mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-03 09:22:44 +00:00
test for explicit null value propagation in apply
This commit is contained in:
parent
86d561424d
commit
4bdcc03c0b
@ -917,6 +917,33 @@ run_kubectl_create_filter_tests() {
|
|||||||
kubectl delete pods selector-test-pod
|
kubectl delete pods selector-test-pod
|
||||||
}
|
}
|
||||||
|
|
||||||
|
run_kubectl_apply_deployments_tests() {
|
||||||
|
## kubectl apply should propagate user defined null values
|
||||||
|
# Pre-Condition: no Deployments exists
|
||||||
|
kube::test::get_object_assert deployments "{{range.items}}{{$id_field}}:{{end}}" ''
|
||||||
|
# apply base deployment
|
||||||
|
kubectl apply -f hack/testdata/null-propagation/deployment-l1.yaml "${kube_flags[@]}"
|
||||||
|
# check right deployment exists
|
||||||
|
kube::test::get_object_assert 'deployments my-depl' "{{${id_field}}}" 'my-depl'
|
||||||
|
# check right labels exists
|
||||||
|
kube::test::get_object_assert 'deployments my-depl' "{{.spec.template.metadata.labels.l1}}" 'l1'
|
||||||
|
kube::test::get_object_assert 'deployments my-depl' "{{.spec.selector.matchLabels.l1}}" 'l1'
|
||||||
|
kube::test::get_object_assert 'deployments my-depl' "{{.metadata.labels.l1}}" 'l1'
|
||||||
|
|
||||||
|
# apply new deployment with new template labels
|
||||||
|
kubectl apply -f hack/testdata/null-propagation/deployment-l2.yaml "${kube_flags[@]}"
|
||||||
|
# check right labels exists
|
||||||
|
kube::test::get_object_assert 'deployments my-depl' "{{.spec.template.metadata.labels.l1}}" '<no value>'
|
||||||
|
kube::test::get_object_assert 'deployments my-depl' "{{.spec.selector.matchLabels.l1}}" '<no value>'
|
||||||
|
kube::test::get_object_assert 'deployments my-depl' "{{.metadata.labels.l1}}" '<no value>'
|
||||||
|
kube::test::get_object_assert 'deployments my-depl' "{{.spec.template.metadata.labels.l2}}" 'l2'
|
||||||
|
kube::test::get_object_assert 'deployments my-depl' "{{.spec.selector.matchLabels.l2}}" 'l2'
|
||||||
|
kube::test::get_object_assert 'deployments my-depl' "{{.metadata.labels.l2}}" 'l2'
|
||||||
|
|
||||||
|
# cleanup
|
||||||
|
kubectl delete deployments my-depl
|
||||||
|
}
|
||||||
|
|
||||||
# Runs tests for --save-config tests.
|
# Runs tests for --save-config tests.
|
||||||
run_save_config_tests() {
|
run_save_config_tests() {
|
||||||
## Configuration annotations should be set when --save-config is enabled
|
## Configuration annotations should be set when --save-config is enabled
|
||||||
@ -2718,6 +2745,10 @@ runTests() {
|
|||||||
run_kubectl_create_filter_tests
|
run_kubectl_create_filter_tests
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
if kube::test::if_supports_resource "${deployments}" ; then
|
||||||
|
run_kubectl_apply_deployments_tests
|
||||||
|
fi
|
||||||
|
|
||||||
###############
|
###############
|
||||||
# Kubectl get #
|
# Kubectl get #
|
||||||
###############
|
###############
|
||||||
|
13
hack/testdata/null-propagation/deployment-l1.yaml
vendored
Normal file
13
hack/testdata/null-propagation/deployment-l1.yaml
vendored
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
apiVersion: extensions/v1beta1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: my-depl
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
l1: l1
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: nginx
|
||||||
|
image: gcr.io/google-containers/nginx:1.7.9
|
17
hack/testdata/null-propagation/deployment-l2.yaml
vendored
Normal file
17
hack/testdata/null-propagation/deployment-l2.yaml
vendored
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
apiVersion: extensions/v1beta1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: my-depl
|
||||||
|
# We expect this field to be defaulted to the new label l2
|
||||||
|
labels: null
|
||||||
|
spec:
|
||||||
|
# We expect this field to be defaulted to the new label l2
|
||||||
|
selector: null
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
l2: l2
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: nginx
|
||||||
|
image: gcr.io/google-containers/nginx:1.7.9
|
@ -20,6 +20,7 @@ import (
|
|||||||
"bytes"
|
"bytes"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"io"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
@ -35,6 +36,8 @@ import (
|
|||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
"k8s.io/kubernetes/pkg/api/annotations"
|
"k8s.io/kubernetes/pkg/api/annotations"
|
||||||
"k8s.io/kubernetes/pkg/api/testapi"
|
"k8s.io/kubernetes/pkg/api/testapi"
|
||||||
|
"k8s.io/kubernetes/pkg/apis/extensions"
|
||||||
|
"k8s.io/kubernetes/pkg/client/restclient/fake"
|
||||||
cmdtesting "k8s.io/kubernetes/pkg/kubectl/cmd/testing"
|
cmdtesting "k8s.io/kubernetes/pkg/kubectl/cmd/testing"
|
||||||
cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
|
cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
|
||||||
)
|
)
|
||||||
@ -443,3 +446,87 @@ func testApplyMultipleObjects(t *testing.T, asList bool) {
|
|||||||
t.Fatalf("unexpected output: %s\nexpected: %s OR %s", buf.String(), expectOne, expectTwo)
|
t.Fatalf("unexpected output: %s\nexpected: %s OR %s", buf.String(), expectOne, expectTwo)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const (
|
||||||
|
filenameDeployObjServerside = "../../../test/fixtures/pkg/kubectl/cmd/apply/deploy-serverside.yaml"
|
||||||
|
filenameDeployObjClientside = "../../../test/fixtures/pkg/kubectl/cmd/apply/deploy-clientside.yaml"
|
||||||
|
)
|
||||||
|
|
||||||
|
// validateNULLPatchApplication retrieves the StrategicMergePatch created by kubectl apply and checks that this patch
|
||||||
|
// contains the null value defined by the user.
