mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-28 14:07:14 +00:00
Merge pull request #30207 from mwielgus/namespace-controller
Automatic merge from submit-queue Federated namespace controller Implemented based on federation common libs. Depends on #30126. cc: @quinton-hoole @wojtek-t @kubernetes/sig-cluster-federation
This commit is contained in:
commit
3a938dac07
@ -30,6 +30,7 @@ import (
|
|||||||
"k8s.io/kubernetes/federation/cmd/federation-controller-manager/app/options"
|
"k8s.io/kubernetes/federation/cmd/federation-controller-manager/app/options"
|
||||||
"k8s.io/kubernetes/federation/pkg/dnsprovider"
|
"k8s.io/kubernetes/federation/pkg/dnsprovider"
|
||||||
clustercontroller "k8s.io/kubernetes/federation/pkg/federation-controller/cluster"
|
clustercontroller "k8s.io/kubernetes/federation/pkg/federation-controller/cluster"
|
||||||
|
namespacecontroller "k8s.io/kubernetes/federation/pkg/federation-controller/namespace"
|
||||||
servicecontroller "k8s.io/kubernetes/federation/pkg/federation-controller/service"
|
servicecontroller "k8s.io/kubernetes/federation/pkg/federation-controller/service"
|
||||||
"k8s.io/kubernetes/federation/pkg/federation-controller/util"
|
"k8s.io/kubernetes/federation/pkg/federation-controller/util"
|
||||||
"k8s.io/kubernetes/pkg/client/restclient"
|
"k8s.io/kubernetes/pkg/client/restclient"
|
||||||
@ -144,5 +145,10 @@ func StartControllers(s *options.CMServer, restClientCfg *restclient.Config) err
|
|||||||
if err := servicecontroller.Run(s.ConcurrentServiceSyncs, wait.NeverStop); err != nil {
|
if err := servicecontroller.Run(s.ConcurrentServiceSyncs, wait.NeverStop); err != nil {
|
||||||
glog.Errorf("Failed to start service controller: %v", err)
|
glog.Errorf("Failed to start service controller: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
nsClientset := federationclientset.NewForConfigOrDie(restclient.AddUserAgent(restClientCfg, "namespace-controller"))
|
||||||
|
namespaceController := namespacecontroller.NewNamespaceController(nsClientset)
|
||||||
|
namespaceController.Run(wait.NeverStop)
|
||||||
|
|
||||||
select {}
|
select {}
|
||||||
}
|
}
|
||||||
|
@ -0,0 +1,302 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2016 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package namespace
|
||||||
|
|
||||||
|
import (
|
||||||
|
"reflect"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
federation_api "k8s.io/kubernetes/federation/apis/federation/v1beta1"
|
||||||
|
federation_release_1_4 "k8s.io/kubernetes/federation/client/clientset_generated/federation_release_1_4"
|
||||||
|
"k8s.io/kubernetes/federation/pkg/federation-controller/util"
|
||||||
|
"k8s.io/kubernetes/pkg/api"
|
||||||
|
api_v1 "k8s.io/kubernetes/pkg/api/v1"
|
||||||
|
"k8s.io/kubernetes/pkg/client/cache"
|
||||||
|
"k8s.io/kubernetes/pkg/controller"
|
||||||
|
"k8s.io/kubernetes/pkg/controller/framework"
|
||||||
|
pkg_runtime "k8s.io/kubernetes/pkg/runtime"
|
||||||
|
"k8s.io/kubernetes/pkg/util/flowcontrol"
|
||||||
|
"k8s.io/kubernetes/pkg/watch"
|
||||||
|
|
||||||
|
"github.com/golang/glog"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
allClustersKey = "ALL_CLUSTERS"
|
||||||
|
)
|
||||||
|
|
||||||
|
type NamespaceController struct {
|
||||||
|
// For triggering single namespace reconcilation. This is used when there is an
|
||||||
|
// add/update/delete operation on a namespace in either federated API server or
|
||||||
|
// in some member of the federation.
|
||||||
|
namespaceDeliverer *util.DelayingDeliverer
|
||||||
|
|
||||||
|
// For triggering all namespaces reconcilation. This is used when
|
||||||
|
// a new cluster becomes available.
|
||||||
|
clusterDeliverer *util.DelayingDeliverer
|
||||||
|
|
||||||
|
// Contains namespaces present in members of federation.
