* mw/k8s: Test Federation parsing The test case was there, but there was nothing testing it?!?!?! Add it and split it out of the main setup test which is too long already. Also allow kubernetes a not have a ZONE, just default to the serverblock in that case. Remove test that was blocking that. Cleanup up the readme more. * rewrite README
627 lines
13 KiB
Go
627 lines
13 KiB
Go
package kubernetes
|
|
|
|
import (
|
|
"net"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/mholt/caddy"
|
|
unversionedapi "k8s.io/client-go/1.5/pkg/api/unversioned"
|
|
)
|
|
|
|
func parseCidr(cidr string) net.IPNet {
|
|
_, ipnet, _ := net.ParseCIDR(cidr)
|
|
return *ipnet
|
|
}
|
|
|
|
func TestKubernetesParse(t *testing.T) {
|
|
tests := []struct {
|
|
input string // Corefile data as string
|
|
shouldErr bool // true if test case is exected to produce an error.
|
|
expectedErrContent string // substring from the expected error. Empty for positive cases.
|
|
expectedZoneCount int // expected count of defined zones.
|
|
expectedNSCount int // expected count of namespaces.
|
|
expectedResyncPeriod time.Duration // expected resync period value
|
|
expectedLabelSelector string // expected label selector value
|
|
expectedPodMode string
|
|
expectedCidrs []net.IPNet
|
|
expectedFallthrough bool
|
|
expectedUpstreams []string
|
|
}{
|
|
// positive
|
|
{
|
|
`kubernetes coredns.local`,
|
|
false,
|
|
"",
|
|
1,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local test.local`,
|
|
false,
|
|
"",
|
|
2,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
}`,
|
|
false,
|
|
"",
|
|
1,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
endpoint http://localhost:9090
|
|
}`,
|
|
false,
|
|
"",
|
|
1,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
namespaces demo
|
|
}`,
|
|
false,
|
|
"",
|
|
1,
|
|
1,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
namespaces demo test
|
|
}`,
|
|
false,
|
|
"",
|
|
1,
|
|
2,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
resyncperiod 30s
|
|
}`,
|
|
false,
|
|
"",
|
|
1,
|
|
0,
|
|
30 * time.Second,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
resyncperiod 15m
|
|
}`,
|
|
false,
|
|
"",
|
|
1,
|
|
0,
|
|
15 * time.Minute,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
labels environment=prod
|
|
}`,
|
|
false,
|
|
"",
|
|
1,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"environment=prod",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
labels environment in (production, staging, qa),application=nginx
|
|
}`,
|
|
false,
|
|
"",
|
|
1,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"application=nginx,environment in (production,qa,staging)",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local test.local {
|
|
resyncperiod 15m
|
|
endpoint http://localhost:8080
|
|
namespaces demo test
|
|
labels environment in (production, staging, qa),application=nginx
|
|
fallthrough
|
|
}`,
|
|
false,
|
|
"",
|
|
2,
|
|
2,
|
|
15 * time.Minute,
|
|
"application=nginx,environment in (production,qa,staging)",
|
|
PodModeDisabled,
|
|
nil,
|
|
true,
|
|
nil,
|
|
},
|
|
// negative
|
|
{
|
|
"",
|
|
true,
|
|
"kubernetes setup called without keyword 'kubernetes' in Corefile",
|
|
-1,
|
|
-1,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
endpoint
|
|
}`,
|
|
true,
|
|
"rong argument count or unexpected line ending",
|
|
-1,
|
|
-1,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
namespaces
|
|
}`,