|
||||||
|
func validateNULLPatchApplication(t *testing.T, req *http.Request) {
|
||||||
|
patch, err := ioutil.ReadAll(req.Body)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
patchMap := map[string]interface{}{}
|
||||||
|
if err := json.Unmarshal(patch, &patchMap); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
annotationsMap := walkMapPath(t, patchMap, []string{"metadata", "annotations"})
|
||||||
|
if _, ok := annotationsMap[annotations.LastAppliedConfigAnnotation]; !ok {
|
||||||
|
t.Fatalf("patch does not contain annotation:\n%s\n", patch)
|
||||||
|
}
|
||||||
|
|
||||||
|
labelMap := walkMapPath(t, patchMap, []string{"spec", "strategy"})
|
||||||
|
// Checks if `rollingUpdate = null` exists in the patch
|
||||||
|
if deleteMe, ok := labelMap["rollingUpdate"]; !ok || deleteMe != nil {
|
||||||
|
t.Fatalf("patch did not retain null value in key: rollingUpdate:\n%s\n", patch)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func getServersideObject(t *testing.T) io.ReadCloser {
|
||||||
|
raw := readBytesFromFile(t, filenameDeployObjServerside)
|
||||||
|
obj := &extensions.Deployment{}
|
||||||
|
if err := runtime.DecodeInto(testapi.Extensions.Codec(), raw, obj); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
objJSON, err := runtime.Encode(testapi.Extensions.Codec(), obj)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
return ioutil.NopCloser(bytes.NewReader(objJSON))
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestApplyNULLPreservation(t *testing.T) {
|
||||||
|
deploymentName := "nginx-deployment"
|
||||||
|
deploymentPath := "/namespaces/test/deployments/" + deploymentName
|
||||||
|
|
||||||
|
f, tf, _, ns := cmdtesting.NewExtensionsAPIFactory()
|
||||||
|
tf.Client = &fake.RESTClient{
|
||||||
|
NegotiatedSerializer: ns,
|
||||||
|
GroupName: "extensions",
|
||||||
|
Client: fake.CreateHTTPClient(func(req *http.Request) (*http.Response, error) {
|
||||||
|
switch p, m := req.URL.Path, req.Method; {
|
||||||
|
case p == deploymentPath && m == "GET":
|
||||||
|
return &http.Response{StatusCode: 200, Header: defaultHeader(), Body: getServersideObject(t)}, nil
|
||||||
|
case p == deploymentPath && m == "PATCH":
|
||||||
|
validateNULLPatchApplication(t, req)
|
||||||
|
// The real API server would had returned the patched object but Kubectl
|
||||||
|
// is ignoring the actual return object.
|
||||||
|
// TODO: Make this match actual server behavior by returning the patched object.
