2017-02-01 00:45:59 +00:00
|
|
|
/*
|
|
|
|
Copyright 2014 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package config
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
|
|
"k8s.io/apimachinery/pkg/types"
|
2017-02-03 13:41:32 +00:00
|
|
|
utiltesting "k8s.io/client-go/util/testing"
|
2017-02-01 00:45:59 +00:00
|
|
|
"k8s.io/kubernetes/pkg/api"
|
|
|
|
"k8s.io/kubernetes/pkg/api/testapi"
|
|
|
|
"k8s.io/kubernetes/pkg/api/v1"
|
|
|
|
"k8s.io/kubernetes/pkg/api/validation"
|
|
|
|
kubetypes "k8s.io/kubernetes/pkg/kubelet/types"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestURLErrorNotExistNoUpdate(t *testing.T) {
|
|
|
|
ch := make(chan interface{})
|
|
|
|
NewSourceURL("http://localhost:49575/_not_found_", http.Header{}, "localhost", time.Millisecond, ch)
|
|
|
|
select {
|
|
|
|
case got := <-ch:
|
|
|
|
t.Errorf("Expected no update, Got %#v", got)
|
|
|
|
case <-time.After(2 * time.Millisecond):
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestExtractFromHttpBadness(t *testing.T) {
|
|
|
|
ch := make(chan interface{}, 1)
|
|
|
|
c := sourceURL{"http://localhost:49575/_not_found_", http.Header{}, "other", ch, nil, 0, http.DefaultClient}
|
|
|
|
if err := c.extractFromURL(); err == nil {
|
|
|
|
t.Errorf("Expected error")
|
|
|
|
}
|
|
|
|
expectEmptyChannel(t, ch)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestExtractInvalidPods(t *testing.T) {
|
|
|
|
var testCases = []struct {
|
|
|
|
desc string
|
|
|
|
pod *v1.Pod
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
desc: "No version",
|
|
|
|
pod: &v1.Pod{TypeMeta: metav1.TypeMeta{APIVersion: ""}},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "Invalid version",
|
|
|
|
pod: &v1.Pod{TypeMeta: metav1.TypeMeta{APIVersion: "v1betta2"}},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "Invalid volume name",
|
|
|
|
pod: &v1.Pod{
|
|
|
|
TypeMeta: metav1.TypeMeta{APIVersion: api.Registry.GroupOrDie(v1.GroupName).GroupVersion.String()},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
Volumes: []v1.Volume{{Name: "_INVALID_"}},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "Duplicate volume names",
|
|
|
|
pod: &v1.Pod{
|
|
|
|
TypeMeta: metav1.TypeMeta{APIVersion: api.Registry.GroupOrDie(v1.GroupName).GroupVersion.String()},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
Volumes: []v1.Volume{{Name: "repeated"}, {Name: "repeated"}},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "Unspecified container name",
|
|
|
|
pod: &v1.Pod{
|
|
|
|
TypeMeta: metav1.TypeMeta{APIVersion: api.Registry.GroupOrDie(v1.GroupName).GroupVersion.String()},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
Containers: []v1.Container{{Name: ""}},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "Invalid container name",
|
|
|
|
pod: &v1.Pod{
|
|
|
|
TypeMeta: metav1.TypeMeta{APIVersion: api.Registry.GroupOrDie(v1.GroupName).GroupVersion.String()},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
Containers: []v1.Container{{Name: "_INVALID_"}},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, testCase := range testCases {
|
|
|
|
data, err := json.Marshal(testCase.pod)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("%s: Some weird json problem: %v", testCase.desc, err)
|
|
|
|
}
|
|
|
|
fakeHandler := utiltesting.FakeHandler{
|
|
|
|
StatusCode: 200,
|
|
|
|
ResponseBody: string(data),
|
|
|
|
}
|
|
|
|
testServer := httptest.NewServer(&fakeHandler)
|
|
|
|
defer testServer.Close()
|
|
|
|
