mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-31 05:40:42 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			418 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			418 lines
		
	
	
		
			11 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2016 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package service
 | |
| 
 | |
| import (
 | |
| 	"testing"
 | |
| 
 | |
| 	"fmt"
 | |
| 	"strings"
 | |
| 
 | |
| 	"k8s.io/api/core/v1"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	netsets "k8s.io/kubernetes/pkg/util/net/sets"
 | |
| 
 | |
| 	"github.com/davecgh/go-spew/spew"
 | |
| )
 | |
| 
 | |
| func TestGetLoadBalancerSourceRanges(t *testing.T) {
 | |
| 	checkError := func(v string) {
 | |
| 		annotations := make(map[string]string)
 | |
| 		annotations[v1.AnnotationLoadBalancerSourceRangesKey] = v
 | |
| 		svc := v1.Service{}
 | |
| 		svc.Annotations = annotations
 | |
| 		_, err := GetLoadBalancerSourceRanges(&svc)
 | |
| 		if err == nil {
 | |
| 			t.Errorf("Expected error parsing: %q", v)
 | |
| 		}
 | |
| 		svc = v1.Service{}
 | |
| 		svc.Spec.LoadBalancerSourceRanges = strings.Split(v, ",")
 | |
| 		_, err = GetLoadBalancerSourceRanges(&svc)
 | |
| 		if err == nil {
 | |
| 			t.Errorf("Expected error parsing: %q", v)
 | |
| 		}
 | |
| 	}
 | |
| 	checkError("10.0.0.1/33")
 | |
| 	checkError("foo.bar")
 | |
| 	checkError("10.0.0.1/32,*")
 | |
| 	checkError("10.0.0.1/32,")
 | |
| 	checkError("10.0.0.1/32, ")
 | |
| 	checkError("10.0.0.1")
 | |
| 
 | |
| 	checkOK := func(v string) netsets.IPNet {
 | |
| 		annotations := make(map[string]string)
 | |
| 		annotations[v1.AnnotationLoadBalancerSourceRangesKey] = v
 | |
| 		svc := v1.Service{}
 | |
| 		svc.Annotations = annotations
 | |
| 		cidrs, err := GetLoadBalancerSourceRanges(&svc)
 | |
| 		if err != nil {
 | |
| 			t.Errorf("Unexpected error parsing: %q", v)
 | |
| 		}
 | |
| 		svc = v1.Service{}
 | |
| 		svc.Spec.LoadBalancerSourceRanges = strings.Split(v, ",")
 | |
| 		cidrs, err = GetLoadBalancerSourceRanges(&svc)
 | |
| 		if err != nil {
 | |
| 			t.Errorf("Unexpected error parsing: %q", v)
 | |
| 		}
 | |
| 		return cidrs
 | |
| 	}
 | |
| 	cidrs := checkOK("192.168.0.1/32")
 | |
| 	if len(cidrs) != 1 {
 | |
| 		t.Errorf("Expected exactly one CIDR: %v", cidrs.StringSlice())
 | |
| 	}
 | |
| 	cidrs = checkOK("192.168.0.1/32,192.168.0.1/32")
 | |
| 	if len(cidrs) != 1 {
 | |
| 		t.Errorf("Expected exactly one CIDR (after de-dup): %v", cidrs.StringSlice())
 | |
| 	}
 | |
| 	cidrs = checkOK("192.168.0.1/32,192.168.0.2/32")
 | |
| 	if len(cidrs) != 2 {
 | |
| 		t.Errorf("Expected two CIDRs: %v", cidrs.StringSlice())
 | |
| 	}
 | |
| 	cidrs = checkOK("  192.168.0.1/32 , 192.168.0.2/32   ")
 | |
| 	if len(cidrs) != 2 {
 | |
| 		t.Errorf("Expected two CIDRs: %v", cidrs.StringSlice())
 | |
| 	}
 | |
| 	// check LoadBalancerSourceRanges not specified
 | |
| 	svc := v1.Service{}
 | |
| 	cidrs, err := GetLoadBalancerSourceRanges(&svc)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Unexpected error: %v", err)
 | |
| 	}
 | |
| 	if len(cidrs) != 1 {
 | |
| 		t.Errorf("Expected exactly one CIDR: %v", cidrs.StringSlice())
 | |
| 	}
 | |
| 	if !IsAllowAll(cidrs) {
 | |
| 		t.Errorf("Expected default to be allow-all: %v", cidrs.StringSlice())
 | |
| 	}
 | |
| 	// check SourceRanges annotation is empty
 | |
| 	annotations := make(map[string]string)
 | |
| 	annotations[v1.AnnotationLoadBalancerSourceRangesKey] = ""
 | |
| 	svc = v1.Service{}
 | |
| 	svc.Annotations = annotations
 | |
| 	cidrs, err = GetLoadBalancerSourceRanges(&svc)
 | |
| 	if err != nil {
 | |
| 		t.Errorf("Unexpected error: %v", err)
 | |
| 	}
 | |
| 	if len(cidrs) != 1 {
 | |
| 		t.Errorf("Expected exactly one CIDR: %v", cidrs.StringSlice())
 | |
| 	}
 | |
| 	if !IsAllowAll(cidrs) {
 | |
| 		t.Errorf("Expected default to be allow-all: %v", cidrs.StringSlice())
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestAllowAll(t *testing.T) {
 | |
| 	checkAllowAll := func(allowAll bool, cidrs ...string) {
 | |
| 		ipnets, err := netsets.ParseIPNets(cidrs...)
