2017-06-02 15:31:47 +00:00
|
|
|
/*
|
|
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2017-11-12 09:40:57 +00:00
|
|
|
package master
|
2017-06-02 15:31:47 +00:00
|
|
|
|
|
|
|
import (
|
2017-07-05 10:44:01 +00:00
|
|
|
"encoding/json"
|
2019-03-07 04:36:23 +00:00
|
|
|
"fmt"
|
2017-06-02 15:31:47 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2019-03-07 04:36:23 +00:00
|
|
|
"github.com/go-openapi/spec"
|
|
|
|
|
2017-06-02 15:31:47 +00:00
|
|
|
networkingv1 "k8s.io/api/networking/v1"
|
|
|
|
apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1"
|
|
|
|
apiextensionsclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
|
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
2017-07-05 10:44:01 +00:00
|
|
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
2017-06-02 15:31:47 +00:00
|
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
2019-03-07 04:36:23 +00:00
|
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
2017-06-02 15:31:47 +00:00
|
|
|
"k8s.io/client-go/dynamic"
|
|
|
|
"k8s.io/client-go/kubernetes"
|
2017-11-12 09:40:57 +00:00
|
|
|
kubeapiservertesting "k8s.io/kubernetes/cmd/kube-apiserver/app/testing"
|
2018-11-04 21:44:43 +00:00
|
|
|
"k8s.io/kubernetes/test/integration/etcd"
|
2017-11-12 09:40:57 +00:00
|
|
|
"k8s.io/kubernetes/test/integration/framework"
|
2017-06-02 15:31:47 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestCRDShadowGroup(t *testing.T) {
|
2018-02-28 19:37:42 +00:00
|
|
|
result := kubeapiservertesting.StartTestServerOrDie(t, nil, nil, framework.SharedEtcd())
|
2017-11-12 09:40:57 +00:00
|
|
|
defer result.TearDownFn()
|
2017-06-02 15:31:47 +00:00
|
|
|
|
2017-11-12 09:40:57 +00:00
|
|
|
kubeclient, err := kubernetes.NewForConfig(result.ClientConfig)
|
2017-06-02 15:31:47 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
|
|
}
|
|
|
|
|
2017-11-12 09:40:57 +00:00
|
|
|
apiextensionsclient, err := apiextensionsclientset.NewForConfig(result.ClientConfig)
|
2017-06-02 15:31:47 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Logf("Creating a NetworkPolicy")
|
|
|
|
nwPolicy, err := kubeclient.NetworkingV1().NetworkPolicies("default").Create(&networkingv1.NetworkPolicy{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: metav1.NamespaceDefault},
|
|
|
|
Spec: networkingv1.NetworkPolicySpec{
|
|
|
|
PodSelector: metav1.LabelSelector{MatchLabels: map[string]string{"foo": "bar"}},
|
|
|
|
Ingress: []networkingv1.NetworkPolicyIngressRule{},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to create NetworkPolicy: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Logf("Trying to shadow networking group")
|
|
|
|
crd := &apiextensionsv1beta1.CustomResourceDefinition{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "foos." + networkingv1.GroupName,
|
|
|
|
},
|
|
|
|
Spec: apiextensionsv1beta1.CustomResourceDefinitionSpec{
|
|
|
|
Group: networkingv1.GroupName,
|
|
|
|
Version: networkingv1.SchemeGroupVersion.Version,
|
|
|
|
Scope: apiextensionsv1beta1.ClusterScoped,
|
|
|
|
Names: apiextensionsv1beta1.CustomResourceDefinitionNames{
|
|
|
|
Plural: "foos",
|
|
|
|
Kind: "Foo",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2018-11-04 21:44:43 +00:00
|
|
|
etcd.CreateTestCRDs(t, apiextensionsclient, true, crd)
|
|
|
|
|