|
||||||
|
return &http.Response{StatusCode: 200, Header: defaultHeader(), Body: getServersideObject(t)}, nil
|
||||||
|
default:
|
||||||
|
t.Fatalf("unexpected request: %#v\n%#v", req.URL, req)
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
}),
|
||||||
|
}
|
||||||
|
tf.Namespace = "test"
|
||||||
|
tf.ClientConfig = defaultClientConfig()
|
||||||
|
buf := bytes.NewBuffer([]byte{})
|
||||||
|
errBuf := bytes.NewBuffer([]byte{})
|
||||||
|
|
||||||
|
cmd := NewCmdApply(f, buf, errBuf)
|
||||||
|
cmd.Flags().Set("filename", filenameDeployObjClientside)
|
||||||
|
cmd.Flags().Set("output", "name")
|
||||||
|
|
||||||
|
cmd.Run(cmd, []string{})
|
||||||
|
|
||||||
|
expected := "deployment/" + deploymentName + "\n"
|
||||||
|
if buf.String() != expected {
|
||||||
|
t.Fatalf("unexpected output: %s\nexpected: %s", buf.String(), expected)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -646,6 +646,27 @@ func NewAPIFactory() (cmdutil.Factory, *TestFactory, runtime.Codec, runtime.Nego
|
|||||||
}, t, testapi.Default.Codec(), testapi.Default.NegotiatedSerializer()
|
}, t, testapi.Default.Codec(), testapi.Default.NegotiatedSerializer()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type fakeExtensionsAPIFactory struct {
|
||||||
|
fakeAPIFactory
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *fakeExtensionsAPIFactory) JSONEncoder() runtime.Encoder {
|
||||||
|
return testapi.Extensions.Codec()
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewExtensionsAPIFactory() (cmdutil.Factory, *TestFactory, runtime.Codec, runtime.NegotiatedSerializer) {
|
||||||
|
t := &TestFactory{
|
||||||
|
Validator: validation.NullSchema{},
|
||||||
|
}
|
||||||
|
rf := cmdutil.NewFactory(nil)
|
||||||
|
return &fakeExtensionsAPIFactory{
|
||||||
|
fakeAPIFactory: fakeAPIFactory{
|
||||||
|
Factory: rf,
|
||||||
|
tf: t,
|
||||||
|
},
|
||||||
|
}, t, testapi.Default.Codec(), testapi.Default.NegotiatedSerializer()
|
||||||
|
}
|
||||||
|
|
||||||
func testDynamicResources() []*discovery.APIGroupResources {
|
func testDynamicResources() []*discovery.APIGroupResources {
|
||||||
return []*discovery.APIGroupResources{
|
return []*discovery.APIGroupResources{
|
||||||
{
|
{
|
||||||
|
16
test/fixtures/pkg/kubectl/cmd/apply/deploy-clientside.yaml
vendored
Normal file
16
test/fixtures/pkg/kubectl/cmd/apply/deploy-clientside.yaml
vendored
Normal file
@ -0,0 +1,16 @@
|
|||||||
|
apiVersion: extensions/v1beta1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: nginx-deployment
|
||||||
|
spec:
|
||||||
|
strategy:
|
||||||
|
type: Recreate
|
||||||
|
rollingUpdate: null
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
name: nginx
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: nginx
|
||||||
|
image: nginx
|
46
test/fixtures/pkg/kubectl/cmd/apply/deploy-serverside.yaml
vendored
Normal file
46
test/fixtures/pkg/kubectl/cmd/apply/deploy-serverside.yaml
vendored
Normal file
@ -0,0 +1,46 @@
|
|||||||
|
apiVersion: extensions/v1beta1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
deployment.kubernetes.io/revision: "1"
|
||||||
|
kubectl.kubernetes.io/last-applied-configuration: '{"kind":"Deployment","apiVersion":"extensions/v1beta1","metadata":{"name":"nginx-deployment","creationTimestamp":null},"spec":{"template":{"metadata":{"creationTimestamp":null,"labels":{"name":"nginx"}},"spec":{"containers":[{"name":"nginx","image":"nginx","resources":{}}]}},"strategy":{}},"status":{}}'
|
||||||
|
creationTimestamp: 2016-10-24T22:15:06Z
|
||||||
|
generation: 6
|
||||||
|
labels:
|
||||||
|
name: nginx
|
||||||
|
name: nginx-deployment
|
||||||
|
namespace: test
|
||||||
|
resourceVersion: "355959"
|
||||||
|
selfLink: /apis/extensions/v1beta1/namespaces/test/deployments/nginx-deployment
|
||||||
|
uid: 51ac266e-9a37-11e6-8738-0800270c4edc
|
||||||
|
spec:
|
||||||
|
replicas: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
name: nginx
|
||||||
|
strategy:
|
||||||
|
rollingUpdate:
|
||||||
|
maxSurge: 1
|
||||||
|
maxUnavailable: 1
|
||||||
|
type: RollingUpdate
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
name: nginx
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- image: nginx
|
||||||
|
imagePullPolicy: Always
|
||||||
|
name: nginx
|
||||||
|
resources: {}
|
||||||
|
terminationMessagePath: /dev/termination-log
|
||||||
|
dnsPolicy: ClusterFirst
|
||||||
|
restartPolicy: Always
|
||||||
|
securityContext: {}
|
||||||
|
terminationGracePeriodSeconds: 30
|
||||||
|
status:
|
||||||
|
availableReplicas: 1
|
||||||
|
observedGeneration: 6
|
||||||
|
replicas: 1
|
||||||
|
updatedReplicas: 1
|
Loading…
Reference in New Issue
Block a user