mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-10-31 10:18:13 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			1855 lines
		
	
	
		
			55 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			1855 lines
		
	
	
		
			55 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2014 The Kubernetes Authors All rights reserved.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package server
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"encoding/json"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 	"io"
 | |
| 	"io/ioutil"
 | |
| 	"net"
 | |
| 	"net/http"
 | |
| 	"net/http/httptest"
 | |
| 	"net/http/httputil"
 | |
| 	"reflect"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	cadvisorapi "github.com/google/cadvisor/info/v1"
 | |
| 	cadvisorapiv2 "github.com/google/cadvisor/info/v2"
 | |
| 	"k8s.io/kubernetes/pkg/api"
 | |
| 	apierrs "k8s.io/kubernetes/pkg/api/errors"
 | |
| 	"k8s.io/kubernetes/pkg/auth/authorizer"
 | |
| 	"k8s.io/kubernetes/pkg/auth/user"
 | |
| 	"k8s.io/kubernetes/pkg/kubelet/cm"
 | |
| 	kubecontainer "k8s.io/kubernetes/pkg/kubelet/container"
 | |
| 	kubetypes "k8s.io/kubernetes/pkg/kubelet/types"
 | |
| 	"k8s.io/kubernetes/pkg/types"
 | |
| 	"k8s.io/kubernetes/pkg/util/httpstream"
 | |
| 	"k8s.io/kubernetes/pkg/util/httpstream/spdy"
 | |
| 	"k8s.io/kubernetes/pkg/util/sets"
 | |
| )
 | |
| 
 | |
| type fakeKubelet struct {
 | |
| 	podByNameFunc                      func(namespace, name string) (*api.Pod, bool)
 | |
| 	containerInfoFunc                  func(podFullName string, uid types.UID, containerName string, req *cadvisorapi.ContainerInfoRequest) (*cadvisorapi.ContainerInfo, error)
 | |
| 	rawInfoFunc                        func(query *cadvisorapi.ContainerInfoRequest) (map[string]*cadvisorapi.ContainerInfo, error)
 | |
| 	machineInfoFunc                    func() (*cadvisorapi.MachineInfo, error)
 | |
| 	podsFunc                           func() []*api.Pod
 | |
| 	runningPodsFunc                    func() ([]*api.Pod, error)
 | |
| 	logFunc                            func(w http.ResponseWriter, req *http.Request)
 | |
| 	runFunc                            func(podFullName string, uid types.UID, containerName string, cmd []string) ([]byte, error)
 | |
| 	execFunc                           func(pod string, uid types.UID, container string, cmd []string, in io.Reader, out, err io.WriteCloser, tty bool) error
 | |
| 	attachFunc                         func(pod string, uid types.UID, container string, in io.Reader, out, err io.WriteCloser, tty bool) error
 | |
| 	portForwardFunc                    func(name string, uid types.UID, port uint16, stream io.ReadWriteCloser) error
 | |
| 	containerLogsFunc                  func(podFullName, containerName string, logOptions *api.PodLogOptions, stdout, stderr io.Writer) error
 | |
| 	streamingConnectionIdleTimeoutFunc func() time.Duration
 | |
| 	hostnameFunc                       func() string
 | |
| 	resyncInterval                     time.Duration
 | |
| 	loopEntryTime                      time.Time
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) ResyncInterval() time.Duration {
 | |
| 	return fk.resyncInterval
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) LatestLoopEntryTime() time.Time {
 | |
| 	return fk.loopEntryTime
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) GetPodByName(namespace, name string) (*api.Pod, bool) {
 | |
| 	return fk.podByNameFunc(namespace, name)
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) GetContainerInfo(podFullName string, uid types.UID, containerName string, req *cadvisorapi.ContainerInfoRequest) (*cadvisorapi.ContainerInfo, error) {
 | |
| 	return fk.containerInfoFunc(podFullName, uid, containerName, req)
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) GetRawContainerInfo(containerName string, req *cadvisorapi.ContainerInfoRequest, subcontainers bool) (map[string]*cadvisorapi.ContainerInfo, error) {
 | |
| 	return fk.rawInfoFunc(req)
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) GetCachedMachineInfo() (*cadvisorapi.MachineInfo, error) {
 | |
| 	return fk.machineInfoFunc()
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) GetPods() []*api.Pod {
 | |
| 	return fk.podsFunc()
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) GetRunningPods() ([]*api.Pod, error) {
 | |
| 	return fk.runningPodsFunc()
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) ServeLogs(w http.ResponseWriter, req *http.Request) {
 | |
| 	fk.logFunc(w, req)
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) GetKubeletContainerLogs(podFullName, containerName string, logOptions *api.PodLogOptions, stdout, stderr io.Writer) error {
 | |
| 	return fk.containerLogsFunc(podFullName, containerName, logOptions, stdout, stderr)
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) GetHostname() string {
 | |
| 	return fk.hostnameFunc()
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) RunInContainer(podFullName string, uid types.UID, containerName string, cmd []string) ([]byte, error) {
 | |
| 	return fk.runFunc(podFullName, uid, containerName, cmd)
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) ExecInContainer(name string, uid types.UID, container string, cmd []string, in io.Reader, out, err io.WriteCloser, tty bool) error {
 | |
| 	return fk.execFunc(name, uid, container, cmd, in, out, err, tty)
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) AttachContainer(name string, uid types.UID, container string, in io.Reader, out, err io.WriteCloser, tty bool) error {
 | |
| 	return fk.attachFunc(name, uid, container, in, out, err, tty)
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) PortForward(name string, uid types.UID, port uint16, stream io.ReadWriteCloser) error {
 | |
| 	return fk.portForwardFunc(name, uid, port, stream)
 | |
| }
 | |
| 
 | |
| func (fk *fakeKubelet) StreamingConnectionIdleTimeout() time.Duration {
 | |
| 	return fk.streamingConnectionIdleTimeoutFunc()
 | |
| }
 | |
| 
 | |
| // Unused functions
 | |
| func (_ *fakeKubelet) GetContainerInfoV2(_ string, _ cadvisorapiv2.RequestOptions) (map[string]cadvisorapiv2.ContainerInfo, error) {
 | |
| 	return nil, nil
 | |
| }
 | |
| 
 | |
| func (_ *fakeKubelet) DockerImagesFsInfo() (cadvisorapiv2.FsInfo, error) {
 | |
| 	return cadvisorapiv2.FsInfo{}, fmt.Errorf("Unsupported Operation DockerImagesFsInfo")
 | |
| }
 | |
| 
 | |
| func (_ *fakeKubelet) RootFsInfo() (cadvisorapiv2.FsInfo, error) {
 | |
| 	return cadvisorapiv2.FsInfo{}, fmt.Errorf("Unsupport Operation RootFsInfo")
 | |
| }
 | |
| 
 | |
| func (_ *fakeKubelet) GetNode() (*api.Node, error)  { return nil, nil }
 | |
| func (_ *fakeKubelet) GetNodeConfig() cm.NodeConfig { return cm.NodeConfig{} }
 | |
| 
 | |
| type fakeAuth struct {
 | |
| 	authenticateFunc func(*http.Request) (user.Info, bool, error)
 | |
| 	attributesFunc   func(user.Info, *http.Request) authorizer.Attributes
 | |
| 	authorizeFunc    func(authorizer.Attributes) (err error)
 | |
| }
 | |
| 
 | |
| func (f *fakeAuth) AuthenticateRequest(req *http.Request) (user.Info, bool, error) {
 | |
| 	return f.authenticateFunc(req)
 | |
| }
 | |
| func (f *fakeAuth) GetRequestAttributes(u user.Info, req *http.Request) authorizer.Attributes {
 | |
| 	return f.attributesFunc(u, req)
 | |
| }
 | |
| func (f *fakeAuth) Authorize(a authorizer.Attributes) (err error) {
 | |
| 	return f.authorizeFunc(a)
 | |
| }
 | |
| 
 | |
| type serverTestFramework struct {
 | |
| 	serverUnderTest *Server
 | |
| 	fakeKubelet     *fakeKubelet
 | |
| 	fakeAuth        *fakeAuth
 | |
| 	testHTTPServer  *httptest.Server
 | |
| }
 | |
| 
 | |
| func newServerTest() *serverTestFramework {
 | |
| 	fw := &serverTestFramework{}
 | |
| 	fw.fakeKubelet = &fakeKubelet{
 | |
| 		hostnameFunc: func() string {
 | |
| 			return "127.0.0.1"
 | |
| 		},
 | |
| 		podByNameFunc: func(namespace, name string) (*api.Pod, bool) {
 | |
| 			return &api.Pod{
 | |
| 				ObjectMeta: api.ObjectMeta{
 | |
| 					Namespace: namespace,
 | |
| 					Name:      name,
 | |
| 				},
 | |
| 			}, true
 | |
| 		},
 | |
| 	}
 | |
| 	fw.fakeAuth = &fakeAuth{
 | |
| 		authenticateFunc: func(req *http.Request) (user.Info, bool, error) {
 | |
| 			return &user.DefaultInfo{Name: "test"}, true, nil
 | |
| 		},
 | |
| 		attributesFunc: func(u user.Info, req *http.Request) authorizer.Attributes {
 | |
| 			return &authorizer.AttributesRecord{User: u}
 | |
| 		},
 | |
| 		authorizeFunc: func(a authorizer.Attributes) (err error) {
 | |
| 			return nil
 | |
| 		},
 | |
| 	}
 | |
| 	server := NewServer(fw.fakeKubelet, fw.fakeAuth, true)
 | |
| 	fw.serverUnderTest = &server
 | |
| 	// TODO: Close() this when fix #19254
 | |
| 	fw.testHTTPServer = httptest.NewServer(fw.serverUnderTest)
 | |
| 	return fw
 | |
| }
 | |
| 
 | |
| // encodeJSON returns obj marshalled as a JSON string, panicing on any errors
 | |
| func encodeJSON(obj interface{}) string {
 | |
| 	data, err := json.Marshal(obj)
 | |
| 	if err != nil {
 | |
| 		panic(err)
 | |
| 	}
 | |
| 	return string(data)
 | |
| }
 | |
| 
 | |
| func readResp(resp *http.Response) (string, error) {
 | |
| 	defer resp.Body.Close()
 | |
| 	body, err := ioutil.ReadAll(resp.Body)
 | |
| 	return string(body), err
 | |
| }
 | |
| 
 | |
| // A helper function to return the correct pod name.
