mirror of https://github.com/k3s-io/k3s
472 lines
14 KiB
Go
472 lines
14 KiB
Go
/*
|
|
Copyright 2015 The Kubernetes Authors All rights reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package v1beta3_test
|
|
|
|
import (
|
|
"reflect"
|
|
"testing"
|
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/api"
|
|
versioned "github.com/GoogleCloudPlatform/kubernetes/pkg/api/v1beta3"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/runtime"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/util"
|
|
)
|
|
|
|
func roundTrip(t *testing.T, obj runtime.Object) runtime.Object {
|
|
data, err := versioned.Codec.Encode(obj)
|
|
if err != nil {
|
|
t.Errorf("%v\n %#v", err, obj)
|
|
return nil
|
|
}
|
|
obj2, err := api.Codec.Decode(data)
|
|
if err != nil {
|
|
t.Errorf("%v\nData: %s\nSource: %#v", err, string(data), obj)
|
|
return nil
|
|
}
|
|
obj3 := reflect.New(reflect.TypeOf(obj).Elem()).Interface().(runtime.Object)
|
|
err = api.Scheme.Convert(obj2, obj3)
|
|
if err != nil {
|
|
t.Errorf("%v\nSource: %#v", err, obj2)
|
|
return nil
|
|
}
|
|
return obj3
|
|
}
|
|
|
|
func TestSetDefaultReplicationController(t *testing.T) {
|
|
tests := []struct {
|
|
rc *versioned.ReplicationController
|
|
expectLabels bool
|
|
expectSelector bool
|
|
}{
|
|
{
|
|
rc: &versioned.ReplicationController{
|
|
Spec: versioned.ReplicationControllerSpec{
|
|
Template: &versioned.PodTemplateSpec{
|
|
ObjectMeta: versioned.ObjectMeta{
|
|
Labels: map[string]string{
|
|
"foo": "bar",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expectLabels: true,
|
|
expectSelector: true,
|
|
},
|
|
{
|
|
rc: &versioned.ReplicationController{
|
|
ObjectMeta: versioned.ObjectMeta{
|
|
Labels: map[string]string{
|
|
"bar": "foo",
|
|
},
|
|
},
|
|
Spec: versioned.ReplicationControllerSpec{
|
|
Template: &versioned.PodTemplateSpec{
|
|
ObjectMeta: versioned.ObjectMeta{
|
|
Labels: map[string]string{
|
|
"foo": "bar",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expectLabels: false,
|
|
expectSelector: true,
|
|
},
|
|
{
|
|
rc: &versioned.ReplicationController{
|
|
ObjectMeta: versioned.ObjectMeta{
|
|
Labels: map[string]string{
|
|
"bar": "foo",
|
|
},
|
|
},
|
|
Spec: versioned.ReplicationControllerSpec{
|
|
Selector: map[string]string{
|
|
"some": "other",
|
|
},
|
|
Template: &versioned.PodTemplateSpec{
|
|
ObjectMeta: versioned.ObjectMeta{
|
|
Labels: map[string]string{
|
|
"foo": "bar",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expectLabels: false,
|
|
expectSelector: false,
|
|
},
|
|
{
|
|
rc: &versioned.ReplicationController{
|
|
Spec: versioned.ReplicationControllerSpec{
|
|
Selector: map[string]string{
|
|
"some": "other",
|
|
},
|
|
Template: &versioned.PodTemplateSpec{
|
|
ObjectMeta: versioned.ObjectMeta{
|
|
Labels: map[string]string{
|
|
"foo": "bar",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expectLabels: true,
|
|
expectSelector: false,
