mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			330 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			330 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2017 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package controlplane
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"encoding/json"
 | 
						|
	"fmt"
 | 
						|
	"strings"
 | 
						|
	"testing"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"k8s.io/apiextensions-apiserver/test/integration/fixtures"
 | 
						|
 | 
						|
	apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
 | 
						|
 | 
						|
	v1 "k8s.io/api/core/v1"
 | 
						|
	networkingv1 "k8s.io/api/networking/v1"
 | 
						|
	apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1"
 | 
						|
	apiextensionsclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/runtime/schema"
 | 
						|
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						|
	"k8s.io/client-go/dynamic"
 | 
						|
	"k8s.io/client-go/kubernetes"
 | 
						|
	"k8s.io/kube-openapi/pkg/validation/spec"
 | 
						|
	kubeapiservertesting "k8s.io/kubernetes/cmd/kube-apiserver/app/testing"
 | 
						|
	"k8s.io/kubernetes/test/integration/etcd"
 | 
						|
	"k8s.io/kubernetes/test/integration/framework"
 | 
						|
)
 | 
						|
 | 
						|
func TestCRDShadowGroup(t *testing.T) {
 | 
						|
	result := kubeapiservertesting.StartTestServerOrDie(t, nil, nil, framework.SharedEtcd())
 | 
						|
	defer result.TearDownFn()
 | 
						|
 | 
						|
	testNamespace := "test-crd-shadow-group"
 | 
						|
	kubeclient, err := kubernetes.NewForConfig(result.ClientConfig)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("Unexpected error: %v", err)
 | 
						|
	}
 | 
						|
	if _, err := kubeclient.CoreV1().Namespaces().Create(context.TODO(), (&v1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: testNamespace}}), metav1.CreateOptions{}); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	apiextensionsclient, err := apiextensionsclientset.NewForConfig(result.ClientConfig)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("Unexpected error: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	t.Logf("Creating a NetworkPolicy")
 | 
						|
	nwPolicy, err := kubeclient.NetworkingV1().NetworkPolicies(testNamespace).Create(context.TODO(), &networkingv1.NetworkPolicy{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: testNamespace},
 | 
						|
		Spec: networkingv1.NetworkPolicySpec{
 | 
						|
			PodSelector: metav1.LabelSelector{MatchLabels: map[string]string{"foo": "bar"}},
 | 
						|
			Ingress:     []networkingv1.NetworkPolicyIngressRule{},
 | 
						|
		},
 | 
						|
	}, metav1.CreateOptions{})
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("Failed to create NetworkPolicy: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	t.Logf("Trying to shadow networking group")
 | 
						|
	crd := &apiextensionsv1.CustomResourceDefinition{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name:        "foos." + networkingv1.GroupName,
 | 
						|
			Annotations: map[string]string{"api-approved.kubernetes.io": "unapproved, test-only"},
 | 
						|
		},
 | 
						|
		Spec: apiextensionsv1.CustomResourceDefinitionSpec{
 | 
						|
			Group: networkingv1.GroupName,
 | 
						|
			Scope: apiextensionsv1.ClusterScoped,
 | 
						|
			Names: apiextensionsv1.CustomResourceDefinitionNames{
 | 
						|
				Plural: "foos",
 | 
						|
				Kind:   "Foo",
 | 
						|
			},
 | 
						|
			Versions: []apiextensionsv1.CustomResourceDefinitionVersion{
 | 
						|
				{
 | 
						|
					Name:    networkingv1.SchemeGroupVersion.Version,
 | 
						|
					Served:  true,
 | 
						|
					Storage: true,
 | 
						|
					Schema:  fixtures.AllowAllSchema(),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	etcd.CreateTestCRDs(t, apiextensionsclient, true, crd)
 | 
						|
 | 
						|
	// wait to give aggregator time to update
 | 
						|
	time.Sleep(2 * time.Second)
 | 
						|
 | 
						|
	t.Logf("Checking that we still see the NetworkPolicy")
 | 
						|
	_, err = kubeclient.NetworkingV1().NetworkPolicies(nwPolicy.Namespace).Get(context.TODO(), nwPolicy.Name, metav1.GetOptions{})
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to get NetworkPolocy: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	t.Logf("Checking that crd resource does not show up in networking group")
 | 
						|
	if etcd.CrdExistsInDiscovery(apiextensionsclient, crd) {
 | 
						|
		t.Errorf("CRD resource shows up in discovery, but shouldn't.")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestCRD(t *testing.T) {
 | 
						|