 | |
| func getPodName(name, namespace string) string {
 | |
| 	if namespace == "" {
 | |
| 		namespace = kubetypes.NamespaceDefault
 | |
| 	}
 | |
| 	return name + "_" + namespace
 | |
| }
 | |
| 
 | |
| func TestContainerInfo(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	expectedInfo := &cadvisorapi.ContainerInfo{}
 | |
| 	podID := "somepod"
 | |
| 	expectedPodID := getPodName(podID, "")
 | |
| 	expectedContainerName := "goodcontainer"
 | |
| 	fw.fakeKubelet.containerInfoFunc = func(podID string, uid types.UID, containerName string, req *cadvisorapi.ContainerInfoRequest) (*cadvisorapi.ContainerInfo, error) {
 | |
| 		if podID != expectedPodID || containerName != expectedContainerName {
 | |
| 			return nil, fmt.Errorf("bad podID or containerName: podID=%v; containerName=%v", podID, containerName)
 | |
| 		}
 | |
| 		return expectedInfo, nil
 | |
| 	}
 | |
| 
 | |
| 	resp, err := http.Get(fw.testHTTPServer.URL + fmt.Sprintf("/stats/%v/%v", podID, expectedContainerName))
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 	var receivedInfo cadvisorapi.ContainerInfo
 | |
| 	err = json.NewDecoder(resp.Body).Decode(&receivedInfo)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("received invalid json data: %v", err)
 | |
| 	}
 | |
| 	if !receivedInfo.Eq(expectedInfo) {
 | |
| 		t.Errorf("received wrong data: %#v", receivedInfo)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestContainerInfoWithUidNamespace(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	expectedInfo := &cadvisorapi.ContainerInfo{}
 | |
| 	podID := "somepod"
 | |
| 	expectedNamespace := "custom"
 | |
| 	expectedPodID := getPodName(podID, expectedNamespace)
 | |
| 	expectedContainerName := "goodcontainer"
 | |
| 	expectedUid := "9b01b80f-8fb4-11e4-95ab-4200af06647"
 | |
| 	fw.fakeKubelet.containerInfoFunc = func(podID string, uid types.UID, containerName string, req *cadvisorapi.ContainerInfoRequest) (*cadvisorapi.ContainerInfo, error) {
 | |
| 		if podID != expectedPodID || string(uid) != expectedUid || containerName != expectedContainerName {
 | |
| 			return nil, fmt.Errorf("bad podID or uid or containerName: podID=%v; uid=%v; containerName=%v", podID, uid, containerName)
 | |
| 		}
 | |
| 		return expectedInfo, nil
 | |
| 	}
 | |
| 
 | |
| 	resp, err := http.Get(fw.testHTTPServer.URL + fmt.Sprintf("/stats/%v/%v/%v/%v", expectedNamespace, podID, expectedUid, expectedContainerName))
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 	var receivedInfo cadvisorapi.ContainerInfo
 | |
| 	err = json.NewDecoder(resp.Body).Decode(&receivedInfo)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("received invalid json data: %v", err)
 | |
| 	}
 | |
| 	if !receivedInfo.Eq(expectedInfo) {
 | |
| 		t.Errorf("received wrong data: %#v", receivedInfo)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestContainerNotFound(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	podID := "somepod"
 | |
| 	expectedNamespace := "custom"
 | |
| 	expectedContainerName := "slowstartcontainer"
 | |
| 	expectedUid := "9b01b80f-8fb4-11e4-95ab-4200af06647"
 | |
| 	fw.fakeKubelet.containerInfoFunc = func(podID string, uid types.UID, containerName string, req *cadvisorapi.ContainerInfoRequest) (*cadvisorapi.ContainerInfo, error) {
 | |
| 		return nil, kubecontainer.ErrContainerNotFound
 | |
| 	}
 | |
| 	resp, err := http.Get(fw.testHTTPServer.URL + fmt.Sprintf("/stats/%v/%v/%v/%v", expectedNamespace, podID, expectedUid, expectedContainerName))
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	if resp.StatusCode != http.StatusNotFound {
 | |
| 		t.Fatalf("Received status %d expecting %d", resp.StatusCode, http.StatusNotFound)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| }
 | |
| 
 | |
| func TestRootInfo(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	expectedInfo := &cadvisorapi.ContainerInfo{
 | |
| 		ContainerReference: cadvisorapi.ContainerReference{
 | |
| 			Name: "/",
 | |
| 		},
 | |
| 	}
 | |
| 	fw.fakeKubelet.rawInfoFunc = func(req *cadvisorapi.ContainerInfoRequest) (map[string]*cadvisorapi.ContainerInfo, error) {
 | |
| 		return map[string]*cadvisorapi.ContainerInfo{
 | |
| 			expectedInfo.Name: expectedInfo,
 | |
| 		}, nil
 | |
| 	}
 | |
| 
 | |
| 	resp, err := http.Get(fw.testHTTPServer.URL + "/stats")
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 	var receivedInfo cadvisorapi.ContainerInfo
 | |
| 	err = json.NewDecoder(resp.Body).Decode(&receivedInfo)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("received invalid json data: %v", err)
 | |
| 	}
 | |
| 	if !receivedInfo.Eq(expectedInfo) {
 | |
| 		t.Errorf("received wrong data: %#v, expected %#v", receivedInfo, expectedInfo)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestSubcontainerContainerInfo(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	const kubeletContainer = "/kubelet"
 | |
| 	const kubeletSubContainer = "/kubelet/sub"
 | |
| 	expectedInfo := map[string]*cadvisorapi.ContainerInfo{
 | |
| 		kubeletContainer: {
 | |
| 			ContainerReference: cadvisorapi.ContainerReference{
 | |
| 				Name: kubeletContainer,
 | |
| 			},
 | |
| 		},
 | |
| 		kubeletSubContainer: {
 | |
| 			ContainerReference: cadvisorapi.ContainerReference{
 | |
| 				Name: kubeletSubContainer,
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 	fw.fakeKubelet.rawInfoFunc = func(req *cadvisorapi.ContainerInfoRequest) (map[string]*cadvisorapi.ContainerInfo, error) {
 | |
| 		return expectedInfo, nil
 | |
| 	}
 | |
| 
 | |
| 	request := fmt.Sprintf("{\"containerName\":%q, \"subcontainers\": true}", kubeletContainer)
 | |
| 	resp, err := http.Post(fw.testHTTPServer.URL+"/stats/container", "application/json", bytes.NewBuffer([]byte(request)))
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 	var receivedInfo map[string]*cadvisorapi.ContainerInfo
 | |
| 	err = json.NewDecoder(resp.Body).Decode(&receivedInfo)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Received invalid json data: %v", err)
 | |
| 	}
 | |
| 	if len(receivedInfo) != len(expectedInfo) {
 | |
| 		t.Errorf("Received wrong data: %#v, expected %#v", receivedInfo, expectedInfo)
 | |
| 	}
 | |
| 
 | |
| 	for _, containerName := range []string{kubeletContainer, kubeletSubContainer} {
 | |
| 		if _, ok := receivedInfo[containerName]; !ok {
 | |
| 			t.Errorf("Expected container %q to be present in result: %#v", containerName, receivedInfo)
 | |
| 		}
 | |
| 		if !receivedInfo[containerName].Eq(expectedInfo[containerName]) {
 | |
| 			t.Errorf("Invalid result for %q: Expected %#v, received %#v", containerName, expectedInfo[containerName], receivedInfo[containerName])
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestMachineInfo(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	expectedInfo := &cadvisorapi.MachineInfo{
 | |
| 		NumCores:       4,
 | |
| 		MemoryCapacity: 1024,
 | |
| 	}
 | |
| 	fw.fakeKubelet.machineInfoFunc = func() (*cadvisorapi.MachineInfo, error) {
 | |
| 		return expectedInfo, nil
 | |
| 	}
 | |
| 
 | |
| 	resp, err := http.Get(fw.testHTTPServer.URL + "/spec")
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 	var receivedInfo cadvisorapi.MachineInfo
 | |
| 	err = json.NewDecoder(resp.Body).Decode(&receivedInfo)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("received invalid json data: %v", err)
 | |
| 	}
 | |
| 	if !reflect.DeepEqual(&receivedInfo, expectedInfo) {
 | |
| 		t.Errorf("received wrong data: %#v", receivedInfo)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestServeLogs(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 
 | |
| 	content := string(`<pre><a href="kubelet.log">kubelet.log</a><a href="google.log">google.log</a></pre>`)
 | |
| 
 | |
| 	fw.fakeKubelet.logFunc = func(w http.ResponseWriter, req *http.Request) {
 | |
| 		w.WriteHeader(http.StatusOK)
 | |
| 		w.Header().Add("Content-Type", "text/html")
 | |
| 		w.Write([]byte(content))
 | |
| 	}
 | |
| 
 | |
| 	resp, err := http.Get(fw.testHTTPServer.URL + "/logs/")
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 
 | |
| 	body, err := httputil.DumpResponse(resp, true)
 | |
| 	if err != nil {
 | |
| 		// copying the response body did not work
 | |
| 		t.Errorf("Cannot copy resp: %#v", err)
 | |
| 	}
 | |
| 	result := string(body)
 | |
| 	if !strings.Contains(result, "kubelet.log") || !strings.Contains(result, "google.log") {
 | |
| 		t.Errorf("Received wrong data: %s", result)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestServeRunInContainer(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	output := "foo bar"