|
||||||
|
namespaceFederatedInformer util.FederatedInformer
|
||||||
|
// For updating members of federation.
|
||||||
|
federatedUpdater util.FederatedUpdater
|
||||||
|
// Definitions of namespaces that should be federated.
|
||||||
|
namespaceInformerStore cache.Store
|
||||||
|
// Informer controller for namespaces that should be federated.
|
||||||
|
namespaceInformerController framework.ControllerInterface
|
||||||
|
|
||||||
|
// Client to federated api server.
|
||||||
|
federatedApiClient federation_release_1_4.Interface
|
||||||
|
|
||||||
|
// Backoff manager for namespaces
|
||||||
|
namespaceBackoff *flowcontrol.Backoff
|
||||||
|
|
||||||
|
namespaceReviewDelay time.Duration
|
||||||
|
clusterAvailableDelay time.Duration
|
||||||
|
smallDelay time.Duration
|
||||||
|
updateTimeout time.Duration
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewNamespaceController returns a new namespace controller
|
||||||
|
func NewNamespaceController(client federation_release_1_4.Interface) *NamespaceController {
|
||||||
|
nc := &NamespaceController{
|
||||||
|
federatedApiClient: client,
|
||||||
|
namespaceReviewDelay: time.Second * 10,
|
||||||
|
clusterAvailableDelay: time.Second * 20,
|
||||||
|
smallDelay: time.Second * 3,
|
||||||
|
updateTimeout: time.Second * 30,
|
||||||
|
namespaceBackoff: flowcontrol.NewBackOff(5*time.Second, time.Minute),
|
||||||
|
}
|
||||||
|
|
||||||
|
// Build delivereres for triggering reconcilations.
|
||||||
|
nc.namespaceDeliverer = util.NewDelayingDeliverer()
|
||||||
|
nc.clusterDeliverer = util.NewDelayingDeliverer()
|
||||||
|
|
||||||
|
// Start informer in federated API servers on namespaces that should be federated.
|
||||||
|
nc.namespaceInformerStore, nc.namespaceInformerController = framework.NewInformer(
|
||||||
|
&cache.ListWatch{
|
||||||
|
ListFunc: func(options api.ListOptions) (pkg_runtime.Object, error) {
|
||||||
|
return client.Core().Namespaces().List(options)
|
||||||
|
},
|
||||||
|
WatchFunc: func(options api.ListOptions) (watch.Interface, error) {
|
||||||
|
return client.Core().Namespaces().Watch(options)
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&api_v1.Namespace{},
|
||||||
|
controller.NoResyncPeriodFunc(),
|
||||||
|
util.NewTriggerOnAllChanges(func(obj pkg_runtime.Object) { nc.deliverNamespaceObj(obj, 0, false) }))
|
||||||
|
|
||||||
|
// Federated informer on namespaces in members of federation.
|
||||||
|
nc.namespaceFederatedInformer = util.NewFederatedInformer(
|
||||||
|
client,
|
||||||
|
func(cluster *federation_api.Cluster, targetClient federation_release_1_4.Interface) (cache.Store, framework.ControllerInterface) {
|
||||||
|
return framework.NewInformer(
|
||||||
|
&cache.ListWatch{
|
||||||
|
ListFunc: func(options api.ListOptions) (pkg_runtime.Object, error) {
|
||||||
|
return targetClient.Core().Namespaces().List(options)
|
||||||
|
},
|
||||||
|
WatchFunc: func(options api.ListOptions) (watch.Interface, error) {
|
||||||
|
return targetClient.Core().Namespaces().Watch(options)
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&api_v1.Namespace{},
|
||||||
|
controller.NoResyncPeriodFunc(),
|
||||||
|
// Trigger reconcilation whenever something in federated cluster is changed. In most cases it
|
||||||
|
// would be just confirmation that some namespace opration suceeded.
|
||||||
|
util.NewTriggerOnMetaAndSpecChangesPreproc(
|
||||||
|
func(obj pkg_runtime.Object) { nc.deliverNamespaceObj(obj, nc.namespaceReviewDelay, false) },
|
||||||
|
func(obj pkg_runtime.Object) { util.SetClusterName(obj, cluster.Name) },
|
||||||
|
))
|
||||||
|
},
|
||||||
|
|
||||||
|
&util.ClusterLifecycleHandlerFuncs{
|
||||||
|
ClusterAvailable: func(cluster *federation_api.Cluster) {
|
||||||
|
// When new cluster becomes available process all the namespaces again.
