|
|
@ -484,13 +484,13 @@ func TestReconcileSecurityGroupFromAnyDestinationAddressPrefixToLoadBalancerIP(t
|
|
|
|
az := getTestCloud()
|
|
|
|
az := getTestCloud()
|
|
|
|
svc1 := getTestService("serviceea", v1.ProtocolTCP, nil, 80)
|
|
|
|
svc1 := getTestService("serviceea", v1.ProtocolTCP, nil, 80)
|
|
|
|
svc1.Spec.LoadBalancerIP = "192.168.0.0"
|
|
|
|
svc1.Spec.LoadBalancerIP = "192.168.0.0"
|
|
|
|
sg := getTestSecurityGroup(az)
|
|
|
|
getTestSecurityGroup(az)
|
|
|
|
// Simulate a pre-Kubernetes 1.8 NSG, where we do not specify the destination address prefix
|
|
|
|
// Simulate a pre-Kubernetes 1.8 NSG, where we do not specify the destination address prefix
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(""), true)
|
|
|
|
_, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(""), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
@ -501,7 +501,7 @@ func TestReconcileSecurityGroupDynamicLoadBalancerIP(t *testing.T) {
|
|
|
|
az := getTestCloud()
|
|
|
|
az := getTestCloud()
|
|
|
|
svc1 := getTestService("servicea", v1.ProtocolTCP, nil, 80)
|
|
|
|
svc1 := getTestService("servicea", v1.ProtocolTCP, nil, 80)
|
|
|
|
svc1.Spec.LoadBalancerIP = ""
|
|
|
|
svc1.Spec.LoadBalancerIP = ""
|
|
|
|
sg := getTestSecurityGroup(az)
|
|
|
|
getTestSecurityGroup(az)
|
|
|
|
dynamicallyAssignedIP := "192.168.0.0"
|
|
|
|
dynamicallyAssignedIP := "192.168.0.0"
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(dynamicallyAssignedIP), true)
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(dynamicallyAssignedIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
@ -603,12 +603,12 @@ func TestReconcileLoadBalancerRemoveService(t *testing.T) {
|
|
|
|
clusterResources := getClusterResources(az, 1, 1)
|
|
|
|
clusterResources := getClusterResources(az, 1, 1)
|
|
|
|
svc := getTestService("servicea", v1.ProtocolTCP, nil, 80, 443)
|
|
|
|
svc := getTestService("servicea", v1.ProtocolTCP, nil, 80, 443)
|
|
|
|
|
|
|
|
|
|
|
|
lb, err := az.reconcileLoadBalancer(testClusterName, &svc, clusterResources.nodes, true /* wantLb */)
|
|
|
|
_, err := az.reconcileLoadBalancer(testClusterName, &svc, clusterResources.nodes, true /* wantLb */)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
lb, err = az.reconcileLoadBalancer(testClusterName, &svc, clusterResources.nodes, false /* wantLb */)
|
|
|
|
lb, err := az.reconcileLoadBalancer(testClusterName, &svc, clusterResources.nodes, false /* wantLb */)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
@ -653,13 +653,13 @@ func TestReconcileLoadBalancerRemovesPort(t *testing.T) {
|
|
|
|
clusterResources := getClusterResources(az, 1, 1)
|
|
|
|
clusterResources := getClusterResources(az, 1, 1)
|
|
|
|
|
|
|
|
|
|
|
|
svc := getTestService("servicea", v1.ProtocolTCP, nil, 80, 443)
|
|
|
|
svc := getTestService("servicea", v1.ProtocolTCP, nil, 80, 443)
|
|
|
|
lb, err := az.reconcileLoadBalancer(testClusterName, &svc, clusterResources.nodes, true /* wantLb */)
|
|
|
|
_, err := az.reconcileLoadBalancer(testClusterName, &svc, clusterResources.nodes, true /* wantLb */)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
svcUpdated := getTestService("servicea", v1.ProtocolTCP, nil, 80)
|
|
|
|
svcUpdated := getTestService("servicea", v1.ProtocolTCP, nil, 80)
|
|
|
|
lb, err = az.reconcileLoadBalancer(testClusterName, &svcUpdated, clusterResources.nodes, true /* wantLb */)
|
|
|
|
lb, err := az.reconcileLoadBalancer(testClusterName, &svcUpdated, clusterResources.nodes, true /* wantLb */)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
@ -674,12 +674,12 @@ func TestReconcileLoadBalancerMultipleServices(t *testing.T) {
|
|
|
|
svc1 := getTestService("servicea", v1.ProtocolTCP, nil, 80, 443)
|
|
|
|
svc1 := getTestService("servicea", v1.ProtocolTCP, nil, 80, 443)
|
|
|
|
svc2 := getTestService("serviceb", v1.ProtocolTCP, nil, 80)