 | |
| 	podNamespace := "other"
 | |
| 	podName := "foo"
 | |
| 	expectedPodName := getPodName(podName, podNamespace)
 | |
| 	expectedContainerName := "baz"
 | |
| 	expectedCommand := "ls -a"
 | |
| 	fw.fakeKubelet.runFunc = func(podFullName string, uid types.UID, containerName string, cmd []string) ([]byte, error) {
 | |
| 		if podFullName != expectedPodName {
 | |
| 			t.Errorf("expected %s, got %s", expectedPodName, podFullName)
 | |
| 		}
 | |
| 		if containerName != expectedContainerName {
 | |
| 			t.Errorf("expected %s, got %s", expectedContainerName, containerName)
 | |
| 		}
 | |
| 		if strings.Join(cmd, " ") != expectedCommand {
 | |
| 			t.Errorf("expected: %s, got %v", expectedCommand, cmd)
 | |
| 		}
 | |
| 
 | |
| 		return []byte(output), nil
 | |
| 	}
 | |
| 
 | |
| 	resp, err := http.Post(fw.testHTTPServer.URL+"/run/"+podNamespace+"/"+podName+"/"+expectedContainerName+"?cmd=ls%20-a", "", nil)
 | |
| 
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Got error POSTing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 
 | |
| 	body, err := ioutil.ReadAll(resp.Body)
 | |
| 	if err != nil {
 | |
| 		// copying the response body did not work
 | |
| 		t.Errorf("Cannot copy resp: %#v", err)
 | |
| 	}
 | |
| 	result := string(body)
 | |
| 	if result != output {
 | |
| 		t.Errorf("expected %s, got %s", output, result)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestServeRunInContainerWithUID(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	output := "foo bar"
 | |
| 	podNamespace := "other"
 | |
| 	podName := "foo"
 | |
| 	expectedPodName := getPodName(podName, podNamespace)
 | |
| 	expectedUID := "7e00838d_-_3523_-_11e4_-_8421_-_42010af0a720"
 | |
| 	expectedContainerName := "baz"
 | |
| 	expectedCommand := "ls -a"
 | |
| 	fw.fakeKubelet.runFunc = func(podFullName string, uid types.UID, containerName string, cmd []string) ([]byte, error) {
 | |
| 		if podFullName != expectedPodName {
 | |
| 			t.Errorf("expected %s, got %s", expectedPodName, podFullName)
 | |
| 		}
 | |
| 		if string(uid) != expectedUID {
 | |
| 			t.Errorf("expected %s, got %s", expectedUID, uid)
 | |
| 		}
 | |
| 		if containerName != expectedContainerName {
 | |
| 			t.Errorf("expected %s, got %s", expectedContainerName, containerName)
 | |
| 		}
 | |
| 		if strings.Join(cmd, " ") != expectedCommand {
 | |
| 			t.Errorf("expected: %s, got %v", expectedCommand, cmd)
 | |
| 		}
 | |
| 
 | |
| 		return []byte(output), nil
 | |
| 	}
 | |
| 
 | |
| 	resp, err := http.Post(fw.testHTTPServer.URL+"/run/"+podNamespace+"/"+podName+"/"+expectedUID+"/"+expectedContainerName+"?cmd=ls%20-a", "", nil)
 | |
| 
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Got error POSTing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 
 | |
| 	body, err := ioutil.ReadAll(resp.Body)
 | |
| 	if err != nil {
 | |
| 		// copying the response body did not work
 | |
| 		t.Errorf("Cannot copy resp: %#v", err)
 | |
| 	}
 | |
| 	result := string(body)
 | |
| 	if result != output {
 | |
| 		t.Errorf("expected %s, got %s", output, result)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestHealthCheck(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	fw.fakeKubelet.hostnameFunc = func() string {
 | |
| 		return "127.0.0.1"
 | |
| 	}
 | |
| 
 | |
| 	// Test with correct hostname, Docker version
 | |
| 	assertHealthIsOk(t, fw.testHTTPServer.URL+"/healthz")
 | |
| 
 | |
| 	//Test with incorrect hostname
 | |
| 	fw.fakeKubelet.hostnameFunc = func() string {
 | |
| 		return "fake"
 | |
| 	}
 | |
| 	assertHealthIsOk(t, fw.testHTTPServer.URL+"/healthz")
 | |
| }
 | |
| 
 | |
| func assertHealthFails(t *testing.T, httpURL string, expectedErrorCode int) {
 | |
| 	resp, err := http.Get(httpURL)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 	if resp.StatusCode != expectedErrorCode {
 | |
| 		t.Errorf("expected status code %d, got %d", expectedErrorCode, resp.StatusCode)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| type authTestCase struct {
 | |
| 	Method string
 | |
| 	Path   string
 | |
| }
 | |
| 
 | |
| func TestAuthFilters(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 
 | |
| 	testcases := []authTestCase{}
 | |
| 
 | |
| 	// This is a sanity check that the Handle->HandleWithFilter() delegation is working
 | |
| 	// Ideally, these would move to registered web services and this list would get shorter
 | |
| 	expectedPaths := []string{"/healthz", "/metrics"}
 | |
| 	paths := sets.NewString(fw.serverUnderTest.restfulCont.RegisteredHandlePaths()...)
 | |
| 	for _, expectedPath := range expectedPaths {
 | |
| 		if !paths.Has(expectedPath) {
 | |
| 			t.Errorf("Expected registered handle path %s was missing", expectedPath)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Test all the non-web-service handlers
 | |
| 	for _, path := range fw.serverUnderTest.restfulCont.RegisteredHandlePaths() {
 | |
| 		testcases = append(testcases, authTestCase{"GET", path})
 | |
| 		testcases = append(testcases, authTestCase{"POST", path})
 | |
| 		// Test subpaths for directory handlers
 | |
| 		if strings.HasSuffix(path, "/") {
 | |
| 			testcases = append(testcases, authTestCase{"GET", path + "foo"})
 | |
| 			testcases = append(testcases, authTestCase{"POST", path + "foo"})
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// Test all the generated web-service paths
 | |
| 	for _, ws := range fw.serverUnderTest.restfulCont.RegisteredWebServices() {
 | |
| 		for _, r := range ws.Routes() {
 | |
| 			testcases = append(testcases, authTestCase{r.Method, r.Path})
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	for _, tc := range testcases {
 | |
| 		var (
 | |
| 			expectedUser       = &user.DefaultInfo{Name: "test"}
 | |
| 			expectedAttributes = &authorizer.AttributesRecord{User: expectedUser}
 | |
| 
 | |
| 			calledAuthenticate = false
 | |
| 			calledAuthorize    = false
 | |
| 			calledAttributes   = false
 | |
| 		)
 | |
| 
 | |
| 		fw.fakeAuth.authenticateFunc = func(req *http.Request) (user.Info, bool, error) {
 | |
| 			calledAuthenticate = true
 | |
| 			return expectedUser, true, nil
 | |
| 		}
 | |
| 		fw.fakeAuth.attributesFunc = func(u user.Info, req *http.Request) authorizer.Attributes {
 | |
| 			calledAttributes = true
 | |
| 			if u != expectedUser {
 | |
| 				t.Fatalf("%s: expected user %v, got %v", tc.Path, expectedUser, u)
 | |
| 			}
 | |
| 			return expectedAttributes
 | |
| 		}
 | |
| 		fw.fakeAuth.authorizeFunc = func(a authorizer.Attributes) (err error) {
 | |
| 			calledAuthorize = true
 | |
| 			if a != expectedAttributes {
 | |
| 				t.Fatalf("%s: expected attributes %v, got %v", tc.Path, expectedAttributes, a)
 | |
| 			}
 | |
| 			return errors.New("Forbidden")
 | |
| 		}
 | |
| 
 | |
| 		req, err := http.NewRequest(tc.Method, fw.testHTTPServer.URL+tc.Path, nil)
 | |
| 		if err != nil {
 | |
| 			t.Errorf("%s: unexpected error: %v", tc.Path, err)
 | |
| 			continue
 | |
| 		}
 | |
| 		resp, err := http.DefaultClient.Do(req)
 | |
| 		if err != nil {
 | |
| 			t.Errorf("%s: unexpected error: %v", tc.Path, err)
 | |
| 			continue
 | |
| 		}
 | |
| 		defer resp.Body.Close()
 | |
| 		if resp.StatusCode != http.StatusForbidden {
 | |
| 			t.Errorf("%s: unexpected status code %d", tc.Path, resp.StatusCode)
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		if !calledAuthenticate {
 | |
| 			t.Errorf("%s: Authenticate was not called", tc.Path)
 | |
| 			continue
 | |
| 		}
 | |
| 		if !calledAttributes {
 | |
| 			t.Errorf("%s: Attributes were not called", tc.Path)
 | |
| 			continue
 | |
| 		}
 | |
| 		if !calledAuthorize {
 | |
| 			t.Errorf("%s: Authorize was not called", tc.Path)
 | |
| 			continue
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestAuthenticationFailure(t *testing.T) {
 | |
| 	var (
 | |
| 		expectedUser       = &user.DefaultInfo{Name: "test"}
 | |
| 		expectedAttributes = &authorizer.AttributesRecord{User: expectedUser}
 | |
| 
 | |
| 		calledAuthenticate = false
 | |
| 		calledAuthorize    = false
 | |
| 		calledAttributes   = false
 | |
| 	)
 | |
| 
 | |
| 	fw := newServerTest()
 | |
| 	fw.fakeAuth.authenticateFunc = func(req *http.Request) (user.Info, bool, error) {
 | |
| 		calledAuthenticate = true
 | |
| 		return nil, false, nil
 | |
| 	}
 | |
| 	fw.fakeAuth.attributesFunc = func(u user.Info, req *http.Request) authorizer.Attributes {
 | |
| 		calledAttributes = true
 | |
| 		return expectedAttributes
 | |
| 	}
 | |
| 	fw.fakeAuth.authorizeFunc = func(a authorizer.Attributes) (err error) {
 | |
| 		calledAuthorize = true
