2014-07-23 18:08:16 +00:00
|
|
|
/*
|
2016-06-03 00:25:58 +00:00
|
|
|
Copyright 2014 The Kubernetes Authors.
|
2014-07-23 18:08:16 +00:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package examples_test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"regexp"
|
2015-03-13 22:19:55 +00:00
|
|
|
"strings"
|
2014-07-23 18:08:16 +00:00
|
|
|
"testing"
|
|
|
|
|
2015-08-05 22:05:17 +00:00
|
|
|
"github.com/golang/glog"
|
2015-08-05 22:03:47 +00:00
|
|
|
"k8s.io/kubernetes/pkg/api"
|
2015-09-11 06:37:26 +00:00
|
|
|
"k8s.io/kubernetes/pkg/api/testapi"
|
2015-08-05 22:03:47 +00:00
|
|
|
"k8s.io/kubernetes/pkg/api/validation"
|
2016-07-16 19:08:11 +00:00
|
|
|
"k8s.io/kubernetes/pkg/apis/apps"
|
|
|
|
appsvalidation "k8s.io/kubernetes/pkg/apis/apps/validation"
|
2016-04-18 15:44:19 +00:00
|
|
|
"k8s.io/kubernetes/pkg/apis/batch"
|
2015-10-09 22:04:41 +00:00
|
|
|
"k8s.io/kubernetes/pkg/apis/extensions"
|
2015-10-19 21:08:35 +00:00
|
|
|
expvalidation "k8s.io/kubernetes/pkg/apis/extensions/validation"
|
2015-08-05 22:03:47 +00:00
|
|
|
"k8s.io/kubernetes/pkg/capabilities"
|
2016-09-21 13:01:02 +00:00
|
|
|
"k8s.io/kubernetes/pkg/registry/batch/job"
|
2015-08-05 22:03:47 +00:00
|
|
|
"k8s.io/kubernetes/pkg/runtime"
|
Added Selector Generation to Job.
Added selector generation to Job's
strategy.Validate, right before validation.
Can't do in defaulting since UID is not known.
Added a validation to Job to ensure that the generated
labels and selector are correct when generation was requested.
This happens right after generation, but validation is in a better
place to return an error.
Adds "manualSelector" field to batch/v1 Job to control selector generation.
Adds same field to extensions/__internal. Conversion between those two
is automatic.
Adds "autoSelector" field to extensions/v1beta1 Job. Used for storing batch/v1 Jobs
- Default for v1 is to do generation.
- Default for v1beta1 is to not do it.
- In both cases, unset == false == do the default thing.
Release notes:
Added batch/v1 group, which contains just Job, and which is the next
version of extensions/v1beta1 Job.
The changes from the previous version are:
- Users no longer need to ensure labels on their pod template are unique to the enclosing
job (but may add labels as needed for categorization).
- In v1beta1, job.spec.selector was defaulted from pod labels, with the user responsible for uniqueness.
In v1, a unique label is generated and added to the pod template, and used as the selector (other
labels added by user stay on pod template, but need not be used by selector).
- a new field called "manualSelector" field exists to control whether the new behavior is used,
versus a more error-prone but more flexible "manual" (not generated) seletor. Most users
will not need to use this field and should leave it unset.
Users who are creating extensions.Job go objects and then posting them using the go client
will see a change in the default behavior. They need to either stop providing a selector (relying on
selector generation) or else specify "spec.manualSelector" until they are ready to do the former.
2016-02-08 23:55:40 +00:00
|
|
|
"k8s.io/kubernetes/pkg/types"
|
2015-11-06 23:30:52 +00:00
|
|
|
"k8s.io/kubernetes/pkg/util/validation/field"
|
2015-08-05 22:03:47 +00:00
|
|
|
"k8s.io/kubernetes/pkg/util/yaml"
|
|
|
|
schedulerapi "k8s.io/kubernetes/plugin/pkg/scheduler/api"
|
|
|
|
schedulerapilatest "k8s.io/kubernetes/plugin/pkg/scheduler/api/latest"
|
2014-07-23 18:08:16 +00:00
|
|
|
)
|
|
|
|
|
2015-11-06 23:30:52 +00:00
|
|
|
func validateObject(obj runtime.Object) (errors field.ErrorList) {
|
2014-07-23 18:08:16 +00:00
|
|
|
switch t := obj.(type) {
|
|
|
|
case *api.ReplicationController:
|
2014-11-07 02:09:46 +00:00
|
|
|
if t.Namespace == "" {
|
|
|
|
t.Namespace = api.NamespaceDefault
|
|
|
|
}
|
|
|
|
errors = validation.ValidateReplicationController(t)
|
2014-07-23 18:08:16 +00:00
|
|
|
case *api.ReplicationControllerList:
|
|
|
|
for i := range t.Items {
|
|
|
|
errors = append(errors, validateObject(&t.Items[i])...)
