123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375 |
- /*
- Copyright 2014 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package cmd
- import (
- "bytes"
- "encoding/json"
- "fmt"
- "io/ioutil"
- "net/http"
- "os"
- "testing"
- "github.com/ghodss/yaml"
- "github.com/spf13/cobra"
- "k8s.io/kubernetes/pkg/api"
- "k8s.io/kubernetes/pkg/api/annotations"
- kubeerr "k8s.io/kubernetes/pkg/api/errors"
- "k8s.io/kubernetes/pkg/api/meta"
- "k8s.io/kubernetes/pkg/api/unversioned"
- "k8s.io/kubernetes/pkg/client/unversioned/fake"
- cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
- "k8s.io/kubernetes/pkg/runtime"
- )
- func TestApplyExtraArgsFail(t *testing.T) {
- buf := bytes.NewBuffer([]byte{})
- f, _, _, _ := NewAPIFactory()
- c := NewCmdApply(f, buf)
- if validateApplyArgs(c, []string{"rc"}) == nil {
- t.Fatalf("unexpected non-error")
- }
- }
- func validateApplyArgs(cmd *cobra.Command, args []string) error {
- if len(args) != 0 {
- return cmdutil.UsageError(cmd, "Unexpected args: %v", args)
- }
- return nil
- }
- const (
- filenameRC = "../../../test/fixtures/pkg/kubectl/cmd/apply/rc.yaml"
- filenameSVC = "../../../test/fixtures/pkg/kubectl/cmd/apply/service.yaml"
- filenameRCSVC = "../../../test/fixtures/pkg/kubectl/cmd/apply/rc-service.yaml"
- )
- func readBytesFromFile(t *testing.T, filename string) []byte {
- file, err := os.Open(filename)
- if err != nil {
- t.Fatal(err)
- }
- data, err := ioutil.ReadAll(file)
- if err != nil {
- t.Fatal(err)
- }
- return data
- }
- func readReplicationControllerFromFile(t *testing.T, filename string) *api.ReplicationController {
- data := readBytesFromFile(t, filename)
- rc := api.ReplicationController{}
- // TODO(jackgr): Replace with a call to testapi.Codec().Decode().
- if err := yaml.Unmarshal(data, &rc); err != nil {
- t.Fatal(err)
- }
- return &rc
- }
- func readServiceFromFile(t *testing.T, filename string) *api.Service {
- data := readBytesFromFile(t, filename)
- svc := api.Service{}
- // TODO(jackgr): Replace with a call to testapi.Codec().Decode().
- if err := yaml.Unmarshal(data, &svc); err != nil {
- t.Fatal(err)
- }
- return &svc
- }
- func annotateRuntimeObject(t *testing.T, originalObj, currentObj runtime.Object, kind string) (string, []byte) {
- originalAccessor, err := meta.Accessor(originalObj)
- if err != nil {
- t.Fatal(err)
- }
- originalLabels := originalAccessor.GetLabels()
- originalLabels["DELETE_ME"] = "DELETE_ME"
- originalAccessor.SetLabels(originalLabels)
- original, err := json.Marshal(originalObj)
- if err != nil {
- t.Fatal(err)
- }
- currentAccessor, err := meta.Accessor(currentObj)
- if err != nil {
- t.Fatal(err)
- }
- currentAnnotations := currentAccessor.GetAnnotations()
- if currentAnnotations == nil {
- currentAnnotations = make(map[string]string)
- }
- currentAnnotations[annotations.LastAppliedConfigAnnotation] = string(original)
- currentAccessor.SetAnnotations(currentAnnotations)
- current, err := json.Marshal(currentObj)
- if err != nil {
- t.Fatal(err)
- }
- return currentAccessor.GetName(), current
- }
- func readAndAnnotateReplicationController(t *testing.T, filename string) (string, []byte) {
- rc1 := readReplicationControllerFromFile(t, filename)
- rc2 := readReplicationControllerFromFile(t, filename)
- return annotateRuntimeObject(t, rc1, rc2, "ReplicationController")
- }
- func readAndAnnotateService(t *testing.T, filename string) (string, []byte) {
- svc1 := readServiceFromFile(t, filename)