ch := make(chan interface{}, 1)
|
|
|
|
c := sourceURL{testServer.URL, http.Header{}, "localhost", ch, nil, 0, http.DefaultClient}
|
|
|
|
if err := c.extractFromURL(); err == nil {
|
|
|
|
t.Errorf("%s: Expected error", testCase.desc)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestExtractPodsFromHTTP(t *testing.T) {
|
|
|
|
nodeName := "different-value"
|
|
|
|
|
|
|
|
grace := int64(30)
|
|
|
|
var testCases = []struct {
|
|
|
|
desc string
|
|
|
|
pods runtime.Object
|
|
|
|
expected kubetypes.PodUpdate
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
desc: "Single pod",
|
|
|
|
pods: &v1.Pod{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "Pod",
|
|
|
|
APIVersion: "",
|
|
|
|
},
|
2017-02-03 13:41:32 +00:00
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2017-02-01 00:45:59 +00:00
|
|
|
Name: "foo",
|
|
|
|
UID: "111",
|
|
|
|
Namespace: "mynamespace",
|
|
|
|
},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
NodeName: string(nodeName),
|
2017-02-03 13:41:32 +00:00
|
|
|
Containers: []v1.Container{{Name: "1", Image: "foo", ImagePullPolicy: v1.PullAlways, TerminationMessagePolicy: v1.TerminationMessageReadFile}},
|
2017-02-01 00:45:59 +00:00
|
|
|
SecurityContext: &v1.PodSecurityContext{},
|
2017-02-03 13:41:32 +00:00
|
|
|
SchedulerName: api.DefaultSchedulerName,
|
2017-02-01 00:45:59 +00:00
|
|
|
},
|
|
|
|
Status: v1.PodStatus{
|
|
|
|
Phase: v1.PodPending,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expected: CreatePodUpdate(kubetypes.SET,
|
|
|
|
kubetypes.HTTPSource,
|
|
|
|
&v1.Pod{
|
2017-02-03 13:41:32 +00:00
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2017-02-01 00:45:59 +00:00
|
|
|
UID: "111",
|
|
|
|
Name: "foo" + "-" + nodeName,
|
|
|
|
Namespace: "mynamespace",
|
|
|
|
Annotations: map[string]string{kubetypes.ConfigHashAnnotationKey: "111"},
|
|
|
|
SelfLink: getSelfLink("foo-"+nodeName, "mynamespace"),
|
|
|
|
},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
NodeName: nodeName,
|
|
|
|
RestartPolicy: v1.RestartPolicyAlways,
|
|
|
|
DNSPolicy: v1.DNSClusterFirst,
|
|
|
|
SecurityContext: &v1.PodSecurityContext{},
|
|
|
|
TerminationGracePeriodSeconds: &grace,
|
2017-02-03 13:41:32 +00:00
|
|
|
SchedulerName: api.DefaultSchedulerName,
|
2017-02-01 00:45:59 +00:00
|
|
|
|
|
|
|
Containers: []v1.Container{{
|
|
|
|
Name: "1",
|
|
|
|
Image: "foo",
|
2017-02-03 13:41:32 +00:00
|
|
|
TerminationMessagePath: "/dev/termination-log",
|
|
|
|
ImagePullPolicy: "Always",
|
|
|
|
TerminationMessagePolicy: v1.TerminationMessageReadFile,
|
2017-02-01 00:45:59 +00:00
|
|
|
}},
|
|
|
|
},
|
|
|
|
Status: v1.PodStatus{
|
|
|
|
Phase: v1.PodPending,
|
|
|
|
},
|
|
|
|
}),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
desc: "Multiple pods",
|
|
|
|
pods: &v1.PodList{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "PodList",
|
|
|
|
APIVersion: "",
|
|
|
|
},
|
|
|
|
Items: []v1.Pod{
|
|
|
|
{
|
2017-02-03 13:41:32 +00:00
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2017-02-01 00:45:59 +00:00
|
|
|
Name: "foo",
|
|
|
|
UID: "111",
|
|
|
|
},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
NodeName: nodeName,
|
2017-02-03 13:41:32 +00:00
|
|
|
Containers: []v1.Container{{Name: "1", Image: "foo", ImagePullPolicy: v1.PullAlways, TerminationMessagePolicy: v1.TerminationMessageReadFile}},
|
2017-02-01 00:45:59 +00:00
|
|
|
SecurityContext: &v1.PodSecurityContext{},
|
2017-02-03 13:41:32 +00:00
|
|
|
SchedulerName: api.DefaultSchedulerName,
|
