mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-03 19:58:17 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			230 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			230 lines
		
	
	
		
			6.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2015 The Kubernetes Authors All rights reserved.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package app
 | 
						|
 | 
						|
import (
 | 
						|
	"reflect"
 | 
						|
	"regexp"
 | 
						|
	"strings"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"k8s.io/kubernetes/cmd/kube-apiserver/app/options"
 | 
						|
	"k8s.io/kubernetes/pkg/api"
 | 
						|
	"k8s.io/kubernetes/pkg/api/unversioned"
 | 
						|
	"k8s.io/kubernetes/pkg/apis/extensions"
 | 
						|
	"k8s.io/kubernetes/pkg/genericapiserver"
 | 
						|
	"k8s.io/kubernetes/pkg/master"
 | 
						|
	"k8s.io/kubernetes/pkg/runtime"
 | 
						|
	"k8s.io/kubernetes/pkg/storage"
 | 
						|
	etcdstorage "k8s.io/kubernetes/pkg/storage/etcd"
 | 
						|
)
 | 
						|
 | 
						|
func TestLongRunningRequestRegexp(t *testing.T) {
 | 
						|
	regexp := regexp.MustCompile(options.NewAPIServer().LongRunningRequestRE)
 | 
						|
	dontMatch := []string{
 | 
						|
		"/api/v1/watch-namespace/",
 | 
						|
		"/api/v1/namespace-proxy/",
 | 
						|
		"/api/v1/namespace-watch",
 | 
						|
		"/api/v1/namespace-proxy",
 | 
						|
		"/api/v1/namespace-portforward/pods",
 | 
						|
		"/api/v1/portforward/pods",
 | 
						|
		". anything",
 | 
						|
		"/ that",
 | 
						|
	}
 | 
						|
	doMatch := []string{
 | 
						|
		"/api/v1/pods/watch",
 | 
						|
		"/api/v1/watch/stuff",
 | 
						|
		"/api/v1/default/service/proxy",
 | 
						|
		"/api/v1/pods/proxy/path/to/thing",
 | 
						|
		"/api/v1/namespaces/myns/pods/mypod/log",
 | 
						|
		"/api/v1/namespaces/myns/pods/mypod/logs",
 | 
						|
		"/api/v1/namespaces/myns/pods/mypod/portforward",
 | 
						|
		"/api/v1/namespaces/myns/pods/mypod/exec",
 | 
						|
		"/api/v1/namespaces/myns/pods/mypod/attach",
 | 
						|
		"/api/v1/namespaces/myns/pods/mypod/log/",
 | 
						|
		"/api/v1/namespaces/myns/pods/mypod/logs/",
 | 
						|
		"/api/v1/namespaces/myns/pods/mypod/portforward/",
 | 
						|
		"/api/v1/namespaces/myns/pods/mypod/exec/",
 | 
						|
		"/api/v1/namespaces/myns/pods/mypod/attach/",
 | 
						|
		"/api/v1/watch/namespaces/myns/pods",
 | 
						|
	}
 | 
						|
	for _, path := range dontMatch {
 | 
						|
		if regexp.MatchString(path) {
 | 
						|
			t.Errorf("path should not have match regexp but did: %s", path)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	for _, path := range doMatch {
 | 
						|
		if !regexp.MatchString(path) {
 | 
						|
			t.Errorf("path should have match regexp did not: %s", path)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestUpdateEtcdOverrides(t *testing.T) {
 | 
						|
	storageVersions := map[string]string{
 | 
						|
		"":           "v1",
 | 
						|
		"extensions": "extensions/v1beta1",
 | 
						|
	}
 | 
						|
 | 
						|
	testCases := []struct {
 | 
						|
		apigroup string
 | 
						|
		resource string
 | 
						|
		servers  []string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			apigroup: api.GroupName,
 | 
						|
			resource: "resource",
 | 
						|
			servers:  []string{"http://127.0.0.1:10000"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			apigroup: api.GroupName,
 | 
						|
			resource: "resource",
 | 
						|
			servers:  []string{"http://127.0.0.1:10000", "http://127.0.0.1:20000"},
 | 
						|
		},
 | 
						|
		{
 | 
						|
			apigroup: extensions.GroupName,
 | 
						|
			resource: "resource",
 | 
						|
			servers:  []string{"http://127.0.0.1:10000"},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range testCases {
 | 
						|
		newEtcd := func(_ runtime.NegotiatedSerializer, _, _ string, etcdConfig etcdstorage.EtcdConfig) (storage.Interface, error) {
 | 
						|
			if !reflect.DeepEqual(test.servers, etcdConfig.ServerList) {
 | 
						|
				t.Errorf("unexpected server list, expected: %#v, got: %#v", test.servers, etcdConfig.ServerList)
 | 
						|
			}
 | 
						|
			return nil, nil
 | 
						|
		}
 | 
						|
		storageDestinations := genericapiserver.NewStorageDestinations()
 | 
						|
		override := test.apigroup + "/" + test.resource + "#" + strings.Join(test.servers, ";")
 | 
						|
		defaultEtcdConfig := etcdstorage.EtcdConfig{
 | 
						|
			Prefix:     genericapiserver.DefaultEtcdPathPrefix,
 | 
						|
			ServerList: []string{"http://127.0.0.1"},
 | 
						|
		}
 | 
						|
		updateEtcdOverrides([]string{override}, storageVersions, defaultEtcdConfig, &storageDestinations, newEtcd)
 | 
						|
		apigroup, ok := storageDestinations.APIGroups[test.apigroup]
 | 
						|
		if !ok {
 | 
						|
			t.Errorf("apigroup: %s not created", test.apigroup)
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		if apigroup.Overrides == nil {
 | 
						|
			t.Errorf("Overrides not created for: %s", test.apigroup)
 | 
						|
			continue
 | 
						|
		}
 | 
						|
		if _, ok := apigroup.Overrides[test.resource]; !ok {
 | 
						|
			t.Errorf("override not created for: %s", test.resource)
 | 
						|
			continue
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestParseRuntimeConfig(t *testing.T) {
 | 
						|
	testCases := []struct {
 | 
						|
		runtimeConfig     map[string]string
 | 
						|
		expectedAPIConfig func() *genericapiserver.ResourceConfig
 | 
						|
		err               bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			runtimeConfig: map[string]string{},
 | 
						|
			expectedAPIConfig: func() *genericapiserver.ResourceConfig {
 | 
						|
				return master.DefaultAPIResourceConfigSource()
 | 
						|
			},
 | 
						|
			err: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// Cannot override v1 resources.
