mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			143 lines
		
	
	
		
			5.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			143 lines
		
	
	
		
			5.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2016 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package configmap
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"testing"
 | 
						|
	"time"
 | 
						|
 | 
						|
	federationapi "k8s.io/kubernetes/federation/apis/federation/v1beta1"
 | 
						|
	fakefedclientset "k8s.io/kubernetes/federation/client/clientset_generated/federation_clientset/fake"
 | 
						|
	"k8s.io/kubernetes/federation/pkg/federation-controller/util"
 | 
						|
	. "k8s.io/kubernetes/federation/pkg/federation-controller/util/test"
 | 
						|
	apiv1 "k8s.io/kubernetes/pkg/api/v1"
 | 
						|
	kubeclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
 | 
						|
	fakekubeclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/fake"
 | 
						|
	"k8s.io/kubernetes/pkg/runtime"
 | 
						|
	"k8s.io/kubernetes/pkg/types"
 | 
						|
	"k8s.io/kubernetes/pkg/util/wait"
 | 
						|
 | 
						|
	"github.com/stretchr/testify/assert"
 | 
						|
)
 | 
						|
 | 
						|
func TestConfigMapController(t *testing.T) {
 | 
						|
	cluster1 := NewCluster("cluster1", apiv1.ConditionTrue)
 | 
						|
	cluster2 := NewCluster("cluster2", apiv1.ConditionTrue)
 | 
						|
 | 
						|
	fakeClient := &fakefedclientset.Clientset{}
 | 
						|
	RegisterFakeList("clusters", &fakeClient.Fake, &federationapi.ClusterList{Items: []federationapi.Cluster{*cluster1}})
 | 
						|
	RegisterFakeList("configmaps", &fakeClient.Fake, &apiv1.ConfigMapList{Items: []apiv1.ConfigMap{}})
 | 
						|
	configmapWatch := RegisterFakeWatch("configmaps", &fakeClient.Fake)
 | 
						|
	clusterWatch := RegisterFakeWatch("clusters", &fakeClient.Fake)
 | 
						|
 | 
						|
	cluster1Client := &fakekubeclientset.Clientset{}
 | 
						|
	cluster1Watch := RegisterFakeWatch("configmaps", &cluster1Client.Fake)
 | 
						|
	RegisterFakeList("configmaps", &cluster1Client.Fake, &apiv1.ConfigMapList{Items: []apiv1.ConfigMap{}})
 | 
						|
	cluster1CreateChan := RegisterFakeCopyOnCreate("configmaps", &cluster1Client.Fake, cluster1Watch)
 | 
						|
	cluster1UpdateChan := RegisterFakeCopyOnUpdate("configmaps", &cluster1Client.Fake, cluster1Watch)
 | 
						|
 | 
						|
	cluster2Client := &fakekubeclientset.Clientset{}
 | 
						|
	cluster2Watch := RegisterFakeWatch("configmaps", &cluster2Client.Fake)
 | 
						|
	RegisterFakeList("configmaps", &cluster2Client.Fake, &apiv1.ConfigMapList{Items: []apiv1.ConfigMap{}})
 | 
						|
	cluster2CreateChan := RegisterFakeCopyOnCreate("configmaps", &cluster2Client.Fake, cluster2Watch)
 | 
						|
 | 
						|
	configmapController := NewConfigMapController(fakeClient)
 | 
						|
	informer := ToFederatedInformerForTestOnly(configmapController.configmapFederatedInformer)
 | 
						|
	informer.SetClientFactory(func(cluster *federationapi.Cluster) (kubeclientset.Interface, error) {
 | 
						|
		switch cluster.Name {
 | 
						|
		case cluster1.Name:
 | 
						|
			return cluster1Client, nil
 | 
						|
		case cluster2.Name:
 | 
						|
			return cluster2Client, nil
 | 
						|
		default:
 | 
						|
			return nil, fmt.Errorf("Unknown cluster")
 | 
						|
		}
 | 
						|
	})
 | 
						|
 | 
						|
	configmapController.clusterAvailableDelay = time.Second
 | 
						|