|
|
true,
|
|
"rong argument count or unexpected line ending",
|
|
-1,
|
|
-1,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
resyncperiod
|
|
}`,
|
|
true,
|
|
"rong argument count or unexpected line ending",
|
|
-1,
|
|
0,
|
|
0 * time.Minute,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
resyncperiod 15
|
|
}`,
|
|
true,
|
|
"unable to parse resync duration value",
|
|
-1,
|
|
0,
|
|
0 * time.Second,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
resyncperiod abc
|
|
}`,
|
|
true,
|
|
"unable to parse resync duration value",
|
|
-1,
|
|
0,
|
|
0 * time.Second,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
labels
|
|
}`,
|
|
true,
|
|
"rong argument count or unexpected line ending",
|
|
-1,
|
|
0,
|
|
0 * time.Second,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
{
|
|
`kubernetes coredns.local {
|
|
labels environment in (production, qa
|
|
}`,
|
|
true,
|
|
"unable to parse label selector",
|
|
-1,
|
|
0,
|
|
0 * time.Second,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
// pods disabled
|
|
{
|
|
`kubernetes coredns.local {
|
|
pods disabled
|
|
}`,
|
|
false,
|
|
"",
|
|
1,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
// pods insecure
|
|
{
|
|
`kubernetes coredns.local {
|
|
pods insecure
|
|
}`,
|
|
false,
|
|
"",
|
|
1,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeInsecure,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
// pods verified
|
|
{
|
|
`kubernetes coredns.local {
|
|
pods verified
|
|
}`,
|
|
false,
|
|
"",
|
|
1,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeVerified,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
// pods invalid
|
|
{
|
|
`kubernetes coredns.local {
|
|
pods giant_seed
|
|
}`,
|
|
true,
|
|
"rong value for pods",
|
|
-1,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeVerified,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
// cidrs ok
|
|
{
|
|
`kubernetes coredns.local {
|
|
cidrs 10.0.0.0/24 10.0.1.0/24
|
|
}`,
|
|
false,
|
|
"",
|
|
1,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
[]net.IPNet{parseCidr("10.0.0.0/24"), parseCidr("10.0.1.0/24")},
|
|
false,
|
|
nil,
|
|
},
|
|
// cidrs ok
|
|
{
|
|
`kubernetes coredns.local {
|
|
cidrs hard dry
|
|
}`,
|
|
true,
|
|
"invalid cidr: hard",
|
|
-1,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
// fallthrough invalid
|
|
{
|
|
`kubernetes coredns.local {
|
|
fallthrough junk
|
|
}`,
|
|
true,
|
|
"rong argument count",
|
|
-1,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
// Valid upstream
|
|
{
|
|
`kubernetes coredns.local {
|
|
upstream 13.14.15.16:53
|
|
}`,
|
|
false,
|
|
"",
|
|
1,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
[]string{"13.14.15.16:53"},
|
|
},
|
|
// Invalid upstream
|
|
{
|
|
`kubernetes coredns.local {
|
|
upstream 13.14.15.16orange
|
|
}`,
|
|
true,
|
|
"not an IP address or file: \"13.14.15.16orange\"",
|
|
-1,
|
|
0,
|
|
defaultResyncPeriod,
|
|
"",
|
|
PodModeDisabled,
|
|
nil,
|
|
false,
|
|
nil,
|
|
},
|
|
}
|
|
|
|
for i, test := range tests {
|
|
c := caddy.NewTestController("dns", test.input)
|
|
k8sController, err := kubernetesParse(c)
|
|
|
|
if test.shouldErr && err == nil {
|
|
t.Errorf("Test %d: Expected error, but did not find error for input '%s'. Error was: '%v'", i, test.input, err)
|
|
}
|
|
|
|
if err != nil {
|
|
if !test.shouldErr {
|
|
t.Errorf("Test %d: Expected no error but found one for input %s. Error was: %v", i, test.input, err)