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
rc := test.rc
|
|
obj2 := roundTrip(t, runtime.Object(rc))
|
|
rc2, ok := obj2.(*versioned.ReplicationController)
|
|
if !ok {
|
|
t.Errorf("unexpected object: %v", rc2)
|
|
t.FailNow()
|
|
}
|
|
if test.expectSelector != reflect.DeepEqual(rc2.Spec.Selector, rc2.Spec.Template.Labels) {
|
|
if test.expectSelector {
|
|
t.Errorf("expected: %v, got: %v", rc2.Spec.Template.Labels, rc2.Spec.Selector)
|
|
} else {
|
|
t.Errorf("unexpected equality: %v", rc.Spec.Selector)
|
|
}
|
|
}
|
|
if test.expectLabels != reflect.DeepEqual(rc2.Labels, rc2.Spec.Template.Labels) {
|
|
if test.expectLabels {
|
|
t.Errorf("expected: %v, got: %v", rc2.Spec.Template.Labels, rc2.Labels)
|
|
} else {
|
|
t.Errorf("unexpected equality: %v", rc.Labels)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestSetDefaultService(t *testing.T) {
|
|
svc := &versioned.Service{}
|
|
obj2 := roundTrip(t, runtime.Object(svc))
|
|
svc2 := obj2.(*versioned.Service)
|
|
if svc2.Spec.SessionAffinity != versioned.ServiceAffinityNone {
|
|
t.Errorf("Expected default session affinity type:%s, got: %s", versioned.ServiceAffinityNone, svc2.Spec.SessionAffinity)
|
|
}
|
|
if svc2.Spec.Type != versioned.ServiceTypeClusterIP {
|
|
t.Errorf("Expected default type:%s, got: %s", versioned.ServiceTypeClusterIP, svc2.Spec.Type)
|
|
}
|
|
}
|
|
|
|
func TestSetDefaultServiceWithLoadbalancer(t *testing.T) {
|
|
svc := &versioned.Service{}
|
|
svc.Spec.CreateExternalLoadBalancer = true
|
|
obj2 := roundTrip(t, runtime.Object(svc))
|
|
svc2 := obj2.(*versioned.Service)
|
|
if svc2.Spec.Type != versioned.ServiceTypeLoadBalancer {
|
|
t.Errorf("Expected default type:%s, got: %s", versioned.ServiceTypeLoadBalancer, svc2.Spec.Type)
|
|
}
|
|
}
|
|
|
|
func TestSetDefaultSecret(t *testing.T) {
|
|
s := &versioned.Secret{}
|
|
obj2 := roundTrip(t, runtime.Object(s))
|
|
s2 := obj2.(*versioned.Secret)
|
|
|
|
if s2.Type != versioned.SecretTypeOpaque {
|
|
t.Errorf("Expected secret type %v, got %v", versioned.SecretTypeOpaque, s2.Type)
|
|
}
|
|
}
|
|
|
|
func TestSetDefaultPersistentVolume(t *testing.T) {
|
|
pv := &versioned.PersistentVolume{}
|
|
obj2 := roundTrip(t, runtime.Object(pv))
|
|
pv2 := obj2.(*versioned.PersistentVolume)
|
|
|
|
if pv2.Status.Phase != versioned.VolumePending {
|
|
t.Errorf("Expected volume phase %v, got %v", versioned.VolumePending, pv2.Status.Phase)
|
|
}
|
|
if pv2.Spec.PersistentVolumeReclaimPolicy != versioned.PersistentVolumeReclaimRetain {
|
|
t.Errorf("Expected pv reclaim policy %v, got %v", versioned.PersistentVolumeReclaimRetain, pv2.Spec.PersistentVolumeReclaimPolicy)
|
|
}
|
|
}
|
|
|
|
func TestSetDefaultPersistentVolumeClaim(t *testing.T) {
|
|
pvc := &versioned.PersistentVolumeClaim{}
|
|
obj2 := roundTrip(t, runtime.Object(pvc))
|
|
pvc2 := obj2.(*versioned.PersistentVolumeClaim)
|
|
|
|
