mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-10-31 02:08:13 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			189 lines
		
	
	
		
			7.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			189 lines
		
	
	
		
			7.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2016 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package namespace
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/apimachinery/pkg/runtime"
 | |
| 	"k8s.io/apimachinery/pkg/util/wait"
 | |
| 	"k8s.io/client-go/dynamic"
 | |
| 	restclient "k8s.io/client-go/rest"
 | |
| 	core "k8s.io/client-go/testing"
 | |
| 	federationapi "k8s.io/kubernetes/federation/apis/federation/v1beta1"
 | |
| 	fakefedclientset "k8s.io/kubernetes/federation/client/clientset_generated/federation_clientset/fake"
 | |
| 	"k8s.io/kubernetes/federation/pkg/federation-controller/util"
 | |
| 	"k8s.io/kubernetes/federation/pkg/federation-controller/util/deletionhelper"
 | |
| 	. "k8s.io/kubernetes/federation/pkg/federation-controller/util/test"
 | |
| 	apiv1 "k8s.io/kubernetes/pkg/api/v1"
 | |
| 	kubeclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
 | |
| 	fakekubeclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/fake"
 | |
| 
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	namespaces string = "namespaces"
 | |
| 	clusters   string = "clusters"
 | |
| )
 | |
| 
 | |
| func TestNamespaceController(t *testing.T) {
 | |
| 	cluster1 := NewCluster("cluster1", apiv1.ConditionTrue)
 | |
| 	cluster2 := NewCluster("cluster2", apiv1.ConditionTrue)
 | |
| 	ns1 := apiv1.Namespace{
 | |
| 		ObjectMeta: metav1.ObjectMeta{
 | |
| 			Name:     "test-namespace",
 | |
| 			SelfLink: "/api/v1/namespaces/test-namespace",
 | |
| 		},
 | |
| 		Spec: apiv1.NamespaceSpec{
 | |
| 			Finalizers: []apiv1.FinalizerName{apiv1.FinalizerKubernetes},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	fakeClient := &fakefedclientset.Clientset{}
 | |
| 	RegisterFakeList(clusters, &fakeClient.Fake, &federationapi.ClusterList{Items: []federationapi.Cluster{*cluster1}})
 | |
| 	RegisterFakeList(namespaces, &fakeClient.Fake, &apiv1.NamespaceList{Items: []apiv1.Namespace{}})
 | |
| 	namespaceWatch := RegisterFakeWatch(namespaces, &fakeClient.Fake)
 | |
| 	namespaceCreateChan := RegisterFakeCopyOnCreate(namespaces, &fakeClient.Fake, namespaceWatch)
 | |
| 	clusterWatch := RegisterFakeWatch(clusters, &fakeClient.Fake)
 | |
| 
 | |
| 	cluster1Client := &fakekubeclientset.Clientset{}
 | |
| 	cluster1Watch := RegisterFakeWatch(namespaces, &cluster1Client.Fake)
 | |
| 	RegisterFakeList(namespaces, &cluster1Client.Fake, &apiv1.NamespaceList{Items: []apiv1.Namespace{}})
 | |
| 	cluster1CreateChan := RegisterFakeCopyOnCreate(namespaces, &cluster1Client.Fake, cluster1Watch)
 | |
| 	cluster1UpdateChan := RegisterFakeCopyOnUpdate(namespaces, &cluster1Client.Fake, cluster1Watch)
 | |
| 
 | |
| 	cluster2Client := &fakekubeclientset.Clientset{}
 | |
| 	cluster2Watch := RegisterFakeWatch(namespaces, &cluster2Client.Fake)
 | |
| 	RegisterFakeList(namespaces, &cluster2Client.Fake, &apiv1.NamespaceList{Items: []apiv1.Namespace{}})
 | |
| 	cluster2CreateChan := RegisterFakeCopyOnCreate(namespaces, &cluster2Client.Fake, cluster2Watch)
 | |
| 
 | |
| 	nsDeleteChan := RegisterDelete(&fakeClient.Fake, namespaces)
 | |
| 	namespaceController := NewNamespaceController(fakeClient, dynamic.NewDynamicClientPool(&restclient.Config{}))
 | |
| 	informerClientFactory := func(cluster *federationapi.Cluster) (kubeclientset.Interface, error) {
 | |
| 		switch cluster.Name {
 | |
| 		case cluster1.Name:
 | |
| 			return cluster1Client, nil
 | |
| 		case cluster2.Name:
 | |
| 			return cluster2Client, nil
 | |
| 		default:
 | |
| 			return nil, fmt.Errorf("Unknown cluster")
 | |
| 		}
 | |
| 	}
 | |
| 	setClientFactory(namespaceController.namespaceFederatedInformer, informerClientFactory)
 | |
| 	namespaceController.clusterAvailableDelay = time.Second
 | |
| 	namespaceController.namespaceReviewDelay = 50 * time.Millisecond
 | |
| 	namespaceController.smallDelay = 20 * time.Millisecond
 | |
| 	namespaceController.updateTimeout = 5 * time.Second
 | |
| 
 | |
| 	stop := make(chan struct{})
