mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	This removes the net.experimental.kubernetes.io/proxy-mode and net.beta.kubernetes.io/proxy-mode annotations from kube-proxy.
		
			
				
	
	
		
			218 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			218 lines
		
	
	
		
			5.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2015 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package app
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"runtime"
 | 
						|
	"strings"
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"github.com/stretchr/testify/assert"
 | 
						|
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/kubernetes/cmd/kube-proxy/app/options"
 | 
						|
	"k8s.io/kubernetes/pkg/api"
 | 
						|
	"k8s.io/kubernetes/pkg/apis/componentconfig"
 | 
						|
	"k8s.io/kubernetes/pkg/util/iptables"
 | 
						|
)
 | 
						|
 | 
						|
type fakeNodeInterface struct {
 | 
						|
	node api.Node
 | 
						|
}
 | 
						|
 | 
						|
func (fake *fakeNodeInterface) Get(hostname string, options metav1.GetOptions) (*api.Node, error) {
 | 
						|
	return &fake.node, nil
 | 
						|
}
 | 
						|
 | 
						|
type fakeIPTablesVersioner struct {
 | 
						|
	version string // what to return
 | 
						|
	err     error  // what to return
 | 
						|
}
 | 
						|
 | 
						|
func (fake *fakeIPTablesVersioner) GetVersion() (string, error) {
 | 
						|
	return fake.version, fake.err
 | 
						|
}
 | 
						|
 | 
						|
type fakeKernelCompatTester struct {
 | 
						|
	ok bool
 | 
						|
}
 | 
						|
 | 
						|
func (fake *fakeKernelCompatTester) IsCompatible() error {
 | 
						|
	if !fake.ok {
 | 
						|
		return fmt.Errorf("error")
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func Test_getProxyMode(t *testing.T) {
 | 
						|
	if runtime.GOOS != "linux" {
 | 
						|
		t.Skip("skipping on non-Linux")
 | 
						|
	}
 | 
						|
	var cases = []struct {
 | 
						|
		flag            string
 | 
						|
		annotationKey   string
 | 
						|
		annotationVal   string
 | 
						|
		iptablesVersion string
 | 
						|
		kernelCompat    bool
 | 
						|
		iptablesError   error
 | 
						|
		expected        string
 | 
						|
	}{
 | 
						|
		{ // flag says userspace
 | 
						|
			flag:     "userspace",
 | 
						|
			expected: proxyModeUserspace,
 | 
						|
		},
 | 
						|
		{ // flag says iptables, error detecting version
 | 
						|
			flag:          "iptables",
 | 
						|
			iptablesError: fmt.Errorf("oops!"),
 | 
						|
			expected:      proxyModeUserspace,
 | 
						|
		},
 | 
						|
		{ // flag says iptables, version too low
 | 
						|
			flag:            "iptables",
 | 
						|
			iptablesVersion: "0.0.0",
 | 
						|
			expected:        proxyModeUserspace,
 | 
						|
		},
 | 
						|
		{ // flag says iptables, version ok, kernel not compatible
 | 
						|
			flag:            "iptables",
 | 
						|
			iptablesVersion: iptables.MinCheckVersion,
 | 
						|
			kernelCompat:    false,
 | 
						|
			expected:        proxyModeUserspace,
 | 
						|
		},
 | 
						|
		{ // flag says iptables, version ok, kernel is compatible
 | 
						|
			flag:            "iptables",
 | 
						|
			iptablesVersion: iptables.MinCheckVersion,
 | 
						|
			kernelCompat:    true,
 | 
						|
			expected:        proxyModeIPTables,
 | 
						|
		},
 | 
						|
		{ // detect, error
 | 
						|
			flag:          "",
 | 
						|
			iptablesError: fmt.Errorf("oops!"),
 | 
						|
			expected:      proxyModeUserspace,
 | 
						|
		},
 | 
						|
		{ // detect, version too low
 | 
						|
			flag:            "",
 | 
						|
			iptablesVersion: "0.0.0",
 | 
						|
			expected:        proxyModeUserspace,
 | 
						|
		},
 | 
						|
		{ // detect, version ok, kernel not compatible
 | 
						|
			flag:            "",
 | 
						|
			iptablesVersion: iptables.MinCheckVersion,
 | 
						|
			kernelCompat:    false,
 | 
						|
			expected:        proxyModeUserspace,
 | 
						|
		},
 | 
						|
		{ // detect, version ok, kernel is compatible