 | |
| 		return errors.New("not allowed")
 | |
| 	}
 | |
| 
 | |
| 	assertHealthFails(t, fw.testHTTPServer.URL+"/healthz", http.StatusUnauthorized)
 | |
| 
 | |
| 	if !calledAuthenticate {
 | |
| 		t.Fatalf("Authenticate was not called")
 | |
| 	}
 | |
| 	if calledAttributes {
 | |
| 		t.Fatalf("Attributes was called unexpectedly")
 | |
| 	}
 | |
| 	if calledAuthorize {
 | |
| 		t.Fatalf("Authorize was called unexpectedly")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestAuthorizationSuccess(t *testing.T) {
 | |
| 	var (
 | |
| 		expectedUser       = &user.DefaultInfo{Name: "test"}
 | |
| 		expectedAttributes = &authorizer.AttributesRecord{User: expectedUser}
 | |
| 
 | |
| 		calledAuthenticate = false
 | |
| 		calledAuthorize    = false
 | |
| 		calledAttributes   = false
 | |
| 	)
 | |
| 
 | |
| 	fw := newServerTest()
 | |
| 	fw.fakeAuth.authenticateFunc = func(req *http.Request) (user.Info, bool, error) {
 | |
| 		calledAuthenticate = true
 | |
| 		return expectedUser, true, nil
 | |
| 	}
 | |
| 	fw.fakeAuth.attributesFunc = func(u user.Info, req *http.Request) authorizer.Attributes {
 | |
| 		calledAttributes = true
 | |
| 		return expectedAttributes
 | |
| 	}
 | |
| 	fw.fakeAuth.authorizeFunc = func(a authorizer.Attributes) (err error) {
 | |
| 		calledAuthorize = true
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	assertHealthIsOk(t, fw.testHTTPServer.URL+"/healthz")
 | |
| 
 | |
| 	if !calledAuthenticate {
 | |
| 		t.Fatalf("Authenticate was not called")
 | |
| 	}
 | |
| 	if !calledAttributes {
 | |
| 		t.Fatalf("Attributes were not called")
 | |
| 	}
 | |
| 	if !calledAuthorize {
 | |
| 		t.Fatalf("Authorize was not called")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestSyncLoopCheck(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	fw.fakeKubelet.hostnameFunc = func() string {
 | |
| 		return "127.0.0.1"
 | |
| 	}
 | |
| 
 | |
| 	fw.fakeKubelet.resyncInterval = time.Minute
 | |
| 	fw.fakeKubelet.loopEntryTime = time.Now()
 | |
| 
 | |
| 	// Test with correct hostname, Docker version
 | |
| 	assertHealthIsOk(t, fw.testHTTPServer.URL+"/healthz")
 | |
| 
 | |
| 	fw.fakeKubelet.loopEntryTime = time.Now().Add(time.Minute * -10)
 | |
| 	assertHealthFails(t, fw.testHTTPServer.URL+"/healthz", http.StatusInternalServerError)
 | |
| }
 | |
| 
 | |
| // returns http response status code from the HTTP GET
 | |
| func assertHealthIsOk(t *testing.T, httpURL string) {
 | |
| 	resp, err := http.Get(httpURL)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 	if resp.StatusCode != http.StatusOK {
 | |
| 		t.Errorf("expected status code %d, got %d", http.StatusOK, resp.StatusCode)
 | |
| 	}
 | |
| 	body, readErr := ioutil.ReadAll(resp.Body)
 | |
| 	if readErr != nil {
 | |
| 		// copying the response body did not work
 | |
| 		t.Fatalf("Cannot copy resp: %#v", readErr)
 | |
| 	}
 | |
| 	result := string(body)
 | |
| 	if !strings.Contains(result, "ok") {
 | |
| 		t.Errorf("expected body contains ok, got %s", result)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func setPodByNameFunc(fw *serverTestFramework, namespace, pod, container string) {
 | |
| 	fw.fakeKubelet.podByNameFunc = func(namespace, name string) (*api.Pod, bool) {
 | |
| 		return &api.Pod{
 | |
| 			ObjectMeta: api.ObjectMeta{
 | |
| 				Namespace: namespace,
 | |
| 				Name:      pod,
 | |
| 			},
 | |
| 			Spec: api.PodSpec{
 | |
| 				Containers: []api.Container{
 | |
| 					{
 | |
| 						Name: container,
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 		}, true
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func setGetContainerLogsFunc(fw *serverTestFramework, t *testing.T, expectedPodName, expectedContainerName string, expectedLogOptions *api.PodLogOptions, output string) {
 | |
| 	fw.fakeKubelet.containerLogsFunc = func(podFullName, containerName string, logOptions *api.PodLogOptions, stdout, stderr io.Writer) error {
 | |
| 		if podFullName != expectedPodName {
 | |
| 			t.Errorf("expected %s, got %s", expectedPodName, podFullName)
 | |
| 		}
 | |
| 		if containerName != expectedContainerName {
 | |
| 			t.Errorf("expected %s, got %s", expectedContainerName, containerName)
 | |
| 		}
 | |
| 		if !reflect.DeepEqual(expectedLogOptions, logOptions) {
 | |
| 			t.Errorf("expected %#v, got %#v", expectedLogOptions, logOptions)
 | |
| 		}
 | |
| 
 | |
| 		io.WriteString(stdout, output)
 | |
| 		return nil
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // TODO: I really want to be a table driven test
 | |
| func TestContainerLogs(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	output := "foo bar"
 | |
| 	podNamespace := "other"
 | |
| 	podName := "foo"
 | |
| 	expectedPodName := getPodName(podName, podNamespace)
 | |
| 	expectedContainerName := "baz"
 | |
| 	setPodByNameFunc(fw, podNamespace, podName, expectedContainerName)
 | |
| 	setGetContainerLogsFunc(fw, t, expectedPodName, expectedContainerName, &api.PodLogOptions{}, output)
 | |
| 	resp, err := http.Get(fw.testHTTPServer.URL + "/containerLogs/" + podNamespace + "/" + podName + "/" + expectedContainerName)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 
 | |
| 	body, err := ioutil.ReadAll(resp.Body)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Error reading container logs: %v", err)
 | |
| 	}
 | |
| 	result := string(body)
 | |
| 	if result != output {
 | |
| 		t.Errorf("Expected: '%v', got: '%v'", output, result)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestContainerLogsWithLimitBytes(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	output := "foo bar"
 | |
| 	podNamespace := "other"
 | |
| 	podName := "foo"
 | |
| 	expectedPodName := getPodName(podName, podNamespace)
 | |
| 	expectedContainerName := "baz"
 | |
| 	bytes := int64(3)
 | |
| 	setPodByNameFunc(fw, podNamespace, podName, expectedContainerName)
 | |
| 	setGetContainerLogsFunc(fw, t, expectedPodName, expectedContainerName, &api.PodLogOptions{LimitBytes: &bytes}, output)
 | |
| 	resp, err := http.Get(fw.testHTTPServer.URL + "/containerLogs/" + podNamespace + "/" + podName + "/" + expectedContainerName + "?limitBytes=3")
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 
 | |
| 	body, err := ioutil.ReadAll(resp.Body)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Error reading container logs: %v", err)
 | |
| 	}
 | |
| 	result := string(body)
 | |
| 	if result != output[:bytes] {
 | |
| 		t.Errorf("Expected: '%v', got: '%v'", output[:bytes], result)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestContainerLogsWithTail(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	output := "foo bar"
 | |
| 	podNamespace := "other"
 | |
| 	podName := "foo"
 | |
| 	expectedPodName := getPodName(podName, podNamespace)
 | |
| 	expectedContainerName := "baz"
 | |
| 	expectedTail := int64(5)
 | |
| 	setPodByNameFunc(fw, podNamespace, podName, expectedContainerName)
 | |
| 	setGetContainerLogsFunc(fw, t, expectedPodName, expectedContainerName, &api.PodLogOptions{TailLines: &expectedTail}, output)
 | |
| 	resp, err := http.Get(fw.testHTTPServer.URL + "/containerLogs/" + podNamespace + "/" + podName + "/" + expectedContainerName + "?tailLines=5")
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 
 | |
| 	body, err := ioutil.ReadAll(resp.Body)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Error reading container logs: %v", err)
 | |
| 	}
 | |
| 	result := string(body)
 | |
| 	if result != output {
 | |
| 		t.Errorf("Expected: '%v', got: '%v'", output, result)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestContainerLogsWithLegacyTail(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	output := "foo bar"
 | |
| 	podNamespace := "other"
 | |
| 	podName := "foo"
 | |
| 	expectedPodName := getPodName(podName, podNamespace)
 | |
| 	expectedContainerName := "baz"
 | |
| 	expectedTail := int64(5)
 | |
| 	setPodByNameFunc(fw, podNamespace, podName, expectedContainerName)
 | |
| 	setGetContainerLogsFunc(fw, t, expectedPodName, expectedContainerName, &api.PodLogOptions{TailLines: &expectedTail}, output)
 | |
| 	resp, err := http.Get(fw.testHTTPServer.URL + "/containerLogs/" + podNamespace + "/" + podName + "/" + expectedContainerName + "?tail=5")
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 
 | |
| 	body, err := ioutil.ReadAll(resp.Body)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Error reading container logs: %v", err)
 | |
| 	}
 | |
| 	result := string(body)
 | |
| 	if result != output {
 | |
