
TestWatchBasedManager was racing with the default namespace creation. To fix that flake and to ensure integration tests using a shared etcd don't accidentally overlap in the future, move the three main tests using the default namespace to separate namespaces, and have TestWatchBasedManager create that namespace before it runs. Make StartTestServer wait for default namespace creation, which will reduce other flakes until future changes completely remove use of default namespace. From a failed integration run: watch_manager_test.go:66: namespaces "default" not found watch_manager_test.go:66: namespaces "default" not found watch_manager_test.go:66: namespaces "default" not found
252 lines
8.3 KiB
Go
252 lines
8.3 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package master
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/go-openapi/spec"
|
|
|
|
v1 "k8s.io/api/core/v1"
|
|
networkingv1 "k8s.io/api/networking/v1"
|
|
apiextensionsv1beta1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1"
|
|
apiextensionsclientset "k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
"k8s.io/client-go/dynamic"
|
|
"k8s.io/client-go/kubernetes"
|
|
kubeapiservertesting "k8s.io/kubernetes/cmd/kube-apiserver/app/testing"
|
|
"k8s.io/kubernetes/test/integration/etcd"
|
|
"k8s.io/kubernetes/test/integration/framework"
|
|
)
|
|
|
|
func TestCRDShadowGroup(t *testing.T) {
|
|
result := kubeapiservertesting.StartTestServerOrDie(t, nil, nil, framework.SharedEtcd())
|
|
defer result.TearDownFn()
|
|
|
|
testNamespace := "test-crd-shadow-group"
|
|
kubeclient, err := kubernetes.NewForConfig(result.ClientConfig)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
if _, err := kubeclient.CoreV1().Namespaces().Create((&v1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: testNamespace}})); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
apiextensionsclient, err := apiextensionsclientset.NewForConfig(result.ClientConfig)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
t.Logf("Creating a NetworkPolicy")
|
|
nwPolicy, err := kubeclient.NetworkingV1().NetworkPolicies(testNamespace).Create(&networkingv1.NetworkPolicy{
|
|
ObjectMeta: metav1.ObjectMeta{Name: "abc", Namespace: testNamespace},
|
|
Spec: networkingv1.NetworkPolicySpec{
|
|
PodSelector: metav1.LabelSelector{MatchLabels: map[string]string{"foo": "bar"}},
|
|
Ingress: []networkingv1.NetworkPolicyIngressRule{},
|
|
},
|
|
})
|
|
if err != nil {
|
|
t.Fatalf("Failed to create NetworkPolicy: %v", err)
|
|
}
|
|
|
|
t.Logf("Trying to shadow networking group")
|
|
crd := &apiextensionsv1beta1.CustomResourceDefinition{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "foos." + networkingv1.GroupName,
|
|
},
|
|
Spec: apiextensionsv1beta1.CustomResourceDefinitionSpec{
|
|
Group: networkingv1.GroupName,
|
|
Version: networkingv1.SchemeGroupVersion.Version,
|
|
Scope: apiextensionsv1beta1.ClusterScoped,
|
|
Names: apiextensionsv1beta1.CustomResourceDefinitionNames{
|
|
Plural: "foos",
|
|
Kind: "Foo",
|
|
},
|
|
},
|
|
}
|
|
etcd.CreateTestCRDs(t, apiextensionsclient, true, crd)
|
|
|
|
// wait to give aggregator time to update
|
|
time.Sleep(2 * time.Second)
|
|
|
|
t.Logf("Checking that we still see the NetworkPolicy")
|
|
_, err = kubeclient.NetworkingV1().NetworkPolicies(nwPolicy.Namespace).Get(nwPolicy.Name, metav1.GetOptions{})
|
|
if err != nil {
|
|
t.Errorf("Failed to get NetworkPolocy: %v", err)
|
|
}
|
|
|
|
t.Logf("Checking that crd resource does not show up in networking group")
|
|
if etcd.CrdExistsInDiscovery(apiextensionsclient, crd) {
|
|
t.Errorf("CRD resource shows up in discovery, but shouldn't.")