 | |
| 		if err != nil {
 | |
| 			t.Errorf("Unexpected error parsing cidrs: %v", cidrs)
 | |
| 		}
 | |
| 		if allowAll != IsAllowAll(ipnets) {
 | |
| 			t.Errorf("IsAllowAll did not return expected value for %v", cidrs)
 | |
| 		}
 | |
| 	}
 | |
| 	checkAllowAll(false, "10.0.0.1/32")
 | |
| 	checkAllowAll(false, "10.0.0.1/32", "10.0.0.2/32")
 | |
| 	checkAllowAll(false, "10.0.0.1/32", "10.0.0.1/32")
 | |
| 
 | |
| 	checkAllowAll(true, "0.0.0.0/0")
 | |
| 	checkAllowAll(true, "192.168.0.0/0")
 | |
| 	checkAllowAll(true, "192.168.0.1/32", "0.0.0.0/0")
 | |
| }
 | |
| 
 | |
| func TestRequestsOnlyLocalTraffic(t *testing.T) {
 | |
| 	checkRequestsOnlyLocalTraffic := func(requestsOnlyLocalTraffic bool, service *v1.Service) {
 | |
| 		res := RequestsOnlyLocalTraffic(service)
 | |
| 		if res != requestsOnlyLocalTraffic {
 | |
| 			t.Errorf("Expected requests OnlyLocal traffic = %v, got %v",
 | |
| 				requestsOnlyLocalTraffic, res)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	checkRequestsOnlyLocalTraffic(false, &v1.Service{})
 | |
| 	checkRequestsOnlyLocalTraffic(false, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeClusterIP,
 | |
| 		},
 | |
| 	})
 | |
| 	checkRequestsOnlyLocalTraffic(false, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeNodePort,
 | |
| 		},
 | |
| 	})
 | |
| 	checkRequestsOnlyLocalTraffic(false, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeNodePort,
 | |
| 			ExternalTrafficPolicy: v1.ServiceExternalTrafficPolicyTypeCluster,
 | |
| 		},
 | |
| 	})
 | |
| 	checkRequestsOnlyLocalTraffic(true, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeNodePort,
 | |
| 			ExternalTrafficPolicy: v1.ServiceExternalTrafficPolicyTypeLocal,
 | |
| 		},
 | |
| 	})
 | |
| 	checkRequestsOnlyLocalTraffic(false, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeLoadBalancer,
 | |
| 			ExternalTrafficPolicy: v1.ServiceExternalTrafficPolicyTypeCluster,
 | |
| 		},
 | |
| 	})
 | |
| 	checkRequestsOnlyLocalTraffic(true, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeLoadBalancer,
 | |
| 			ExternalTrafficPolicy: v1.ServiceExternalTrafficPolicyTypeLocal,
 | |
| 		},
 | |
| 	})
 | |
| }
 | |
| 
 | |
| func TestNeedsHealthCheck(t *testing.T) {
 | |
| 	checkNeedsHealthCheck := func(needsHealthCheck bool, service *v1.Service) {
 | |
| 		res := NeedsHealthCheck(service)
 | |
| 		if res != needsHealthCheck {
 | |
| 			t.Errorf("Expected needs health check = %v, got %v",
 | |
| 				needsHealthCheck, res)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	checkNeedsHealthCheck(false, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeClusterIP,
 | |
| 		},
 | |
| 	})
 | |
| 	checkNeedsHealthCheck(false, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeNodePort,
 | |
| 			ExternalTrafficPolicy: v1.ServiceExternalTrafficPolicyTypeCluster,
 | |
| 		},
 | |
| 	})
 | |
| 	checkNeedsHealthCheck(false, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeNodePort,
 | |
| 			ExternalTrafficPolicy: v1.ServiceExternalTrafficPolicyTypeLocal,
 | |
| 		},
 | |
| 	})
 | |
| 	checkNeedsHealthCheck(false, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeLoadBalancer,