|
||||||
|
nc.clusterDeliverer.DeliverAfter(allClustersKey, nil, nc.clusterAvailableDelay)
|
||||||
|
},
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
// Federated updeater along with Create/Update/Delete operations.
|
||||||
|
nc.federatedUpdater = util.NewFederatedUpdater(nc.namespaceFederatedInformer,
|
||||||
|
func(client federation_release_1_4.Interface, obj pkg_runtime.Object) error {
|
||||||
|
namespace := obj.(*api_v1.Namespace)
|
||||||
|
_, err := client.Core().Namespaces().Create(namespace)
|
||||||
|
return err
|
||||||
|
},
|
||||||
|
func(client federation_release_1_4.Interface, obj pkg_runtime.Object) error {
|
||||||
|
namespace := obj.(*api_v1.Namespace)
|
||||||
|
_, err := client.Core().Namespaces().Update(namespace)
|
||||||
|
return err
|
||||||
|
},
|
||||||
|
func(client federation_release_1_4.Interface, obj pkg_runtime.Object) error {
|
||||||
|
namespace := obj.(*api_v1.Namespace)
|
||||||
|
err := client.Core().Namespaces().Delete(namespace.Name, &api.DeleteOptions{})
|
||||||
|
return err
|
||||||
|
})
|
||||||
|
return nc
|
||||||
|
}
|
||||||
|
|
||||||
|
func (nc *NamespaceController) Run(stopChan <-chan struct{}) {
|
||||||
|
go nc.namespaceInformerController.Run(stopChan)
|
||||||
|
nc.namespaceFederatedInformer.Start()
|
||||||
|
go func() {
|
||||||
|
<-stopChan
|
||||||
|
nc.namespaceFederatedInformer.Stop()
|
||||||
|
}()
|
||||||
|
nc.namespaceDeliverer.StartWithHandler(func(item *util.DelayingDelivererItem) {
|
||||||
|
namespace := item.Value.(string)
|
||||||
|
nc.reconcileNamespace(namespace)
|
||||||
|
})
|
||||||
|
nc.clusterDeliverer.StartWithHandler(func(_ *util.DelayingDelivererItem) {
|
||||||
|
nc.reconcileNamespacesOnClusterChange()
|
||||||
|
})
|
||||||
|
go func() {
|
||||||
|
select {
|
||||||
|
case <-time.After(time.Minute):
|
||||||
|
nc.namespaceBackoff.GC()
|
||||||
|
case <-stopChan:
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (nc *NamespaceController) deliverNamespaceObj(obj interface{}, delay time.Duration, failed bool) {
|
||||||
|
namespace := obj.(*api_v1.Namespace)
|
||||||
|
nc.deliverNamespace(namespace.Name, delay, failed)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Adds backoff to delay if this delivery is related to some failure. Resets backoff if there was no failure.
|
||||||
|
func (nc *NamespaceController) deliverNamespace(namespace string, delay time.Duration, failed bool) {
|
||||||
|
if failed {
|
||||||
|
nc.namespaceBackoff.Next(namespace, time.Now())
|
||||||
|
delay = delay + nc.namespaceBackoff.Get(namespace)
|
||||||
|
} else {
|
||||||
|
nc.namespaceBackoff.Reset(namespace)
|
||||||
|
}
|
||||||
|
nc.namespaceDeliverer.DeliverAfter(namespace, namespace, delay)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check whether all data stores are in sync. False is returned if any of the informer/stores is not yet
|
||||||
|
// synced with the coresponding api server.
|
||||||
|
func (nc *NamespaceController) isSynced() bool {
|
||||||
|
if !nc.namespaceFederatedInformer.ClustersSynced() {
|
||||||
|
glog.V(2).Infof("Cluster list not synced")
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
clusters, err := nc.namespaceFederatedInformer.GetReadyClusters()
|
||||||
|
if err != nil {
|
||||||
|
glog.Errorf("Failed to get ready clusters: %v", err)
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if !nc.namespaceFederatedInformer.GetTargetStore().ClustersSynced(clusters) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// The function triggers reconcilation of all federated namespaces.