if pvc2.Status.Phase != versioned.ClaimPending {
|
|
t.Errorf("Expected claim phase %v, got %v", versioned.ClaimPending, pvc2.Status.Phase)
|
|
}
|
|
}
|
|
|
|
func TestSetDefaulEndpointsProtocol(t *testing.T) {
|
|
in := &versioned.Endpoints{Subsets: []versioned.EndpointSubset{
|
|
{Ports: []versioned.EndpointPort{{}, {Protocol: "UDP"}, {}}},
|
|
}}
|
|
obj := roundTrip(t, runtime.Object(in))
|
|
out := obj.(*versioned.Endpoints)
|
|
|
|
for i := range out.Subsets {
|
|
for j := range out.Subsets[i].Ports {
|
|
if in.Subsets[i].Ports[j].Protocol == "" {
|
|
if out.Subsets[i].Ports[j].Protocol != versioned.ProtocolTCP {
|
|
t.Errorf("Expected protocol %s, got %s", versioned.ProtocolTCP, out.Subsets[i].Ports[j].Protocol)
|
|
}
|
|
} else {
|
|
if out.Subsets[i].Ports[j].Protocol != in.Subsets[i].Ports[j].Protocol {
|
|
t.Errorf("Expected protocol %s, got %s", in.Subsets[i].Ports[j].Protocol, out.Subsets[i].Ports[j].Protocol)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestSetDefaulServiceTargetPort(t *testing.T) {
|
|
in := &versioned.Service{Spec: versioned.ServiceSpec{Ports: []versioned.ServicePort{{Port: 1234}}}}
|
|
obj := roundTrip(t, runtime.Object(in))
|
|
out := obj.(*versioned.Service)
|
|
if out.Spec.Ports[0].TargetPort != util.NewIntOrStringFromInt(1234) {
|
|
t.Errorf("Expected TargetPort to be defaulted, got %s", out.Spec.Ports[0].TargetPort)
|
|
}
|
|
|
|
in = &versioned.Service{Spec: versioned.ServiceSpec{Ports: []versioned.ServicePort{{Port: 1234, TargetPort: util.NewIntOrStringFromInt(5678)}}}}
|
|
obj = roundTrip(t, runtime.Object(in))
|
|
out = obj.(*versioned.Service)
|
|
if out.Spec.Ports[0].TargetPort != util.NewIntOrStringFromInt(5678) {
|
|
t.Errorf("Expected TargetPort to be unchanged, got %s", out.Spec.Ports[0].TargetPort)
|
|
}
|
|
}
|
|
|
|
func TestSetDefaultServicePort(t *testing.T) {
|
|
// Unchanged if set.
|
|
in := &versioned.Service{Spec: versioned.ServiceSpec{
|
|
Ports: []versioned.ServicePort{
|
|
{Protocol: "UDP", Port: 9376, TargetPort: util.NewIntOrStringFromString("p")},
|
|
{Protocol: "UDP", Port: 8675, TargetPort: util.NewIntOrStringFromInt(309)},
|
|
},
|
|
}}
|
|
out := roundTrip(t, runtime.Object(in)).(*versioned.Service)
|
|
if out.Spec.Ports[0].Protocol != versioned.ProtocolUDP {
|
|
t.Errorf("Expected protocol %s, got %s", versioned.ProtocolUDP, out.Spec.Ports[0].Protocol)
|
|
}
|
|
if out.Spec.Ports[0].TargetPort != util.NewIntOrStringFromString("p") {
|
|
t.Errorf("Expected port %d, got %s", in.Spec.Ports[0].Port, out.Spec.Ports[0].TargetPort)
|
|
}
|
|
if out.Spec.Ports[1].Protocol != versioned.ProtocolUDP {
|
|
t.Errorf("Expected protocol %s, got %s", versioned.ProtocolUDP, out.Spec.Ports[1].Protocol)
|
|
}
|
|
if out.Spec.Ports[1].TargetPort != util.NewIntOrStringFromInt(309) {
|
|
t.Errorf("Expected port %d, got %s", in.Spec.Ports[1].Port, out.Spec.Ports[1].TargetPort)
|
|
}
|
|
|
|
// Defaulted.