2017-02-01 00:45:59 +00:00
|
|
|
},
|
|
|
|
Status: v1.PodStatus{
|
|
|
|
Phase: v1.PodPending,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
2017-02-03 13:41:32 +00:00
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2017-02-01 00:45:59 +00:00
|
|
|
Name: "bar",
|
|
|
|
UID: "222",
|
|
|
|
},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
NodeName: nodeName,
|
2017-02-03 13:41:32 +00:00
|
|
|
Containers: []v1.Container{{Name: "2", Image: "bar:bartag", ImagePullPolicy: "", TerminationMessagePolicy: v1.TerminationMessageReadFile}},
|
2017-02-01 00:45:59 +00:00
|
|
|
SecurityContext: &v1.PodSecurityContext{},
|
2017-02-03 13:41:32 +00:00
|
|
|
SchedulerName: api.DefaultSchedulerName,
|
2017-02-01 00:45:59 +00:00
|
|
|
},
|
|
|
|
Status: v1.PodStatus{
|
|
|
|
Phase: v1.PodPending,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
expected: CreatePodUpdate(kubetypes.SET,
|
|
|
|
kubetypes.HTTPSource,
|
|
|
|
&v1.Pod{
|
2017-02-03 13:41:32 +00:00
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2017-02-01 00:45:59 +00:00
|
|
|
UID: "111",
|
|
|
|
Name: "foo" + "-" + nodeName,
|
|
|
|
Namespace: "default",
|
|
|
|
Annotations: map[string]string{kubetypes.ConfigHashAnnotationKey: "111"},
|
2017-02-03 13:41:32 +00:00
|
|
|
SelfLink: getSelfLink("foo-"+nodeName, metav1.NamespaceDefault),
|
2017-02-01 00:45:59 +00:00
|
|
|
},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
NodeName: nodeName,
|
|
|
|
RestartPolicy: v1.RestartPolicyAlways,
|
|
|
|
DNSPolicy: v1.DNSClusterFirst,
|
|
|
|
TerminationGracePeriodSeconds: &grace,
|
|
|
|
SecurityContext: &v1.PodSecurityContext{},
|
2017-02-03 13:41:32 +00:00
|
|
|
SchedulerName: api.DefaultSchedulerName,
|
2017-02-01 00:45:59 +00:00
|
|
|
|
|
|
|
Containers: []v1.Container{{
|
|
|
|
Name: "1",
|
|
|
|
Image: "foo",
|
2017-02-03 13:41:32 +00:00
|
|
|
TerminationMessagePath: "/dev/termination-log",
|
|
|
|
ImagePullPolicy: "Always",
|
|
|
|
TerminationMessagePolicy: v1.TerminationMessageReadFile,
|
2017-02-01 00:45:59 +00:00
|
|
|
}},
|
|
|
|
},
|
|
|
|
Status: v1.PodStatus{
|
|
|
|
Phase: v1.PodPending,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
&v1.Pod{
|
2017-02-03 13:41:32 +00:00
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2017-02-01 00:45:59 +00:00
|
|
|
UID: "222",
|
|
|
|
Name: "bar" + "-" + nodeName,
|
|
|
|
Namespace: "default",
|
|
|
|
Annotations: map[string]string{kubetypes.ConfigHashAnnotationKey: "222"},
|
2017-02-03 13:41:32 +00:00
|
|
|
SelfLink: getSelfLink("bar-"+nodeName, metav1.NamespaceDefault),
|
2017-02-01 00:45:59 +00:00
|
|
|
},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
NodeName: nodeName,
|
|
|
|
RestartPolicy: v1.RestartPolicyAlways,
|
|
|
|
DNSPolicy: v1.DNSClusterFirst,
|
|
|
|
TerminationGracePeriodSeconds: &grace,
|
|
|
|
SecurityContext: &v1.PodSecurityContext{},
|
2017-02-03 13:41:32 +00:00
|
|
|
SchedulerName: api.DefaultSchedulerName,
|
2017-02-01 00:45:59 +00:00
|
|
|
|
|
|
|
Containers: []v1.Container{{
|
|
|
|
Name: "2",
|
|
|
|
Image: "bar:bartag",
|
2017-02-03 13:41:32 +00:00
|
|
|
TerminationMessagePath: "/dev/termination-log",
|
|
|
|
ImagePullPolicy: "IfNotPresent",
|
|
|
|
TerminationMessagePolicy: v1.TerminationMessageReadFile,
|
2017-02-01 00:45:59 +00:00
|
|
|
}},
|
|
|
|
},
|
|
|
|
Status: v1.PodStatus{
|
|
|
|
Phase: v1.PodPending,
|
|
|
|
},
|
|
|
|
}),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, testCase := range testCases {
|
|
|
|
var versionedPods runtime.Object