|
|
}
|
|
}
|
|
|
|
func TestCRD(t *testing.T) {
|
|
result := kubeapiservertesting.StartTestServerOrDie(t, nil, nil, framework.SharedEtcd())
|
|
defer result.TearDownFn()
|
|
|
|
testNamespace := "test-crd"
|
|
kubeclient, err := kubernetes.NewForConfig(result.ClientConfig)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
if _, err := kubeclient.CoreV1().Namespaces().Create((&v1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: testNamespace}})); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
apiextensionsclient, err := apiextensionsclientset.NewForConfig(result.ClientConfig)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
t.Logf("Trying to create a custom resource without conflict")
|
|
crd := &apiextensionsv1beta1.CustomResourceDefinition{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "foos.cr.bar.com",
|
|
},
|
|
Spec: apiextensionsv1beta1.CustomResourceDefinitionSpec{
|
|
Group: "cr.bar.com",
|
|
Version: "v1",
|
|
Scope: apiextensionsv1beta1.NamespaceScoped,
|
|
Names: apiextensionsv1beta1.CustomResourceDefinitionNames{
|
|
Plural: "foos",
|
|
Kind: "Foo",
|
|
},
|
|
},
|
|
}
|
|
etcd.CreateTestCRDs(t, apiextensionsclient, false, crd)
|
|
|
|
t.Logf("Trying to access foos.cr.bar.com with dynamic client")
|
|
dynamicClient, err := dynamic.NewForConfig(result.ClientConfig)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
fooResource := schema.GroupVersionResource{Group: "cr.bar.com", Version: "v1", Resource: "foos"}
|
|
_, err = dynamicClient.Resource(fooResource).Namespace(testNamespace).List(metav1.ListOptions{})
|
|
if err != nil {
|
|
t.Errorf("Failed to list foos.cr.bar.com instances: %v", err)
|
|
}
|
|
}
|
|
|
|
func TestCRDOpenAPI(t *testing.T) {
|
|
result := kubeapiservertesting.StartTestServerOrDie(t, nil, nil, framework.SharedEtcd())
|
|
defer result.TearDownFn()
|
|
kubeclient, err := kubernetes.NewForConfig(result.ClientConfig)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
apiextensionsclient, err := apiextensionsclientset.NewForConfig(result.ClientConfig)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
t.Logf("Trying to create a custom resource without conflict")
|
|
crd := &apiextensionsv1beta1.CustomResourceDefinition{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "foos.cr.bar.com",
|
|
},
|
|
Spec: apiextensionsv1beta1.CustomResourceDefinitionSpec{
|
|
Group: "cr.bar.com",
|
|
Version: "v1",
|
|
Scope: apiextensionsv1beta1.NamespaceScoped,
|
|
Names: apiextensionsv1beta1.CustomResourceDefinitionNames{
|
|
Plural: "foos",
|
|
Kind: "Foo",
|
|
},
|
|
Validation: &apiextensionsv1beta1.CustomResourceValidation{
|
|
OpenAPIV3Schema: &apiextensionsv1beta1.JSONSchemaProps{
|
|
Type: "object",
|
|
Properties: map[string]apiextensionsv1beta1.JSONSchemaProps{
|
|
"foo": {Type: "string"},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
etcd.CreateTestCRDs(t, apiextensionsclient, false, crd)
|
|
waitForSpec := func(expectedType string) {
|
|
t.Logf(`Waiting for {properties: {"foo": {"type":"%s"}}} to show up in schema`, expectedType)
|
|
lastMsg := ""
|
|
if err := wait.PollImmediate(500*time.Millisecond, 10*time.Second, func() (bool, error) {
|
|
lastMsg = ""
|
|
bs, err := kubeclient.RESTClient().Get().AbsPath("openapi", "v2").DoRaw()
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
spec := spec.Swagger{}
|
|
if err := json.Unmarshal(bs, &spec); err != nil {
|
|
return false, err
|
|
}
|
|
if spec.SwaggerProps.Paths == nil {
|
|
lastMsg = "spec.SwaggerProps.Paths is nil"
|
|
return false, nil
|
|
}
|
|
d, ok := spec.SwaggerProps.Definitions["com.bar.cr.v1.Foo"]
|
|
if !ok {
|
|
lastMsg = `spec.SwaggerProps.Definitions["com.bar.cr.v1.Foo"] not found`
|
|
return false, nil
|
|
}
|
|
p, ok := d.Properties["foo"]
|
|
if !ok {
|
|
lastMsg = `spec.SwaggerProps.Definitions["com.bar.cr.v1.Foo"].Properties["foo"] not found`
|
|
return false, nil
|
|
}
|
|
if !p.Type.Contains(expectedType) {
|
|
lastMsg = fmt.Sprintf(`spec.SwaggerProps.Definitions["com.bar.cr.v1.Foo"].Properties["foo"].Type should be %q, but got: %q`, expectedType, p.Type)
|
|
return false, nil
|
|
}
|
|
return true, nil
|
|
}); err != nil {
|
|
t.Fatalf("Failed to see %s OpenAPI spec in discovery: %v, last message: %s", crd.Name, err, lastMsg)
|
|
}
|
|
}
|
|
waitForSpec("string")
|
|
crd, err = apiextensionsclient.ApiextensionsV1beta1().CustomResourceDefinitions().Get(crd.Name, metav1.GetOptions{})
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
prop := crd.Spec.Validation.OpenAPIV3Schema.Properties["foo"]
|
|
prop.Type = "boolean"
|
|
crd.Spec.Validation.OpenAPIV3Schema.Properties["foo"] = prop
|
|
if _, err = apiextensionsclient.ApiextensionsV1beta1().CustomResourceDefinitions().Update(crd); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
waitForSpec("boolean")
|
|
}
|
|
|
|
type Foo struct {
|
|
metav1.TypeMeta `json:",inline"`
|
|
metav1.ObjectMeta `json:"metadata,omitempty" protobuf:"bytes,1,opt,name=metadata"`
|
|
}
|
|
|
|
func unstructuredFoo(foo *Foo) (*unstructured.Unstructured, error) {
|
|
bs, err := json.Marshal(foo)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
ret := &unstructured.Unstructured{}
|
|
if err = ret.UnmarshalJSON(bs); err != nil {
|
|
return nil, err
|
|
}
|
|
return ret, nil
|
|
}
|