mirror of https://github.com/k3s-io/k3s
189 lines
7.2 KiB
Go
189 lines
7.2 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package namespace
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
"time"
|
|
|
|
apiv1 "k8s.io/api/core/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
"k8s.io/client-go/dynamic"
|
|
restclient "k8s.io/client-go/rest"
|
|
core "k8s.io/client-go/testing"
|
|
federationapi "k8s.io/kubernetes/federation/apis/federation/v1beta1"
|
|
fakefedclientset "k8s.io/kubernetes/federation/client/clientset_generated/federation_clientset/fake"
|
|
"k8s.io/kubernetes/federation/pkg/federation-controller/util"
|
|
"k8s.io/kubernetes/federation/pkg/federation-controller/util/deletionhelper"
|
|
. "k8s.io/kubernetes/federation/pkg/federation-controller/util/test"
|
|
kubeclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
|
fakekubeclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset/fake"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
const (
|
|
namespaces string = "namespaces"
|
|
clusters string = "clusters"
|
|
)
|
|
|
|
func TestNamespaceController(t *testing.T) {
|
|
cluster1 := NewCluster("cluster1", apiv1.ConditionTrue)
|
|
cluster2 := NewCluster("cluster2", apiv1.ConditionTrue)
|
|
ns1 := apiv1.Namespace{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "test-namespace",
|
|
SelfLink: "/api/v1/namespaces/test-namespace",
|
|
},
|
|
Spec: apiv1.NamespaceSpec{
|
|
Finalizers: []apiv1.FinalizerName{apiv1.FinalizerKubernetes},
|
|
},
|
|
}
|
|
|
|
fakeClient := &fakefedclientset.Clientset{}
|
|
RegisterFakeList(clusters, &fakeClient.Fake, &federationapi.ClusterList{Items: []federationapi.Cluster{*cluster1}})
|
|
RegisterFakeList(namespaces, &fakeClient.Fake, &apiv1.NamespaceList{Items: []apiv1.Namespace{}})
|
|
namespaceWatch := RegisterFakeWatch(namespaces, &fakeClient.Fake)
|
|
namespaceUpdateChan := RegisterFakeCopyOnUpdate(namespaces, &fakeClient.Fake, namespaceWatch)
|
|
clusterWatch := RegisterFakeWatch(clusters, &fakeClient.Fake)
|
|
|
|
cluster1Client := &fakekubeclientset.Clientset{}
|
|
cluster1Watch := RegisterFakeWatch(namespaces, &cluster1Client.Fake)
|
|
RegisterFakeList(namespaces, &cluster1Client.Fake, &apiv1.NamespaceList{Items: []apiv1.Namespace{}})
|
|
cluster1CreateChan := RegisterFakeCopyOnCreate(namespaces, &cluster1Client.Fake, cluster1Watch)
|
|
cluster1UpdateChan := RegisterFakeCopyOnUpdate(namespaces, &cluster1Client.Fake, cluster1Watch)
|
|
|
|
cluster2Client := &fakekubeclientset.Clientset{}
|
|
cluster2Watch := RegisterFakeWatch(namespaces, &cluster2Client.Fake)
|
|
RegisterFakeList(namespaces, &cluster2Client.Fake, &apiv1.NamespaceList{Items: []apiv1.Namespace{}})
|
|
cluster2CreateChan := RegisterFakeCopyOnCreate(namespaces, &cluster2Client.Fake, cluster2Watch)
|
|
|
|
nsDeleteChan := RegisterDelete(&fakeClient.Fake, namespaces)
|
|
namespaceController := NewNamespaceController(fakeClient, dynamic.NewDynamicClientPool(&restclient.Config{}))
|
|
informerClientFactory := func(cluster *federationapi.Cluster) (kubeclientset.Interface, error) {
|
|
switch cluster.Name {
|
|
case cluster1.Name:
|
|
return cluster1Client, nil
|
|
case cluster2.Name:
|
|
return cluster2Client, nil
|
|
default:
|
|
return nil, fmt.Errorf("Unknown cluster")
|
|
}
|
|
}
|
|
setClientFactory(namespaceController.namespaceFederatedInformer, informerClientFactory)
|
|
namespaceController.clusterAvailableDelay = time.Second
|
|
namespaceController.namespaceReviewDelay = 50 * time.Millisecond
|
|
namespaceController.smallDelay = 20 * time.Millisecond
|
|
namespaceController.updateTimeout = 5 * time.Second
|
|
|
|
stop := make(chan struct{})
|
|
namespaceController.Run(stop)
|
|
|
|
// Test add federated namespace.