|
|
|
|
svc2 := getTestService("serviceb", v1.ProtocolTCP, nil, 80)
|
|
|
|
|
|
|
|
|
|
|
|
updatedLoadBalancer, err := az.reconcileLoadBalancer(testClusterName, &svc1, clusterResources.nodes, true /* wantLb */)
|
|
|
|
_, err := az.reconcileLoadBalancer(testClusterName, &svc1, clusterResources.nodes, true /* wantLb */)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
updatedLoadBalancer, err = az.reconcileLoadBalancer(testClusterName, &svc2, clusterResources.nodes, true /* wantLb */)
|
|
|
|
updatedLoadBalancer, err := az.reconcileLoadBalancer(testClusterName, &svc2, clusterResources.nodes, true /* wantLb */)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
t.Errorf("Unexpected error: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
@ -822,7 +822,7 @@ func TestReconcileSecurityGroupRemoveServiceRemovesPort(t *testing.T) {
|
|
|
|
svc := getTestService("servicea", v1.ProtocolTCP, nil, 80, 443)
|
|
|
|
svc := getTestService("servicea", v1.ProtocolTCP, nil, 80, 443)
|
|
|
|
clusterResources := getClusterResources(az, 1, 1)
|
|
|
|
clusterResources := getClusterResources(az, 1, 1)
|
|
|
|
|
|
|
|
|
|
|
|
sg := getTestSecurityGroup(az, svc)
|
|
|
|
getTestSecurityGroup(az, svc)
|
|
|
|
svcUpdated := getTestService("servicea", v1.ProtocolTCP, nil, 80)
|
|
|
|
svcUpdated := getTestService("servicea", v1.ProtocolTCP, nil, 80)
|
|
|
|
lb, _ := az.reconcileLoadBalancer(testClusterName, &svc, clusterResources.nodes, true)
|
|
|
|
lb, _ := az.reconcileLoadBalancer(testClusterName, &svc, clusterResources.nodes, true)
|
|
|
|
lbStatus, _ := az.getServiceLoadBalancerStatus(&svc, lb)
|
|
|
|
lbStatus, _ := az.getServiceLoadBalancerStatus(&svc, lb)
|
|
|
@ -844,7 +844,7 @@ func TestReconcileSecurityWithSourceRanges(t *testing.T) {
|
|
|
|
}
|
|
|
|
}
|
|
|
|
clusterResources := getClusterResources(az, 1, 1)
|
|
|
|
clusterResources := getClusterResources(az, 1, 1)
|
|
|
|
|
|
|
|
|
|
|
|
sg := getTestSecurityGroup(az, svc)
|
|
|
|
getTestSecurityGroup(az, svc)
|
|
|
|
lb, _ := az.reconcileLoadBalancer(testClusterName, &svc, clusterResources.nodes, true)
|
|
|
|
lb, _ := az.reconcileLoadBalancer(testClusterName, &svc, clusterResources.nodes, true)
|
|
|
|
lbStatus, _ := az.getServiceLoadBalancerStatus(&svc, lb)
|
|
|
|
lbStatus, _ := az.getServiceLoadBalancerStatus(&svc, lb)
|
|
|
|
|
|
|
|
|
|
|
@ -1109,9 +1109,7 @@ func getClusterResources(az *Cloud, vmCount int, availabilitySetCount int) (clus
|
|
|
|
|
|
|
|
|
|
|
|
vmCtx, vmCancel := getContextWithCancel()
|
|
|
|
vmCtx, vmCancel := getContextWithCancel()
|
|
|
|
defer vmCancel()
|
|
|
|
defer vmCancel()
|
|
|
|
_, err := az.VirtualMachinesClient.CreateOrUpdate(vmCtx, az.Config.ResourceGroup, vmName, newVM, "")
|
|
|
|
az.VirtualMachinesClient.CreateOrUpdate(vmCtx, az.Config.ResourceGroup, vmName, newVM, "")
|
|
|
|
if err != nil {
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
// add to kubernetes
|
|
|
|
// add to kubernetes
|
|
|
|
newNode := &v1.Node{
|
|
|
|
newNode := &v1.Node{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
@ -1809,7 +1807,7 @@ func TestIfServiceSpecifiesSharedRuleAndRuleDoesNotExistItIsCreated(t *testing.T
|
|
|
|
svc.Spec.LoadBalancerIP = "192.168.77.88"
|
|
|
|
svc.Spec.LoadBalancerIP = "192.168.77.88"
|
|
|
|
svc.Annotations[ServiceAnnotationSharedSecurityRule] = "true"
|
|
|
|
svc.Annotations[ServiceAnnotationSharedSecurityRule] = "true"
|
|
|
|
|
|
|
|
|
|
|
|
sg := getTestSecurityGroup(az)
|
|
|
|
getTestSecurityGroup(az)
|
|
|
|
|
|
|
|
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc, to.StringPtr(svc.Spec.LoadBalancerIP), true)
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc, to.StringPtr(svc.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
@ -1908,14 +1906,14 @@ func TestIfServicesSpecifySharedRuleButDifferentPortsThenSeparateRulesAreCreated