|
|
in = &versioned.Service{Spec: versioned.ServiceSpec{
|
|
Ports: []versioned.ServicePort{
|
|
{Protocol: "", Port: 9376, TargetPort: util.NewIntOrStringFromString("")},
|
|
{Protocol: "", Port: 8675, TargetPort: util.NewIntOrStringFromInt(0)},
|
|
},
|
|
}}
|
|
out = roundTrip(t, runtime.Object(in)).(*versioned.Service)
|
|
if out.Spec.Ports[0].Protocol != versioned.ProtocolTCP {
|
|
t.Errorf("Expected protocol %s, got %s", versioned.ProtocolTCP, out.Spec.Ports[0].Protocol)
|
|
}
|
|
if out.Spec.Ports[0].TargetPort != util.NewIntOrStringFromInt(in.Spec.Ports[0].Port) {
|
|
t.Errorf("Expected port %d, got %d", in.Spec.Ports[0].Port, out.Spec.Ports[0].TargetPort)
|
|
}
|
|
if out.Spec.Ports[1].Protocol != versioned.ProtocolTCP {
|
|
t.Errorf("Expected protocol %s, got %s", versioned.ProtocolTCP, out.Spec.Ports[1].Protocol)
|
|
}
|
|
if out.Spec.Ports[1].TargetPort != util.NewIntOrStringFromInt(in.Spec.Ports[1].Port) {
|
|
t.Errorf("Expected port %d, got %d", in.Spec.Ports[1].Port, out.Spec.Ports[1].TargetPort)
|
|
}
|
|
}
|
|
|
|
func TestSetDefaultNamespace(t *testing.T) {
|
|
s := &versioned.Namespace{}
|
|
obj2 := roundTrip(t, runtime.Object(s))
|
|
s2 := obj2.(*versioned.Namespace)
|
|
|
|
if s2.Status.Phase != versioned.NamespaceActive {
|
|
t.Errorf("Expected phase %v, got %v", versioned.NamespaceActive, s2.Status.Phase)
|
|
}
|
|
}
|
|
|
|
func TestSetDefaultPodSpecHostNetwork(t *testing.T) {
|
|
portNum := 8080
|
|
s := versioned.PodSpec{}
|
|
s.HostNetwork = true
|
|
s.Containers = []versioned.Container{
|
|
{
|
|
Ports: []versioned.ContainerPort{
|
|
{
|
|
ContainerPort: portNum,
|
|
},
|
|
},
|
|
},
|
|
}
|
|
pod := &versioned.Pod{
|
|
Spec: s,
|
|
}
|
|
obj2 := roundTrip(t, runtime.Object(pod))
|
|
pod2 := obj2.(*versioned.Pod)
|
|
s2 := pod2.Spec
|
|
|
|
hostPortNum := s2.Containers[0].Ports[0].HostPort
|
|
if hostPortNum != portNum {
|
|
t.Errorf("Expected container port to be defaulted, was made %d instead of %d", hostPortNum, portNum)
|
|
}
|
|
}
|
|
|
|
func TestSetDefaultNodeExternalID(t *testing.T) {
|
|
name := "node0"
|
|
n := &versioned.Node{}
|
|
n.Name = name
|
|
obj2 := roundTrip(t, runtime.Object(n))
|
|
n2 := obj2.(*versioned.Node)
|
|
if n2.Spec.ExternalID != name {
|
|
t.Errorf("Expected default External ID: %s, got: %s", name, n2.Spec.ExternalID)
|
|
}
|
|
if n2.Spec.ProviderID != "" {
|
|
t.Errorf("Expected empty default Cloud Provider ID, got: %s", n2.Spec.ProviderID)
|
|
}
|
|
}
|
|
|
|
func TestSetDefaultObjectFieldSelectorAPIVersion(t *testing.T) {
|
|
s := versioned.PodSpec{
|
|
Containers: []versioned.Container{
|
|
{
|
|
Env: []versioned.EnvVar{
|
|
{
|
|
ValueFrom: &versioned.EnvVarSource{
|
|
FieldRef: &versioned.ObjectFieldSelector{},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
pod := &versioned.Pod{
|
|
Spec: s,
|
|
}
|
|
obj2 := roundTrip(t, runtime.Object(pod))
|
|
pod2 := obj2.(*versioned.Pod)
|
|
s2 := pod2.Spec
|
|
|
|
apiVersion := s2.Containers[0].Env[0].ValueFrom.FieldRef.APIVersion
|
|
if apiVersion != "v1beta3" {
|
|
t.Errorf("Expected default APIVersion v1beta3, got: %v", apiVersion)
|
|
}
|
|
}
|
|
|
|
func TestSetDefaultSecurityContext(t *testing.T) {