|
|
|
|
}
|
|
|
|
case *api.Service:
|
2014-11-07 02:09:46 +00:00
|
|
|
if t.Namespace == "" {
|
|
|
|
t.Namespace = api.NamespaceDefault
|
|
|
|
}
|
2015-01-27 23:55:54 +00:00
|
|
|
errors = validation.ValidateService(t)
|
2014-07-23 18:08:16 +00:00
|
|
|
case *api.ServiceList:
|
|
|
|
for i := range t.Items {
|
|
|
|
errors = append(errors, validateObject(&t.Items[i])...)
|
|
|
|
}
|
|
|
|
case *api.Pod:
|
2014-11-07 02:09:46 +00:00
|
|
|
if t.Namespace == "" {
|
|
|
|
t.Namespace = api.NamespaceDefault
|
|
|
|
}
|
|
|
|
errors = validation.ValidatePod(t)
|
2014-07-23 18:08:16 +00:00
|
|
|
case *api.PodList:
|
|
|
|
for i := range t.Items {
|
|
|
|
errors = append(errors, validateObject(&t.Items[i])...)
|
|
|
|
}
|
2015-03-26 19:50:36 +00:00
|
|
|
case *api.PersistentVolume:
|
|
|
|
errors = validation.ValidatePersistentVolume(t)
|
|
|
|
case *api.PersistentVolumeClaim:
|
2015-03-04 00:54:17 +00:00
|
|
|
if t.Namespace == "" {
|
|
|
|
t.Namespace = api.NamespaceDefault
|
|
|
|
}
|
2015-03-26 19:50:36 +00:00
|
|
|
errors = validation.ValidatePersistentVolumeClaim(t)
|
2015-03-04 00:54:17 +00:00
|
|
|
case *api.PodTemplate:
|
|
|
|
if t.Namespace == "" {
|
|
|
|
t.Namespace = api.NamespaceDefault
|
|
|
|
}
|
|
|
|
errors = validation.ValidatePodTemplate(t)
|
2015-05-14 18:59:34 +00:00
|
|
|
case *api.Endpoints:
|
|
|
|
if t.Namespace == "" {
|
|
|
|
t.Namespace = api.NamespaceDefault
|
|
|
|
}
|
|
|
|
errors = validation.ValidateEndpoints(t)
|
2015-05-30 09:46:27 +00:00
|
|
|
case *api.Namespace:
|
|
|
|
errors = validation.ValidateNamespace(t)
|
|
|
|
case *api.Secret:
|
|
|
|
if t.Namespace == "" {
|
|
|
|
t.Namespace = api.NamespaceDefault
|
|
|
|
}
|
|
|
|
errors = validation.ValidateSecret(t)
|
|
|
|
case *api.LimitRange:
|
|
|
|
if t.Namespace == "" {
|
|
|
|
t.Namespace = api.NamespaceDefault
|
|
|
|
}
|
|
|
|
errors = validation.ValidateLimitRange(t)
|
|
|
|
case *api.ResourceQuota:
|
|
|
|
if t.Namespace == "" {
|
|
|
|
t.Namespace = api.NamespaceDefault
|
|
|
|
}
|
|
|
|
errors = validation.ValidateResourceQuota(t)
|
2015-10-09 22:49:10 +00:00
|
|
|
case *extensions.Deployment:
|
2015-09-21 23:29:47 +00:00
|
|
|
if t.Namespace == "" {
|
|
|
|
t.Namespace = api.NamespaceDefault
|
|
|
|
}
|
2015-10-19 21:08:35 +00:00
|
|
|
errors = expvalidation.ValidateDeployment(t)
|
2016-04-18 15:44:19 +00:00
|
|
|
case *batch.Job:
|
2015-09-16 00:29:44 +00:00
|
|
|
if t.Namespace == "" {
|
|
|
|
t.Namespace = api.NamespaceDefault
|
|
|
|
}
|
Added Selector Generation to Job.