- svc2 := readServiceFromFile(t, filename)
- return annotateRuntimeObject(t, svc1, svc2, "Service")
- }
- func validatePatchApplication(t *testing.T, req *http.Request) {
- patch, err := ioutil.ReadAll(req.Body)
- if err != nil {
- t.Fatal(err)
- }
- patchMap := map[string]interface{}{}
- if err := json.Unmarshal(patch, &patchMap); err != nil {
- t.Fatal(err)
- }
- annotationsMap := walkMapPath(t, patchMap, []string{"metadata", "annotations"})
- if _, ok := annotationsMap[annotations.LastAppliedConfigAnnotation]; !ok {
- t.Fatalf("patch does not contain annotation:\n%s\n", patch)
- }
- labelMap := walkMapPath(t, patchMap, []string{"metadata", "labels"})
- if deleteMe, ok := labelMap["DELETE_ME"]; !ok || deleteMe != nil {
- t.Fatalf("patch does not remove deleted key: DELETE_ME:\n%s\n", patch)
- }
- }
- func walkMapPath(t *testing.T, start map[string]interface{}, path []string) map[string]interface{} {
- finish := start
- for i := 0; i < len(path); i++ {
- var ok bool
- finish, ok = finish[path[i]].(map[string]interface{})
- if !ok {
- t.Fatalf("key:%s of path:%v not found in map:%v", path[i], path, start)
- }
- }
- return finish
- }
- func TestApplyObject(t *testing.T) {
- initTestErrorHandler(t)
- nameRC, currentRC := readAndAnnotateReplicationController(t, filenameRC)
- pathRC := "/namespaces/test/replicationcontrollers/" + nameRC
- f, tf, _, ns := NewAPIFactory()
- tf.Printer = &testPrinter{}
- tf.Client = &fake.RESTClient{
- NegotiatedSerializer: ns,
- Client: fake.CreateHTTPClient(func(req *http.Request) (*http.Response, error) {
- switch p, m := req.URL.Path, req.Method; {
- case p == pathRC && m == "GET":
- bodyRC := ioutil.NopCloser(bytes.NewReader(currentRC))
- return &http.Response{StatusCode: 200, Header: defaultHeader(), Body: bodyRC}, nil
- case p == pathRC && m == "PATCH":
- validatePatchApplication(t, req)
- bodyRC := ioutil.NopCloser(bytes.NewReader(currentRC))
- return &http.Response{StatusCode: 200, Header: defaultHeader(), Body: bodyRC}, nil
- default:
- t.Fatalf("unexpected request: %#v\n%#v", req.URL, req)
- return nil, nil
- }
- }),
- }
- tf.Namespace = "test"
- buf := bytes.NewBuffer([]byte{})
- cmd := NewCmdApply(f, buf)
- cmd.Flags().Set("filename", filenameRC)
- cmd.Flags().Set("output", "name")
- cmd.Run(cmd, []string{})
- // uses the name from the file, not the response
- expectRC := "replicationcontroller/" + nameRC + "\n"
- if buf.String() != expectRC {
- t.Fatalf("unexpected output: %s\nexpected: %s", buf.String(), expectRC)
- }
- }
- func TestApplyRetry(t *testing.T) {
- initTestErrorHandler(t)
- nameRC, currentRC := readAndAnnotateReplicationController(t, filenameRC)
- pathRC := "/namespaces/test/replicationcontrollers/" + nameRC
- firstPatch := true
- retry := false
- getCount := 0
- f, tf, _, ns := NewAPIFactory()
- tf.Printer = &testPrinter{}
- tf.Client = &fake.RESTClient{
- NegotiatedSerializer: ns,
- Client: fake.CreateHTTPClient(func(req *http.Request) (*http.Response, error) {
- switch p, m := req.URL.Path, req.Method; {
- case p == pathRC && m == "GET":
- getCount++
- bodyRC := ioutil.NopCloser(bytes.NewReader(currentRC))
- return &http.Response{StatusCode: 200, Header: defaultHeader(), Body: bodyRC}, nil
- case p == pathRC && m == "PATCH":
- if firstPatch {
- firstPatch = false
- statusErr := kubeerr.NewConflict(unversioned.GroupResource{Group: "", Resource: "rc"}, "test-rc", fmt.Errorf("the object has been modified. Please apply at first."))
