2017-02-01 00:45:59 +00:00
|
|
|
/*
|
|
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package admission
|
|
|
|
|
|
|
|
import (
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"reflect"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"k8s.io/kubernetes/pkg/apis/componentconfig"
|
|
|
|
_ "k8s.io/kubernetes/pkg/apis/componentconfig/install"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestReadAdmissionConfiguration(t *testing.T) {
|
|
|
|
// create a place holder file to hold per test config
|
|
|
|
configFile, err := ioutil.TempFile("", "admission-plugin-config")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected err: %v", err)
|
|
|
|
}
|
|
|
|
if err = configFile.Close(); err != nil {
|
|
|
|
t.Fatalf("unexpected err: %v", err)
|
|
|
|
}
|
|
|
|
configFileName := configFile.Name()
|
|
|
|
// the location that will be fixed up to be relative to the test config file.
|
|
|
|
imagePolicyWebhookFile, err := makeAbs("image-policy-webhook.json", os.TempDir())
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected err: %v", err)
|
|
|
|
}
|
|
|
|
// individual test scenarios
|
|
|
|
testCases := map[string]struct {
|
|
|
|
ConfigBody string
|
|
|
|
ExpectedAdmissionConfig *componentconfig.AdmissionConfiguration
|
|
|
|
PluginNames []string
|
|
|
|
}{
|
|
|
|
"v1Alpha1 configuration - path fixup": {
|
|
|
|
ConfigBody: `{
|
|
|
|
"apiVersion": "componentconfig/v1alpha1",
|
|
|
|
"kind": "AdmissionConfiguration",
|
|
|
|
"plugins": [
|
|
|
|
{"name": "ImagePolicyWebhook", "path": "image-policy-webhook.json"},
|
|
|
|
{"name": "ResourceQuota"}
|
|
|
|
]}`,
|
|
|
|
ExpectedAdmissionConfig: &componentconfig.AdmissionConfiguration{
|
|
|
|
Plugins: []componentconfig.AdmissionPluginConfiguration{
|
|
|
|
{
|
|
|
|
Name: "ImagePolicyWebhook",
|
|
|
|
Path: imagePolicyWebhookFile,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "ResourceQuota",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
PluginNames: []string{},
|
|
|
|
},
|
|
|
|
"v1Alpha1 configuration - abspath": {
|
|
|
|
ConfigBody: `{
|
|
|
|
"apiVersion": "componentconfig/v1alpha1",
|
|
|
|
"kind": "AdmissionConfiguration",
|
|
|
|
"plugins": [
|
|
|
|
{"name": "ImagePolicyWebhook", "path": "/tmp/image-policy-webhook.json"},
|
|
|
|
{"name": "ResourceQuota"}
|
|
|
|
]}`,
|
|
|
|
ExpectedAdmissionConfig: &componentconfig.AdmissionConfiguration{
|
|
|
|
Plugins: []componentconfig.AdmissionPluginConfiguration{
|
|
|
|
{
|
|
|
|
Name: "ImagePolicyWebhook",
|
|
|
|
Path: "/tmp/image-policy-webhook.json",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "ResourceQuota",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
PluginNames: []string{},
|
|
|
|
},
|
|
|
|
"legacy configuration with using legacy plugins": {
|
|
|
|
ConfigBody: `{
|
|
|
|
"imagePolicy": {
|
|
|
|
"kubeConfigFile": "/home/user/.kube/config",
|
|
|
|
"allowTTL": 30,
|
|
|
|
"denyTTL": 30,
|
|
|
|
"retryBackoff": 500,
|
|
|
|
"defaultAllow": true
|
|
|
|
},
|
|
|
|
"podNodeSelectorPluginConfig": {
|
|
|
|
"clusterDefaultNodeSelector": ""
|
|
|
|
}
|
|
|
|
}`,
|
|
|
|
ExpectedAdmissionConfig: &componentconfig.AdmissionConfiguration{
|
|
|
|
Plugins: []componentconfig.AdmissionPluginConfiguration{
|
|
|
|
{
|
|
|
|
Name: "ImagePolicyWebhook",
|
|
|
|
Path: configFileName,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "PodNodeSelector",
|
|
|
|
Path: configFileName,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
PluginNames: []string{"ImagePolicyWebhook", "PodNodeSelector"},
|
|
|
|
},
|
|
|
|
"legacy configuration not using legacy plugins": {
|
|
|
|
ConfigBody: `{
|
|
|
|
"imagePolicy": {
|
|
|
|
"kubeConfigFile": "/home/user/.kube/config",
|
|
|
|
"allowTTL": 30,
|
|
|
|
"denyTTL": 30,
|
|
|
|
"retryBackoff": 500,
|
|
|
|
"defaultAllow": true
|
|
|
|
},
|
|
|
|
"podNodeSelectorPluginConfig": {
|
|
|
|
"clusterDefaultNodeSelector": ""
|
|
|
|
}
|
|
|
|
}`,
|
|
|
|
ExpectedAdmissionConfig: &componentconfig.AdmissionConfiguration{},
|
|
|
|
PluginNames: []string{"NamespaceLifecycle", "InitialResources"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for testName, testCase := range testCases {
|
|
|
|
if err = ioutil.WriteFile(configFileName, []byte(testCase.ConfigBody), 0644); err != nil {
|
|
|
|
t.Fatalf("unexpected err writing temp file: %v", err)
|
|
|
|
}
|
|
|
|
config, err := ReadAdmissionConfiguration(testCase.PluginNames, configFileName)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected err: %v", err)
|
|
|
|
}
|
2017-02-03 13:41:32 +00:00
|
|
|
if !reflect.DeepEqual(config.(configProvider).config, testCase.ExpectedAdmissionConfig) {
|
|
|
|
t.Errorf("%s: Expected:\n\t%#v\nGot:\n\t%#v", testName, testCase.ExpectedAdmissionConfig, config.(configProvider).config)
|
2017-02-01 00:45:59 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|