Added selector generation to Job's
strategy.Validate, right before validation.
Can't do in defaulting since UID is not known.
Added a validation to Job to ensure that the generated
labels and selector are correct when generation was requested.
This happens right after generation, but validation is in a better
place to return an error.
Adds "manualSelector" field to batch/v1 Job to control selector generation.
Adds same field to extensions/__internal. Conversion between those two
is automatic.
Adds "autoSelector" field to extensions/v1beta1 Job. Used for storing batch/v1 Jobs
- Default for v1 is to do generation.
- Default for v1beta1 is to not do it.
- In both cases, unset == false == do the default thing.
Release notes:
Added batch/v1 group, which contains just Job, and which is the next
version of extensions/v1beta1 Job.
The changes from the previous version are:
- Users no longer need to ensure labels on their pod template are unique to the enclosing
job (but may add labels as needed for categorization).
- In v1beta1, job.spec.selector was defaulted from pod labels, with the user responsible for uniqueness.
In v1, a unique label is generated and added to the pod template, and used as the selector (other
labels added by user stay on pod template, but need not be used by selector).
- a new field called "manualSelector" field exists to control whether the new behavior is used,
versus a more error-prone but more flexible "manual" (not generated) seletor. Most users
will not need to use this field and should leave it unset.
Users who are creating extensions.Job go objects and then posting them using the go client
will see a change in the default behavior. They need to either stop providing a selector (relying on
selector generation) or else specify "spec.manualSelector" until they are ready to do the former.
2016-02-08 23:55:40 +00:00
|
|
|
// Job needs generateSelector called before validation, and job.Validate does this.
|
|
|
|
// See: https://github.com/kubernetes/kubernetes/issues/20951#issuecomment-187787040
|
|
|
|
t.ObjectMeta.UID = types.UID("fakeuid")
|
|
|
|
errors = job.Strategy.Validate(nil, t)
|
2015-10-19 16:56:14 +00:00
|
|
|
case *extensions.Ingress:
|
|
|
|
if t.Namespace == "" {
|
|
|
|
t.Namespace = api.NamespaceDefault
|
|
|
|
}
|
|
|
|
errors = expvalidation.ValidateIngress(t)
|
2015-10-09 22:49:10 +00:00
|
|
|
case *extensions.DaemonSet:
|
2015-09-16 00:29:44 +00:00
|
|
|
if t.Namespace == "" {
|
|
|
|
t.Namespace = api.NamespaceDefault
|
|
|
|
}
|
2015-10-19 21:08:35 +00:00
|
|
|
errors = expvalidation.ValidateDaemonSet(t)
|
2016-07-16 19:08:11 +00:00
|
|
|
case *apps.PetSet:
|
|
|
|
if t.Namespace == "" {
|
|
|
|
t.Namespace = api.NamespaceDefault
|
|
|
|
}
|
|
|
|
errors = appsvalidation.ValidatePetSet(t)
|
2014-07-23 18:08:16 +00:00
|
|
|
default:
|
2016-04-12 15:49:32 +00:00
|
|
|
errors = field.ErrorList{}
|
|
|
|
errors = append(errors, field.InternalError(field.NewPath(""), fmt.Errorf("no validation defined for %#v", obj)))
|
2014-07-23 18:08:16 +00:00
|
|
|
}
|
|
|
|
return errors
|
|
|
|
}
|
|
|
|
|
|
|
|
func walkJSONFiles(inDir string, fn func(name, path string, data []byte)) error {
|
2015-03-13 22:19:55 +00:00
|
|
|