	configmapController.configmapReviewDelay = 50 * time.Millisecond
 | 
						|
	configmapController.smallDelay = 20 * time.Millisecond
 | 
						|
	configmapController.updateTimeout = 5 * time.Second
 | 
						|
 | 
						|
	stop := make(chan struct{})
 | 
						|
	configmapController.Run(stop)
 | 
						|
 | 
						|
	configmap1 := &apiv1.ConfigMap{
 | 
						|
		ObjectMeta: apiv1.ObjectMeta{
 | 
						|
			Name:      "test-configmap",
 | 
						|
			Namespace: "ns",
 | 
						|
			SelfLink:  "/api/v1/namespaces/ns/configmaps/test-configmap",
 | 
						|
		},
 | 
						|
		Data: map[string]string{
 | 
						|
			"A": "ala ma kota",
 | 
						|
			"B": "quick brown fox",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	// Test add federated configmap.
 | 
						|
	configmapWatch.Add(configmap1)
 | 
						|
	createdConfigMap := GetConfigMapFromChan(cluster1CreateChan)
 | 
						|
	assert.NotNil(t, createdConfigMap)
 | 
						|
	assert.Equal(t, configmap1.Namespace, createdConfigMap.Namespace)
 | 
						|
	assert.Equal(t, configmap1.Name, createdConfigMap.Name)
 | 
						|
	assert.True(t, util.ConfigMapEquivalent(configmap1, createdConfigMap))
 | 
						|
 | 
						|
	// Wait for the configmap to appear in the informer store
 | 
						|
	err := WaitForStoreUpdate(
 | 
						|
		configmapController.configmapFederatedInformer.GetTargetStore(),
 | 
						|
		cluster1.Name, types.NamespacedName{Namespace: configmap1.Namespace, Name: configmap1.Name}.String(), wait.ForeverTestTimeout)
 | 
						|
	assert.Nil(t, err, "configmap should have appeared in the informer store")
 | 
						|
 | 
						|
	// Test update federated configmap.
 | 
						|
	configmap1.Annotations = map[string]string{
 | 
						|
		"A": "B",
 | 
						|
	}
 | 
						|
	configmapWatch.Modify(configmap1)
 | 
						|
	updatedConfigMap := GetConfigMapFromChan(cluster1UpdateChan)
 | 
						|
	assert.NotNil(t, updatedConfigMap)
 | 
						|
	assert.Equal(t, configmap1.Name, updatedConfigMap.Name)
 | 
						|
	assert.Equal(t, configmap1.Namespace, updatedConfigMap.Namespace)
 | 
						|
	assert.True(t, util.ConfigMapEquivalent(configmap1, updatedConfigMap))
 | 
						|
 | 
						|
	// Test update federated configmap.
 | 
						|
	configmap1.Data = map[string]string{
 | 
						|
		"config": "myconfigurationfile",
 | 
						|
	}
 | 
						|
	configmapWatch.Modify(configmap1)
 | 
						|
	updatedConfigMap2 := GetConfigMapFromChan(cluster1UpdateChan)
 | 
						|
	assert.NotNil(t, updatedConfigMap)
 | 
						|
	assert.Equal(t, configmap1.Name, updatedConfigMap.Name)
 | 
						|
	assert.Equal(t, configmap1.Namespace, updatedConfigMap.Namespace)
 | 
						|
	assert.True(t, util.ConfigMapEquivalent(configmap1, updatedConfigMap2))
 | 
						|
 | 
						|
	// Test add cluster
 | 
						|
	clusterWatch.Add(cluster2)
 | 
						|
	createdConfigMap2 := GetConfigMapFromChan(cluster2CreateChan)
 | 
						|
	assert.NotNil(t, createdConfigMap2)
 | 
						|
	assert.Equal(t, configmap1.Name, createdConfigMap2.Name)
 | 
						|
	assert.Equal(t, configmap1.Namespace, createdConfigMap2.Namespace)
 | 
						|
	assert.True(t, util.ConfigMapEquivalent(configmap1, createdConfigMap2))
 | 
						|
 | 
						|
	close(stop)
 | 
						|
}
 | 
						|
 | 
						|
func GetConfigMapFromChan(c chan runtime.Object) *apiv1.ConfigMap {
 | 
						|
	configmap := GetObjectFromChan(c).(*apiv1.ConfigMap)
 | 
						|
	return configmap
 | 
						|
}
 |