52baf68d50
Signed-off-by: Michał Żyłowski <michal.zylowski@intel.com>
315 lines
8.2 KiB
Go
315 lines
8.2 KiB
Go
/*
|
|
Copyright 2015 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package e2e
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
"time"
|
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/fields"
|
|
"k8s.io/apimachinery/pkg/labels"
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
"k8s.io/kubernetes/pkg/api/v1"
|
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
|
"k8s.io/kubernetes/pkg/util/intstr"
|
|
"k8s.io/kubernetes/test/e2e/framework"
|
|
|
|
. "github.com/onsi/ginkgo"
|
|
. "github.com/onsi/gomega"
|
|
)
|
|
|
|
type dnsConfigMapTest struct {
|
|
f *framework.Framework
|
|
c clientset.Interface
|
|
ns string
|
|
name string
|
|
labels []string
|
|
|
|
cm *v1.ConfigMap
|
|
fedMap map[string]string
|
|
isValid bool
|
|
|
|
dnsPod *v1.Pod
|
|
utilPod *v1.Pod
|
|
utilService *v1.Service
|
|
}
|
|
|
|
var _ = framework.KubeDescribe("DNS config map", func() {
|
|
test := &dnsConfigMapTest{
|
|
f: framework.NewDefaultFramework("dns-config-map"),
|
|
ns: "kube-system",
|
|
name: "kube-dns",
|
|
}
|
|
|
|
BeforeEach(func() {
|
|
test.c = test.f.ClientSet
|
|
})
|
|
|
|
It("should be able to change configuration", func() {
|
|
test.run()
|
|
})
|
|
})
|
|
|
|
func (t *dnsConfigMapTest) init() {
|
|
By("Finding a DNS pod")
|
|
label := labels.SelectorFromSet(labels.Set(map[string]string{"k8s-app": "kube-dns"}))
|
|
options := metav1.ListOptions{LabelSelector: label.String()}
|
|
|
|
pods, err := t.f.ClientSet.Core().Pods("kube-system").List(options)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
Expect(len(pods.Items)).Should(BeNumerically(">=", 1))
|
|
|
|
t.dnsPod = &pods.Items[0]
|
|
framework.Logf("Using DNS pod: %v", t.dnsPod.Name)
|
|
}
|
|
|
|
func (t *dnsConfigMapTest) run() {
|
|
t.init()
|
|
|
|
defer t.c.Core().ConfigMaps(t.ns).Delete(t.name, nil)
|
|
t.createUtilPod()
|
|
defer t.deleteUtilPod()
|
|
|
|
t.validate()
|
|
|
|
t.labels = []string{"abc", "ghi"}
|
|
valid1 := map[string]string{"federations": t.labels[0] + "=def"}
|
|
valid1m := map[string]string{t.labels[0]: "def"}
|
|
valid2 := map[string]string{"federations": t.labels[1] + "=xyz"}
|
|
valid2m := map[string]string{t.labels[1]: "xyz"}
|
|
invalid := map[string]string{"federations": "invalid.map=xyz"}
|
|
|
|
By("empty -> valid1")
|
|
t.setConfigMap(&v1.ConfigMap{Data: valid1}, valid1m, true)
|
|
t.validate()
|
|
|
|
By("valid1 -> valid2")
|
|
t.setConfigMap(&v1.ConfigMap{Data: valid2}, valid2m, true)
|
|
t.validate()
|
|
|
|
By("valid2 -> invalid")
|
|
t.setConfigMap(&v1.ConfigMap{Data: invalid}, nil, false)
|
|
t.validate()
|
|
|
|
By("invalid -> valid1")
|
|
t.setConfigMap(&v1.ConfigMap{Data: valid1}, valid1m, true)
|
|
t.validate()
|
|
|
|
By("valid1 -> deleted")
|
|
t.deleteConfigMap()
|
|
t.validate()
|
|
|
|
By("deleted -> invalid")
|
|
t.setConfigMap(&v1.ConfigMap{Data: invalid}, nil, false)
|
|
t.validate()
|
|
}
|
|
|
|
func (t *dnsConfigMapTest) validate() {
|
|
t.validateFederation()
|
|
}
|
|
|
|
func (t *dnsConfigMapTest) validateFederation() {
|
|
federations := t.fedMap
|
|
|
|
if len(federations) == 0 {
|
|
By(fmt.Sprintf("Validating federation labels %v do not exist", t.labels))
|
|
|
|
for _, label := range t.labels {
|
|
var federationDNS = fmt.Sprintf("e2e-dns-configmap.%s.%s.svc.cluster.local.",
|
|
t.f.Namespace.Name, label)
|
|
predicate := func(actual []string) bool {
|
|
return len(actual) == 0
|
|
}
|
|
t.checkDNSRecord(federationDNS, predicate, wait.ForeverTestTimeout)
|
|
}
|
|
} else {
|
|
for label := range federations {
|
|
var federationDNS = fmt.Sprintf("%s.%s.%s.svc.cluster.local.",
|
|
t.utilService.ObjectMeta.Name, t.f.Namespace.Name, label)
|
|
var localDNS = fmt.Sprintf("%s.%s.svc.cluster.local.",
|
|
t.utilService.ObjectMeta.Name, t.f.Namespace.Name)
|
|
// Check local mapping. Checking a remote mapping requires
|
|
// creating an arbitrary DNS record which is not possible at the
|
|
// moment.