|
|
continue
|
|
}
|
|
|
|
if test.shouldErr && (len(test.expectedErrContent) < 1) {
|
|
t.Fatalf("Test %d: Test marked as expecting an error, but no expectedErrContent provided for input '%s'. Error was: '%v'", i, test.input, err)
|
|
}
|
|
|
|
if test.shouldErr && (test.expectedZoneCount >= 0) {
|
|
t.Errorf("Test %d: Test marked as expecting an error, but provides value for expectedZoneCount!=-1 for input '%s'. Error was: '%v'", i, test.input, err)
|
|
}
|
|
|
|
if !strings.Contains(err.Error(), test.expectedErrContent) {
|
|
t.Errorf("Test %d: Expected error to contain: %v, found error: %v, input: %s", i, test.expectedErrContent, err, test.input)
|
|
}
|
|
continue
|
|
}
|
|
|
|
// No error was raised, so validate initialization of k8sController
|
|
// Zones
|
|
foundZoneCount := len(k8sController.Zones)
|
|
if foundZoneCount != test.expectedZoneCount {
|
|
t.Errorf("Test %d: Expected kubernetes controller to be initialized with %d zones, instead found %d zones: '%v' for input '%s'", i, test.expectedZoneCount, foundZoneCount, k8sController.Zones, test.input)
|
|
}
|
|
|
|
// Namespaces
|
|
foundNSCount := len(k8sController.Namespaces)
|
|
if foundNSCount != test.expectedNSCount {
|
|
t.Errorf("Test %d: Expected kubernetes controller to be initialized with %d namespaces. Instead found %d namespaces: '%v' for input '%s'", i, test.expectedNSCount, foundNSCount, k8sController.Namespaces, test.input)
|
|
}
|
|
|
|
// ResyncPeriod
|
|
foundResyncPeriod := k8sController.ResyncPeriod
|
|
if foundResyncPeriod != test.expectedResyncPeriod {
|
|
t.Errorf("Test %d: Expected kubernetes controller to be initialized with resync period '%s'. Instead found period '%s' for input '%s'", i, test.expectedResyncPeriod, foundResyncPeriod, test.input)
|
|
}
|
|
|
|
// Labels
|
|
if k8sController.LabelSelector != nil {
|
|
foundLabelSelectorString := unversionedapi.FormatLabelSelector(k8sController.LabelSelector)
|
|
if foundLabelSelectorString != test.expectedLabelSelector {
|
|
t.Errorf("Test %d: Expected kubernetes controller to be initialized with label selector '%s'. Instead found selector '%s' for input '%s'", i, test.expectedLabelSelector, foundLabelSelectorString, test.input)
|
|
}
|
|
}
|
|
// Pods
|
|
foundPodMode := k8sController.PodMode
|
|
if foundPodMode != test.expectedPodMode {
|
|
t.Errorf("Test %d: Expected kubernetes controller to be initialized with pod mode '%s'. Instead found pod mode '%s' for input '%s'", i, test.expectedPodMode, foundPodMode, test.input)
|
|
}
|
|
|
|
// Cidrs
|
|
foundCidrs := k8sController.ReverseCidrs
|
|
if len(foundCidrs) != len(test.expectedCidrs) {
|
|
t.Errorf("Test %d: Expected kubernetes controller to be initialized with %d cidrs. Instead found %d cidrs for input '%s'", i, len(test.expectedCidrs), len(foundCidrs), test.input)
|
|
}
|
|
for j, cidr := range test.expectedCidrs {
|
|
if cidr.String() != foundCidrs[j].String() {
|
|
t.Errorf("Test %d: Expected kubernetes controller to be initialized with cidr '%s'. Instead found cidr '%s' for input '%s'", i, test.expectedCidrs[j].String(), foundCidrs[j].String(), test.input)
|
|
}
|
|
}
|
|
// fallthrough
|
|
foundFallthrough := k8sController.Fallthrough
|
|
if foundFallthrough != test.expectedFallthrough {
|
|
t.Errorf("Test %d: Expected kubernetes controller to be initialized with fallthrough '%v'. Instead found fallthrough '%v' for input '%s'", i, test.expectedFallthrough, foundFallthrough, test.input)