2017-06-02 15:31:47 +00:00
|
|
|
// wait to give aggregator time to update
|
|
|
|
time.Sleep(2 * time.Second)
|
|
|
|
|
|
|
|
t.Logf("Checking that we still see the NetworkPolicy")
|
|
|
|
_, err = kubeclient.NetworkingV1().NetworkPolicies(nwPolicy.Namespace).Get(nwPolicy.Name, metav1.GetOptions{})
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Failed to get NetworkPolocy: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Logf("Checking that crd resource does not show up in networking group")
|
2018-11-04 21:44:43 +00:00
|
|
|
if etcd.CrdExistsInDiscovery(apiextensionsclient, crd) {
|
2017-06-02 15:31:47 +00:00
|
|
|
t.Errorf("CRD resource shows up in discovery, but shouldn't.")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCRD(t *testing.T) {
|
2019-01-17 14:19:28 +00:00
|
|
|
result := kubeapiservertesting.StartTestServerOrDie(t, nil, nil, framework.SharedEtcd())
|
2017-11-12 09:40:57 +00:00
|
|
|
defer result.TearDownFn()
|
2017-06-02 15:31:47 +00:00
|
|
|
|
2017-11-12 09:40:57 +00:00
|
|
|
apiextensionsclient, err := apiextensionsclientset.NewForConfig(result.ClientConfig)
|
2017-06-02 15:31:47 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Logf("Trying to create a custom resource without conflict")
|
|
|
|
crd := &apiextensionsv1beta1.CustomResourceDefinition{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "foos.cr.bar.com",
|
|
|
|
},
|
|
|
|
Spec: apiextensionsv1beta1.CustomResourceDefinitionSpec{
|
|
|
|
Group: "cr.bar.com",
|
|
|
|
Version: "v1",
|
|
|
|
Scope: apiextensionsv1beta1.NamespaceScoped,
|
|
|
|
Names: apiextensionsv1beta1.CustomResourceDefinitionNames{
|
|
|
|
Plural: "foos",
|
|
|
|
Kind: "Foo",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2018-11-04 21:44:43 +00:00
|
|
|
etcd.CreateTestCRDs(t, apiextensionsclient, false, crd)
|
2017-06-02 15:31:47 +00:00
|
|
|
|
|
|
|
t.Logf("Trying to access foos.cr.bar.com with dynamic client")
|
2018-05-09 16:52:12 +00:00
|
|
|
dynamicClient, err := dynamic.NewForConfig(result.ClientConfig)
|
2017-06-02 15:31:47 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
|
|
}
|
2018-05-09 16:52:12 +00:00
|
|
|
fooResource := schema.GroupVersionResource{Group: "cr.bar.com", Version: "v1", Resource: "foos"}
|
|
|
|
_, err = dynamicClient.Resource(fooResource).Namespace("default").List(metav1.ListOptions{})
|
2017-06-02 15:31:47 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Failed to list foos.cr.bar.com instances: %v", err)
|
|
|
|
}
|
2017-07-05 10:44:01 +00:00
|
|
|
}
|
|
|
|
|
2019-03-07 04:36:23 +00:00
|
|
|
func TestCRDOpenAPI(t *testing.T) {
|
|
|
|
result := kubeapiservertesting.StartTestServerOrDie(t, nil, []string{"--feature-gates=CustomResourcePublishOpenAPI=true"}, framework.SharedEtcd())
|
|
|
|
defer result.TearDownFn()
|
|
|
|
kubeclient, err := kubernetes.NewForConfig(result.ClientConfig)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
|
|
}
|
|
|
|
apiextensionsclient, err := apiextensionsclientset.NewForConfig(result.ClientConfig)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
|
|
}
|
|
|
|
t.Logf("Trying to create a custom resource without conflict")
|
|
|
|
crd := &apiextensionsv1beta1.CustomResourceDefinition{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "foos.cr.bar.com",
