mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-03 19:58:17 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			305 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			305 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2021 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package network
 | 
						|
 | 
						|
import (
 | 
						|
	"encoding/json"
 | 
						|
	"fmt"
 | 
						|
	"testing"
 | 
						|
	"time"
 | 
						|
 | 
						|
	v1 "k8s.io/api/core/v1"
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/types"
 | 
						|
	"k8s.io/apimachinery/pkg/util/intstr"
 | 
						|
	"k8s.io/apimachinery/pkg/util/strategicpatch"
 | 
						|
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						|
	"k8s.io/kubernetes/cmd/kube-apiserver/app/options"
 | 
						|
	"k8s.io/kubernetes/pkg/controlplane"
 | 
						|
 | 
						|
	"k8s.io/kubernetes/test/integration/framework"
 | 
						|
	"k8s.io/kubernetes/test/utils/ktesting"
 | 
						|
)
 | 
						|
 | 
						|
// TestServicesFinalizersRepairLoop tests that Services participate in the object
 | 
						|
// deletion when using finalizers, and that the Services Repair controller doesn't,
 | 
						|
// mistakenly, repair the ClusterIP assigned to the Service that is being deleted.
 | 
						|
// https://issues.k8s.io/87603
 | 
						|
func TestServicesFinalizersRepairLoop(t *testing.T) {
 | 
						|
	serviceCIDR := "10.0.0.0/16"
 | 
						|
	clusterIP := "10.0.0.20"
 | 
						|
	interval := 5 * time.Second
 | 
						|
 | 
						|
	tCtx := ktesting.Init(t)
 | 
						|
	client, _, tearDownFn := framework.StartTestServer(tCtx, t, framework.TestServerSetup{
 | 
						|
		ModifyServerRunOptions: func(opts *options.ServerRunOptions) {
 | 
						|
			opts.ServiceClusterIPRanges = serviceCIDR
 | 
						|
		},
 | 
						|
		ModifyServerConfig: func(cfg *controlplane.Config) {
 | 
						|
			cfg.Extra.RepairServicesInterval = interval
 | 
						|
		},
 | 
						|
	})
 | 
						|
	defer tearDownFn()
 | 
						|
 | 
						|
	// verify client is working
 | 
						|
	if err := wait.PollImmediate(5*time.Second, 2*time.Minute, func() (bool, error) {
 | 
						|
		_, err := client.CoreV1().Endpoints(metav1.NamespaceDefault).Get(tCtx, "kubernetes", metav1.GetOptions{})
 | 
						|
		if err != nil {
 | 
						|
			t.Logf("error fetching endpoints: %v", err)
 | 
						|
			return false, nil
 | 
						|
		}
 | 
						|
		return true, nil
 | 
						|
	}); err != nil {
 | 
						|
		t.Errorf("server without enabled endpoints failed to register: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Create a NodePort service with one finalizer
 | 
						|
	svcNodePort := v1.Service{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:       "svc",
 | 
						|
			Finalizers: []string{"foo.bar/some-finalizer"},
 | 
						|
		},
 | 
						|
		Spec: v1.ServiceSpec{
 | 
						|
			ClusterIP: clusterIP,
 | 
						|
			Ports: []v1.ServicePort{{
 | 
						|
				Port:       8443,
 | 
						|
				NodePort:   30443,
 | 
						|
				TargetPort: intstr.FromInt32(8443),
 | 
						|
				Protocol:   v1.ProtocolTCP,
 | 
						|
			}},
 | 
						|
			Type: v1.ServiceTypeNodePort,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	// Create service
 | 
						|
	if _, err := client.CoreV1().Services(metav1.NamespaceDefault).Create(tCtx, &svcNodePort, metav1.CreateOptions{}); err != nil {
 | 
						|
		t.Errorf("unexpected error creating service: %v", err)
