166 lines
5.0 KiB
Go
166 lines
5.0 KiB
Go
/*
|
|
Copyright 2015 The Kubernetes Authors All rights reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package app
|
|
|
|
import (
|
|
"reflect"
|
|
"regexp"
|
|
"testing"
|
|
|
|
"k8s.io/kubernetes/cmd/kube-apiserver/app/options"
|
|
"k8s.io/kubernetes/pkg/api/unversioned"
|
|
"k8s.io/kubernetes/pkg/genericapiserver"
|
|
"k8s.io/kubernetes/pkg/master"
|
|
)
|
|
|
|
func TestLongRunningRequestRegexp(t *testing.T) {
|
|
regexp := regexp.MustCompile(options.NewAPIServer().LongRunningRequestRE)
|
|
dontMatch := []string{
|
|
"/api/v1/watch-namespace/",
|
|
"/api/v1/namespace-proxy/",
|
|
"/api/v1/namespace-watch",
|
|
"/api/v1/namespace-proxy",
|
|
"/api/v1/namespace-portforward/pods",
|
|
"/api/v1/portforward/pods",
|
|
". anything",
|
|
"/ that",
|
|
}
|
|
doMatch := []string{
|
|
"/api/v1/pods/watch",
|
|
"/api/v1/watch/stuff",
|
|
"/api/v1/default/service/proxy",
|
|
"/api/v1/pods/proxy/path/to/thing",
|
|
"/api/v1/namespaces/myns/pods/mypod/log",
|
|
"/api/v1/namespaces/myns/pods/mypod/logs",
|
|
"/api/v1/namespaces/myns/pods/mypod/portforward",
|
|
"/api/v1/namespaces/myns/pods/mypod/exec",
|
|
"/api/v1/namespaces/myns/pods/mypod/attach",
|
|
"/api/v1/namespaces/myns/pods/mypod/log/",
|
|
"/api/v1/namespaces/myns/pods/mypod/logs/",
|
|
"/api/v1/namespaces/myns/pods/mypod/portforward/",
|
|
"/api/v1/namespaces/myns/pods/mypod/exec/",
|
|
"/api/v1/namespaces/myns/pods/mypod/attach/",
|
|
"/api/v1/watch/namespaces/myns/pods",
|
|
}
|
|
for _, path := range dontMatch {
|
|
if regexp.MatchString(path) {
|
|
t.Errorf("path should not have match regexp but did: %s", path)
|
|
}
|
|
}
|
|
for _, path := range doMatch {
|
|
if !regexp.MatchString(path) {
|
|
t.Errorf("path should have match regexp did not: %s", path)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestParseRuntimeConfig(t *testing.T) {
|
|
testCases := []struct {
|
|
runtimeConfig map[string]string
|
|
expectedAPIConfig func() *genericapiserver.ResourceConfig
|
|
err bool
|
|
}{
|
|
{
|
|
runtimeConfig: map[string]string{},
|
|
expectedAPIConfig: func() *genericapiserver.ResourceConfig {
|
|
return master.DefaultAPIResourceConfigSource()
|
|
},
|
|
err: false,
|
|
},
|
|
{
|
|
// Cannot override v1 resources.
|
|
runtimeConfig: map[string]string{
|
|
"api/v1/pods": "false",
|
|
},
|
|
expectedAPIConfig: func() *genericapiserver.ResourceConfig {
|
|
return master.DefaultAPIResourceConfigSource()
|
|
},
|
|
err: true,
|
|
},
|
|
{
|
|
// Disable v1.
|
|
runtimeConfig: map[string]string{
|
|
"api/v1": "false",
|
|
},
|
|
expectedAPIConfig: func() *genericapiserver.ResourceConfig {
|
|
config := master.DefaultAPIResourceConfigSource()
|
|
config.DisableVersions(unversioned.GroupVersion{Group: "", Version: "v1"})
|
|
return config
|
|
},
|
|
err: false,
|
|
},
|
|
{
|
|
// Disable extensions.
|
|
runtimeConfig: map[string]string{
|
|
"extensions/v1beta1": "false",
|
|
},
|
|
expectedAPIConfig: func() *genericapiserver.ResourceConfig {
|
|
config := master.DefaultAPIResourceConfigSource()
|
|
config.DisableVersions(unversioned.GroupVersion{Group: "extensions", Version: "v1beta1"})
|
|
return config
|
|
},
|
|
err: false,
|
|
},
|
|
{
|
|
// Disable deployments.
|
|
runtimeConfig: map[string]string{
|
|
"extensions/v1beta1/deployments": "false",
|
|
},
|
|
expectedAPIConfig: func() *genericapiserver.ResourceConfig {
|
|
config := master.DefaultAPIResourceConfigSource()
|
|
config.DisableResources(unversioned.GroupVersionResource{Group: "extensions", Version: "v1beta1", Resource: "deployments"})
|
|
return config
|
|
},
|
|
err: false,
|
|
},
|
|
{
|
|
// Enable deployments and disable jobs.
|
|
runtimeConfig: map[string]string{
|
|
"extensions/v1beta1/anything": "true",
|
|
"extensions/v1beta1/jobs": "false",
|
|
},
|
|
expectedAPIConfig: func() *genericapiserver.ResourceConfig {
|
|
config := master.DefaultAPIResourceConfigSource()
|
|
config.DisableResources(unversioned.GroupVersionResource{Group: "extensions", Version: "v1beta1", Resource: "jobs"})
|
|
config.EnableResources(unversioned.GroupVersionResource{Group: "extensions", Version: "v1beta1", Resource: "anything"})
|
|
return config
|
|
},
|
|
err: false,
|
|
},
|
|
}
|
|
for _, test := range testCases {
|
|
s := &options.APIServer{
|
|
ServerRunOptions: &genericapiserver.ServerRunOptions{
|
|
RuntimeConfig: test.runtimeConfig,
|
|
},
|
|
}
|
|
actualDisablers, err := parseRuntimeConfig(s)
|
|
|
|
if err == nil && test.err {
|
|
t.Fatalf("expected error for test: %v", test)
|
|
} else if err != nil && !test.err {
|
|
t.Fatalf("unexpected error: %s, for test: %v", err, test)
|
|
}
|
|
|
|
expectedConfig := test.expectedAPIConfig()
|
|
if err == nil && !reflect.DeepEqual(actualDisablers, expectedConfig) {
|
|
t.Fatalf("%v: unexpected apiResourceDisablers. Actual: %v\n expected: %v", test.runtimeConfig, actualDisablers, expectedConfig)
|
|
}
|
|
}
|
|
|
|
}
|