mirror of https://github.com/k3s-io/k3s
Add e2e test for when a webhook does not return.
Adding code to simulate a webhook not returning. Ensure that we verify that the returned error is a timeout.pull/6/head
parent
ee13444144
commit
e1cf77858e
|
@ -56,6 +56,7 @@ const (
|
||||||
skipNamespaceLabelValue = "yes"
|
skipNamespaceLabelValue = "yes"
|
||||||
skippedNamespaceName = "exempted-namesapce"
|
skippedNamespaceName = "exempted-namesapce"
|
||||||
disallowedPodName = "disallowed-pod"
|
disallowedPodName = "disallowed-pod"
|
||||||
|
hangingPodName = "hanging-pod"
|
||||||
disallowedConfigMapName = "disallowed-configmap"
|
disallowedConfigMapName = "disallowed-configmap"
|
||||||
allowedConfigMapName = "allowed-configmap"
|
allowedConfigMapName = "allowed-configmap"
|
||||||
crdName = "e2e-test-webhook-crd"
|
crdName = "e2e-test-webhook-crd"
|
||||||
|
@ -99,7 +100,7 @@ var _ = SIGDescribe("AdmissionWebhook", func() {
|
||||||
// Note that in 1.9 we will have backwards incompatible change to
|
// Note that in 1.9 we will have backwards incompatible change to
|
||||||
// admission webhooks, so the image will be updated to 1.9 sometime in
|
// admission webhooks, so the image will be updated to 1.9 sometime in
|
||||||
// the development 1.9 cycle.
|
// the development 1.9 cycle.
|
||||||
deployWebhookAndService(f, "gcr.io/kubernetes-e2e-test-images/k8s-sample-admission-webhook-amd64:1.8v6", context)
|
deployWebhookAndService(f, "gcr.io/kubernetes-e2e-test-images/k8s-sample-admission-webhook-amd64:1.8v7", context)
|
||||||
})
|
})
|
||||||
AfterEach(func() {
|
AfterEach(func() {
|
||||||
cleanWebhookTest(client, namespaceName)
|
cleanWebhookTest(client, namespaceName)
|
||||||
|
@ -453,6 +454,17 @@ func testWebhook(f *framework.Framework) {
|
||||||
framework.Failf("expect error contains %q, got %q", expectedErrMsg2, err.Error())
|
framework.Failf("expect error contains %q, got %q", expectedErrMsg2, err.Error())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
By("create a pod that causes the webhook to hang")
|
||||||
|
client = f.ClientSet
|
||||||
|
// Creating the pod, the request should be rejected
|
||||||
|
pod = hangingPod(f)
|
||||||
|
_, err = client.CoreV1().Pods(f.Namespace.Name).Create(pod)
|
||||||
|
Expect(err).NotTo(BeNil())
|
||||||
|
expectedTimeoutErr := "request did not complete within allowed duration"
|
||||||
|
if !strings.Contains(err.Error(), expectedTimeoutErr) {
|
||||||
|
framework.Failf("expect timeout error %q, got %q", expectedTimeoutErr, err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
By("create a configmap that should be denied by the webhook")
|
By("create a configmap that should be denied by the webhook")
|
||||||
// Creating the configmap, the request should be rejected
|
// Creating the configmap, the request should be rejected
|
||||||
configmap := nonCompliantConfigMap(f)
|
configmap := nonCompliantConfigMap(f)
|
||||||
|
@ -631,6 +643,25 @@ func nonCompliantPod(f *framework.Framework) *v1.Pod {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func hangingPod(f *framework.Framework) *v1.Pod {
|
||||||
|
return &v1.Pod{
|
||||||
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
|
Name: hangingPodName,
|
||||||
|
Labels: map[string]string{
|
||||||
|
"webhook-e2e-test": "wait-forever",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Spec: v1.PodSpec{
|
||||||
|
Containers: []v1.Container{
|
||||||
|
{
|
||||||
|
Name: "wait-forever",
|
||||||
|
Image: framework.GetPauseImageName(f.ClientSet),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func nonCompliantConfigMap(f *framework.Framework) *v1.ConfigMap {
|
func nonCompliantConfigMap(f *framework.Framework) *v1.ConfigMap {
|
||||||
return &v1.ConfigMap{
|
return &v1.ConfigMap{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
|
|
||||||
build:
|
build:
|
||||||
CGO_ENABLED=0 GOOS=linux go build -a -installsuffix cgo -o webhook .
|
CGO_ENABLED=0 GOOS=linux go build -a -installsuffix cgo -o webhook .
|
||||||
docker build --no-cache -t gcr.io/kubernetes-e2e-test-images/k8s-sample-admission-webhook-amd64:1.8v6 .
|
docker build --no-cache -t gcr.io/kubernetes-e2e-test-images/k8s-sample-admission-webhook-amd64:1.8v7 .
|
||||||
rm -rf webhook
|
rm -rf webhook
|
||||||
push:
|
push:
|
||||||
gcloud docker -- push gcr.io/kubernetes-e2e-test-images/k8s-sample-admission-webhook-amd64:1.8v6
|
gcloud docker -- push gcr.io/kubernetes-e2e-test-images/k8s-sample-admission-webhook-amd64:1.8v7
|
||||||
|
|
|
@ -85,11 +85,16 @@ func admitPods(ar v1beta1.AdmissionReview) *v1beta1.AdmissionResponse {
|
||||||
reviewResponse.Allowed = true
|
reviewResponse.Allowed = true
|
||||||
|
|
||||||
var msg string
|
var msg string
|
||||||
for k, v := range pod.Labels {
|
if v, ok := pod.Labels["webhook-e2e-test"]; ok {
|
||||||
if k == "webhook-e2e-test" && v == "webhook-disallow" {
|
if v == "webhook-disallow" {
|
||||||
reviewResponse.Allowed = false
|
reviewResponse.Allowed = false
|
||||||
msg = msg + "the pod contains unwanted label; "
|
msg = msg + "the pod contains unwanted label; "
|
||||||
}
|
}
|
||||||
|
if v == "wait-forever" {
|
||||||
|
reviewResponse.Allowed = false
|
||||||
|
msg = msg + "the pod response should not be sent; "
|
||||||
|
<-make(chan int) // Sleep forever - no one sends to this channel
|
||||||
|
}
|
||||||
}
|
}
|
||||||
for _, container := range pod.Spec.Containers {
|
for _, container := range pod.Spec.Containers {
|
||||||
if strings.Contains(container.Name, "webhook-disallow") {
|
if strings.Contains(container.Name, "webhook-disallow") {
|
||||||
|
|
Loading…
Reference in New Issue