 | 
						|
	}
 | 
						|
	t.Logf("Created service: %s", svcNodePort.Name)
 | 
						|
 | 
						|
	// Check the service has been created correctly
 | 
						|
	svc, err := client.CoreV1().Services(metav1.NamespaceDefault).Get(tCtx, svcNodePort.Name, metav1.GetOptions{})
 | 
						|
	if err != nil || svc.Spec.ClusterIP != clusterIP {
 | 
						|
		t.Errorf("created service is not correct: %v", err)
 | 
						|
	}
 | 
						|
	t.Logf("Service created successfully: %v", svc)
 | 
						|
 | 
						|
	// Delete service
 | 
						|
	if err := client.CoreV1().Services(metav1.NamespaceDefault).Delete(tCtx, svcNodePort.Name, metav1.DeleteOptions{}); err != nil {
 | 
						|
		t.Errorf("unexpected error deleting service: %v", err)
 | 
						|
	}
 | 
						|
	t.Logf("Deleted service: %s", svcNodePort.Name)
 | 
						|
 | 
						|
	// wait for the repair loop to recover the deleted resources
 | 
						|
	time.Sleep(interval + 1)
 | 
						|
 | 
						|
	// Check that the service was not deleted and the IP is already allocated
 | 
						|
	svc, err = client.CoreV1().Services(metav1.NamespaceDefault).Get(tCtx, svcNodePort.Name, metav1.GetOptions{})
 | 
						|
	if err != nil || svc.Spec.ClusterIP != clusterIP {
 | 
						|
		t.Errorf("created service is not correct: %v", err)
 | 
						|
	}
 | 
						|
	t.Logf("Service after Delete: %v", svc)
 | 
						|
 | 
						|
	// Remove the finalizer
 | 
						|
	if _, err = client.CoreV1().Services(metav1.NamespaceDefault).Patch(tCtx, svcNodePort.Name, types.JSONPatchType, []byte(`[{"op":"remove","path":"/metadata/finalizers"}]`), metav1.PatchOptions{}); err != nil {
 | 
						|
		t.Errorf("unexpected error removing finalizer: %v", err)
 | 
						|
	}
 | 
						|
	t.Logf("Removed service finalizer: %s", svcNodePort.Name)
 | 
						|
 | 
						|
	// Check that the service was deleted
 | 
						|
	_, err = client.CoreV1().Services(metav1.NamespaceDefault).Get(tCtx, svcNodePort.Name, metav1.GetOptions{})
 | 
						|
	if err == nil {
 | 
						|
		t.Errorf("service was not delete: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	// Try to create service again
 | 
						|
	if _, err := client.CoreV1().Services(metav1.NamespaceDefault).Create(tCtx, &svcNodePort, metav1.CreateOptions{}); err != nil {
 | 
						|
		t.Errorf("unexpected error creating service: %v", err)
 | 
						|
	}
 | 
						|
	t.Logf("Created service: %s", svcNodePort.Name)
 | 
						|
}
 | 
						|
 | 
						|
func TestServicesFinalizersPatchStatus(t *testing.T) {
 | 
						|
	serviceCIDR := "10.0.0.0/16"
 | 
						|
	clusterIP := "10.0.0.21"
 | 
						|
	nodePort := 30443
 | 
						|
	tCtx := ktesting.Init(t)
 | 
						|
	client, _, tearDownFn := framework.StartTestServer(tCtx, t, framework.TestServerSetup{
 | 
						|
		ModifyServerRunOptions: func(opts *options.ServerRunOptions) {
 | 
						|
			opts.ServiceClusterIPRanges = serviceCIDR
 | 
						|
		},
 | 
						|
	})
 | 
						|
	defer tearDownFn()
 | 
						|
 | 
						|
	for _, testcase := range []string{"spec", "status"} {
 | 
						|
		t.Run(testcase, func(t *testing.T) {
 | 
						|
			// Create a NodePort service with one finalizer
 | 
						|
			svcNodePort := v1.Service{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:       "svc" + testcase,
 | 
						|
					Finalizers: []string{"foo.bar/some-finalizer"},
 | 
						|
				},
 | 
						|
				Spec: v1.ServiceSpec{
 | 
						|
					ClusterIP: clusterIP,