return filepath.Walk(inDir, func(path string, info os.FileInfo, err error) error {
|
2014-07-23 18:08:16 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-03-13 22:19:55 +00:00
|
|
|
|
2014-07-23 18:08:16 +00:00
|
|
|
if info.IsDir() && path != inDir {
|
|
|
|
return filepath.SkipDir
|
|
|
|
}
|
2015-03-13 22:19:55 +00:00
|
|
|
|
|
|
|
file := filepath.Base(path)
|
|
|
|
if ext := filepath.Ext(file); ext == ".json" || ext == ".yaml" {
|
|
|
|
glog.Infof("Testing %s", path)
|
|
|
|
data, err := ioutil.ReadFile(path)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
name := strings.TrimSuffix(file, ext)
|
2015-03-17 03:43:59 +00:00
|
|
|
|
|
|
|
if ext == ".yaml" {
|
|
|
|
out, err := yaml.ToJSON(data)
|
|
|
|
if err != nil {
|
2015-05-30 09:46:27 +00:00
|
|
|
return fmt.Errorf("%s: %v", path, err)
|
2015-03-17 03:43:59 +00:00
|
|
|
}
|
|
|
|
data = out
|
|
|
|
}
|
|
|
|
|
2015-03-13 22:19:55 +00:00
|
|
|
fn(name, path, data)
|
2014-07-23 18:08:16 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2014-09-19 17:14:33 +00:00
|
|
|
func TestExampleObjectSchemas(t *testing.T) {
|
|
|
|
cases := map[string]map[string]runtime.Object{
|
|
|
|
"../examples/guestbook": {
|
2016-03-23 23:03:07 +00:00
|
|
|
"frontend-deployment": &extensions.Deployment{},
|
|
|
|
"redis-slave-deployment": &extensions.Deployment{},
|
|
|
|
"redis-master-deployment": &extensions.Deployment{},
|
2015-02-05 23:20:27 +00:00
|
|
|
"frontend-service": &api.Service{},
|
|
|
|
"redis-master-service": &api.Service{},
|
|
|
|
"redis-slave-service": &api.Service{},
|
2014-09-19 17:14:33 +00:00
|
|
|
},
|
2016-03-23 23:03:07 +00:00
|
|
|
"../examples/guestbook/legacy": {
|
|
|
|
"frontend-controller": &api.ReplicationController{},
|
|
|
|
"redis-slave-controller": &api.ReplicationController{},
|
|
|
|
"redis-master-controller": &api.ReplicationController{},
|
|
|
|
},
|
2015-02-23 21:30:36 +00:00
|
|
|
"../examples/guestbook-go": {
|
|
|
|
"guestbook-controller": &api.ReplicationController{},
|
|
|
|
"redis-slave-controller": &api.ReplicationController{},
|
|
|
|
"redis-master-controller": &api.ReplicationController{},
|
|
|
|
"guestbook-service": &api.Service{},
|
|
|
|
"redis-master-service": &api.Service{},
|
|
|
|
"redis-slave-service": &api.Service{},
|
|
|
|
},
|
2016-06-21 22:43:29 +00:00
|
|
|
"../examples/volumes/iscsi": {
|
2015-03-13 21:31:13 +00:00
|
|
|
"iscsi": &api.Pod{},
|
|
|
|
},
|
2016-06-21 22:43:29 +00:00
|
|
|
"../examples/volumes/glusterfs": {
|
2015-05-14 18:59:34 +00:00
|
|
|
"glusterfs-pod": &api.Pod{},
|
|
|
|
"glusterfs-endpoints": &api.Endpoints{},
|
2015-08-31 05:52:51 +00:00
|
|
|
"glusterfs-service": &api.Service{},
|
2015-03-26 18:53:21 +00:00
|
|
|
},
|
2015-05-01 05:16:59 +00:00
|
|
|
"../examples": {
|
2015-09-04 06:50:14 +00:00
|
|
|
"scheduler-policy-config": &schedulerapi.Policy{},
|
|
|
|
"scheduler-policy-config-with-extender": &schedulerapi.Policy{},
|
2015-05-01 05:16:59 +00:00
|
|
|
},
|
2016-06-21 22:43:29 +00:00
|
|
|
"../examples/volumes/rbd/secret": {
|
2015-05-30 09:46:27 +00:00
|
|
|
"ceph-secret": &api.Secret{},
|
|
|
|
},
|
2016-06-21 22:43:29 +00:00
|
|
|
"../examples/volumes/rbd": {
|
2015-04-07 17:22:23 +00:00
|
|
|
"rbd": &api.Pod{},
|
|
|
|
"rbd-with-secret": &api.Pod{},
|
|
|
|
},
|