- bodyBytes, _ := json.Marshal(statusErr)
- bodyErr := ioutil.NopCloser(bytes.NewReader(bodyBytes))
- return &http.Response{StatusCode: http.StatusConflict, Header: defaultHeader(), Body: bodyErr}, nil
- }
- retry = true
- validatePatchApplication(t, req)
- bodyRC := ioutil.NopCloser(bytes.NewReader(currentRC))
- return &http.Response{StatusCode: 200, Header: defaultHeader(), Body: bodyRC}, nil
- default:
- t.Fatalf("unexpected request: %#v\n%#v", req.URL, req)
- return nil, nil
- }
- }),
- }
- tf.Namespace = "test"
- buf := bytes.NewBuffer([]byte{})
- cmd := NewCmdApply(f, buf)
- cmd.Flags().Set("filename", filenameRC)
- cmd.Flags().Set("output", "name")
- cmd.Run(cmd, []string{})
- if !retry || getCount != 2 {
- t.Fatalf("apply didn't retry when get conflict error")
- }
- // uses the name from the file, not the response
- expectRC := "replicationcontroller/" + nameRC + "\n"
- if buf.String() != expectRC {
- t.Fatalf("unexpected output: %s\nexpected: %s", buf.String(), expectRC)
- }
- }
- func TestApplyNonExistObject(t *testing.T) {
- nameRC, currentRC := readAndAnnotateReplicationController(t, filenameRC)
- pathRC := "/namespaces/test/replicationcontrollers"
- pathNameRC := pathRC + "/" + nameRC
- f, tf, _, ns := NewAPIFactory()
- tf.Printer = &testPrinter{}
- tf.Client = &fake.RESTClient{
- NegotiatedSerializer: ns,
- Client: fake.CreateHTTPClient(func(req *http.Request) (*http.Response, error) {
- switch p, m := req.URL.Path, req.Method; {
- case p == pathNameRC && m == "GET":
- return &http.Response{StatusCode: 404, Header: defaultHeader(), Body: ioutil.NopCloser(bytes.NewReader(nil))}, nil
- case p == pathRC && m == "POST":
- bodyRC := ioutil.NopCloser(bytes.NewReader(currentRC))
- return &http.Response{StatusCode: 201, Header: defaultHeader(), Body: bodyRC}, nil
- default:
- t.Fatalf("unexpected request: %#v\n%#v", req.URL, req)
- return nil, nil
- }
- }),
- }
- tf.Namespace = "test"
- buf := bytes.NewBuffer([]byte{})
- cmd := NewCmdApply(f, buf)
- cmd.Flags().Set("filename", filenameRC)
- cmd.Flags().Set("output", "name")
- cmd.Run(cmd, []string{})
- // uses the name from the file, not the response
- expectRC := "replicationcontroller/" + nameRC + "\n"
- if buf.String() != expectRC {
- t.Errorf("unexpected output: %s\nexpected: %s", buf.String(), expectRC)
- }
- }
- func TestApplyMultipleObjectsAsList(t *testing.T) {
- testApplyMultipleObjects(t, true)
- }
- func TestApplyMultipleObjectsAsFiles(t *testing.T) {
- testApplyMultipleObjects(t, false)
- }
- func testApplyMultipleObjects(t *testing.T, asList bool) {
- nameRC, currentRC := readAndAnnotateReplicationController(t, filenameRC)
- pathRC := "/namespaces/test/replicationcontrollers/" + nameRC
- nameSVC, currentSVC := readAndAnnotateService(t, filenameSVC)
- pathSVC := "/namespaces/test/services/" + nameSVC
- f, tf, _, ns := NewAPIFactory()
- tf.Printer = &testPrinter{}
- tf.Client = &fake.RESTClient{
- NegotiatedSerializer: ns,
- Client: fake.CreateHTTPClient(func(req *http.Request) (*http.Response, error) {
- switch p, m := req.URL.Path, req.Method; {
- case p == pathRC && m == "GET":
- bodyRC := ioutil.NopCloser(bytes.NewReader(currentRC))
- return &http.Response{StatusCode: 200, Header: defaultHeader(), Body: bodyRC}, nil
- case p == pathRC && m == "PATCH":
- validatePatchApplication(t, req)
- bodyRC := ioutil.NopCloser(bytes.NewReader(currentRC))
- return &http.Response{StatusCode: 200, Header: defaultHeader(), Body: bodyRC}, nil
- case p == pathSVC && m == "GET":
- bodySVC := ioutil.NopCloser(bytes.NewReader(currentSVC))
- return &http.Response{StatusCode: 200, Header: defaultHeader(), Body: bodySVC}, nil
- case p == pathSVC && m == "PATCH":
- validatePatchApplication(t, req)
- bodySVC := ioutil.NopCloser(bytes.NewReader(currentSVC))
- return &http.Response{StatusCode: 200, Header: defaultHeader(), Body: bodySVC}, nil
- default:
- t.Fatalf("unexpected request: %#v\n%#v", req.URL, req)
- return nil, nil
- }
- }),
- }
- tf.Namespace = "test"
- buf := bytes.NewBuffer([]byte{})
- cmd := NewCmdApply(f, buf)
- if asList {
- cmd.Flags().Set("filename", filenameRCSVC)
- } else {
- cmd.Flags().Set("filename", filenameRC)
- cmd.Flags().Set("filename", filenameSVC)
- }
- cmd.Flags().Set("output", "name")
- cmd.Run(cmd, []string{})
- // Names should come from the REST response, NOT the files
- expectRC := "replicationcontroller/" + nameRC + "\n"
- expectSVC := "service/" + nameSVC + "\n"
- // Test both possible orders since output is non-deterministic.
- expectOne := expectRC + expectSVC
- expectTwo := expectSVC + expectRC
- if buf.String() != expectOne && buf.String() != expectTwo {
- t.Fatalf("unexpected output: %s\nexpected: %s OR %s", buf.String(), expectOne, expectTwo)
- }
- }
|