 | 
						|
					Ports: []v1.ServicePort{{
 | 
						|
						Port:       8443,
 | 
						|
						NodePort:   int32(nodePort),
 | 
						|
						TargetPort: intstr.FromInt32(8443),
 | 
						|
						Protocol:   v1.ProtocolTCP,
 | 
						|
					}},
 | 
						|
					Type: v1.ServiceTypeNodePort,
 | 
						|
				},
 | 
						|
			}
 | 
						|
 | 
						|
			ns := framework.CreateNamespaceOrDie(client, "test-service-finalizers-"+testcase, t)
 | 
						|
			defer framework.DeleteNamespaceOrDie(client, ns, t)
 | 
						|
 | 
						|
			// Create service
 | 
						|
			if _, err := client.CoreV1().Services(ns.Name).Create(tCtx, &svcNodePort, metav1.CreateOptions{}); err != nil {
 | 
						|
				t.Fatalf("unexpected error creating service: %v", err)
 | 
						|
			}
 | 
						|
			t.Logf("Created service: %s", svcNodePort.Name)
 | 
						|
 | 
						|
			// Check the service has been created correctly
 | 
						|
			svc, err := client.CoreV1().Services(ns.Name).Get(tCtx, svcNodePort.Name, metav1.GetOptions{})
 | 
						|
			if err != nil || svc.Spec.ClusterIP != clusterIP {
 | 
						|
				t.Fatalf("created service is not correct: %v", err)
 | 
						|
			}
 | 
						|
			t.Logf("Service created successfully: %+v", svc)
 | 
						|
 | 
						|
			// Delete service
 | 
						|
			if err := client.CoreV1().Services(ns.Name).Delete(tCtx, svcNodePort.Name, metav1.DeleteOptions{}); err != nil {
 | 
						|
				t.Fatalf("unexpected error deleting service: %v", err)
 | 
						|
			}
 | 
						|
			t.Logf("Deleted service: %s", svcNodePort.Name)
 | 
						|
 | 
						|
			// Check that the service was not deleted and the IP is already allocated
 | 
						|
			svc, err = client.CoreV1().Services(ns.Name).Get(tCtx, svcNodePort.Name, metav1.GetOptions{})
 | 
						|
			if err != nil ||
 | 
						|
				svc.Spec.ClusterIP != clusterIP ||
 | 
						|
				int(svc.Spec.Ports[0].NodePort) != nodePort ||
 | 
						|
				svc.DeletionTimestamp == nil ||
 | 
						|
				len(svc.ObjectMeta.Finalizers) != 1 {
 | 
						|
				t.Fatalf("Service expected to be deleting and with the same values: %v", err)
 | 
						|
			}
 | 
						|
			t.Logf("Service after Delete: %+v", svc)
 | 
						|
 | 
						|
			// Remove the finalizer
 | 
						|
			updated := svc.DeepCopy()
 | 
						|
			updated.ObjectMeta.Finalizers = []string{}
 | 
						|
			patchBytes, err := getPatchBytes(svc, updated)
 | 
						|
			if err != nil {
 | 
						|
				t.Fatalf("unexpected error getting patch bytes: %v", err)
 | 
						|
			}
 | 
						|
 | 
						|
			if testcase == "spec" {
 | 
						|
				if _, err = client.CoreV1().Services(ns.Name).Patch(tCtx, svcNodePort.Name, types.StrategicMergePatchType, patchBytes, metav1.PatchOptions{}); err != nil {
 | 
						|
					t.Fatalf("unexpected error removing finalizer: %v", err)
 | 
						|
				}
 | 
						|
			} else {
 | 
						|
				if _, err = client.CoreV1().Services(ns.Name).Patch(tCtx, svcNodePort.Name, types.StrategicMergePatchType, patchBytes, metav1.PatchOptions{}, "status"); err != nil {
 | 
						|
					t.Fatalf("unexpected error removing finalizer: %v", err)
 | 
						|
				}
 | 
						|
			}
 | 
						|
			t.Logf("Removed service finalizer: %s", svcNodePort.Name)
 | 
						|
 | 
						|
			// Check that the service was deleted
 | 
						|
			_, err = client.CoreV1().Services(ns.Name).Get(tCtx, svcNodePort.Name, metav1.GetOptions{})
 | 
						|
			if err == nil {
 | 
						|
