mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-31 05:40:42 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			136 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			136 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2017 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package apiserver
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"fmt"
 | |
| 	"sync"
 | |
| 	"sync/atomic"
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/google/uuid"
 | |
| 
 | |
| 	v1 "k8s.io/api/core/v1"
 | |
| 	apierrors "k8s.io/apimachinery/pkg/api/errors"
 | |
| 	"k8s.io/apimachinery/pkg/api/meta"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/apimachinery/pkg/types"
 | |
| 	"k8s.io/kubernetes/test/integration/framework"
 | |
| )
 | |
| 
 | |
| // Tests that the apiserver retries patches
 | |
| func TestPatchConflicts(t *testing.T) {
 | |
| 	s, clientSet, closeFn := setup(t)
 | |
| 	defer closeFn()
 | |
| 
 | |
| 	ns := framework.CreateTestingNamespace("status-code", s, t)
 | |
| 	defer framework.DeleteTestingNamespace(ns, s, t)
 | |
| 
 | |
| 	numOfConcurrentPatches := 100
 | |
| 
 | |
| 	UIDs := make([]types.UID, numOfConcurrentPatches)
 | |
| 	ownerRefs := []metav1.OwnerReference{}
 | |
| 	for i := 0; i < numOfConcurrentPatches; i++ {
 | |
| 		uid := types.UID(uuid.New().String())
 | |
| 		ownerName := fmt.Sprintf("owner-%d", i)
 | |
| 		UIDs[i] = uid
 | |
| 		ownerRefs = append(ownerRefs, metav1.OwnerReference{
 | |
| 			APIVersion: "example.com/v1",
 | |
| 			Kind:       "Foo",
 | |
| 			Name:       ownerName,
 | |
| 			UID:        uid,
 | |
| 		})
 | |
| 	}
 | |
| 	secret := &v1.Secret{
 | |
| 		ObjectMeta: metav1.ObjectMeta{
 | |
| 			Name:            "test",
 | |
| 			OwnerReferences: ownerRefs,
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	// Create the object we're going to conflict on
 | |
| 	clientSet.CoreV1().Secrets(ns.Name).Create(context.TODO(), secret, metav1.CreateOptions{})
 | |
| 	client := clientSet.CoreV1().RESTClient()
 | |
| 
 | |
| 	successes := int32(0)
 | |
| 
 | |
| 	// Run a lot of simultaneous patch operations to exercise internal API server retry of application of patches that do not specify resourceVersion.
 | |
| 	// They should all succeed.
 | |
| 	wg := sync.WaitGroup{}
 | |
| 	for i := 0; i < numOfConcurrentPatches; i++ {
 | |
| 		wg.Add(1)
 | |
| 		go func(i int) {
 | |
| 			defer wg.Done()
 | |
| 			labelName := fmt.Sprintf("label-%d", i)
 | |
| 			value := uuid.New().String()
 | |
| 
 | |
| 			obj, err := client.Patch(types.StrategicMergePatchType).
 | |
| 				Namespace(ns.Name).
 | |
| 				Resource("secrets").
 | |
| 				Name("test").
 | |
| 				Body([]byte(fmt.Sprintf(`{"metadata":{"labels":{"%s":"%s"}, "ownerReferences":[{"$patch":"delete","uid":"%s"}]}}`, labelName, value, UIDs[i]))).
 | |
| 				Do(context.TODO()).
 | |
| 				Get()
 | |
| 
 | |
| 			if apierrors.IsConflict(err) {
 | |
| 				t.Logf("tolerated conflict error patching %s: %v", "secrets", err)
 | |
| 				return
 | |
| 			}
 | |
| 			if err != nil {
 | |
| 				t.Errorf("error patching %s: %v", "secrets", err)
 | |
| 				return
 | |
| 			}
 | |
| 
 | |
| 			accessor, err := meta.Accessor(obj)
 | |
| 			if err != nil {
 | |
| 				t.Errorf("error getting object from %s: %v", "secrets", err)
 | |
| 				return
 | |
| 			}
 | |
| 			// make sure the label we wanted was effective
 | |
| 			if accessor.GetLabels()[labelName] != value {
 | |
| 				t.Errorf("patch of %s was ineffective, expected %s=%s, got labels %#v", "secrets", labelName, value, accessor.GetLabels())
 | |
| 				return
 | |
| 			}
 | |
| 			// make sure the patch directive didn't get lost, and that an entry in the ownerReference list was deleted.
 | |
| 			found := findOwnerRefByUID(accessor.GetOwnerReferences(), UIDs[i])
 | |
| 			if found {
 | |
| 				t.Errorf("patch of %s with $patch directive was ineffective, didn't delete the entry in the ownerReference slice: %#v", "secrets", UIDs[i])
 | |
| 			}
 | |
| 
 | |
| 			atomic.AddInt32(&successes, 1)
 | |
| 		}(i)
 | |
| 	}
 | |
| 	wg.Wait()
 | |
| 
 | |
| 	if successes < int32(numOfConcurrentPatches) {
 | |
| 		t.Errorf("Expected at least %d successful patches for %s, got %d", numOfConcurrentPatches, "secrets", successes)
 | |
| 	} else {
 | |
| 		t.Logf("Got %d successful patches for %s", successes, "secrets")
 | |
| 	}
 | |
| 
 | |
| }
 | |
| 
 | |
| func findOwnerRefByUID(ownerRefs []metav1.OwnerReference, uid types.UID) bool {
 | |
| 	for _, of := range ownerRefs {
 | |
| 		if of.UID == uid {
 | |
| 			return true
 | |
| 		}
 | |
| 	}
 | |
| 	return false
 | |
| }
 |