 | |
| 	namespaceController.Run(stop)
 | |
| 
 | |
| 	// Test add federated namespace.
 | |
| 	namespaceWatch.Add(&ns1)
 | |
| 	// Verify that the DeleteFromUnderlyingClusters finalizer is added to the namespace.
 | |
| 	// Note: finalize invokes the create action in Fake client.
 | |
| 	// TODO: Seems like a bug. Should invoke update. Fix it.
 | |
| 	updatedNamespace := GetNamespaceFromChan(namespaceCreateChan)
 | |
| 	assert.True(t, namespaceController.hasFinalizerFunc(updatedNamespace, deletionhelper.FinalizerDeleteFromUnderlyingClusters))
 | |
| 	ns1 = *updatedNamespace
 | |
| 
 | |
| 	// Verify that the namespace is created in underlying cluster1.
 | |
| 	createdNamespace := GetNamespaceFromChan(cluster1CreateChan)
 | |
| 	assert.NotNil(t, createdNamespace)
 | |
| 	assert.Equal(t, ns1.Name, createdNamespace.Name)
 | |
| 
 | |
| 	// Wait for the namespace to appear in the informer store
 | |
| 	err := WaitForStoreUpdate(
 | |
| 		namespaceController.namespaceFederatedInformer.GetTargetStore(),
 | |
| 		cluster1.Name, ns1.Name, wait.ForeverTestTimeout)
 | |
| 	assert.Nil(t, err, "namespace should have appeared in the informer store")
 | |
| 
 | |
| 	// Test update federated namespace.
 | |
| 	ns1.Annotations = map[string]string{
 | |
| 		"A": "B",
 | |
| 	}
 | |
| 	namespaceWatch.Modify(&ns1)
 | |
| 	assert.NoError(t, CheckObjectFromChan(cluster1UpdateChan, MetaAndSpecCheckingFunction(&ns1)))
 | |
| 
 | |
| 	// Test add cluster
 | |
| 	clusterWatch.Add(cluster2)
 | |
| 	createdNamespace2 := GetNamespaceFromChan(cluster2CreateChan)
 | |
| 	assert.NotNil(t, createdNamespace2)
 | |
| 	assert.Equal(t, ns1.Name, createdNamespace2.Name)
 | |
| 	assert.Contains(t, createdNamespace2.Annotations, "A")
 | |
| 
 | |
| 	// Delete the namespace with orphan finalizer (let namespaces
 | |
| 	// in underlying clusters be as is).
 | |
| 	// TODO: Add a test without orphan finalizer.
 | |
| 	ns1.ObjectMeta.Finalizers = append(ns1.ObjectMeta.Finalizers, metav1.FinalizerOrphanDependents)
 | |
| 	ns1.DeletionTimestamp = &metav1.Time{Time: time.Now()}
 | |
| 	namespaceWatch.Modify(&ns1)
 | |
| 	assert.Equal(t, ns1.Name, GetStringFromChan(nsDeleteChan))
 | |
| 	// TODO: Add a test for verifying that resources in the namespace are deleted
 | |
| 	// when the namespace is deleted.
 | |
| 	// Need a fake dynamic client to mock list and delete actions to be able to test this.
 | |
| 	// TODO: Add a fake dynamic client and test this.
 | |
| 	// In the meantime, e2e test verify that the resources in a namespace are
 | |
| 	// deleted when the namespace is deleted.
 | |
| 	close(stop)
 | |
| }
 | |
| 
 | |
| func setClientFactory(informer util.FederatedInformer, informerClientFactory func(*federationapi.Cluster) (kubeclientset.Interface, error)) {
 | |
| 	testInformer := ToFederatedInformerForTestOnly(informer)
 | |
| 	testInformer.SetClientFactory(informerClientFactory)
 | |
| }
 | |
| 
 | |
| func RegisterDeleteCollection(client *core.Fake, resource string) chan string {
 | |
| 	deleteChan := make(chan string, 100)
 | |
| 	client.AddReactor("delete-collection", resource, func(action core.Action) (bool, runtime.Object, error) {
 | |
| 		deleteChan <- "all"
 | |
| 		return true, nil, nil
 | |
| 	})
 | |
| 	return deleteChan
 | |
| }
 | |
| 
 | |
| func RegisterDelete(client *core.Fake, resource string) chan string {
 | |
| 	deleteChan := make(chan string, 100)
 | |
| 	client.AddReactor("delete", resource, func(action core.Action) (bool, runtime.Object, error) {
 | |
| 		deleteAction := action.(core.DeleteAction)
 | |
| 		deleteChan <- deleteAction.GetName()
 | |
| 		return true, nil, nil
 | |
| 	})
 | |
| 	return deleteChan
 | |
| }
 | |
| 
 | |
| func GetStringFromChan(c chan string) string {
 | |
| 	select {
 | |
| 	case str := <-c:
 | |
| 		return str
 | |
| 	case <-time.After(5 * time.Second):
 | |
| 		return "timedout"
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func GetNamespaceFromChan(c chan runtime.Object) *apiv1.Namespace {
 | |
| 	if namespace := GetObjectFromChan(c); namespace == nil {
 | |
| 		return nil
 | |
| 	} else {
 | |
| 		return namespace.(*apiv1.Namespace)
 | |
| 	}
 | |
| }
 | 