				t.Fatalf("service was not delete: %v", err)
 | 
						|
			}
 | 
						|
 | 
						|
			// Try to create service again without the finalizer to check the ClusterIP and NodePort are deallocated
 | 
						|
			svc = svcNodePort.DeepCopy()
 | 
						|
			svc.Finalizers = []string{}
 | 
						|
			if _, err := client.CoreV1().Services(ns.Name).Create(tCtx, svc, metav1.CreateOptions{}); err != nil {
 | 
						|
				t.Fatalf("unexpected error creating service: %v", err)
 | 
						|
			}
 | 
						|
			// Delete service
 | 
						|
			if err := client.CoreV1().Services(ns.Name).Delete(tCtx, svc.Name, metav1.DeleteOptions{}); err != nil {
 | 
						|
				t.Fatalf("unexpected error deleting service: %v", err)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// Regresion test for https://issues.k8s.io/115316
 | 
						|
func TestServiceCIDR28bits(t *testing.T) {
 | 
						|
	serviceCIDR := "10.0.0.0/28"
 | 
						|
 | 
						|
	tCtx := ktesting.Init(t)
 | 
						|
	client, _, tearDownFn := framework.StartTestServer(tCtx, t, framework.TestServerSetup{
 | 
						|
		ModifyServerRunOptions: func(opts *options.ServerRunOptions) {
 | 
						|
			opts.ServiceClusterIPRanges = serviceCIDR
 | 
						|
		},
 | 
						|
	})
 | 
						|
	defer tearDownFn()
 | 
						|
 | 
						|
	// Wait until the default "kubernetes" service is created.
 | 
						|
	if err := wait.Poll(250*time.Millisecond, time.Minute, func() (bool, error) {
 | 
						|
		_, err := client.CoreV1().Services(metav1.NamespaceDefault).Get(tCtx, "kubernetes", metav1.GetOptions{})
 | 
						|
		if err != nil {
 | 
						|
			return false, err
 | 
						|
		}
 | 
						|
		return true, nil
 | 
						|
	}); err != nil {
 | 
						|
		t.Fatalf("creating kubernetes service timed out")
 | 
						|
	}
 | 
						|
 | 
						|
	ns := framework.CreateNamespaceOrDie(client, "test-regression", t)
 | 
						|
	defer framework.DeleteNamespaceOrDie(client, ns, t)
 | 
						|
 | 
						|
	service := &v1.Service{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name: "test-1234",
 | 
						|
		},
 | 
						|
		Spec: v1.ServiceSpec{
 | 
						|
			Type: v1.ServiceTypeClusterIP,
 | 
						|
			Ports: []v1.ServicePort{{
 | 
						|
				Port: int32(80),
 | 
						|
			}},
 | 
						|
			Selector: map[string]string{
 | 
						|
				"foo": "bar",
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	_, err := client.CoreV1().Services(ns.Name).Create(tCtx, service, metav1.CreateOptions{})
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("Error creating test service: %v", err)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func getPatchBytes(oldSvc, newSvc *v1.Service) ([]byte, error) {
 | 
						|
	oldData, err := json.Marshal(oldSvc)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("failed to Marshal oldData for svc %s/%s: %v", oldSvc.Namespace, oldSvc.Name, err)
 | 
						|
	}
 | 
						|
 | 
						|
	newData, err := json.Marshal(newSvc)
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("failed to Marshal newData for svc %s/%s: %v", newSvc.Namespace, newSvc.Name, err)
 | 
						|
	}
 | 
						|
 | 
						|
	patchBytes, err := strategicpatch.CreateTwoWayMergePatch(oldData, newData, v1.Service{})
 | 
						|
	if err != nil {
 | 
						|
		return nil, fmt.Errorf("failed to CreateTwoWayMergePatch for svc %s/%s: %v", oldSvc.Namespace, oldSvc.Name, err)
 | 
						|
	}
 | 
						|
	return patchBytes, nil
 | 
						|
 | 
						|
}
 |