 | |
| 			ExternalTrafficPolicy: v1.ServiceExternalTrafficPolicyTypeCluster,
 | |
| 		},
 | |
| 	})
 | |
| 	checkNeedsHealthCheck(true, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeLoadBalancer,
 | |
| 			ExternalTrafficPolicy: v1.ServiceExternalTrafficPolicyTypeLocal,
 | |
| 		},
 | |
| 	})
 | |
| 
 | |
| 	checkNeedsHealthCheck(false, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeLoadBalancer,
 | |
| 		},
 | |
| 		ObjectMeta: metav1.ObjectMeta{
 | |
| 			Annotations: map[string]string{
 | |
| 				v1.BetaAnnotationExternalTraffic: "invalid",
 | |
| 			},
 | |
| 		},
 | |
| 	})
 | |
| 	checkNeedsHealthCheck(false, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeLoadBalancer,
 | |
| 		},
 | |
| 		ObjectMeta: metav1.ObjectMeta{
 | |
| 			Annotations: map[string]string{
 | |
| 				v1.BetaAnnotationExternalTraffic: v1.AnnotationValueExternalTrafficGlobal,
 | |
| 			},
 | |
| 		},
 | |
| 	})
 | |
| 	checkNeedsHealthCheck(true, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeLoadBalancer,
 | |
| 		},
 | |
| 		ObjectMeta: metav1.ObjectMeta{
 | |
| 			Annotations: map[string]string{
 | |
| 				v1.BetaAnnotationExternalTraffic: v1.AnnotationValueExternalTrafficLocal,
 | |
| 			},
 | |
| 		},
 | |
| 	})
 | |
| }
 | |
| 
 | |
| func TestGetServiceHealthCheckNodePort(t *testing.T) {
 | |
| 	checkGetServiceHealthCheckNodePort := func(healthCheckNodePort int32, service *v1.Service) {
 | |
| 		res := GetServiceHealthCheckNodePort(service)
 | |
| 		if res != healthCheckNodePort {
 | |
| 			t.Errorf("Expected health check node port = %v, got %v",
 | |
| 				healthCheckNodePort, res)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	checkGetServiceHealthCheckNodePort(0, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeClusterIP,
 | |
| 		},
 | |
| 	})
 | |
| 	checkGetServiceHealthCheckNodePort(0, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeNodePort,
 | |
| 			ExternalTrafficPolicy: v1.ServiceExternalTrafficPolicyTypeCluster,
 | |
| 		},
 | |
| 	})
 | |
| 	checkGetServiceHealthCheckNodePort(0, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeLoadBalancer,
 | |
| 			ExternalTrafficPolicy: v1.ServiceExternalTrafficPolicyTypeCluster,
 | |
| 		},
 | |
| 	})
 | |
| 	checkGetServiceHealthCheckNodePort(34567, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeLoadBalancer,
 | |
| 			ExternalTrafficPolicy: v1.ServiceExternalTrafficPolicyTypeLocal,
 | |
| 			HealthCheckNodePort:   int32(34567),
 | |
| 		},
 | |
| 	})
 | |
| 	checkGetServiceHealthCheckNodePort(34567, &v1.Service{
 | |
| 		Spec: v1.ServiceSpec{
 | |
| 			Type: v1.ServiceTypeLoadBalancer,
 | |
| 		},
 | |
| 		ObjectMeta: metav1.ObjectMeta{
 | |
| 			Annotations: map[string]string{
 | |
| 				v1.BetaAnnotationExternalTraffic:     v1.AnnotationValueExternalTrafficLocal,
 | |
| 				v1.BetaAnnotationHealthCheckNodePort: "34567",
 | |
| 			},
 | |
| 		},
 | |
| 	})
 | |
| }
 | |
| 
 | |
| func TestClearExternalTrafficPolicy(t *testing.T) {
 | |
| 	testCases := []struct {
 | |
| 		inputService *v1.Service
 | |
| 	}{
 | |
| 		// First class fields cases.