|
|
priv := false
|
|
privTrue := true
|
|
testCases := map[string]struct {
|
|
c versioned.Container
|
|
}{
|
|
"downward defaulting caps": {
|
|
c: versioned.Container{
|
|
Privileged: false,
|
|
Capabilities: versioned.Capabilities{
|
|
Add: []versioned.Capability{"foo"},
|
|
Drop: []versioned.Capability{"bar"},
|
|
},
|
|
SecurityContext: &versioned.SecurityContext{
|
|
Privileged: &priv,
|
|
},
|
|
},
|
|
},
|
|
"downward defaulting priv": {
|
|
c: versioned.Container{
|
|
Privileged: false,
|
|
Capabilities: versioned.Capabilities{
|
|
Add: []versioned.Capability{"foo"},
|
|
Drop: []versioned.Capability{"bar"},
|
|
},
|
|
SecurityContext: &versioned.SecurityContext{
|
|
Capabilities: &versioned.Capabilities{
|
|
Add: []versioned.Capability{"foo"},
|
|
Drop: []versioned.Capability{"bar"},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
"upward defaulting caps": {
|
|
c: versioned.Container{
|
|
Privileged: false,
|
|
SecurityContext: &versioned.SecurityContext{
|
|
Privileged: &priv,
|
|
Capabilities: &versioned.Capabilities{
|
|
Add: []versioned.Capability{"biz"},
|
|
Drop: []versioned.Capability{"baz"},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
"upward defaulting priv": {
|
|
c: versioned.Container{
|
|
Capabilities: versioned.Capabilities{
|
|
Add: []versioned.Capability{"foo"},
|
|
Drop: []versioned.Capability{"bar"},
|
|
},
|
|
SecurityContext: &versioned.SecurityContext{
|
|
Privileged: &privTrue,
|
|
Capabilities: &versioned.Capabilities{
|
|
Add: []versioned.Capability{"foo"},
|
|
Drop: []versioned.Capability{"bar"},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
pod := &versioned.Pod{
|
|
Spec: versioned.PodSpec{},
|
|
}
|
|
|
|
for k, v := range testCases {
|
|
pod.Spec.Containers = []versioned.Container{v.c}
|
|
obj := roundTrip(t, runtime.Object(pod))
|
|
defaultedPod := obj.(*versioned.Pod)
|
|
c := defaultedPod.Spec.Containers[0]
|
|
if isEqual, issues := areSecurityContextAndContainerEqual(&c); !isEqual {
|
|
t.Errorf("test case %s expected the security context to have the same values as the container but found %#v", k, issues)
|
|
}
|
|
}
|
|
}
|
|
|
|
func areSecurityContextAndContainerEqual(c *versioned.Container) (bool, []string) {
|
|
issues := make([]string, 0)
|
|
equal := true
|
|
|
|
if c.SecurityContext == nil || c.SecurityContext.Privileged == nil || c.SecurityContext.Capabilities == nil {
|
|
equal = false
|
|
issues = append(issues, "Expected non nil settings for SecurityContext")
|
|
return equal, issues
|
|
}
|
|
if *c.SecurityContext.Privileged != c.Privileged {
|
|
equal = false
|
|
issues = append(issues, "The defaulted SecurityContext.Privileged value did not match the container value")
|
|
}
|
|
if !reflect.DeepEqual(c.Capabilities.Add, c.Capabilities.Add) {
|
|
equal = false
|
|
issues = append(issues, "The defaulted SecurityContext.Capabilities.Add did not match the container settings")
|
|
}
|
|
if !reflect.DeepEqual(c.Capabilities.Drop, c.Capabilities.Drop) {
|
|
equal = false
|
|
issues = append(issues, "The defaulted SecurityContext.Capabilities.Drop did not match the container settings")
|
|
}
|
|
return equal, issues
|
|
}
|