 | 
						|
			runtimeConfig: map[string]string{
 | 
						|
				"api/v1/pods": "false",
 | 
						|
			},
 | 
						|
			expectedAPIConfig: func() *genericapiserver.ResourceConfig {
 | 
						|
				return master.DefaultAPIResourceConfigSource()
 | 
						|
			},
 | 
						|
			err: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// Disable v1.
 | 
						|
			runtimeConfig: map[string]string{
 | 
						|
				"api/v1": "false",
 | 
						|
			},
 | 
						|
			expectedAPIConfig: func() *genericapiserver.ResourceConfig {
 | 
						|
				config := master.DefaultAPIResourceConfigSource()
 | 
						|
				config.DisableVersions(unversioned.GroupVersion{Group: "", Version: "v1"})
 | 
						|
				return config
 | 
						|
			},
 | 
						|
			err: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// Disable extensions.
 | 
						|
			runtimeConfig: map[string]string{
 | 
						|
				"extensions/v1beta1": "false",
 | 
						|
			},
 | 
						|
			expectedAPIConfig: func() *genericapiserver.ResourceConfig {
 | 
						|
				config := master.DefaultAPIResourceConfigSource()
 | 
						|
				config.DisableVersions(unversioned.GroupVersion{Group: "extensions", Version: "v1beta1"})
 | 
						|
				return config
 | 
						|
			},
 | 
						|
			err: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// Disable deployments.
 | 
						|
			runtimeConfig: map[string]string{
 | 
						|
				"extensions/v1beta1/deployments": "false",
 | 
						|
			},
 | 
						|
			expectedAPIConfig: func() *genericapiserver.ResourceConfig {
 | 
						|
				config := master.DefaultAPIResourceConfigSource()
 | 
						|
				config.DisableResources(unversioned.GroupVersionResource{Group: "extensions", Version: "v1beta1", Resource: "deployments"})
 | 
						|
				return config
 | 
						|
			},
 | 
						|
			err: false,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			// Enable deployments and disable jobs.
 | 
						|
			runtimeConfig: map[string]string{
 | 
						|
				"extensions/v1beta1/anything": "true",
 | 
						|
				"extensions/v1beta1/jobs":     "false",
 | 
						|
			},
 | 
						|
			expectedAPIConfig: func() *genericapiserver.ResourceConfig {
 | 
						|
				config := master.DefaultAPIResourceConfigSource()
 | 
						|
				config.DisableResources(unversioned.GroupVersionResource{Group: "extensions", Version: "v1beta1", Resource: "jobs"})
 | 
						|
				config.EnableResources(unversioned.GroupVersionResource{Group: "extensions", Version: "v1beta1", Resource: "anything"})
 | 
						|
				return config
 | 
						|
			},
 | 
						|
			err: false,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for _, test := range testCases {
 | 
						|
		s := &options.APIServer{
 | 
						|
			ServerRunOptions: &genericapiserver.ServerRunOptions{
 | 
						|
				RuntimeConfig: test.runtimeConfig,
 | 
						|
			},
 | 
						|
		}
 | 
						|
		actualDisablers, err := parseRuntimeConfig(s)
 | 
						|
 | 
						|
		if err == nil && test.err {
 | 
						|
			t.Fatalf("expected error for test: %v", test)
 | 
						|
		} else if err != nil && !test.err {
 | 
						|
			t.Fatalf("unexpected error: %s, for test: %v", err, test)
 | 
						|
		}
 | 
						|
 | 
						|
		expectedConfig := test.expectedAPIConfig()
 | 
						|
		if err == nil && !reflect.DeepEqual(actualDisablers, expectedConfig) {
 | 
						|
			t.Fatalf("%v: unexpected apiResourceDisablers. Actual: %v\n expected: %v", test.runtimeConfig, actualDisablers, expectedConfig)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
}
 |