|
|
By(fmt.Sprintf("Validating federation record %v", label))
|
|
predicate := func(actual []string) bool {
|
|
for _, v := range actual {
|
|
if v == localDNS {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
t.checkDNSRecord(federationDNS, predicate, wait.ForeverTestTimeout)
|
|
}
|
|
}
|
|
}
|
|
|
|
func (t *dnsConfigMapTest) checkDNSRecord(name string, predicate func([]string) bool, timeout time.Duration) {
|
|
var actual []string
|
|
|
|
err := wait.PollImmediate(
|
|
time.Duration(1)*time.Second,
|
|
timeout,
|
|
func() (bool, error) {
|
|
actual = t.runDig(name)
|
|
if predicate(actual) {
|
|
return true, nil
|
|
}
|
|
return false, nil
|
|
})
|
|
|
|
if err != nil {
|
|
framework.Logf("dig result did not match: %#v after %v",
|
|
actual, timeout)
|
|
}
|
|
}
|
|
|
|
// runDig querying for `dnsName`. Returns a list of responses.
|
|
func (t *dnsConfigMapTest) runDig(dnsName string) []string {
|
|
cmd := []string{
|
|
"/usr/bin/dig",
|
|
"+short",
|
|
"@" + t.dnsPod.Status.PodIP,
|
|
"-p", "10053", dnsName,
|
|
}
|
|
stdout, stderr, err := t.f.ExecWithOptions(framework.ExecOptions{
|
|
Command: cmd,
|
|
Namespace: t.f.Namespace.Name,
|
|
PodName: t.utilPod.Name,
|
|
ContainerName: "util",
|
|
CaptureStdout: true,
|
|
CaptureStderr: true,
|
|
})
|
|
|
|
framework.Logf("Running dig: %v, stdout: %q, stderr: %q, err: %v",
|
|
cmd, stdout, stderr, err)
|
|
|
|
if stdout == "" {
|
|
return []string{}
|
|
} else {
|
|
return strings.Split(stdout, "\n")
|
|
}
|
|
}
|
|
|
|
func (t *dnsConfigMapTest) setConfigMap(cm *v1.ConfigMap, fedMap map[string]string, isValid bool) {
|
|
if isValid {
|
|
t.cm = cm
|
|
t.fedMap = fedMap
|
|
}
|
|
t.isValid = isValid
|
|
|
|
cm.ObjectMeta.Namespace = t.ns
|
|
cm.ObjectMeta.Name = t.name
|
|
|
|
options := metav1.ListOptions{
|
|
FieldSelector: fields.Set{
|
|
"metadata.namespace": t.ns,
|
|
"metadata.name": t.name,
|
|
}.AsSelector().String(),
|
|
}
|
|
cmList, err := t.c.Core().ConfigMaps(t.ns).List(options)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
if len(cmList.Items) == 0 {
|
|
By(fmt.Sprintf("Creating the ConfigMap (%s:%s) %+v", t.ns, t.name, *cm))
|
|
_, err := t.c.Core().ConfigMaps(t.ns).Create(cm)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
} else {
|
|
By(fmt.Sprintf("Updating the ConfigMap (%s:%s) to %+v", t.ns, t.name, *cm))
|
|
_, err := t.c.Core().ConfigMaps(t.ns).Update(cm)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
}
|
|
}
|
|
|
|
func (t *dnsConfigMapTest) deleteConfigMap() {
|
|
By(fmt.Sprintf("Deleting the ConfigMap (%s:%s)", t.ns, t.name))
|
|
|
|
t.cm = nil
|
|
t.isValid = false
|
|
|
|
err := t.c.Core().ConfigMaps(t.ns).Delete(t.name, nil)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
}
|
|
|
|
func (t *dnsConfigMapTest) createUtilPod() {
|
|
// Actual port # doesn't matter, just need to exist.
|
|
const servicePort = 10101
|
|
|
|
t.utilPod = &v1.Pod{
|
|
TypeMeta: metav1.TypeMeta{
|
|
Kind: "Pod",
|
|
},
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Namespace: t.f.Namespace.Name,
|
|
Labels: map[string]string{"app": "e2e-dns-configmap"},
|
|
GenerateName: "e2e-dns-configmap-",
|
|
},
|
|
Spec: v1.PodSpec{
|
|
Containers: []v1.Container{
|
|
{
|
|
Name: "util",
|
|
Image: "gcr.io/google_containers/dnsutils:e2e",
|
|
Command: []string{"sleep", "10000"},
|
|
Ports: []v1.ContainerPort{
|
|
{ContainerPort: servicePort, Protocol: "TCP"},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
var err error
|
|
t.utilPod, err = t.c.Core().Pods(t.f.Namespace.Name).Create(t.utilPod)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
framework.Logf("Created pod %v", t.utilPod)
|
|
Expect(t.f.WaitForPodRunning(t.utilPod.Name)).NotTo(HaveOccurred())
|
|
|
|
t.utilService = &v1.Service{
|
|
TypeMeta: metav1.TypeMeta{
|
|
Kind: "Service",
|
|
},
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Namespace: t.f.Namespace.Name,
|
|
Name: "e2e-dns-configmap",
|
|
},
|
|
Spec: v1.ServiceSpec{
|
|
Selector: map[string]string{"app": "e2e-dns-configmap"},
|
|
Ports: []v1.ServicePort{
|
|
{
|
|
Protocol: "TCP",
|
|
Port: servicePort,
|
|
TargetPort: intstr.FromInt(servicePort),
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
t.utilService, err = t.c.Core().Services(t.f.Namespace.Name).Create(t.utilService)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
framework.Logf("Created service %v", t.utilService)
|
|
}
|
|
|
|
func (t *dnsConfigMapTest) deleteUtilPod() {
|
|
podClient := t.c.Core().Pods(t.f.Namespace.Name)
|
|
if err := podClient.Delete(t.utilPod.Name, metav1.NewDeleteOptions(0)); err != nil {
|
|
framework.Logf("Delete of pod %v:%v failed: %v",
|
|
t.utilPod.Namespace, t.utilPod.Name, err)
|
|
}
|
|
}
|