From 23454c17749f176a18b9a815f4674a8e923586c1 Mon Sep 17 00:00:00 2001 From: Cole Mickens Date: Thu, 25 Aug 2016 08:43:43 +0000 Subject: [PATCH] azure: loadbalancer rules use DSR --- .../providers/azure/azure_loadbalancer.go | 9 +++++---- pkg/cloudprovider/providers/azure/azure_test.go | 14 +++++++------- 2 files changed, 12 insertions(+), 11 deletions(-) diff --git a/pkg/cloudprovider/providers/azure/azure_loadbalancer.go b/pkg/cloudprovider/providers/azure/azure_loadbalancer.go index edb095cc0f6..afadeacef19 100644 --- a/pkg/cloudprovider/providers/azure/azure_loadbalancer.go +++ b/pkg/cloudprovider/providers/azure/azure_loadbalancer.go @@ -133,7 +133,7 @@ func (az *Cloud) EnsureLoadBalancer(clusterName string, service *api.Service, no return nil, utilerrors.Flatten(errs) } - glog.V(2).Infof("ensure(%s): FINISH - %s", service.Name, *pip.Properties.IPAddress) + glog.V(2).Infof("ensure(%s): FINISH - %s", serviceName, *pip.Properties.IPAddress) return &api.LoadBalancerStatus{ Ingress: []api.LoadBalancerIngress{{IP: *pip.Properties.IPAddress}}, }, nil @@ -362,8 +362,9 @@ func (az *Cloud) reconcileLoadBalancer(lb network.LoadBalancer, pip *network.Pub Probe: &network.SubResource{ ID: to.StringPtr(az.getLoadBalancerProbeID(lbName, lbRuleName)), }, - FrontendPort: to.Int32Ptr(port.Port), - BackendPort: to.Int32Ptr(port.NodePort), + FrontendPort: to.Int32Ptr(port.Port), + BackendPort: to.Int32Ptr(port.Port), + EnableFloatingIP: to.BoolPtr(true), }, } } @@ -470,7 +471,7 @@ func (az *Cloud) reconcileSecurityGroup(sg network.SecurityGroup, clusterName st Properties: &network.SecurityRulePropertiesFormat{ Protocol: securityProto, SourcePortRange: to.StringPtr("*"), - DestinationPortRange: to.StringPtr(strconv.Itoa(int(port.NodePort))), + DestinationPortRange: to.StringPtr(strconv.Itoa(int(port.Port))), SourceAddressPrefix: to.StringPtr("Internet"), DestinationAddressPrefix: to.StringPtr("*"), Access: network.Allow, diff --git a/pkg/cloudprovider/providers/azure/azure_test.go b/pkg/cloudprovider/providers/azure/azure_test.go index e7f8707553e..ab9b51597ba 100644 --- a/pkg/cloudprovider/providers/azure/azure_test.go +++ b/pkg/cloudprovider/providers/azure/azure_test.go @@ -217,7 +217,7 @@ func getTestLoadBalancer(services ...api.Service) network.LoadBalancer { Name: to.StringPtr(ruleName), Properties: &network.LoadBalancingRulePropertiesFormat{ FrontendPort: to.Int32Ptr(port.Port), - BackendPort: to.Int32Ptr(port.NodePort), + BackendPort: to.Int32Ptr(port.Port), }, }) probes = append(probes, network.Probe{ @@ -248,7 +248,7 @@ func getTestSecurityGroup(services ...api.Service) network.SecurityGroup { rules = append(rules, network.SecurityRule{ Name: to.StringPtr(ruleName), Properties: &network.SecurityRulePropertiesFormat{ - DestinationPortRange: to.StringPtr(fmt.Sprintf("%d", port.NodePort)), + DestinationPortRange: to.StringPtr(fmt.Sprintf("%d", port.Port)), }, }) } @@ -273,13 +273,13 @@ func validateLoadBalancer(t *testing.T, loadBalancer network.LoadBalancer, servi for _, actualRule := range *loadBalancer.Properties.LoadBalancingRules { if strings.EqualFold(*actualRule.Name, wantedRuleName) && *actualRule.Properties.FrontendPort == wantedRule.Port && - *actualRule.Properties.BackendPort == wantedRule.NodePort { + *actualRule.Properties.BackendPort == wantedRule.Port { foundRule = true break } } if !foundRule { - t.Errorf("Expected rule but didn't find it: %q", wantedRuleName) + t.Errorf("Expected load balancer rule but didn't find it: %q", wantedRuleName) } foundProbe := false @@ -291,7 +291,7 @@ func validateLoadBalancer(t *testing.T, loadBalancer network.LoadBalancer, servi } } if !foundProbe { - t.Errorf("Expected probe but didn't find it: %q", wantedRuleName) + t.Errorf("Expected loadbalancer probe but didn't find it: %q", wantedRuleName) } } } @@ -315,13 +315,13 @@ func validateSecurityGroup(t *testing.T, securityGroup network.SecurityGroup, se foundRule := false for _, actualRule := range *securityGroup.Properties.SecurityRules { if strings.EqualFold(*actualRule.Name, wantedRuleName) && - *actualRule.Properties.DestinationPortRange == fmt.Sprintf("%d", wantedRule.NodePort) { + *actualRule.Properties.DestinationPortRange == fmt.Sprintf("%d", wantedRule.Port) { foundRule = true break } } if !foundRule { - t.Errorf("Expected rule but didn't find it: %q", wantedRuleName) + t.Errorf("Expected security group rule but didn't find it: %q", wantedRuleName) } } }