Merge pull request #67099 from jennybuckley/dry-run-admission-3

Automatic merge from submit-queue (batch tested with PRs 67396, 67097, 67395, 67365, 67099). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

Add unit tests for webhooks with dry run

**What this PR does / why we need it**:
Fixes an issue with https://github.com/kubernetes/kubernetes/pull/67085 and adds a couple test cases that would catch it.

@lavalamp

**Release note**:

```release-note
NONE
```
pull/8/head
Kubernetes Submit Queue 2018-08-15 05:45:28 -07:00 committed by GitHub
commit c582a37cae
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 49 additions and 13 deletions

View File

@ -84,7 +84,7 @@ func (a *mutatingDispatcher) Dispatch(ctx context.Context, attr *generic.Version
func (a *mutatingDispatcher) callAttrMutatingHook(ctx context.Context, h *v1beta1.Webhook, attr *generic.VersionedAttributes) error { func (a *mutatingDispatcher) callAttrMutatingHook(ctx context.Context, h *v1beta1.Webhook, attr *generic.VersionedAttributes) error {
if attr.IsDryRun() { if attr.IsDryRun() {
// TODO: support this // TODO: support this
webhookerrors.NewDryRunUnsupportedErr(h.Name) return webhookerrors.NewDryRunUnsupportedErr(h.Name)
} }
// Make the webhook request // Make the webhook request

View File

@ -79,9 +79,9 @@ func TestAdmit(t *testing.T) {
var attr admission.Attributes var attr admission.Attributes
if tt.IsCRD { if tt.IsCRD {
attr = webhooktesting.NewAttributeUnstructured(ns, tt.AdditionalLabels) attr = webhooktesting.NewAttributeUnstructured(ns, tt.AdditionalLabels, tt.IsDryRun)
} else { } else {
attr = webhooktesting.NewAttribute(ns, tt.AdditionalLabels) attr = webhooktesting.NewAttribute(ns, tt.AdditionalLabels, tt.IsDryRun)
} }
err = wh.Admit(attr) err = wh.Admit(attr)
@ -147,7 +147,7 @@ func TestAdmitCachedClient(t *testing.T) {
continue continue
} }
err = wh.Admit(webhooktesting.NewAttribute(ns, nil)) err = wh.Admit(webhooktesting.NewAttribute(ns, nil, false))
if tt.ExpectAllow != (err == nil) { if tt.ExpectAllow != (err == nil) {
t.Errorf("%s: expected allowed=%v, but got err=%v", tt.Name, tt.ExpectAllow, err) t.Errorf("%s: expected allowed=%v, but got err=%v", tt.Name, tt.ExpectAllow, err)
} }