 | |
| 		{
 | |
| 			&v1.Service{
 | |
| 				Spec: v1.ServiceSpec{
 | |
| 					Type: v1.ServiceTypeClusterIP,
 | |
| 					ExternalTrafficPolicy: v1.ServiceExternalTrafficPolicyTypeCluster,
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 		// Beta annotations cases.
 | |
| 		{
 | |
| 			&v1.Service{
 | |
| 				Spec: v1.ServiceSpec{
 | |
| 					Type: v1.ServiceTypeClusterIP,
 | |
| 				},
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Annotations: map[string]string{
 | |
| 						v1.BetaAnnotationExternalTraffic: v1.AnnotationValueExternalTrafficLocal,
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for i, tc := range testCases {
 | |
| 		ClearExternalTrafficPolicy(tc.inputService)
 | |
| 		if _, ok := tc.inputService.Annotations[v1.BetaAnnotationExternalTraffic]; ok ||
 | |
| 			tc.inputService.Spec.ExternalTrafficPolicy != "" {
 | |
| 			t.Errorf("%v: failed to clear ExternalTrafficPolicy", i)
 | |
| 			spew.Dump(tc)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestSetServiceHealthCheckNodePort(t *testing.T) {
 | |
| 	testCases := []struct {
 | |
| 		inputService *v1.Service
 | |
| 		hcNodePort   int32
 | |
| 		beta         bool
 | |
| 	}{
 | |
| 		// First class fields cases.
 | |
| 		{
 | |
| 			&v1.Service{
 | |
| 				Spec: v1.ServiceSpec{
 | |
| 					Type: v1.ServiceTypeClusterIP,
 | |
| 					ExternalTrafficPolicy: v1.ServiceExternalTrafficPolicyTypeCluster,
 | |
| 				},
 | |
| 			},
 | |
| 			30012,
 | |
| 			false,
 | |
| 		},
 | |
| 		{
 | |
| 			&v1.Service{
 | |
| 				Spec: v1.ServiceSpec{
 | |
| 					Type: v1.ServiceTypeClusterIP,
 | |
| 					ExternalTrafficPolicy: v1.ServiceExternalTrafficPolicyTypeCluster,
 | |
| 				},
 | |
| 			},
 | |
| 			0,
 | |
| 			false,
 | |
| 		},
 | |
| 		// Beta annotations cases.
 | |
| 		{
 | |
| 			&v1.Service{
 | |
| 				Spec: v1.ServiceSpec{
 | |
| 					Type: v1.ServiceTypeClusterIP,
 | |
| 				},
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Annotations: map[string]string{
 | |
| 						v1.BetaAnnotationExternalTraffic: v1.AnnotationValueExternalTrafficGlobal,
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			30012,
 | |
| 			true,
 | |
| 		},
 | |
| 		{
 | |
| 			&v1.Service{
 | |
| 				Spec: v1.ServiceSpec{
 | |
| 					Type: v1.ServiceTypeClusterIP,
 | |
| 				},
 | |
| 				ObjectMeta: metav1.ObjectMeta{
 | |
| 					Annotations: map[string]string{
 | |
| 						v1.BetaAnnotationExternalTraffic: v1.AnnotationValueExternalTrafficGlobal,
 | |
| 					},
 | |
| 				},
 | |
| 			},
 | |
| 			0,
 | |
| 			true,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	for i, tc := range testCases {
 | |
| 		SetServiceHealthCheckNodePort(tc.inputService, tc.hcNodePort)
 | |
| 		if !tc.beta {
 | |
| 			if tc.inputService.Spec.HealthCheckNodePort != tc.hcNodePort {
 | |
| 				t.Errorf("%v: got HealthCheckNodePort %v, want %v", i, tc.inputService.Spec.HealthCheckNodePort, tc.hcNodePort)
 | |
| 			}
 | |
| 		} else {
 | |
| 			l, ok := tc.inputService.Annotations[v1.BetaAnnotationHealthCheckNodePort]
 | |
| 			if tc.hcNodePort == 0 {
 | |
| 				if ok {
 | |
| 					t.Errorf("%v: HealthCheckNodePort set, want it to be cleared", i)
 | |
| 				}
 | |
| 			} else {
 | |
| 				if !ok {
 | |
| 					t.Errorf("%v: HealthCheckNodePort unset, want %v", i, tc.hcNodePort)
 | |
| 				} else if l != fmt.Sprintf("%v", tc.hcNodePort) {
 | |
| 					t.Errorf("%v: got HealthCheckNodePort %v, want %v", i, l, tc.hcNodePort)
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| }
 |