 | 
						|
			flag:            "",
 | 
						|
			iptablesVersion: iptables.MinCheckVersion,
 | 
						|
			kernelCompat:    true,
 | 
						|
			expected:        proxyModeIPTables,
 | 
						|
		},
 | 
						|
	}
 | 
						|
	for i, c := range cases {
 | 
						|
		getter := &fakeNodeInterface{}
 | 
						|
		getter.node.Annotations = map[string]string{c.annotationKey: c.annotationVal}
 | 
						|
		versioner := &fakeIPTablesVersioner{c.iptablesVersion, c.iptablesError}
 | 
						|
		kcompater := &fakeKernelCompatTester{c.kernelCompat}
 | 
						|
		r := getProxyMode(c.flag, getter, "host", versioner, kcompater)
 | 
						|
		if r != c.expected {
 | 
						|
			t.Errorf("Case[%d] Expected %q, got %q", i, c.expected, r)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// This test verifies that Proxy Server does not crash that means
 | 
						|
// Config and iptinterface are not nil when CleanupAndExit is true.
 | 
						|
// To avoid proxy crash: https://github.com/kubernetes/kubernetes/pull/14736
 | 
						|
func TestProxyServerWithCleanupAndExit(t *testing.T) {
 | 
						|
	// creates default config
 | 
						|
	config := options.NewProxyConfig()
 | 
						|
 | 
						|
	// sets CleanupAndExit manually
 | 
						|
	config.CleanupAndExit = true
 | 
						|
 | 
						|
	// creates new proxy server
 | 
						|
	proxyserver, err := NewProxyServerDefault(config)
 | 
						|
 | 
						|
	// verifies that nothing is nill except error
 | 
						|
	assert.Nil(t, err)
 | 
						|
	assert.NotNil(t, proxyserver)
 | 
						|
	assert.NotNil(t, proxyserver.Config)
 | 
						|
	assert.NotNil(t, proxyserver.IptInterface)
 | 
						|
}
 | 
						|
 | 
						|
func TestGetConntrackMax(t *testing.T) {
 | 
						|
	ncores := runtime.NumCPU()
 | 
						|
	testCases := []struct {
 | 
						|
		config   componentconfig.KubeProxyConfiguration
 | 
						|
		expected int
 | 
						|
		err      string
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			config:   componentconfig.KubeProxyConfiguration{},
 | 
						|
			expected: 0,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			config: componentconfig.KubeProxyConfiguration{
 | 
						|
				ConntrackMax: 12345,
 | 
						|
			},
 | 
						|
			expected: 12345,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			config: componentconfig.KubeProxyConfiguration{
 | 
						|
				ConntrackMax:        12345,
 | 
						|
				ConntrackMaxPerCore: 67890,
 | 
						|
			},
 | 
						|
			expected: -1,
 | 
						|
			err:      "mutually exclusive",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			config: componentconfig.KubeProxyConfiguration{
 | 
						|
				ConntrackMaxPerCore: 67890, // use this if Max is 0
 | 
						|
				ConntrackMin:        1,     // avoid 0 default
 | 
						|
			},
 | 
						|
			expected: 67890 * ncores,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			config: componentconfig.KubeProxyConfiguration{
 | 
						|
				ConntrackMaxPerCore: 1, // ensure that Min is considered
 | 
						|
				ConntrackMin:        123456,
 | 
						|
			},
 | 
						|
			expected: 123456,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			config: componentconfig.KubeProxyConfiguration{
 | 
						|
				ConntrackMaxPerCore: 0, // leave system setting
 | 
						|
				ConntrackMin:        123456,
 | 
						|
			},
 | 
						|
			expected: 0,
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	for i, tc := range testCases {
 | 
						|
		cfg := options.ProxyServerConfig{KubeProxyConfiguration: tc.config}
 | 
						|
		x, e := getConntrackMax(&cfg)
 | 
						|
		if e != nil {
 | 
						|
			if tc.err == "" {
 | 
						|
				t.Errorf("[%d] unexpected error: %v", i, e)
 | 
						|
			} else if !strings.Contains(e.Error(), tc.err) {
 | 
						|
				t.Errorf("[%d] expected an error containing %q: %v", i, tc.err, e)
 | 
						|
			}
 | 
						|
		} else if x != tc.expected {
 | 
						|
			t.Errorf("[%d] expected %d, got %d", i, tc.expected, x)
 | 
						|
		}
 | 
						|
	}
 | 
						|
}
 |