|
||||||
|
func (nc *NamespaceController) reconcileNamespacesOnClusterChange() {
|
||||||
|
if !nc.isSynced() {
|
||||||
|
nc.clusterDeliverer.DeliverAfter(allClustersKey, nil, nc.clusterAvailableDelay)
|
||||||
|
}
|
||||||
|
for _, obj := range nc.namespaceInformerStore.List() {
|
||||||
|
namespace := obj.(*api_v1.Namespace)
|
||||||
|
nc.deliverNamespace(namespace.Name, nc.smallDelay, false)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (nc *NamespaceController) reconcileNamespace(namespace string) {
|
||||||
|
if !nc.isSynced() {
|
||||||
|
nc.deliverNamespace(namespace, nc.clusterAvailableDelay, false)
|
||||||
|
}
|
||||||
|
|
||||||
|
baseNamespaceObj, exist, err := nc.namespaceInformerStore.GetByKey(namespace)
|
||||||
|
if err != nil {
|
||||||
|
glog.Errorf("Failed to query main namespace store for %v: %v", namespace, err)
|
||||||
|
nc.deliverNamespace(namespace, 0, true)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if !exist {
|
||||||
|
// Not federated namespace, ignoring.
|
||||||
|
return
|
||||||
|
}
|
||||||
|
baseNamespace := baseNamespaceObj.(*api_v1.Namespace)
|
||||||
|
if baseNamespace.Status.Phase == api_v1.NamespaceTerminating {
|
||||||
|
// TODO: What about namespaces in subclusters ???
|
||||||
|
err = nc.federatedApiClient.Core().Namespaces().Delete(baseNamespace.Name, &api.DeleteOptions{})
|
||||||
|
if err != nil {
|
||||||
|
glog.Errorf("Failed to delete namespace %s: %v", baseNamespace.Name, err)
|
||||||
|
nc.deliverNamespace(namespace, 0, true)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
clusters, err := nc.namespaceFederatedInformer.GetReadyClusters()
|
||||||
|
if err != nil {
|
||||||
|
glog.Errorf("Failed to get cluster list: %v", err)
|
||||||
|
nc.deliverNamespace(namespace, nc.clusterAvailableDelay, false)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
operations := make([]util.FederatedOperation, 0)
|
||||||
|
for _, cluster := range clusters {
|
||||||
|
clusterNamespaceObj, found, err := nc.namespaceFederatedInformer.GetTargetStore().GetByKey(cluster.Name, namespace)
|
||||||
|
if err != nil {
|
||||||
|
glog.Errorf("Failed to get %s from %s: %v", namespace, cluster.Name, err)
|
||||||
|
nc.deliverNamespace(namespace, 0, true)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
desiredNamespace := &api_v1.Namespace{
|
||||||
|
ObjectMeta: baseNamespace.ObjectMeta,
|
||||||
|
Spec: baseNamespace.Spec,
|
||||||
|
}
|
||||||
|
util.SetClusterName(desiredNamespace, cluster.Name)
|
||||||
|
|
||||||
|
if !found {
|
||||||
|
operations = append(operations, util.FederatedOperation{
|
||||||
|
Type: util.OperationTypeAdd,
|
||||||
|
Obj: desiredNamespace,
|
||||||
|
})
|
||||||
|
} else {
|
||||||
|
clusterNamespace := clusterNamespaceObj.(*api_v1.Namespace)
|
||||||
|
|
||||||
|
// Update existing namespace, if needed.