2016-06-21 22:43:29 +00:00
|
|
|
"../examples/storage/cassandra": {
|
2015-10-21 03:44:17 +00:00
|
|
|
"cassandra-daemonset": &extensions.DaemonSet{},
|
2015-05-30 09:46:27 +00:00
|
|
|
"cassandra-controller": &api.ReplicationController{},
|
|
|
|
"cassandra-service": &api.Service{},
|
2016-07-16 19:08:11 +00:00
|
|
|
"cassandra-petset": &apps.PetSet{},
|
2015-05-30 09:46:27 +00:00
|
|
|
},
|
|
|
|
"../examples/cluster-dns": {
|
|
|
|
"dns-backend-rc": &api.ReplicationController{},
|
|
|
|
"dns-backend-service": &api.Service{},
|
|
|
|
"dns-frontend-pod": &api.Pod{},
|
|
|
|
"namespace-dev": &api.Namespace{},
|
|
|
|
"namespace-prod": &api.Namespace{},
|
|
|
|
},
|
|
|
|
"../examples/elasticsearch": {
|
2015-08-21 11:30:11 +00:00
|
|
|
"es-rc": &api.ReplicationController{},
|
|
|
|
"es-svc": &api.Service{},
|
|
|
|
"service-account": nil,
|
2015-05-30 09:46:27 +00:00
|
|
|
},
|
|
|
|
"../examples/explorer": {
|
|
|
|
"pod": &api.Pod{},
|
|
|
|
},
|
2016-06-21 22:43:29 +00:00
|
|
|
"../examples/storage/hazelcast": {
|
2015-05-30 09:46:27 +00:00
|
|
|
"hazelcast-controller": &api.ReplicationController{},
|
|
|
|
"hazelcast-service": &api.Service{},
|
|
|
|
},
|
|
|
|
"../examples/meteor": {
|
|
|
|
"meteor-controller": &api.ReplicationController{},
|
|
|
|
"meteor-service": &api.Service{},
|
|
|
|
"mongo-pod": &api.Pod{},
|
|
|
|
"mongo-service": &api.Service{},
|
|
|
|
},
|
|
|
|
"../examples/mysql-wordpress-pd": {
|
2016-02-18 21:35:39 +00:00
|
|
|
"gce-volumes": &api.PersistentVolume{},
|
|
|
|
"local-volumes": &api.PersistentVolume{},
|
|
|
|
"mysql-deployment": &api.Service{},
|
|
|
|
"wordpress-deployment": &api.Service{},
|
2015-05-30 09:46:27 +00:00
|
|
|
},
|
2016-06-21 22:43:29 +00:00
|
|
|
"../examples/volumes/nfs": {
|
2015-10-20 23:56:55 +00:00
|
|
|
"nfs-busybox-rc": &api.ReplicationController{},
|
|
|
|
"nfs-server-rc": &api.ReplicationController{},
|
2015-05-30 09:46:27 +00:00
|
|
|
"nfs-server-service": &api.Service{},
|
2015-10-20 23:56:55 +00:00
|
|
|
"nfs-pv": &api.PersistentVolume{},
|
|
|
|
"nfs-pvc": &api.PersistentVolumeClaim{},
|
|
|
|
"nfs-web-rc": &api.ReplicationController{},
|
|
|
|
"nfs-web-service": &api.Service{},
|
2015-05-30 09:46:27 +00:00
|
|
|
},
|
|
|
|
"../examples/openshift-origin": {
|
2015-06-10 20:07:47 +00:00
|
|
|
"openshift-origin-namespace": &api.Namespace{},
|
|
|
|
"openshift-controller": &api.ReplicationController{},
|
|
|
|
"openshift-service": &api.Service{},
|
|
|
|
"etcd-controller": &api.ReplicationController{},
|
|
|
|
"etcd-service": &api.Service{},
|
|
|
|
"etcd-discovery-controller": &api.ReplicationController{},
|
|
|
|
"etcd-discovery-service": &api.Service{},
|
|
|
|
"secret": nil,
|
2015-05-30 09:46:27 +00:00
|
|
|
},
|
|
|
|
"../examples/phabricator": {
|
2015-09-28 12:34:14 +00:00
|
|
|
"phabricator-controller": &api.ReplicationController{},
|
|
|
|
"phabricator-service": &api.Service{},
|
2015-05-30 09:46:27 +00:00
|
|
|
},
|
2016-06-21 22:43:29 +00:00
|
|
|
"../examples/storage/redis": {
|
2015-05-30 09:46:27 +00:00
|
|
|
"redis-controller": &api.ReplicationController{},
|
|
|
|
"redis-master": &api.Pod{},
|
|
|
|
"redis-proxy": &api.Pod{},
|
|
|
|
"redis-sentinel-controller": &api.ReplicationController{},
|
|
|
|