|
|
}
|
|
// upstream
|
|
foundUpstreams := k8sController.Proxy.Upstreams
|
|
if test.expectedUpstreams == nil {
|
|
if foundUpstreams != nil {
|
|
t.Errorf("Test %d: Expected kubernetes controller to not be initialized with upstreams for input '%s'", i, test.input)
|
|
}
|
|
} else {
|
|
if foundUpstreams == nil {
|
|
t.Errorf("Test %d: Expected kubernetes controller to be initialized with upstreams for input '%s'", i, test.input)
|
|
} else {
|
|
if len(*foundUpstreams) != len(test.expectedUpstreams) {
|
|
t.Errorf("Test %d: Expected kubernetes controller to be initialized with %d upstreams. Instead found %d upstreams for input '%s'", i, len(test.expectedUpstreams), len(*foundUpstreams), test.input)
|
|
}
|
|
for j, want := range test.expectedUpstreams {
|
|
got := (*foundUpstreams)[j].Select().Name
|
|
if got != want {
|
|
t.Errorf("Test %d: Expected kubernetes controller to be initialized with upstream '%s'. Instead found upstream '%s' for input '%s'", i, want, got, test.input)
|
|
}
|
|
}
|
|
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestKubernetesParseFederation(t *testing.T) {
|
|
tests := []struct {
|
|
input string // Corefile data as string
|
|
shouldErr bool // true if test case is exected to produce an error.
|
|
expectedErrContent string // substring from the expected error. Empty for positive cases.
|
|
expectedFederations []Federation
|
|
}{
|
|
// Valid federations
|
|
{
|
|
`kubernetes coredns.local {
|
|
federation foo bar.crawl.com
|
|
federation fed era.tion.com
|
|
}`,
|
|
false,
|
|
"",
|
|
[]Federation{
|
|
{name: "foo", zone: "bar.crawl.com"},
|
|
{name: "fed", zone: "era.tion.com"},
|
|
},
|
|
},
|
|
// Invalid federations
|
|
{
|
|
`kubernetes coredns.local {
|
|
federation starship
|
|
}`,
|
|
true,
|
|
`incorrect number of arguments for federation`,
|
|
[]Federation{},
|
|
},
|
|
}
|
|
|
|
for i, test := range tests {
|
|
c := caddy.NewTestController("dns", test.input)
|
|
k8sController, err := kubernetesParse(c)
|
|
|
|
if test.shouldErr && err == nil {
|
|
t.Errorf("Test %d: Expected error, but did not find error for input '%s'. Error was: '%v'", i, test.input, err)
|
|
}
|
|
|
|
if err != nil {
|
|
if !test.shouldErr {
|
|
t.Errorf("Test %d: Expected no error but found one for input %s. Error was: %v", i, test.input, err)
|
|
continue
|
|
}
|
|
|
|
if test.shouldErr && (len(test.expectedErrContent) < 1) {
|
|
t.Fatalf("Test %d: Test marked as expecting an error, but no expectedErrContent provided for input '%s'. Error was: '%v'", i, test.input, err)
|
|
}
|
|
|
|
if !strings.Contains(err.Error(), test.expectedErrContent) {
|
|
t.Errorf("Test %d: Expected error to contain: %v, found error: %v, input: %s", i, test.expectedErrContent, err, test.input)
|
|
}
|
|
continue
|
|
}
|
|
|
|
foundFed := k8sController.Federations
|
|
if len(foundFed) != len(test.expectedFederations) {
|
|
t.Errorf("Test %d: Expected kubernetes controller to be initialized with %d fedrations. Instead found %d fedrations for input '%s'", i, len(test.expectedFederations), len(foundFed), test.input)
|
|
}
|
|
for j, fed := range test.expectedFederations {
|
|
if fed != foundFed[j] {
|
|
t.Errorf("Test %d: Expected kubernetes controller to be initialized with federation '%s'. Instead found federation '%s' for input '%s'", i, test.expectedFederations[j], foundFed[j], test.input)
|
|
}
|
|
}
|
|
}
|
|
}
|