| 		t.Errorf("Expected: '%v', got: '%v'", output, result)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestContainerLogsWithTailAll(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	output := "foo bar"
 | |
| 	podNamespace := "other"
 | |
| 	podName := "foo"
 | |
| 	expectedPodName := getPodName(podName, podNamespace)
 | |
| 	expectedContainerName := "baz"
 | |
| 	setPodByNameFunc(fw, podNamespace, podName, expectedContainerName)
 | |
| 	setGetContainerLogsFunc(fw, t, expectedPodName, expectedContainerName, &api.PodLogOptions{}, output)
 | |
| 	resp, err := http.Get(fw.testHTTPServer.URL + "/containerLogs/" + podNamespace + "/" + podName + "/" + expectedContainerName + "?tail=all")
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 
 | |
| 	body, err := ioutil.ReadAll(resp.Body)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Error reading container logs: %v", err)
 | |
| 	}
 | |
| 	result := string(body)
 | |
| 	if result != output {
 | |
| 		t.Errorf("Expected: '%v', got: '%v'", output, result)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestContainerLogsWithInvalidTail(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	output := "foo bar"
 | |
| 	podNamespace := "other"
 | |
| 	podName := "foo"
 | |
| 	expectedPodName := getPodName(podName, podNamespace)
 | |
| 	expectedContainerName := "baz"
 | |
| 	setPodByNameFunc(fw, podNamespace, podName, expectedContainerName)
 | |
| 	setGetContainerLogsFunc(fw, t, expectedPodName, expectedContainerName, &api.PodLogOptions{}, output)
 | |
| 	resp, err := http.Get(fw.testHTTPServer.URL + "/containerLogs/" + podNamespace + "/" + podName + "/" + expectedContainerName + "?tail=-1")
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 	if resp.StatusCode != apierrs.StatusUnprocessableEntity {
 | |
| 		t.Errorf("Unexpected non-error reading container logs: %#v", resp)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestContainerLogsWithFollow(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 	output := "foo bar"
 | |
| 	podNamespace := "other"
 | |
| 	podName := "foo"
 | |
| 	expectedPodName := getPodName(podName, podNamespace)
 | |
| 	expectedContainerName := "baz"
 | |
| 	setPodByNameFunc(fw, podNamespace, podName, expectedContainerName)
 | |
| 	setGetContainerLogsFunc(fw, t, expectedPodName, expectedContainerName, &api.PodLogOptions{Follow: true}, output)
 | |
| 	resp, err := http.Get(fw.testHTTPServer.URL + "/containerLogs/" + podNamespace + "/" + podName + "/" + expectedContainerName + "?follow=1")
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Got error GETing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 
 | |
| 	body, err := ioutil.ReadAll(resp.Body)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Error reading container logs: %v", err)
 | |
| 	}
 | |
| 	result := string(body)
 | |
| 	if result != output {
 | |
| 		t.Errorf("Expected: '%v', got: '%v'", output, result)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestServeExecInContainerIdleTimeout(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 
 | |
| 	fw.fakeKubelet.streamingConnectionIdleTimeoutFunc = func() time.Duration {
 | |
| 		return 100 * time.Millisecond
 | |
| 	}
 | |
| 
 | |
| 	podNamespace := "other"
 | |
| 	podName := "foo"
 | |
| 	expectedContainerName := "baz"
 | |
| 
 | |
| 	url := fw.testHTTPServer.URL + "/exec/" + podNamespace + "/" + podName + "/" + expectedContainerName + "?c=ls&c=-a&" + api.ExecStdinParam + "=1"
 | |
| 
 | |
| 	upgradeRoundTripper := spdy.NewSpdyRoundTripper(nil)
 | |
| 	c := &http.Client{Transport: upgradeRoundTripper}
 | |
| 
 | |
| 	resp, err := c.Post(url, "", nil)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Got error POSTing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 
 | |
| 	upgradeRoundTripper.Dialer = &net.Dialer{
 | |
| 		Deadline: time.Now().Add(60 * time.Second),
 | |
| 		Timeout:  60 * time.Second,
 | |
| 	}
 | |
| 	conn, err := upgradeRoundTripper.NewConnection(resp)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Unexpected error creating streaming connection: %s", err)
 | |
| 	}
 | |
| 	if conn == nil {
 | |
| 		t.Fatal("Unexpected nil connection")
 | |
| 	}
 | |
| 
 | |
| 	<-conn.CloseChan()
 | |
| }
 | |
| 
 | |
| func TestServeExecInContainer(t *testing.T) {
 | |
| 	tests := []struct {
 | |
| 		stdin              bool
 | |
| 		stdout             bool
 | |
| 		stderr             bool
 | |
| 		tty                bool
 | |
| 		responseStatusCode int
 | |
| 		uid                bool
 | |
| 	}{
 | |
| 		{responseStatusCode: http.StatusBadRequest},
 | |
| 		{stdin: true, responseStatusCode: http.StatusSwitchingProtocols},
 | |
| 		{stdout: true, responseStatusCode: http.StatusSwitchingProtocols},
 | |
| 		{stderr: true, responseStatusCode: http.StatusSwitchingProtocols},
 | |
| 		{stdout: true, stderr: true, responseStatusCode: http.StatusSwitchingProtocols},
 | |
| 		{stdout: true, stderr: true, tty: true, responseStatusCode: http.StatusSwitchingProtocols},
 | |
| 		{stdin: true, stdout: true, stderr: true, responseStatusCode: http.StatusSwitchingProtocols},
 | |
| 	}
 | |
| 
 | |
| 	for i, test := range tests {
 | |
| 		fw := newServerTest()
 | |
| 
 | |
| 		fw.fakeKubelet.streamingConnectionIdleTimeoutFunc = func() time.Duration {
 | |
| 			return 0
 | |
| 		}
 | |
| 
 | |
| 		podNamespace := "other"
 | |
| 		podName := "foo"
 | |
| 		expectedPodName := getPodName(podName, podNamespace)
 | |
| 		expectedUid := "9b01b80f-8fb4-11e4-95ab-4200af06647"
 | |
| 		expectedContainerName := "baz"
 | |
| 		expectedCommand := "ls -a"
 | |
| 		expectedStdin := "stdin"
 | |
| 		expectedStdout := "stdout"
 | |
| 		expectedStderr := "stderr"
 | |
| 		execFuncDone := make(chan struct{})
 | |
| 		clientStdoutReadDone := make(chan struct{})
 | |
| 		clientStderrReadDone := make(chan struct{})
 | |
| 
 | |
| 		fw.fakeKubelet.execFunc = func(podFullName string, uid types.UID, containerName string, cmd []string, in io.Reader, out, stderr io.WriteCloser, tty bool) error {
 | |
| 			defer close(execFuncDone)
 | |
| 			if podFullName != expectedPodName {
 | |
| 				t.Fatalf("%d: podFullName: expected %s, got %s", i, expectedPodName, podFullName)
 | |
| 			}
 | |
| 			if test.uid && string(uid) != expectedUid {
 | |
| 				t.Fatalf("%d: uid: expected %v, got %v", i, expectedUid, uid)
 | |
| 			}
 | |
| 			if containerName != expectedContainerName {
 | |
| 				t.Fatalf("%d: containerName: expected %s, got %s", i, expectedContainerName, containerName)
 | |
| 			}
 | |
| 			if strings.Join(cmd, " ") != expectedCommand {
 | |
| 				t.Fatalf("%d: cmd: expected: %s, got %v", i, expectedCommand, cmd)
 | |
| 			}
 | |
| 
 | |
| 			if test.stdin {
 | |
| 				if in == nil {
 | |
| 					t.Fatalf("%d: stdin: expected non-nil", i)
 | |
| 				}
 | |
| 				b := make([]byte, 10)
 | |
| 				n, err := in.Read(b)
 | |
| 				if err != nil {
 | |
| 					t.Fatalf("%d: error reading from stdin: %v", i, err)
 | |
| 				}
 | |
| 				if e, a := expectedStdin, string(b[0:n]); e != a {
 | |
| 					t.Fatalf("%d: stdin: expected to read %v, got %v", i, e, a)
 | |
| 				}
 | |
| 			} else if in != nil {
 | |
| 				t.Fatalf("%d: stdin: expected nil: %#v", i, in)
 | |
| 			}
 | |
| 
 | |
| 			if test.stdout {
 | |
| 				if out == nil {
 | |
| 					t.Fatalf("%d: stdout: expected non-nil", i)
 | |
| 				}
 | |
| 				_, err := out.Write([]byte(expectedStdout))
 | |
| 				if err != nil {
 | |
| 					t.Fatalf("%d:, error writing to stdout: %v", i, err)
 | |
| 				}
 | |
| 				out.Close()
 | |
| 				<-clientStdoutReadDone
 | |
| 			} else if out != nil {
 | |
| 				t.Fatalf("%d: stdout: expected nil: %#v", i, out)
 | |
| 			}
 | |
| 
 | |
| 			if tty {
 | |
| 				if stderr != nil {
 | |
| 					t.Fatalf("%d: tty set but received non-nil stderr: %v", i, stderr)
 | |
| 				}
 | |
| 			} else if test.stderr {
 | |
| 				if stderr == nil {
 | |
| 					t.Fatalf("%d: stderr: expected non-nil", i)
 | |
| 				}
 | |
| 				_, err := stderr.Write([]byte(expectedStderr))
 | |
| 				if err != nil {
 | |
| 					t.Fatalf("%d:, error writing to stderr: %v", i, err)
 | |
| 				}
 | |
| 				stderr.Close()
 | |
| 				<-clientStderrReadDone
 | |
| 			} else if stderr != nil {
 | |
| 				t.Fatalf("%d: stderr: expected nil: %#v", i, stderr)
 | |
| 			}
 | |
| 
 | |
| 			return nil
 | |
| 		}
 | |
| 
 | |
| 		var url string
 | |
| 		if test.uid {
 | |
| 			url = fw.testHTTPServer.URL + "/exec/" + podNamespace + "/" + podName + "/" + expectedUid + "/" + expectedContainerName + "?command=ls&command=-a"
 | |
| 		} else {
 | |
| 			url = fw.testHTTPServer.URL + "/exec/" + podNamespace + "/" + podName + "/" + expectedContainerName + "?command=ls&command=-a"