	result := kubeapiservertesting.StartTestServerOrDie(t, nil, nil, framework.SharedEtcd())
 | 
						|
	defer result.TearDownFn()
 | 
						|
 | 
						|
	testNamespace := "test-crd"
 | 
						|
	kubeclient, err := kubernetes.NewForConfig(result.ClientConfig)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("Unexpected error: %v", err)
 | 
						|
	}
 | 
						|
	if _, err := kubeclient.CoreV1().Namespaces().Create(context.TODO(), (&v1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: testNamespace}}), metav1.CreateOptions{}); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
 | 
						|
	apiextensionsclient, err := apiextensionsclientset.NewForConfig(result.ClientConfig)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("Unexpected error: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	t.Logf("Trying to create a custom resource without conflict")
 | 
						|
	crd := &apiextensionsv1.CustomResourceDefinition{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name: "foos.cr.bar.com",
 | 
						|
		},
 | 
						|
		Spec: apiextensionsv1.CustomResourceDefinitionSpec{
 | 
						|
			Group: "cr.bar.com",
 | 
						|
			Scope: apiextensionsv1.NamespaceScoped,
 | 
						|
			Names: apiextensionsv1.CustomResourceDefinitionNames{
 | 
						|
				Plural: "foos",
 | 
						|
				Kind:   "Foo",
 | 
						|
			},
 | 
						|
			Versions: []apiextensionsv1.CustomResourceDefinitionVersion{
 | 
						|
				{
 | 
						|
					Name:    networkingv1.SchemeGroupVersion.Version,
 | 
						|
					Served:  true,
 | 
						|
					Storage: true,
 | 
						|
					Schema:  fixtures.AllowAllSchema(),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	etcd.CreateTestCRDs(t, apiextensionsclient, false, crd)
 | 
						|
 | 
						|
	t.Logf("Trying to access foos.cr.bar.com with dynamic client")
 | 
						|
	dynamicClient, err := dynamic.NewForConfig(result.ClientConfig)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("Unexpected error: %v", err)
 | 
						|
	}
 | 
						|
	fooResource := schema.GroupVersionResource{Group: "cr.bar.com", Version: "v1", Resource: "foos"}
 | 
						|
	_, err = dynamicClient.Resource(fooResource).Namespace(testNamespace).List(context.TODO(), metav1.ListOptions{})
 | 
						|
	if err != nil {
 | 
						|
		t.Errorf("Failed to list foos.cr.bar.com instances: %v", err)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestCRDOpenAPI(t *testing.T) {
 | 
						|
	result := kubeapiservertesting.StartTestServerOrDie(t, nil, nil, framework.SharedEtcd())
 | 
						|
	defer result.TearDownFn()
 | 
						|
	kubeclient, err := kubernetes.NewForConfig(result.ClientConfig)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("Unexpected error: %v", err)
 | 
						|
	}
 | 
						|
	apiextensionsclient, err := apiextensionsclientset.NewForConfig(result.ClientConfig)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("Unexpected error: %v", err)
 | 
						|
	}
 | 
						|
	dynamicClient, err := dynamic.NewForConfig(result.ClientConfig)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatalf("Unexpected error: %v", err)
 | 
						|
	}
 | 
						|
 | 
						|
	t.Logf("Trying to create a CustomResourceDefinitions")
 | 
						|
	nonStructuralBetaCRD := &apiextensionsv1beta1.CustomResourceDefinition{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name: "foos.nonstructural.cr.bar.com",
 | 
						|
		},
 | 
						|
		Spec: apiextensionsv1beta1.CustomResourceDefinitionSpec{
 | 
						|
			Group:   "nonstructural.cr.bar.com",
 | 
						|
			Version: "v1",
 | 
						|
			Scope:   apiextensionsv1beta1.NamespaceScoped,
 | 
						|
			Names: apiextensionsv1beta1.CustomResourceDefinitionNames{
 | 
						|
				Plural: "foos",
 | 
						|
				Kind:   "Foo",
 | 
						|
			},
 | 
						|
			Validation: &apiextensionsv1beta1.CustomResourceValidation{
 | 
						|
				OpenAPIV3Schema: &apiextensionsv1beta1.JSONSchemaProps{
 | 
						|
					Type: "object",
 | 
						|
					Properties: map[string]apiextensionsv1beta1.JSONSchemaProps{
 | 
						|
						"foo": {},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	structuralCRD := &apiextensionsv1.CustomResourceDefinition{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Name: "foos.structural.cr.bar.com",
 | 
						|
		},
 | 
						|
		Spec: apiextensionsv1.CustomResourceDefinitionSpec{
 | 
						|
			Group: "structural.cr.bar.com",
 | 
						|
			Scope: apiextensionsv1.NamespaceScoped,
 | 
						|
			Names: apiextensionsv1.CustomResourceDefinitionNames{
 | 
						|
				Plural: "foos",
 | 
						|
				Kind:   "Foo",
 | 
						|
			},
 | 
						|
			Versions: []apiextensionsv1.CustomResourceDefinitionVersion{
 | 
						|
				{
 | 
						|