|
|
|
|
err := testapi.Default.Converter().Convert(&testCase.pods, &versionedPods, nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("%s: error in versioning the pods: %s", testCase.desc, err)
|
|
|
|
}
|
|
|
|
data, err := runtime.Encode(testapi.Default.Codec(), versionedPods)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("%s: error in encoding the pod: %v", testCase.desc, err)
|
|
|
|
}
|
|
|
|
fakeHandler := utiltesting.FakeHandler{
|
|
|
|
StatusCode: 200,
|
|
|
|
ResponseBody: string(data),
|
|
|
|
}
|
|
|
|
testServer := httptest.NewServer(&fakeHandler)
|
|
|
|
defer testServer.Close()
|
|
|
|
ch := make(chan interface{}, 1)
|
|
|
|
c := sourceURL{testServer.URL, http.Header{}, types.NodeName(nodeName), ch, nil, 0, http.DefaultClient}
|
|
|
|
if err := c.extractFromURL(); err != nil {
|
|
|
|
t.Errorf("%s: Unexpected error: %v", testCase.desc, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
update := (<-ch).(kubetypes.PodUpdate)
|
|
|
|
|
|
|
|
if !api.Semantic.DeepEqual(testCase.expected, update) {
|
|
|
|
t.Errorf("%s: Expected: %#v, Got: %#v", testCase.desc, testCase.expected, update)
|
|
|
|
}
|
|
|
|
for _, pod := range update.Pods {
|
|
|
|
// TODO: remove the conversion when validation is performed on versioned objects.
|
|
|
|
internalPod := &api.Pod{}
|
|
|
|
if err := v1.Convert_v1_Pod_To_api_Pod(pod, internalPod, nil); err != nil {
|
|
|
|
t.Fatalf("%s: Cannot convert pod %#v, %#v", testCase.desc, pod, err)
|
|
|
|
}
|
|
|
|
if errs := validation.ValidatePod(internalPod); len(errs) != 0 {
|
|
|
|
t.Errorf("%s: Expected no validation errors on %#v, Got %v", testCase.desc, pod, errs.ToAggregate())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestURLWithHeader(t *testing.T) {
|
|
|
|
pod := &v1.Pod{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
APIVersion: api.Registry.GroupOrDie(v1.GroupName).GroupVersion.String(),
|
|
|
|
Kind: "Pod",
|
|
|
|
},
|
2017-02-03 13:41:32 +00:00
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2017-02-01 00:45:59 +00:00
|
|
|
Name: "foo",
|
|
|
|
UID: "111",
|
|
|
|
Namespace: "mynamespace",
|
|
|
|
},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
NodeName: "localhost",
|
|
|
|
Containers: []v1.Container{{Name: "1", Image: "foo", ImagePullPolicy: v1.PullAlways}},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
data, err := json.Marshal(pod)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unexpected json marshalling error: %v", err)
|
|
|
|
}
|
|
|
|
fakeHandler := utiltesting.FakeHandler{
|
|
|
|
StatusCode: 200,
|
|
|
|
ResponseBody: string(data),
|
|
|
|
}
|
|
|
|
testServer := httptest.NewServer(&fakeHandler)
|
|
|
|
defer testServer.Close()
|
|
|
|
ch := make(chan interface{}, 1)
|
|
|
|
header := make(http.Header)
|
|
|
|
header.Set("Metadata-Flavor", "Google")
|
|
|
|
c := sourceURL{testServer.URL, header, "localhost", ch, nil, 0, http.DefaultClient}
|
|
|
|
if err := c.extractFromURL(); err != nil {
|
|
|
|
t.Fatalf("Unexpected error extracting from URL: %v", err)
|
|
|
|
}
|
|
|
|
update := (<-ch).(kubetypes.PodUpdate)
|
|
|
|
|
|
|
|
headerVal := fakeHandler.RequestReceived.Header["Metadata-Flavor"]
|
|
|
|
if len(headerVal) != 1 || headerVal[0] != "Google" {
|
|
|
|
t.Errorf("Header missing expected entry %v. Got %v", header, fakeHandler.RequestReceived.Header)
|
|
|
|
}
|
|
|
|
if len(update.Pods) != 1 {
|
|
|
|
t.Errorf("Received wrong number of pods, expected one: %v", update.Pods)
|
|
|
|
}
|
|
|
|
}
|