1 {
 | |
| 				expectedType = path.expectedType[0]
 | |
| 			} else {
 | |
| 				expectedType = path.expectedType[ix]
 | |
| 				ix++
 | |
| 			}
 | |
| 			json, err := yaml.ToJSON([]byte(content))
 | |
| 			if err != nil {
 | |
| 				t.Errorf("%s could not be converted to JSON: %v\n%s", path, err, string(content))
 | |
| 			}
 | |
| 			if err := runtime.DecodeInto(testapi.Default.Codec(), json, expectedType); err != nil {
 | |
| 				t.Errorf("%s did not decode correctly: %v\n%s", path, err, string(content))
 | |
| 				continue
 | |
| 			}
 | |
| 			if errors := validateObject(expectedType); len(errors) > 0 {
 | |
| 				t.Errorf("%s did not validate correctly: %v", path, errors)
 | |
| 			}
 | |
| 			_, err = runtime.Encode(testapi.Default.Codec(), expectedType)
 | |
| 			if err != nil {
 | |
| 				t.Errorf("Could not encode object: %v", err)
 | |
| 				continue
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 | 