"redis-sentinel-service": &api.Service{},
|
|
|
|
},
|
2016-06-21 22:43:29 +00:00
|
|
|
"../examples/storage/rethinkdb": {
|
2015-05-30 09:46:27 +00:00
|
|
|
"admin-pod": &api.Pod{},
|
|
|
|
"admin-service": &api.Service{},
|
|
|
|
"driver-service": &api.Service{},
|
|
|
|
"rc": &api.ReplicationController{},
|
|
|
|
},
|
|
|
|
"../examples/spark": {
|
2016-04-18 16:34:47 +00:00
|
|
|
"namespace-spark-cluster": &api.Namespace{},
|
2015-10-26 20:42:02 +00:00
|
|
|
"spark-master-controller": &api.ReplicationController{},
|
2015-05-30 09:46:27 +00:00
|
|
|
"spark-master-service": &api.Service{},
|
2015-10-26 20:42:02 +00:00
|
|
|
"spark-webui": &api.Service{},
|
2015-05-30 09:46:27 +00:00
|
|
|
"spark-worker-controller": &api.ReplicationController{},
|
Zeppelin: Add Zeppelin image to Spark example
This adds a very basic Zeppelin image that works with the existing
Spark example. As can be seen from the documentation, it has a couple
of warts:
* It requires kubectl port-forward (which is unstable across long
periods of time, at least for me, on this app, bug incoming). See
* I needed to roll my own container (none of the existing containers
exactly matched needs, or even built anymore against modern Zeppelin
master, and the rest of the example is Spark 1.5).
The image itself is *huge*. One of the further refinements we need to
look at is how to possibly strip the Maven build for this container
down to just the interpreters we care about, because the deps here
are frankly ridiculous.
This might be a case where, if possible, we might want to open an
upstream request to build things dynamically, then use something like
probably the cut the image down considerably. (This might already be
possible, need to poke at whether you can late-bind interpreters
later.)
2015-11-05 22:56:15 +00:00
|
|
|
"zeppelin-controller": &api.ReplicationController{},
|
|
|
|
"zeppelin-service": &api.Service{},
|
2015-05-30 09:46:27 +00:00
|
|
|
},
|
2015-09-18 01:12:31 +00:00
|
|
|
"../examples/spark/spark-gluster": {
|
|
|
|
"spark-master-service": &api.Service{},
|
|
|
|
"spark-master-controller": &api.ReplicationController{},
|
|
|
|
"spark-worker-controller": &api.ReplicationController{},
|
|
|
|
"glusterfs-endpoints": &api.Endpoints{},
|
|
|
|
},
|
2015-05-30 09:46:27 +00:00
|
|
|
"../examples/storm": {
|
|
|
|
"storm-nimbus-service": &api.Service{},
|
|
|
|
"storm-nimbus": &api.Pod{},
|
|
|
|
"storm-worker-controller": &api.ReplicationController{},
|
|
|
|
"zookeeper-service": &api.Service{},
|
|
|
|
"zookeeper": &api.Pod{},
|
|
|
|
},
|
2016-06-21 22:43:29 +00:00
|
|
|
"../examples/volumes/cephfs/": {
|
2015-04-09 18:05:24 +00:00
|
|
|
"cephfs": &api.Pod{},
|
|
|
|
"cephfs-with-secret": &api.Pod{},
|
|
|
|
},
|
2016-06-21 22:43:29 +00:00
|
|
|
"../examples/volumes/fibre_channel": {
|
2015-08-11 15:19:29 +00:00
|
|
|
"fc": &api.Pod{},
|
|
|
|
},
|
2015-09-26 08:08:04 +00:00
|
|
|
"../examples/javaweb-tomcat-sidecar": {
|
|
|
|
"javaweb": &api.Pod{},
|
|
|
|
"javaweb-2": &api.Pod{},
|
|
|
|
},
|
2016-06-21 22:43:29 +00:00
|
|
|
"../examples/volumes/azure_file": {
|
2015-11-13 16:47:04 +00:00
|
|
|
"azure": &api.Pod{},
|
|
|
|
},
|
2016-07-27 18:07:34 +00:00
|
|
|
"../examples/volumes/azure_disk": {
|
|
|
|