 | |
| 		}
 | |
| 		if test.stdin {
 | |
| 			url += "&" + api.ExecStdinParam + "=1"
 | |
| 		}
 | |
| 		if test.stdout {
 | |
| 			url += "&" + api.ExecStdoutParam + "=1"
 | |
| 		}
 | |
| 		if test.stderr && !test.tty {
 | |
| 			url += "&" + api.ExecStderrParam + "=1"
 | |
| 		}
 | |
| 		if test.tty {
 | |
| 			url += "&" + api.ExecTTYParam + "=1"
 | |
| 		}
 | |
| 
 | |
| 		var (
 | |
| 			resp                *http.Response
 | |
| 			err                 error
 | |
| 			upgradeRoundTripper httpstream.UpgradeRoundTripper
 | |
| 			c                   *http.Client
 | |
| 		)
 | |
| 
 | |
| 		if test.responseStatusCode != http.StatusSwitchingProtocols {
 | |
| 			c = &http.Client{}
 | |
| 		} else {
 | |
| 			upgradeRoundTripper = spdy.NewRoundTripper(nil)
 | |
| 			c = &http.Client{Transport: upgradeRoundTripper}
 | |
| 		}
 | |
| 
 | |
| 		resp, err = c.Post(url, "", nil)
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("%d: Got error POSTing: %v", i, err)
 | |
| 		}
 | |
| 		defer resp.Body.Close()
 | |
| 
 | |
| 		_, err = ioutil.ReadAll(resp.Body)
 | |
| 		if err != nil {
 | |
| 			t.Errorf("%d: Error reading response body: %v", i, err)
 | |
| 		}
 | |
| 
 | |
| 		if e, a := test.responseStatusCode, resp.StatusCode; e != a {
 | |
| 			t.Fatalf("%d: response status: expected %v, got %v", i, e, a)
 | |
| 		}
 | |
| 
 | |
| 		if test.responseStatusCode != http.StatusSwitchingProtocols {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		conn, err := upgradeRoundTripper.NewConnection(resp)
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("Unexpected error creating streaming connection: %s", err)
 | |
| 		}
 | |
| 		if conn == nil {
 | |
| 			t.Fatalf("%d: unexpected nil conn", i)
 | |
| 		}
 | |
| 		defer conn.Close()
 | |
| 
 | |
| 		h := http.Header{}
 | |
| 		h.Set(api.StreamType, api.StreamTypeError)
 | |
| 		errorStream, err := conn.CreateStream(h)
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("%d: error creating error stream: %v", i, err)
 | |
| 		}
 | |
| 		defer errorStream.Reset()
 | |
| 
 | |
| 		if test.stdin {
 | |
| 			h.Set(api.StreamType, api.StreamTypeStdin)
 | |
| 			stream, err := conn.CreateStream(h)
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: error creating stdin stream: %v", i, err)
 | |
| 			}
 | |
| 			defer stream.Reset()
 | |
| 			_, err = stream.Write([]byte(expectedStdin))
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: error writing to stdin stream: %v", i, err)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		var stdoutStream httpstream.Stream
 | |
| 		if test.stdout {
 | |
| 			h.Set(api.StreamType, api.StreamTypeStdout)
 | |
| 			stdoutStream, err = conn.CreateStream(h)
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: error creating stdout stream: %v", i, err)
 | |
| 			}
 | |
| 			defer stdoutStream.Reset()
 | |
| 		}
 | |
| 
 | |
| 		var stderrStream httpstream.Stream
 | |
| 		if test.stderr && !test.tty {
 | |
| 			h.Set(api.StreamType, api.StreamTypeStderr)
 | |
| 			stderrStream, err = conn.CreateStream(h)
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: error creating stderr stream: %v", i, err)
 | |
| 			}
 | |
| 			defer stderrStream.Reset()
 | |
| 		}
 | |
| 
 | |
| 		if test.stdout {
 | |
| 			output := make([]byte, 10)
 | |
| 			n, err := stdoutStream.Read(output)
 | |
| 			close(clientStdoutReadDone)
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: error reading from stdout stream: %v", i, err)
 | |
| 			}
 | |
| 			if e, a := expectedStdout, string(output[0:n]); e != a {
 | |
| 				t.Fatalf("%d: stdout: expected '%v', got '%v'", i, e, a)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		if test.stderr && !test.tty {
 | |
| 			output := make([]byte, 10)
 | |
| 			n, err := stderrStream.Read(output)
 | |
| 			close(clientStderrReadDone)
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: error reading from stderr stream: %v", i, err)
 | |
| 			}
 | |
| 			if e, a := expectedStderr, string(output[0:n]); e != a {
 | |
| 				t.Fatalf("%d: stderr: expected '%v', got '%v'", i, e, a)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		<-execFuncDone
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // TODO: largely cloned from TestServeExecContainer, refactor and re-use code
 | |
| func TestServeAttachContainer(t *testing.T) {
 | |
| 	tests := []struct {
 | |
| 		stdin              bool
 | |
| 		stdout             bool
 | |
| 		stderr             bool
 | |
| 		tty                bool
 | |
| 		responseStatusCode int
 | |
| 		uid                bool
 | |
| 	}{
 | |
| 		{responseStatusCode: http.StatusBadRequest},
 | |
| 		{stdin: true, responseStatusCode: http.StatusSwitchingProtocols},
 | |
| 		{stdout: true, responseStatusCode: http.StatusSwitchingProtocols},
 | |
| 		{stderr: true, responseStatusCode: http.StatusSwitchingProtocols},
 | |
| 		{stdout: true, stderr: true, responseStatusCode: http.StatusSwitchingProtocols},
 | |
| 		{stdout: true, stderr: true, tty: true, responseStatusCode: http.StatusSwitchingProtocols},
 | |
| 		{stdin: true, stdout: true, stderr: true, responseStatusCode: http.StatusSwitchingProtocols},
 | |
| 	}
 | |
| 
 | |
| 	for i, test := range tests {
 | |
| 		fw := newServerTest()
 | |
| 
 | |
| 		fw.fakeKubelet.streamingConnectionIdleTimeoutFunc = func() time.Duration {
 | |
| 			return 0
 | |
| 		}
 | |
| 
 | |
| 		podNamespace := "other"
 | |
| 		podName := "foo"
 | |
| 		expectedPodName := getPodName(podName, podNamespace)
 | |
| 		expectedUid := "9b01b80f-8fb4-11e4-95ab-4200af06647"
 | |
| 		expectedContainerName := "baz"
 | |
| 		expectedStdin := "stdin"
 | |
| 		expectedStdout := "stdout"
 | |
| 		expectedStderr := "stderr"
 | |
| 		attachFuncDone := make(chan struct{})
 | |
| 		clientStdoutReadDone := make(chan struct{})
 | |
| 		clientStderrReadDone := make(chan struct{})
 | |
| 
 | |
| 		fw.fakeKubelet.attachFunc = func(podFullName string, uid types.UID, containerName string, in io.Reader, out, stderr io.WriteCloser, tty bool) error {
 | |
| 			defer close(attachFuncDone)
 | |
| 			if podFullName != expectedPodName {
 | |
| 				t.Fatalf("%d: podFullName: expected %s, got %s", i, expectedPodName, podFullName)
 | |
| 			}
 | |
| 			if test.uid && string(uid) != expectedUid {
 | |
| 				t.Fatalf("%d: uid: expected %v, got %v", i, expectedUid, uid)
 | |
| 			}
 | |
| 			if containerName != expectedContainerName {
 | |
| 				t.Fatalf("%d: containerName: expected %s, got %s", i, expectedContainerName, containerName)
 | |
| 			}
 | |
| 
 | |
| 			if test.stdin {
 | |
| 				if in == nil {
 | |
| 					t.Fatalf("%d: stdin: expected non-nil", i)
 | |
| 				}
 | |
| 				b := make([]byte, 10)
 | |
| 				n, err := in.Read(b)
 | |
| 				if err != nil {
 | |
| 					t.Fatalf("%d: error reading from stdin: %v", i, err)
 | |
| 				}
 | |
| 				if e, a := expectedStdin, string(b[0:n]); e != a {
 | |
| 					t.Fatalf("%d: stdin: expected to read %v, got %v", i, e, a)
 | |
| 				}
 | |
| 			} else if in != nil {
 | |
| 				t.Fatalf("%d: stdin: expected nil: %#v", i, in)
 | |
| 			}
 | |
| 
 | |
| 			if test.stdout {
 | |
| 				if out == nil {
 | |
| 					t.Fatalf("%d: stdout: expected non-nil", i)
 | |
| 				}
 | |
| 				_, err := out.Write([]byte(expectedStdout))
 | |
| 				if err != nil {
 | |
| 					t.Fatalf("%d:, error writing to stdout: %v", i, err)
 | |
| 				}
 | |
| 				out.Close()
 | |
| 				<-clientStdoutReadDone
 | |
| 			} else if out != nil {
 | |
| 				t.Fatalf("%d: stdout: expected nil: %#v", i, out)
 | |
| 			}
 | |
| 
 | |
| 			if tty {
 | |
| 				if stderr != nil {
 | |
| 					t.Fatalf("%d: tty set but received non-nil stderr: %v", i, stderr)
 | |
| 				}
 | |
| 			} else if test.stderr {
 | |
| 				if stderr == nil {
 | |
| 					t.Fatalf("%d: stderr: expected non-nil", i)
 | |
| 				}
 | |
| 				_, err := stderr.Write([]byte(expectedStderr))
 | |
| 				if err != nil {
 | |
| 					t.Fatalf("%d:, error writing to stderr: %v", i, err)
 | |
| 				}
 | |
| 				stderr.Close()
 | |
| 				<-clientStderrReadDone
 | |
| 			} else if stderr != nil {
 | |
| 				t.Fatalf("%d: stderr: expected nil: %#v", i, stderr)
 | |
| 			}
 | |
| 
 | |
| 			return nil
 | |
| 		}
 | |
| 
 | |
| 		var url string
 | |
| 		if test.uid {
 | |
| 			url = fw.testHTTPServer.URL + "/attach/" + podNamespace + "/" + podName + "/" + expectedUid + "/" + expectedContainerName + "?"
 | |
| 		} else {
 | |
| 			url = fw.testHTTPServer.URL + "/attach/" + podNamespace + "/" + podName + "/" + expectedContainerName + "?"