|
|
|
|
expectedRuleName1 := "shared-TCP-4444-Internet"
|
|
|
|
expectedRuleName1 := "shared-TCP-4444-Internet"
|
|
|
|
expectedRuleName2 := "shared-TCP-8888-Internet"
|
|
|
|
expectedRuleName2 := "shared-TCP-8888-Internet"
|
|
|
|
|
|
|
|
|
|
|
|
sg := getTestSecurityGroup(az)
|
|
|
|
getTestSecurityGroup(az)
|
|
|
|
|
|
|
|
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
_, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
@ -1977,14 +1975,14 @@ func TestIfServicesSpecifySharedRuleButDifferentProtocolsThenSeparateRulesAreCre
|
|
|
|
expectedRuleName1 := "shared-TCP-4444-Internet"
|
|
|
|
expectedRuleName1 := "shared-TCP-4444-Internet"
|
|
|
|
expectedRuleName2 := "shared-UDP-4444-Internet"
|
|
|
|
expectedRuleName2 := "shared-UDP-4444-Internet"
|
|
|
|
|
|
|
|
|
|
|
|
sg := getTestSecurityGroup(az)
|
|
|
|
getTestSecurityGroup(az)
|
|
|
|
|
|
|
|
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
_, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
@ -2046,14 +2044,14 @@ func TestIfServicesSpecifySharedRuleButDifferentSourceAddressesThenSeparateRules
|
|
|
|
expectedRuleName1 := "shared-TCP-80-192.168.12.0_24"
|
|
|
|
expectedRuleName1 := "shared-TCP-80-192.168.12.0_24"
|
|
|
|
expectedRuleName2 := "shared-TCP-80-192.168.34.0_24"
|
|
|
|
expectedRuleName2 := "shared-TCP-80-192.168.34.0_24"
|
|
|
|
|
|
|
|
|
|
|
|
sg := getTestSecurityGroup(az)
|
|
|
|
getTestSecurityGroup(az)
|
|
|
|
|
|
|
|
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
_, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
@ -2119,19 +2117,19 @@ func TestIfServicesSpecifySharedRuleButSomeAreOnDifferentPortsThenRulesAreSepara
|
|
|
|
expectedRuleName13 := "shared-TCP-4444-Internet"
|
|
|
|
expectedRuleName13 := "shared-TCP-4444-Internet"
|
|
|
|
expectedRuleName2 := "shared-TCP-8888-Internet"
|
|
|
|
expectedRuleName2 := "shared-TCP-8888-Internet"
|
|
|
|
|
|
|
|
|
|
|
|
sg := getTestSecurityGroup(az)
|
|
|
|
getTestSecurityGroup(az)
|
|
|
|
|
|
|
|
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
_, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
_, err = az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc3, to.StringPtr(svc3.Spec.LoadBalancerIP), true)
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc3, to.StringPtr(svc3.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc3: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc3: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
@ -2214,14 +2212,14 @@ func TestIfServiceSpecifiesSharedRuleAndServiceIsDeletedThenTheServicesPortAndAd
|
|
|
|
|
|
|
|
|
|
|
|
expectedRuleName := "shared-TCP-80-Internet"
|
|
|
|
expectedRuleName := "shared-TCP-80-Internet"
|
|
|
|
|
|
|
|
|
|
|
|
sg := getTestSecurityGroup(az)
|
|
|
|
getTestSecurityGroup(az)
|
|
|
|
|
|
|
|
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
_, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
@ -2274,19 +2272,19 @@ func TestIfSomeServicesShareARuleAndOneIsDeletedItIsRemovedFromTheRightRule(t *t
|
|
|
|
expectedRuleName13 := "shared-TCP-4444-Internet"
|
|
|
|
expectedRuleName13 := "shared-TCP-4444-Internet"
|
|
|
|
expectedRuleName2 := "shared-TCP-8888-Internet"
|
|
|
|
expectedRuleName2 := "shared-TCP-8888-Internet"
|
|
|
|
|
|
|
|
|
|
|
|
sg := getTestSecurityGroup(az)
|
|
|
|
getTestSecurityGroup(az)
|
|
|
|
|
|
|
|
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
_, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
_, err = az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc3, to.StringPtr(svc3.Spec.LoadBalancerIP), true)
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc3, to.StringPtr(svc3.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc3: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc3: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