"azure": &api.Pod{},
|
|
|
|
},
|
2014-07-23 18:08:16 +00:00
|
|
|
}
|
|
|
|
|
2015-05-30 09:46:27 +00:00
|
|
|
capabilities.SetForTests(capabilities.Capabilities{
|
|
|
|
AllowPrivileged: true,
|
|
|
|
})
|
|
|
|
|
2014-09-19 17:14:33 +00:00
|
|
|
for path, expected := range cases {
|
|
|
|
tested := 0
|
|
|
|
err := walkJSONFiles(path, func(name, path string, data []byte) {
|
|
|
|
expectedType, found := expected[name]
|
|
|
|
if !found {
|
2015-03-13 21:31:13 +00:00
|
|
|
t.Errorf("%s: %s does not have a test case defined", path, name)
|
2014-09-19 17:14:33 +00:00
|
|
|
return
|
|
|
|
}
|
2015-05-30 09:46:27 +00:00
|
|
|
tested++
|
|
|
|
if expectedType == nil {
|
|
|
|
t.Logf("skipping : %s/%s\n", path, name)
|
|
|
|
return
|
|
|
|
}
|
2015-09-04 06:50:14 +00:00
|
|
|
if strings.Contains(name, "scheduler-policy-config") {
|
2016-01-22 05:06:52 +00:00
|
|
|
if err := runtime.DecodeInto(schedulerapilatest.Codec, data, expectedType); err != nil {
|
2015-05-30 07:32:13 +00:00
|
|
|
t.Errorf("%s did not decode correctly: %v\n%s", path, err, string(data))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
//TODO: Add validate method for &schedulerapi.Policy
|
|
|
|
} else {
|
2015-09-21 23:29:47 +00:00
|
|
|
codec, err := testapi.GetCodecForObject(expectedType)
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Could not get codec for %s: %s", expectedType, err)
|
|
|
|
}
|
2015-12-10 02:15:02 +00:00
|
|
|
if err := runtime.DecodeInto(codec, data, expectedType); err != nil {
|
2015-05-30 07:32:13 +00:00
|
|
|
t.Errorf("%s did not decode correctly: %v\n%s", path, err, string(data))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if errors := validateObject(expectedType); len(errors) > 0 {
|
|
|
|
t.Errorf("%s did not validate correctly: %v", path, errors)
|
|
|
|
}
|
2014-09-19 17:14:33 +00:00
|
|
|
}
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Expected no error, Got %v", err)
|
2014-07-23 18:08:16 +00:00
|
|
|
}
|
2014-09-19 17:14:33 +00:00
|
|
|
if tested != len(expected) {
|
2015-07-23 14:38:39 +00:00
|
|
|
t.Errorf("Directory %v: Expected %d examples, Got %d", path, len(expected), tested)
|
2014-07-23 18:08:16 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-16 16:11:47 +00:00
|
|
|
// This regex is tricky, but it works. For future me, here is the decode:
|
|
|
|
//
|
|
|
|
// Flags: (?ms) = multiline match, allow . to match \n
|
|
|
|
// 1) Look for a line that starts with ``` (a markdown code block)
|
|
|
|
// 2) (?: ... ) = non-capturing group
|
|
|
|
// 3) (P<name>) = capture group as "name"
|
|
|
|
// 4) Look for #1 followed by either:
|
|
|
|
// 4a) "yaml" followed by any word-characters followed by a newline (e.g. ```yamlfoo\n)
|
|
|
|
// 4b) "any word-characters followed by a newline (e.g. ```json\n)
|
|
|
|
// 5) Look for either:
|
|
|
|
// 5a) #4a followed by one or more characters (non-greedy)
|
|
|
|
// 5b) #4b followed by { followed by one or more characters (non-greedy) followed by }
|
|
|
|
// 6) Look for #5 followed by a newline followed by ``` (end of the code block)
|
|
|
|
//
|
|
|
|
// This could probably be simplified, but is already too delicate. Before any
|
|
|
|
// real changes, we should have a testscase that just tests this regex.