|
||||||
|
if !reflect.DeepEqual(desiredNamespace.ObjectMeta, clusterNamespace.ObjectMeta) ||
|
||||||
|
!reflect.DeepEqual(desiredNamespace.Spec, clusterNamespace.Spec) {
|
||||||
|
operations = append(operations, util.FederatedOperation{
|
||||||
|
Type: util.OperationTypeUpdate,
|
||||||
|
Obj: desiredNamespace,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(operations) == 0 {
|
||||||
|
// Everything is in order
|
||||||
|
return
|
||||||
|
}
|
||||||
|
err = nc.federatedUpdater.Update(operations, nc.updateTimeout)
|
||||||
|
if err != nil {
|
||||||
|
glog.Errorf("Failed to execute updates for %s: %v", namespace, err)
|
||||||
|
nc.deliverNamespace(namespace, 0, true)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Evertyhing is in order but lets be double sure
|
||||||
|
nc.deliverNamespace(namespace, nc.namespaceReviewDelay, false)
|
||||||
|
}
|
@ -0,0 +1,175 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2016 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package namespace
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
federation_api "k8s.io/kubernetes/federation/apis/federation/v1beta1"
|
||||||
|
federation_release_1_4 "k8s.io/kubernetes/federation/client/clientset_generated/federation_release_1_4"
|
||||||
|
fake_federation_release_1_4 "k8s.io/kubernetes/federation/client/clientset_generated/federation_release_1_4/fake"
|
||||||
|
"k8s.io/kubernetes/federation/pkg/federation-controller/util"
|
||||||
|
api_v1 "k8s.io/kubernetes/pkg/api/v1"
|
||||||
|
"k8s.io/kubernetes/pkg/client/testing/core"
|
||||||
|
"k8s.io/kubernetes/pkg/runtime"
|
||||||
|
"k8s.io/kubernetes/pkg/watch"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestNamespaceController(t *testing.T) {
|
||||||
|
cluster1 := mkCluster("cluster1", api_v1.ConditionTrue)
|
||||||
|
cluster2 := mkCluster("cluster2", api_v1.ConditionTrue)
|
||||||
|
|
||||||
|
fakeClient := &fake_federation_release_1_4.Clientset{}
|
||||||
|
RegisterList("clusters", fakeClient, &federation_api.ClusterList{Items: []federation_api.Cluster{*cluster1}})
|
||||||
|
RegisterList("namespaces", fakeClient, &api_v1.NamespaceList{Items: []api_v1.Namespace{}})
|
||||||
|
namespaceWatch := RegisterWatch("namespaces", fakeClient)
|
||||||
|
clusterWatch := RegisterWatch("clusters", fakeClient)
|
||||||
|
|
||||||
|
cluster1Client := &fake_federation_release_1_4.Clientset{}
|
||||||
|
cluster1Watch := RegisterWatch("namespaces", cluster1Client)
|
||||||
|
RegisterList("namespaces", cluster1Client, &api_v1.NamespaceList{Items: []api_v1.Namespace{}})
|
||||||
|
cluster1CreateChan := RegisterCopyOnCreate("namespaces", cluster1Client, cluster1Watch)
|
||||||
|
cluster1UpdateChan := RegisterCopyOnUpdate("namespaces", cluster1Client, cluster1Watch)
|
||||||
|
|
||||||
|
cluster2Client := &fake_federation_release_1_4.Clientset{}
|
||||||
|
cluster2Watch := RegisterWatch("namespaces", cluster2Client)
|
||||||
|
RegisterList("namespaces", cluster2Client, &api_v1.NamespaceList{Items: []api_v1.Namespace{}})
|
||||||
|
cluster2CreateChan := RegisterCopyOnCreate("namespaces", cluster2Client, cluster2Watch)
|
||||||
|
|
||||||
|
namespaceController := NewNamespaceController(fakeClient)
|
||||||
|
informer := toFederatedInformerForTestOnly(namespaceController.namespaceFederatedInformer)
|
||||||
|
informer.SetClientFactory(func(cluster *federation_api.Cluster) (federation_release_1_4.Interface, error) {
|
||||||
|
switch cluster.Name {
|
||||||
|
case cluster1.Name:
|
||||||
|
return cluster1Client, nil
|
||||||
|
case cluster2.Name:
|
||||||
|
return cluster2Client, nil
|
||||||
|
default:
|
||||||
|
return nil, fmt.Errorf("Unknown cluster")
|
||||||
|
}
|
||||||
|
})
|
||||||
|
namespaceController.clusterAvailableDelay = time.Second
|
||||||
|
namespaceController.namespaceReviewDelay = 50 * time.Millisecond
|
||||||
|
namespaceController.smallDelay = 20 * time.Millisecond
|
||||||
|
namespaceController.updateTimeout = 5 * time.Second
|
||||||
|
|
||||||
|
stop := make(chan struct{})
|
||||||
|
namespaceController.Run(stop)
|
||||||
|
|
||||||
|
ns1 := api_v1.Namespace{
|
||||||
|
ObjectMeta: api_v1.ObjectMeta{
|
||||||
|
Name: "test-namespace",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
// Test add federated namespace.
|
||||||
|
namespaceWatch.Add(&ns1)
|
||||||
|
createdNamespace := GetNamespaceFromChan(cluster1CreateChan)
|
||||||
|
assert.NotNil(t, createdNamespace)
|
||||||
|
assert.Equal(t, ns1.Name, createdNamespace.Name)
|
||||||
|
|
||||||
|
// Test update federated namespace.