|
|
namespaceWatch.Add(&ns1)
|
|
// Verify that the DeleteFromUnderlyingClusters finalizer is added to the namespace.
|
|
updatedNamespace := GetNamespaceFromChan(namespaceUpdateChan)
|
|
require.NotNil(t, updatedNamespace)
|
|
AssertHasFinalizer(t, updatedNamespace, deletionhelper.FinalizerDeleteFromUnderlyingClusters)
|
|
ns1 = *updatedNamespace
|
|
|
|
// Verify that the namespace is created in underlying cluster1.
|
|
createdNamespace := GetNamespaceFromChan(cluster1CreateChan)
|
|
require.NotNil(t, createdNamespace)
|
|
assert.Equal(t, ns1.Name, createdNamespace.Name)
|
|
|
|
// Wait for the namespace to appear in the informer store
|
|
err := WaitForStoreUpdate(
|
|
namespaceController.namespaceFederatedInformer.GetTargetStore(),
|
|
cluster1.Name, ns1.Name, wait.ForeverTestTimeout)
|
|
assert.Nil(t, err, "namespace should have appeared in the informer store")
|
|
|
|
// Test update federated namespace.
|
|
ns1.Annotations = map[string]string{
|
|
"A": "B",
|
|
}
|
|
namespaceWatch.Modify(&ns1)
|
|
assert.NoError(t, CheckObjectFromChan(cluster1UpdateChan, MetaAndSpecCheckingFunction(&ns1)))
|
|
|
|
// Test add cluster
|
|
clusterWatch.Add(cluster2)
|
|
createdNamespace2 := GetNamespaceFromChan(cluster2CreateChan)
|
|
require.NotNil(t, createdNamespace2)
|
|
assert.Equal(t, ns1.Name, createdNamespace2.Name)
|
|
assert.Contains(t, createdNamespace2.Annotations, "A")
|
|
|
|
// Delete the namespace with orphan finalizer (let namespaces
|
|
// in underlying clusters be as is).
|
|
// TODO: Add a test without orphan finalizer.
|
|
ns1.ObjectMeta.Finalizers = append(ns1.ObjectMeta.Finalizers, metav1.FinalizerOrphanDependents)
|
|
ns1.DeletionTimestamp = &metav1.Time{Time: time.Now()}
|
|
namespaceWatch.Modify(&ns1)
|
|
assert.Equal(t, ns1.Name, GetStringFromChan(nsDeleteChan))
|
|
// TODO: Add a test for verifying that resources in the namespace are deleted
|
|
// when the namespace is deleted.
|
|
// Need a fake dynamic client to mock list and delete actions to be able to test this.
|
|
// TODO: Add a fake dynamic client and test this.
|
|
// In the meantime, e2e test verify that the resources in a namespace are
|
|
// deleted when the namespace is deleted.
|
|
close(stop)
|
|
}
|
|
|
|
func setClientFactory(informer util.FederatedInformer, informerClientFactory func(*federationapi.Cluster) (kubeclientset.Interface, error)) {
|
|
testInformer := ToFederatedInformerForTestOnly(informer)
|
|
testInformer.SetClientFactory(informerClientFactory)
|
|
}
|
|
|
|
func RegisterDeleteCollection(client *core.Fake, resource string) chan string {
|
|
deleteChan := make(chan string, 100)
|
|
client.AddReactor("delete-collection", resource, func(action core.Action) (bool, runtime.Object, error) {
|
|
deleteChan <- "all"
|
|
return true, nil, nil
|
|
})
|
|
return deleteChan
|
|
}
|
|
|
|
func RegisterDelete(client *core.Fake, resource string) chan string {
|
|
deleteChan := make(chan string, 100)
|
|
client.AddReactor("delete", resource, func(action core.Action) (bool, runtime.Object, error) {
|
|
deleteAction := action.(core.DeleteAction)
|
|
deleteChan <- deleteAction.GetName()
|
|
return true, nil, nil
|
|
})
|
|
return deleteChan
|
|
}
|
|
|
|
func GetStringFromChan(c chan string) string {
|
|
select {
|
|
case str := <-c:
|
|
return str
|
|
case <-time.After(5 * time.Second):
|
|
return "timedout"
|
|
}
|
|
}
|
|
|
|
func GetNamespaceFromChan(c chan runtime.Object) *apiv1.Namespace {
|
|
if namespace := GetObjectFromChan(c); namespace == nil {
|
|
return nil
|
|
} else {
|
|
return namespace.(*apiv1.Namespace)
|
|
}
|
|
}
|