|
|
|
|
},
|
|
|
|
Spec: apiextensionsv1beta1.CustomResourceDefinitionSpec{
|
|
|
|
Group: "cr.bar.com",
|
|
|
|
Version: "v1",
|
|
|
|
Scope: apiextensionsv1beta1.NamespaceScoped,
|
|
|
|
Names: apiextensionsv1beta1.CustomResourceDefinitionNames{
|
|
|
|
Plural: "foos",
|
|
|
|
Kind: "Foo",
|
|
|
|
},
|
|
|
|
Validation: &apiextensionsv1beta1.CustomResourceValidation{
|
|
|
|
OpenAPIV3Schema: &apiextensionsv1beta1.JSONSchemaProps{
|
|
|
|
Properties: map[string]apiextensionsv1beta1.JSONSchemaProps{
|
|
|
|
"foo": {Type: "string"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
etcd.CreateTestCRDs(t, apiextensionsclient, false, crd)
|
|
|
|
waitForSpec := func(expectedType string) {
|
|
|
|
t.Logf(`Waiting for {properties: {"foo": {"type":"%s"}}} to show up in schema`, expectedType)
|
|
|
|
lastMsg := ""
|
|
|
|
if err := wait.PollImmediate(500*time.Millisecond, 10*time.Second, func() (bool, error) {
|
|
|
|
lastMsg = ""
|
|
|
|
bs, err := kubeclient.RESTClient().Get().AbsPath("openapi", "v2").DoRaw()
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
spec := spec.Swagger{}
|
|
|
|
if err := json.Unmarshal(bs, &spec); err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
if spec.SwaggerProps.Paths == nil {
|
|
|
|
lastMsg = "spec.SwaggerProps.Paths is nil"
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
d, ok := spec.SwaggerProps.Definitions["com.bar.cr.v1.Foo"]
|
|
|
|
if !ok {
|
|
|
|
lastMsg = `spec.SwaggerProps.Definitions["com.bar.cr.v1.Foo"] not found`
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
p, ok := d.Properties["foo"]
|
|
|
|
if !ok {
|
|
|
|
lastMsg = `spec.SwaggerProps.Definitions["com.bar.cr.v1.Foo"].Properties["foo"] not found`
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
if !p.Type.Contains(expectedType) {
|
|
|
|
lastMsg = fmt.Sprintf(`spec.SwaggerProps.Definitions["com.bar.cr.v1.Foo"].Properties["foo"].Type should be %q, but got: %q`, expectedType, p.Type)
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}); err != nil {
|
|
|
|
t.Fatalf("Failed to see %s OpenAPI spec in discovery: %v, last message: %s", crd.Name, err, lastMsg)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
waitForSpec("string")
|
|
|
|
crd, err = apiextensionsclient.ApiextensionsV1beta1().CustomResourceDefinitions().Get(crd.Name, metav1.GetOptions{})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
prop := crd.Spec.Validation.OpenAPIV3Schema.Properties["foo"]
|
|
|
|
prop.Type = "boolean"
|
|
|
|
crd.Spec.Validation.OpenAPIV3Schema.Properties["foo"] = prop
|
|
|
|
if _, err = apiextensionsclient.ApiextensionsV1beta1().CustomResourceDefinitions().Update(crd); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
waitForSpec("boolean")
|
|
|
|
}
|
|
|
|
|
2017-07-05 10:44:01 +00:00
|
|
|
type Foo struct {
|
|
|
|
metav1.TypeMeta `json:",inline"`
|
|
|
|
metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
|
|
|
}
|
|
|
|
|
|
|
|
func unstructuredFoo(foo *Foo) (*unstructured.Unstructured, error) {
|
|
|
|
bs, err := json.Marshal(foo)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
ret := &unstructured.Unstructured{}
|
|
|
|
if err = ret.UnmarshalJSON(bs); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return ret, nil
|
2017-06-02 15:31:47 +00:00
|
|
|
}
|