					Name:    "v1",
 | 
						|
					Served:  true,
 | 
						|
					Storage: true,
 | 
						|
					Schema: &apiextensionsv1.CustomResourceValidation{
 | 
						|
						OpenAPIV3Schema: &apiextensionsv1.JSONSchemaProps{
 | 
						|
							Type: "object",
 | 
						|
							Properties: map[string]apiextensionsv1.JSONSchemaProps{
 | 
						|
								"foo": {Type: "string"},
 | 
						|
							},
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
	nonStructuralCRD, err := fixtures.CreateCRDUsingRemovedAPI(result.EtcdClient, result.EtcdStoragePrefix, nonStructuralBetaCRD, apiextensionsclient, dynamicClient)
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	etcd.CreateTestCRDs(t, apiextensionsclient, false, structuralCRD)
 | 
						|
 | 
						|
	getPublishedSchema := func(defName string) (*spec.Schema, error) {
 | 
						|
		bs, err := kubeclient.RESTClient().Get().AbsPath("openapi", "v2").DoRaw(context.TODO())
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		spec := spec.Swagger{}
 | 
						|
		if err := json.Unmarshal(bs, &spec); err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		if spec.SwaggerProps.Paths == nil {
 | 
						|
			return nil, nil
 | 
						|
		}
 | 
						|
		d, ok := spec.SwaggerProps.Definitions[defName]
 | 
						|
		if !ok {
 | 
						|
			return nil, nil
 | 
						|
		}
 | 
						|
		return &d, nil
 | 
						|
	}
 | 
						|
 | 
						|
	waitForSpec := func(crd *apiextensionsv1.CustomResourceDefinition, expectedType string) {
 | 
						|
		t.Logf(`Waiting for {properties: {"foo": {"type":"%s"}}} to show up in schema`, expectedType)
 | 
						|
		lastMsg := ""
 | 
						|
		if err := wait.PollImmediate(500*time.Millisecond, 10*time.Second, func() (bool, error) {
 | 
						|
			lastMsg = ""
 | 
						|
			defName := crdDefinitionName(crd)
 | 
						|
			schema, err := getPublishedSchema(defName)
 | 
						|
			if err != nil {
 | 
						|
				lastMsg = err.Error()
 | 
						|
				return false, nil
 | 
						|
			}
 | 
						|
			if schema == nil {
 | 
						|
				lastMsg = fmt.Sprintf("spec.SwaggerProps.Definitions[%q] not found", defName)
 | 
						|
				return false, nil
 | 
						|
			}
 | 
						|
			p, ok := schema.Properties["foo"]
 | 
						|
			if !ok {
 | 
						|
				lastMsg = fmt.Sprintf(`spec.SwaggerProps.Definitions[%q].Properties["foo"] not found`, defName)
 | 
						|
				return false, nil
 | 
						|
			}
 | 
						|
			if !p.Type.Contains(expectedType) {
 | 
						|
				lastMsg = fmt.Sprintf(`spec.SwaggerProps.Definitions[%q].Properties["foo"].Type should be %q, but got: %q`, defName, expectedType, p.Type)
 | 
						|
				return false, nil
 | 
						|
			}
 | 
						|
			return true, nil
 | 
						|
		}); err != nil {
 | 
						|
			t.Fatalf("Failed to see %s OpenAPI spec in discovery: %v, last message: %s", structuralCRD.Name, err, lastMsg)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	t.Logf("Check that structural schema is published")
 | 
						|
	waitForSpec(structuralCRD, "string")
 | 
						|
	structuralCRD, err = apiextensionsclient.ApiextensionsV1().CustomResourceDefinitions().Get(context.TODO(), structuralCRD.Name, metav1.GetOptions{})
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	prop := structuralCRD.Spec.Versions[0].Schema.OpenAPIV3Schema.Properties["foo"]
 | 
						|
	prop.Type = "boolean"
 | 
						|
	structuralCRD.Spec.Versions[0].Schema.OpenAPIV3Schema.Properties["foo"] = prop
 | 
						|
	if _, err = apiextensionsclient.ApiextensionsV1().CustomResourceDefinitions().Update(context.TODO(), structuralCRD, metav1.UpdateOptions{}); err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	waitForSpec(structuralCRD, "boolean")
 | 
						|
 | 
						|
	t.Logf("Check that non-structural schema is not published")
 | 
						|
	schema, err := getPublishedSchema(crdDefinitionName(nonStructuralCRD))
 | 
						|
	if err != nil {
 | 
						|
		t.Fatal(err)
 | 
						|
	}
 | 
						|
	if schema == nil {
 | 
						|
		t.Fatal("expected a non-nil schema")
 | 
						|
	}
 | 
						|
	if foo, ok := schema.Properties["foo"]; ok {
 | 
						|
		t.Fatalf("unexpected published 'foo' property: %#v", foo)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func crdDefinitionName(crd *apiextensionsv1.CustomResourceDefinition) string {
 | 
						|
	sgmts := strings.Split(crd.Spec.Group, ".")
 | 
						|
	reverse(sgmts)
 | 
						|
	return strings.Join(append(sgmts, crd.Spec.Versions[0].Name, crd.Spec.Names.Kind), ".")
 | 
						|
}
 | 
						|
 | 
						|
func reverse(s []string) {
 | 
						|
	for i, j := 0, len(s)-1; i < j; i, j = i+1, j-1 {
 | 
						|
		s[i], s[j] = s[j], s[i]
 | 
						|
	}
 | 
						|
}
 |