 | |
| 		}
 | |
| 		if test.stdin {
 | |
| 			url += "&" + api.ExecStdinParam + "=1"
 | |
| 		}
 | |
| 		if test.stdout {
 | |
| 			url += "&" + api.ExecStdoutParam + "=1"
 | |
| 		}
 | |
| 		if test.stderr && !test.tty {
 | |
| 			url += "&" + api.ExecStderrParam + "=1"
 | |
| 		}
 | |
| 		if test.tty {
 | |
| 			url += "&" + api.ExecTTYParam + "=1"
 | |
| 		}
 | |
| 
 | |
| 		var (
 | |
| 			resp                *http.Response
 | |
| 			err                 error
 | |
| 			upgradeRoundTripper httpstream.UpgradeRoundTripper
 | |
| 			c                   *http.Client
 | |
| 		)
 | |
| 
 | |
| 		if test.responseStatusCode != http.StatusSwitchingProtocols {
 | |
| 			c = &http.Client{}
 | |
| 		} else {
 | |
| 			upgradeRoundTripper = spdy.NewRoundTripper(nil)
 | |
| 			c = &http.Client{Transport: upgradeRoundTripper}
 | |
| 		}
 | |
| 
 | |
| 		resp, err = c.Post(url, "", nil)
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("%d: Got error POSTing: %v", i, err)
 | |
| 		}
 | |
| 		defer resp.Body.Close()
 | |
| 
 | |
| 		_, err = ioutil.ReadAll(resp.Body)
 | |
| 		if err != nil {
 | |
| 			t.Errorf("%d: Error reading response body: %v", i, err)
 | |
| 		}
 | |
| 
 | |
| 		if e, a := test.responseStatusCode, resp.StatusCode; e != a {
 | |
| 			t.Fatalf("%d: response status: expected %v, got %v", i, e, a)
 | |
| 		}
 | |
| 
 | |
| 		if test.responseStatusCode != http.StatusSwitchingProtocols {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		conn, err := upgradeRoundTripper.NewConnection(resp)
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("Unexpected error creating streaming connection: %s", err)
 | |
| 		}
 | |
| 		if conn == nil {
 | |
| 			t.Fatalf("%d: unexpected nil conn", i)
 | |
| 		}
 | |
| 		defer conn.Close()
 | |
| 
 | |
| 		h := http.Header{}
 | |
| 		h.Set(api.StreamType, api.StreamTypeError)
 | |
| 		errorStream, err := conn.CreateStream(h)
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("%d: error creating error stream: %v", i, err)
 | |
| 		}
 | |
| 		defer errorStream.Reset()
 | |
| 
 | |
| 		if test.stdin {
 | |
| 			h.Set(api.StreamType, api.StreamTypeStdin)
 | |
| 			stream, err := conn.CreateStream(h)
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: error creating stdin stream: %v", i, err)
 | |
| 			}
 | |
| 			defer stream.Reset()
 | |
| 			_, err = stream.Write([]byte(expectedStdin))
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: error writing to stdin stream: %v", i, err)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		var stdoutStream httpstream.Stream
 | |
| 		if test.stdout {
 | |
| 			h.Set(api.StreamType, api.StreamTypeStdout)
 | |
| 			stdoutStream, err = conn.CreateStream(h)
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: error creating stdout stream: %v", i, err)
 | |
| 			}
 | |
| 			defer stdoutStream.Reset()
 | |
| 		}
 | |
| 
 | |
| 		var stderrStream httpstream.Stream
 | |
| 		if test.stderr && !test.tty {
 | |
| 			h.Set(api.StreamType, api.StreamTypeStderr)
 | |
| 			stderrStream, err = conn.CreateStream(h)
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: error creating stderr stream: %v", i, err)
 | |
| 			}
 | |
| 			defer stderrStream.Reset()
 | |
| 		}
 | |
| 
 | |
| 		if test.stdout {
 | |
| 			output := make([]byte, 10)
 | |
| 			n, err := stdoutStream.Read(output)
 | |
| 			close(clientStdoutReadDone)
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: error reading from stdout stream: %v", i, err)
 | |
| 			}
 | |
| 			if e, a := expectedStdout, string(output[0:n]); e != a {
 | |
| 				t.Fatalf("%d: stdout: expected '%v', got '%v'", i, e, a)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		if test.stderr && !test.tty {
 | |
| 			output := make([]byte, 10)
 | |
| 			n, err := stderrStream.Read(output)
 | |
| 			close(clientStderrReadDone)
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: error reading from stderr stream: %v", i, err)
 | |
| 			}
 | |
| 			if e, a := expectedStderr, string(output[0:n]); e != a {
 | |
| 				t.Fatalf("%d: stderr: expected '%v', got '%v'", i, e, a)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		<-attachFuncDone
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestServePortForwardIdleTimeout(t *testing.T) {
 | |
| 	fw := newServerTest()
 | |
| 
 | |
| 	fw.fakeKubelet.streamingConnectionIdleTimeoutFunc = func() time.Duration {
 | |
| 		return 100 * time.Millisecond
 | |
| 	}
 | |
| 
 | |
| 	podNamespace := "other"
 | |
| 	podName := "foo"
 | |
| 
 | |
| 	url := fw.testHTTPServer.URL + "/portForward/" + podNamespace + "/" + podName
 | |
| 
 | |
| 	upgradeRoundTripper := spdy.NewRoundTripper(nil)
 | |
| 	c := &http.Client{Transport: upgradeRoundTripper}
 | |
| 
 | |
| 	resp, err := c.Post(url, "", nil)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Got error POSTing: %v", err)
 | |
| 	}
 | |
| 	defer resp.Body.Close()
 | |
| 
 | |
| 	conn, err := upgradeRoundTripper.NewConnection(resp)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("Unexpected error creating streaming connection: %s", err)
 | |
| 	}
 | |
| 	if conn == nil {
 | |
| 		t.Fatal("Unexpected nil connection")
 | |
| 	}
 | |
| 	defer conn.Close()
 | |
| 
 | |
| 	<-conn.CloseChan()
 | |
| }
 | |
| 
 | |
| func TestServePortForward(t *testing.T) {
 | |
| 	tests := []struct {
 | |
| 		port          string
 | |
| 		uid           bool
 | |
| 		clientData    string
 | |
| 		containerData string
 | |
| 		shouldError   bool
 | |
| 	}{
 | |
| 		{port: "", shouldError: true},
 | |
| 		{port: "abc", shouldError: true},
 | |
| 		{port: "-1", shouldError: true},
 | |
| 		{port: "65536", shouldError: true},
 | |
| 		{port: "0", shouldError: true},
 | |
| 		{port: "1", shouldError: false},
 | |
| 		{port: "8000", shouldError: false},
 | |
| 		{port: "8000", clientData: "client data", containerData: "container data", shouldError: false},
 | |
| 		{port: "65535", shouldError: false},
 | |
| 		{port: "65535", uid: true, shouldError: false},
 | |
| 	}
 | |
| 
 | |
| 	podNamespace := "other"
 | |
| 	podName := "foo"
 | |
| 	expectedPodName := getPodName(podName, podNamespace)
 | |
| 	expectedUid := "9b01b80f-8fb4-11e4-95ab-4200af06647"
 | |
| 
 | |
| 	for i, test := range tests {
 | |
| 		fw := newServerTest()
 | |
| 
 | |
| 		fw.fakeKubelet.streamingConnectionIdleTimeoutFunc = func() time.Duration {
 | |
| 			return 0
 | |
| 		}
 | |
| 
 | |
| 		portForwardFuncDone := make(chan struct{})
 | |
| 
 | |
| 		fw.fakeKubelet.portForwardFunc = func(name string, uid types.UID, port uint16, stream io.ReadWriteCloser) error {
 | |
| 			defer close(portForwardFuncDone)
 | |
| 
 | |
| 			if e, a := expectedPodName, name; e != a {
 | |
| 				t.Fatalf("%d: pod name: expected '%v', got '%v'", i, e, a)
 | |
| 			}
 | |
| 
 | |
| 			if e, a := expectedUid, uid; test.uid && e != string(a) {
 | |
| 				t.Fatalf("%d: uid: expected '%v', got '%v'", i, e, a)
 | |
| 			}
 | |
| 
 | |
| 			p, err := strconv.ParseUint(test.port, 10, 16)
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: error parsing port string '%s': %v", i, test.port, err)
 | |
| 			}
 | |
| 			if e, a := uint16(p), port; e != a {
 | |
| 				t.Fatalf("%d: port: expected '%v', got '%v'", i, e, a)
 | |
| 			}
 | |
| 
 | |
| 			if test.clientData != "" {
 | |
| 				fromClient := make([]byte, 32)
 | |
| 				n, err := stream.Read(fromClient)
 | |
| 				if err != nil {
 | |
| 					t.Fatalf("%d: error reading client data: %v", i, err)
 | |
| 				}
 | |
| 				if e, a := test.clientData, string(fromClient[0:n]); e != a {
 | |
| 					t.Fatalf("%d: client data: expected to receive '%v', got '%v'", i, e, a)
 | |
| 				}
 | |
| 			}
 | |
| 
 | |
| 			if test.containerData != "" {
 | |
| 				_, err := stream.Write([]byte(test.containerData))
 | |
| 				if err != nil {
 | |
| 					t.Fatalf("%d: error writing container data: %v", i, err)
 | |
| 				}
 | |
| 			}
 | |
| 
 | |
| 			return nil
 | |
| 		}
 | |
| 
 | |
| 		var url string
 | |
| 		if test.uid {
 | |
| 			url = fmt.Sprintf("%s/portForward/%s/%s/%s", fw.testHTTPServer.URL, podNamespace, podName, expectedUid)
 | |
| 		} else {
 | |
| 			url = fmt.Sprintf("%s/portForward/%s/%s", fw.testHTTPServer.URL, podNamespace, podName)
 | |
| 		}
 | |
| 
 | |
| 		upgradeRoundTripper := spdy.NewRoundTripper(nil)
 | |
| 		c := &http.Client{Transport: upgradeRoundTripper}
 | |
| 
 | |
| 		resp, err := c.Post(url, "", nil)
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("%d: Got error POSTing: %v", i, err)
 | |
| 		}
 | |
| 		defer resp.Body.Close()