|
||||||
|
ns1.Annotations = map[string]string{
|
||||||
|
"A": "B",
|
||||||
|
}
|
||||||
|
namespaceWatch.Modify(&ns1)
|
||||||
|
updatedNamespace := GetNamespaceFromChan(cluster1UpdateChan)
|
||||||
|
assert.NotNil(t, updatedNamespace)
|
||||||
|
assert.Equal(t, ns1.Name, updatedNamespace.Name)
|
||||||
|
// assert.Contains(t, updatedNamespace.Annotations, "A")
|
||||||
|
|
||||||
|
// Test add cluster
|
||||||
|
clusterWatch.Add(cluster2)
|
||||||
|
createdNamespace2 := GetNamespaceFromChan(cluster2CreateChan)
|
||||||
|
assert.NotNil(t, createdNamespace2)
|
||||||
|
assert.Equal(t, ns1.Name, createdNamespace2.Name)
|
||||||
|
// assert.Contains(t, createdNamespace2.Annotations, "A")
|
||||||
|
|
||||||
|
close(stop)
|
||||||
|
}
|
||||||
|
|
||||||
|
func toFederatedInformerForTestOnly(informer util.FederatedInformer) util.FederatedInformerForTestOnly {
|
||||||
|
inter := informer.(interface{})
|
||||||
|
return inter.(util.FederatedInformerForTestOnly)
|
||||||
|
}
|
||||||
|
|
||||||
|
func mkCluster(name string, readyStatus api_v1.ConditionStatus) *federation_api.Cluster {
|
||||||
|
return &federation_api.Cluster{
|
||||||
|
ObjectMeta: api_v1.ObjectMeta{
|
||||||
|
Name: name,
|
||||||
|
},
|
||||||
|
Status: federation_api.ClusterStatus{
|
||||||
|
Conditions: []federation_api.ClusterCondition{
|
||||||
|
{Type: federation_api.ClusterReady, Status: readyStatus},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func RegisterWatch(resource string, client *fake_federation_release_1_4.Clientset) *watch.FakeWatcher {
|
||||||
|
watcher := watch.NewFake()
|
||||||
|
client.AddWatchReactor(resource, func(action core.Action) (bool, watch.Interface, error) { return true, watcher, nil })
|
||||||
|
return watcher
|
||||||
|
}
|
||||||
|
|
||||||
|
func RegisterList(resource string, client *fake_federation_release_1_4.Clientset, obj runtime.Object) {
|
||||||
|
client.AddReactor("list", resource, func(action core.Action) (bool, runtime.Object, error) {
|
||||||
|
return true, obj, nil
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func RegisterCopyOnCreate(resource string, client *fake_federation_release_1_4.Clientset, watcher *watch.FakeWatcher) chan runtime.Object {
|
||||||
|
objChan := make(chan runtime.Object, 100)
|
||||||
|
client.AddReactor("create", resource, func(action core.Action) (bool, runtime.Object, error) {
|
||||||
|
createAction := action.(core.CreateAction)
|
||||||
|
obj := createAction.GetObject()
|
||||||
|
go func() {
|
||||||
|
watcher.Add(obj)
|
||||||
|
objChan <- obj
|
||||||
|
}()
|
||||||
|
return true, obj, nil
|
||||||
|
})
|
||||||
|
return objChan
|
||||||
|
}
|
||||||
|
|
||||||
|
func RegisterCopyOnUpdate(resource string, client *fake_federation_release_1_4.Clientset, watcher *watch.FakeWatcher) chan runtime.Object {
|
||||||
|
objChan := make(chan runtime.Object, 100)
|
||||||
|
client.AddReactor("update", resource, func(action core.Action) (bool, runtime.Object, error) {
|
||||||
|
updateAction := action.(core.UpdateAction)
|
||||||
|
obj := updateAction.GetObject()
|
||||||
|
go func() {
|
||||||
|
watcher.Modify(obj)
|
||||||
|
objChan <- obj
|
||||||
|
}()
|
||||||
|
return true, obj, nil
|
||||||
|
})
|
||||||
|
return objChan
|
||||||
|
}
|
||||||
|
|
||||||
|
func GetNamespaceFromChan(c chan runtime.Object) *api_v1.Namespace {
|
||||||
|
select {
|
||||||
|
case obj := <-c:
|
||||||
|
namespace := obj.(*api_v1.Namespace)
|
||||||
|
return namespace
|
||||||
|
case <-time.After(time.Minute):
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user