@ -2381,26 +2379,26 @@ func TestIfServiceSpecifiesSharedRuleAndLastServiceIsDeletedThenRuleIsDeleted(t
|
|
|
|
expectedRuleName13 := "shared-TCP-4444-Internet"
|
|
|
|
expectedRuleName13 := "shared-TCP-4444-Internet"
|
|
|
|
expectedRuleName2 := "shared-TCP-8888-Internet"
|
|
|
|
expectedRuleName2 := "shared-TCP-8888-Internet"
|
|
|
|
|
|
|
|
|
|
|
|
sg := getTestSecurityGroup(az)
|
|
|
|
getTestSecurityGroup(az)
|
|
|
|
|
|
|
|
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
_, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
_, err = az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc3, to.StringPtr(svc3.Spec.LoadBalancerIP), true)
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc3, to.StringPtr(svc3.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc3: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc3: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
validateSecurityGroup(t, sg, svc1, svc2, svc3)
|
|
|
|
validateSecurityGroup(t, sg, svc1, svc2, svc3)
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), false)
|
|
|
|
_, err = az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), false)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error removing svc1: %q", err)
|
|
|
|
t.Errorf("Unexpected error removing svc1: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
@ -2471,29 +2469,29 @@ func TestCanCombineSharedAndPrivateRulesInSameGroup(t *testing.T) {
|
|
|
|
expectedRuleName4 := az.getSecurityRuleName(&svc4, v1.ServicePort{Port: 4444, Protocol: v1.ProtocolTCP}, "Internet")
|
|
|
|
expectedRuleName4 := az.getSecurityRuleName(&svc4, v1.ServicePort{Port: 4444, Protocol: v1.ProtocolTCP}, "Internet")
|
|
|
|
expectedRuleName5 := az.getSecurityRuleName(&svc5, v1.ServicePort{Port: 8888, Protocol: v1.ProtocolTCP}, "Internet")
|
|
|
|
expectedRuleName5 := az.getSecurityRuleName(&svc5, v1.ServicePort{Port: 8888, Protocol: v1.ProtocolTCP}, "Internet")
|
|
|
|
|
|
|
|
|
|
|
|
sg := getTestSecurityGroup(az)
|
|
|
|
getTestSecurityGroup(az)
|
|
|
|
|
|
|
|
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
_, err := az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc1: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
_, err = az.reconcileSecurityGroup(testClusterName, &svc2, to.StringPtr(svc2.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc2: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc3, to.StringPtr(svc3.Spec.LoadBalancerIP), true)
|
|
|
|
_, err = az.reconcileSecurityGroup(testClusterName, &svc3, to.StringPtr(svc3.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc3: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc3: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc4, to.StringPtr(svc4.Spec.LoadBalancerIP), true)
|
|
|
|
_, err = az.reconcileSecurityGroup(testClusterName, &svc4, to.StringPtr(svc4.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc4: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc4: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc5, to.StringPtr(svc5.Spec.LoadBalancerIP), true)
|
|
|
|
sg, err := az.reconcileSecurityGroup(testClusterName, &svc5, to.StringPtr(svc5.Spec.LoadBalancerIP), true)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error adding svc4: %q", err)
|
|
|
|
t.Errorf("Unexpected error adding svc4: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
@ -2584,7 +2582,7 @@ func TestCanCombineSharedAndPrivateRulesInSameGroup(t *testing.T) {
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sg, err = az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), false)
|
|
|
|
_, err = az.reconcileSecurityGroup(testClusterName, &svc1, to.StringPtr(svc1.Spec.LoadBalancerIP), false)
|
|
|
|
if err != nil {
|
|
|
|
if err != nil {
|
|
|
|
t.Errorf("Unexpected error removing svc1: %q", err)
|
|
|
|
t.Errorf("Unexpected error removing svc1: %q", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|