mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-09-29 06:06:03 +00:00
client.Config describes how to make a client connection to a server for HTTP traffic, but for connection upgrade scenarios cannot be used because the underlying http.Transport object can't allow the connection to be hijacked. Reorganize the TLS and connection wrapper methods so that a sophisticated client can do: cfg := &client.Config{...} // from somewhere tlsConfig, _ := client.TLSConfigFor(cfg) _ := conn.Dial(...) rt := MyRoundTripper() // some func that implements grabbing requests wrapper, _ := client.HTTPWrappersFor(cfg) req := &http.Request{} req.Header.Set("Connection-Upgrade", ...) _, := wrapper.RoundTrip(req) // rt has been invoked with a fully formed Req with auth rt.Req.Write(conn) // read response for upgrade It would be good to have utility function that does more of this, but mostly enabling the HTTP2/SPDY client exec function right now.
187 lines
4.5 KiB
Go
187 lines
4.5 KiB
Go
/*
|
|
Copyright 2014 Google Inc. All rights reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package client
|
|
|
|
import (
|
|
"encoding/json"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"net/url"
|
|
"strconv"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/api"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/probe"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/util"
|
|
)
|
|
|
|
func TestHTTPKubeletClient(t *testing.T) {
|
|
expectObj := api.PodStatusResult{
|
|
Status: api.PodStatus{
|
|
Info: map[string]api.ContainerStatus{
|
|
"myID1": {},
|
|
"myID2": {},
|
|
},
|
|
},
|
|
}
|
|
body, err := json.Marshal(expectObj)
|
|
if err != nil {
|
|
t.Errorf("unexpected error: %v", err)
|
|
}
|
|
|
|
fakeHandler := util.FakeHandler{
|
|
StatusCode: 200,
|
|
ResponseBody: string(body),
|
|
}
|
|
testServer := httptest.NewServer(&fakeHandler)
|
|
defer testServer.Close()
|
|
|
|
hostURL, err := url.Parse(testServer.URL)
|
|
if err != nil {
|
|
t.Errorf("unexpected error: %v", err)
|
|
}
|
|
|
|
parts := strings.Split(hostURL.Host, ":")
|
|
|
|
port, err := strconv.Atoi(parts[1])
|
|
if err != nil {
|
|
t.Errorf("unexpected error: %v", err)
|
|
}
|
|
|
|
podInfoGetter := &HTTPKubeletClient{
|
|
Client: http.DefaultClient,
|
|
Port: uint(port),
|
|
}
|
|
gotObj, err := podInfoGetter.GetPodStatus(parts[0], api.NamespaceDefault, "foo")
|
|
if err != nil {
|
|
t.Errorf("unexpected error: %v", err)
|
|
}
|
|
|
|
// reflect.DeepEqual(expectObj, gotObj) doesn't handle blank times well
|
|
if len(gotObj.Status.Info) != len(expectObj.Status.Info) {
|
|
t.Errorf("Unexpected response. Expected: %#v, received %#v", expectObj, gotObj)
|
|
}
|
|
}
|
|
|
|
func TestHTTPKubeletClientNotFound(t *testing.T) {
|
|
expectObj := api.PodContainerInfo{
|
|
ContainerInfo: map[string]api.ContainerStatus{
|
|
"myID": {},
|
|
},
|
|
}
|
|
_, err := json.Marshal(expectObj)
|
|
if err != nil {
|
|
t.Errorf("unexpected error: %v", err)
|
|
}
|
|
|
|
fakeHandler := util.FakeHandler{
|
|
StatusCode: 404,
|
|
ResponseBody: "Pod not found",
|
|
}
|
|
testServer := httptest.NewServer(&fakeHandler)
|
|
defer testServer.Close()
|
|
|
|
hostURL, err := url.Parse(testServer.URL)
|
|
if err != nil {
|
|
t.Errorf("unexpected error: %v", err)
|
|
}
|
|
|
|
parts := strings.Split(hostURL.Host, ":")
|
|
|
|
port, err := strconv.Atoi(parts[1])
|
|
if err != nil {
|
|
t.Errorf("unexpected error: %v", err)
|
|
}
|
|
|
|
podInfoGetter := &HTTPKubeletClient{
|
|
Client: http.DefaultClient,
|
|
Port: uint(port),
|
|
}
|
|
_, err = podInfoGetter.GetPodStatus(parts[0], api.NamespaceDefault, "foo")
|
|
if err != ErrPodInfoNotAvailable {
|
|
t.Errorf("Expected %#v, Got %#v", ErrPodInfoNotAvailable, err)
|
|
}
|
|
}
|
|
|
|
func TestNewKubeletClient(t *testing.T) {
|
|
config := &KubeletConfig{
|
|
Port: 9000,
|
|
EnableHttps: false,
|
|
}
|
|
|
|
client, err := NewKubeletClient(config)
|
|
if err != nil {
|
|
t.Errorf("Error while trying to create a client: %v", err)
|
|
}
|
|
if client == nil {
|
|
t.Error("client is nil.")
|
|
}
|
|
|
|
host := "127.0.0.1"
|
|
healthStatus, err := client.HealthCheck(host)
|
|
if healthStatus != probe.Failure {
|
|
t.Errorf("Expected %v and got %v.", probe.Failure, healthStatus)
|
|
}
|
|
if err != nil {
|
|
t.Error("Expected a nil error")
|
|
}
|
|
}
|
|
|
|
func TestNewKubeletClientTLSInvalid(t *testing.T) {
|
|
config := &KubeletConfig{
|
|
Port: 9000,
|
|
EnableHttps: true,
|
|
//Invalid certificate and key path
|
|
TLSClientConfig: TLSClientConfig{
|
|
CertFile: "./testdata/mycertinvalid.cer",
|
|
KeyFile: "./testdata/mycertinvalid.key",
|
|
CAFile: "./testdata/myCA.cer",
|
|
},
|
|
}
|
|
|
|
client, err := NewKubeletClient(config)
|
|
if err == nil {
|
|
t.Errorf("Expected an error")
|
|
}
|
|
if client != nil {
|
|
t.Error("client should be nil as we provided invalid cert file")
|
|
}
|
|
}
|
|
|
|
func TestNewKubeletClientTLSValid(t *testing.T) {
|
|
config := &KubeletConfig{
|
|
Port: 9000,
|
|
EnableHttps: true,
|
|
TLSClientConfig: TLSClientConfig{
|
|
CertFile: "./testdata/mycertvalid.cer",
|
|
// TLS Configuration, only applies if EnableHttps is true.
|
|
KeyFile: "./testdata/mycertvalid.key",
|
|
// TLS Configuration, only applies if EnableHttps is true.
|
|
CAFile: "./testdata/myCA.cer",
|
|
},
|
|
}
|
|
|
|
client, err := NewKubeletClient(config)
|
|
if err != nil {
|
|
t.Errorf("Not expecting an error #%v", err)
|
|
}
|
|
if client == nil {
|
|
t.Error("client should not be nil")
|
|
}
|
|
}
|