 | |
| 
 | |
| 		conn, err := upgradeRoundTripper.NewConnection(resp)
 | |
| 		if err != nil {
 | |
| 			t.Fatalf("Unexpected error creating streaming connection: %s", err)
 | |
| 		}
 | |
| 		if conn == nil {
 | |
| 			t.Fatalf("%d: Unexpected nil connection", i)
 | |
| 		}
 | |
| 		defer conn.Close()
 | |
| 
 | |
| 		headers := http.Header{}
 | |
| 		headers.Set("streamType", "error")
 | |
| 		headers.Set("port", test.port)
 | |
| 		errorStream, err := conn.CreateStream(headers)
 | |
| 		_ = errorStream
 | |
| 		haveErr := err != nil
 | |
| 		if e, a := test.shouldError, haveErr; e != a {
 | |
| 			t.Fatalf("%d: create stream: expected err=%t, got %t: %v", i, e, a, err)
 | |
| 		}
 | |
| 
 | |
| 		if test.shouldError {
 | |
| 			continue
 | |
| 		}
 | |
| 
 | |
| 		headers.Set("streamType", "data")
 | |
| 		headers.Set("port", test.port)
 | |
| 		dataStream, err := conn.CreateStream(headers)
 | |
| 		haveErr = err != nil
 | |
| 		if e, a := test.shouldError, haveErr; e != a {
 | |
| 			t.Fatalf("%d: create stream: expected err=%t, got %t: %v", i, e, a, err)
 | |
| 		}
 | |
| 
 | |
| 		if test.clientData != "" {
 | |
| 			_, err := dataStream.Write([]byte(test.clientData))
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: unexpected error writing client data: %v", i, err)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		if test.containerData != "" {
 | |
| 			fromContainer := make([]byte, 32)
 | |
| 			n, err := dataStream.Read(fromContainer)
 | |
| 			if err != nil {
 | |
| 				t.Fatalf("%d: unexpected error reading container data: %v", i, err)
 | |
| 			}
 | |
| 			if e, a := test.containerData, string(fromContainer[0:n]); e != a {
 | |
| 				t.Fatalf("%d: expected to receive '%v' from container, got '%v'", i, e, a)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		<-portForwardFuncDone
 | |
| 	}
 | |
| }
 | |
| 
 | |
| type fakeHttpStream struct {
 | |
| 	headers http.Header
 | |
| 	id      uint32
 | |
| }
 | |
| 
 | |
| func newFakeHttpStream() *fakeHttpStream {
 | |
| 	return &fakeHttpStream{
 | |
| 		headers: make(http.Header),
 | |
| 	}
 | |
| }
 | |
| 
 | |
| var _ httpstream.Stream = &fakeHttpStream{}
 | |
| 
 | |
| func (s *fakeHttpStream) Read(data []byte) (int, error) {
 | |
| 	return 0, nil
 | |
| }
 | |
| 
 | |
| func (s *fakeHttpStream) Write(data []byte) (int, error) {
 | |
| 	return 0, nil
 | |
| }
 | |
| 
 | |
| func (s *fakeHttpStream) Close() error {
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (s *fakeHttpStream) Reset() error {
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (s *fakeHttpStream) Headers() http.Header {
 | |
| 	return s.headers
 | |
| }
 | |
| 
 | |
| func (s *fakeHttpStream) Identifier() uint32 {
 | |
| 	return s.id
 | |
| }
 | |
| 
 | |
| func TestPortForwardStreamReceived(t *testing.T) {
 | |
| 	tests := map[string]struct {
 | |
| 		port          string
 | |
| 		streamType    string
 | |
| 		expectedError string
 | |
| 	}{
 | |
| 		"missing port": {
 | |
| 			expectedError: `"port" header is required`,
 | |
| 		},
 | |
| 		"unable to parse port": {
 | |
| 			port:          "abc",
 | |
| 			expectedError: `unable to parse "abc" as a port: strconv.ParseUint: parsing "abc": invalid syntax`,
 | |
| 		},
 | |
| 		"negative port": {
 | |
| 			port:          "-1",
 | |
| 			expectedError: `unable to parse "-1" as a port: strconv.ParseUint: parsing "-1": invalid syntax`,
 | |
| 		},
 | |
| 		"missing stream type": {
 | |
| 			port:          "80",
 | |
| 			expectedError: `"streamType" header is required`,
 | |
| 		},
 | |
| 		"valid port with error stream": {
 | |
| 			port:       "80",
 | |
| 			streamType: "error",
 | |
| 		},
 | |
| 		"valid port with data stream": {
 | |
| 			port:       "80",
 | |
| 			streamType: "data",
 | |
| 		},
 | |
| 		"invalid stream type": {
 | |
| 			port:          "80",
 | |
| 			streamType:    "foo",
 | |
| 			expectedError: `invalid stream type "foo"`,
 | |
| 		},
 | |
| 	}
 | |
| 	for name, test := range tests {
 | |
| 		streams := make(chan httpstream.Stream, 1)
 | |
| 		f := portForwardStreamReceived(streams)
 | |
| 		stream := newFakeHttpStream()
 | |
| 		if len(test.port) > 0 {
 | |
| 			stream.headers.Set("port", test.port)
 | |
| 		}
 | |
| 		if len(test.streamType) > 0 {
 | |
| 			stream.headers.Set("streamType", test.streamType)
 | |
| 		}
 | |
| 		err := f(stream)
 | |
| 		if len(test.expectedError) > 0 {
 | |
| 			if err == nil {
 | |
| 				t.Errorf("%s: expected err=%q, but it was nil", name, test.expectedError)
 | |
| 			}
 | |
| 			if e, a := test.expectedError, err.Error(); e != a {
 | |
| 				t.Errorf("%s: expected err=%q, got %q", name, e, a)
 | |
| 			}
 | |
| 			continue
 | |
| 		}
 | |
| 		if err != nil {
 | |
| 			t.Errorf("%s: unexpected error %v", name, err)
 | |
| 			continue
 | |
| 		}
 | |
| 		if s := <-streams; s != stream {
 | |
| 			t.Errorf("%s: expected stream %#v, got %#v", name, stream, s)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestGetStreamPair(t *testing.T) {
 | |
| 	timeout := make(chan time.Time)
 | |
| 
 | |
| 	h := &portForwardStreamHandler{
 | |
| 		streamPairs: make(map[string]*portForwardStreamPair),
 | |
| 	}
 | |
| 
 | |
| 	// test adding a new entry
 | |
| 	p, created := h.getStreamPair("1")
 | |
| 	if p == nil {
 | |
| 		t.Fatalf("unexpected nil pair")
 | |
| 	}
 | |
| 	if !created {
 | |
| 		t.Fatal("expected created=true")
 | |
| 	}
 | |
| 	if p.dataStream != nil {
 | |
| 		t.Errorf("unexpected non-nil data stream")
 | |
| 	}
 | |
| 	if p.errorStream != nil {
 | |
| 		t.Errorf("unexpected non-nil error stream")
 | |
| 	}
 | |
| 
 | |
| 	// start the monitor for this pair
 | |
| 	monitorDone := make(chan struct{})
 | |
| 	go func() {
 | |
| 		h.monitorStreamPair(p, timeout)
 | |
| 		close(monitorDone)
 | |
| 	}()
 | |
| 
 | |
| 	if !h.hasStreamPair("1") {
 | |
| 		t.Fatal("This should still be true")
 | |
| 	}
 | |
| 
 | |
| 	// make sure we can retrieve an existing entry
 | |
| 	p2, created := h.getStreamPair("1")
 | |
| 	if created {
 | |
| 		t.Fatal("expected created=false")
 | |
| 	}
 | |
| 	if p != p2 {
 | |
| 		t.Fatalf("retrieving an existing pair: expected %#v, got %#v", p, p2)
 | |
| 	}
 | |
| 
 | |
| 	// removed via complete
 | |
| 	dataStream := newFakeHttpStream()
 | |
| 	dataStream.headers.Set(api.StreamType, api.StreamTypeData)
 | |
| 	complete, err := p.add(dataStream)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error adding data stream to pair: %v", err)
 | |
| 	}
 | |
| 	if complete {
 | |
| 		t.Fatalf("unexpected complete")
 | |
| 	}
 | |
| 
 | |
| 	errorStream := newFakeHttpStream()
 | |
| 	errorStream.headers.Set(api.StreamType, api.StreamTypeError)
 | |
| 	complete, err = p.add(errorStream)
 | |
| 	if err != nil {
 | |
| 		t.Fatalf("unexpected error adding error stream to pair: %v", err)
 | |
| 	}
 | |
| 	if !complete {
 | |
| 		t.Fatal("unexpected incomplete")
 | |
| 	}
 | |
| 
 | |
| 	// make sure monitorStreamPair completed
 | |
| 	<-monitorDone
 | |
| 
 | |
| 	// make sure the pair was removed
 | |
| 	if h.hasStreamPair("1") {
 | |
| 		t.Fatal("expected removal of pair after both data and error streams received")
 | |
| 	}
 | |
| 
 | |
| 	// removed via timeout
 | |
| 	p, created = h.getStreamPair("2")
 | |
| 	if !created {
 | |
| 		t.Fatal("expected created=true")
 | |
| 	}
 | |
| 	if p == nil {
 | |
| 		t.Fatal("expected p not to be nil")
 | |
| 	}
 | |
| 	monitorDone = make(chan struct{})
 | |
| 	go func() {
 | |
| 		h.monitorStreamPair(p, timeout)
 | |
| 		close(monitorDone)
 | |
| 	}()
 | |
| 	// cause the timeout
 | |
| 	close(timeout)
 | |
| 	// make sure monitorStreamPair completed
 | |
| 	<-monitorDone
 | |
| 	if h.hasStreamPair("2") {
 | |
| 		t.Fatal("expected stream pair to be removed")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestRequestID(t *testing.T) {
 | |
| 	h := &portForwardStreamHandler{}
 | |
| 
 | |
| 	s := newFakeHttpStream()
 | |
| 	s.headers.Set(api.StreamType, api.StreamTypeError)
 | |
| 	s.id = 1
 | |
| 	if e, a := "1", h.requestID(s); e != a {
 | |
| 		t.Errorf("expected %q, got %q", e, a)
 | |
| 	}
 | |
| 
 | |
| 	s.headers.Set(api.StreamType, api.StreamTypeData)
 | |
| 	s.id = 3
 | |
| 	if e, a := "1", h.requestID(s); e != a {
 | |
| 		t.Errorf("expected %q, got %q", e, a)
 | |
| 	}
 | |
| 
 | |
| 	s.id = 7
 | |
| 	s.headers.Set(api.PortForwardRequestIDHeader, "2")
 | |
| 	if e, a := "2", h.requestID(s); e != a {
 | |
| 		t.Errorf("expected %q, got %q", e, a)
 | |
| 	}
 | |
| }
 | 