View File

@ -76,7 +76,7 @@ func NewFakeDataSource(name string, webhooks []registrationv1beta1.Webhook, muta
return client, informerFactory return client, informerFactory
} }
func newAttributesRecord(object metav1.Object, oldObject metav1.Object, kind schema.GroupVersionKind, namespace string, name string, resource string, labels map[string]string) admission.Attributes { func newAttributesRecord(object metav1.Object, oldObject metav1.Object, kind schema.GroupVersionKind, namespace string, name string, resource string, labels map[string]string, dryRun bool) admission.Attributes {
object.SetName(name) object.SetName(name)
object.SetNamespace(namespace) object.SetNamespace(namespace)
objectLabels := map[string]string{resource + ".name": name} objectLabels := map[string]string{resource + ".name": name}
@ -95,11 +95,11 @@ func newAttributesRecord(object metav1.Object, oldObject metav1.Object, kind sch
UID: "webhook-test", UID: "webhook-test",
} }
return admission.NewAttributesRecord(object.(runtime.Object), oldObject.(runtime.Object), kind, namespace, name, gvr, subResource, admission.Update, false, &userInfo) return admission.NewAttributesRecord(object.(runtime.Object), oldObject.(runtime.Object), kind, namespace, name, gvr, subResource, admission.Update, dryRun, &userInfo)
} }
// NewAttribute returns static admission Attributes for testing. // NewAttribute returns static admission Attributes for testing.
func NewAttribute(namespace string, labels map[string]string) admission.Attributes { func NewAttribute(namespace string, labels map[string]string, dryRun bool) admission.Attributes {
// Set up a test object for the call // Set up a test object for the call
object := corev1.Pod{ object := corev1.Pod{
TypeMeta: metav1.TypeMeta{ TypeMeta: metav1.TypeMeta{
@ -111,11 +111,11 @@ func NewAttribute(namespace string, labels map[string]string) admission.Attribut
kind := corev1.SchemeGroupVersion.WithKind("Pod") kind := corev1.SchemeGroupVersion.WithKind("Pod")
name := "my-pod" name := "my-pod"
return newAttributesRecord(&object, &oldObject, kind, namespace, name, "pod", labels) return newAttributesRecord(&object, &oldObject, kind, namespace, name, "pod", labels, dryRun)
} }
// NewAttributeUnstructured returns static admission Attributes for testing with custom resources. // NewAttributeUnstructured returns static admission Attributes for testing with custom resources.
func NewAttributeUnstructured(namespace string, labels map[string]string) admission.Attributes { func NewAttributeUnstructured(namespace string, labels map[string]string, dryRun bool) admission.Attributes {
// Set up a test object for the call // Set up a test object for the call
object := unstructured.Unstructured{} object := unstructured.Unstructured{}
object.SetKind("TestCRD") object.SetKind("TestCRD")
@ -126,7 +126,7 @@ func NewAttributeUnstructured(namespace string, labels map[string]string) admiss
kind := object.GroupVersionKind() kind := object.GroupVersionKind()
name := "my-test-crd" name := "my-test-crd"
return newAttributesRecord(&object, &oldObject, kind, namespace, name, "crd", labels) return newAttributesRecord(&object, &oldObject, kind, namespace, name, "crd", labels, dryRun)
} }
type urlConfigGenerator struct { type urlConfigGenerator struct {
@ -149,6 +149,7 @@ type Test struct {
Webhooks []registrationv1beta1.Webhook Webhooks []registrationv1beta1.Webhook
Path string Path string
IsCRD bool IsCRD bool
IsDryRun bool
AdditionalLabels map[string]string AdditionalLabels map[string]string
ExpectLabels map[string]string ExpectLabels map[string]string
ExpectAllow bool ExpectAllow bool
@ -349,6 +350,30 @@ func NewNonMutatingTestCases(url *url.URL) []Test {
}}, }},
ErrorContains: "Webhook response was absent", ErrorContains: "Webhook response was absent",
}, },
{
Name: "no match dry run",
Webhooks: []registrationv1beta1.Webhook{{
Name: "nomatch",
ClientConfig: ccfgSVC("disallow"),
Rules: []registrationv1beta1.RuleWithOperations{{
Operations: []registrationv1beta1.OperationType{registrationv1beta1.Create},
}},
NamespaceSelector: &metav1.LabelSelector{},
}},
IsDryRun: true,
ExpectAllow: true,
},
{
Name: "match dry run",
Webhooks: []registrationv1beta1.Webhook{{
Name: "allow",
ClientConfig: ccfgSVC("allow"),
Rules: matchEverythingRules,
NamespaceSelector: &metav1.LabelSelector{},
}},
IsDryRun: true,
ErrorContains: "does not support dry run",
},
// No need to test everything with the url case, since only the // No need to test everything with the url case, since only the
// connection is different. // connection is different.
} }
@ -417,6 +442,17 @@ func NewMutatingTestCases(url *url.URL) []Test {
}}, }},
ErrorContains: "invalid character", ErrorContains: "invalid character",
}, },
{
Name: "match & remove label dry run",
Webhooks: []registrationv1beta1.Webhook{{
Name: "removeLabel",
ClientConfig: ccfgSVC("removeLabel"),
Rules: matchEverythingRules,
NamespaceSelector: &metav1.LabelSelector{},
}},
IsDryRun: true,
ErrorContains: "does not support dry run",
},
// No need to test everything with the url case, since only the // No need to test everything with the url case, since only the
// connection is different. // connection is different.
} }

View File

@ -99,7 +99,7 @@ func (d *validatingDispatcher) Dispatch(ctx context.Context, attr *generic.Versi
func (d *validatingDispatcher) callHook(ctx context.Context, h *v1beta1.Webhook, attr *generic.VersionedAttributes) error { func (d *validatingDispatcher) callHook(ctx context.Context, h *v1beta1.Webhook, attr *generic.VersionedAttributes) error {
if attr.IsDryRun() { if attr.IsDryRun() {
// TODO: support this // TODO: support this
webhookerrors.NewDryRunUnsupportedErr(h.Name) return webhookerrors.NewDryRunUnsupportedErr(h.Name)
} }
// Make the webhook request // Make the webhook request

View File

@ -72,7 +72,7 @@ func TestValidate(t *testing.T) {
continue continue
} }
err = wh.Validate(webhooktesting.NewAttribute(ns, nil)) err = wh.Validate(webhooktesting.NewAttribute(ns, nil, tt.IsDryRun))
if tt.ExpectAllow != (err == nil) { if tt.ExpectAllow != (err == nil) {
t.Errorf("%s: expected allowed=%v, but got err=%v", tt.Name, tt.ExpectAllow, err) t.Errorf("%s: expected allowed=%v, but got err=%v", tt.Name, tt.ExpectAllow, err)
} }
@ -130,7 +130,7 @@ func TestValidateCachedClient(t *testing.T) {
continue continue
} }
err = wh.Validate(webhooktesting.NewAttribute(ns, nil)) err = wh.Validate(webhooktesting.NewAttribute(ns, nil, false))
if tt.ExpectAllow != (err == nil) { if tt.ExpectAllow != (err == nil) {
t.Errorf("%s: expected allowed=%v, but got err=%v", tt.Name, tt.ExpectAllow, err) t.Errorf("%s: expected allowed=%v, but got err=%v", tt.Name, tt.ExpectAllow, err)
} }