|
|
|
|
var sampleRegexp = regexp.MustCompile("(?ms)^```(?:(?P<type>yaml)\\w*\\n(?P<content>.+?)|\\w*\\n(?P<content>\\{.+?\\}))\\n^```")
|
2014-09-19 17:14:33 +00:00
|
|
|
var subsetRegexp = regexp.MustCompile("(?ms)\\.{3}")
|
2014-07-23 18:08:16 +00:00
|
|
|
|
|
|
|
func TestReadme(t *testing.T) {
|
2015-05-01 05:16:59 +00:00
|
|
|
paths := []struct {
|
|
|
|
file string
|
|
|
|
expectedType []runtime.Object
|
|
|
|
}{
|
|
|
|
{"../README.md", []runtime.Object{&api.Pod{}}},
|
2016-06-21 22:43:29 +00:00
|
|
|
{"../examples/volumes/iscsi/README.md", []runtime.Object{&api.Pod{}}},
|
2014-07-23 18:08:16 +00:00
|
|
|
}
|
|
|
|
|
2014-09-19 17:14:33 +00:00
|
|
|
for _, path := range paths {
|
2015-05-01 05:16:59 +00:00
|
|
|
data, err := ioutil.ReadFile(path.file)
|
2014-07-23 18:08:16 +00:00
|
|
|
if err != nil {
|
2014-09-19 17:14:33 +00:00
|
|
|
t.Errorf("Unable to read file %s: %v", path, err)
|
2014-07-23 18:08:16 +00:00
|
|
|
continue
|
|
|
|
}
|
2014-09-19 17:14:33 +00:00
|
|
|
|
|
|
|
matches := sampleRegexp.FindAllStringSubmatch(string(data), -1)
|
|
|
|
if matches == nil {
|
|
|
|
continue
|
|
|
|
}
|
2015-05-01 05:16:59 +00:00
|
|
|
ix := 0
|
2014-09-19 17:14:33 +00:00
|
|
|
for _, match := range matches {
|
|
|
|
var content, subtype string
|
|
|
|
for i, name := range sampleRegexp.SubexpNames() {
|
|
|
|
if name == "type" {
|
|
|
|
subtype = match[i]
|
|
|
|
}
|
|
|
|
if name == "content" && match[i] != "" {
|
|
|
|
content = match[i]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if subtype == "yaml" && subsetRegexp.FindString(content) != "" {
|
|
|
|
t.Logf("skipping (%s): \n%s", subtype, content)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2015-05-01 05:16:59 +00:00
|
|
|
var expectedType runtime.Object
|
|
|
|
if len(path.expectedType) == 1 {
|
|
|
|
expectedType = path.expectedType[0]
|
|
|
|
} else {
|
|
|
|
expectedType = path.expectedType[ix]
|
|
|
|
ix++
|
|
|
|
}
|
2015-03-17 03:43:59 +00:00
|
|
|
json, err := yaml.ToJSON([]byte(content))
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("%s could not be converted to JSON: %v\n%s", path, err, string(content))
|
|
|
|
}
|
2016-01-22 05:06:52 +00:00
|
|
|
if err := runtime.DecodeInto(testapi.Default.Codec(), json, expectedType); err != nil {
|
2014-09-19 17:14:33 +00:00
|
|
|
t.Errorf("%s did not decode correctly: %v\n%s", path, err, string(content))
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if errors := validateObject(expectedType); len(errors) > 0 {
|
|
|
|
t.Errorf("%s did not validate correctly: %v", path, errors)
|
|
|
|
}
|
2016-01-22 05:06:52 +00:00
|
|
|
_, err = runtime.Encode(testapi.Default.Codec(), expectedType)
|
2014-09-19 17:14:33 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Could not encode object: %v", err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
2014-07-23 18:08:16 +00:00
|
|
|
}
|
|
|
|
}
|