mirror of
https://github.com/containous/traefik.git
synced 2024-12-24 21:34:39 +03:00
79dd72f53d
The Kubernetes provider wasn't setting priorities which was causing shorter paths to get chosen before longer ones. This now matches the [documentation](https://github.com/containous/traefik/blob/master/docs/basics.md#priorities)
1297 lines
26 KiB
Go
1297 lines
26 KiB
Go
package provider
|
|
|
|
import (
|
|
"encoding/json"
|
|
"github.com/containous/traefik/provider/k8s"
|
|
"github.com/containous/traefik/types"
|
|
"reflect"
|
|
"testing"
|
|
)
|
|
|
|
func TestLoadIngresses(t *testing.T) {
|
|
ingresses := []k8s.Ingress{{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Namespace: "testing",
|
|
},
|
|
Spec: k8s.IngressSpec{
|
|
Rules: []k8s.IngressRule{
|
|
{
|
|
Host: "foo",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Path: "/bar",
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service1",
|
|
ServicePort: k8s.FromInt(80),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Host: "bar",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service3",
|
|
ServicePort: k8s.FromString("https"),
|
|
},
|
|
},
|
|
{
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service2",
|
|
ServicePort: k8s.FromInt(802),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}}
|
|
services := []k8s.Service{
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Name: "service1",
|
|
UID: "1",
|
|
Namespace: "testing",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.1",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Port: 80,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Name: "service2",
|
|
UID: "2",
|
|
Namespace: "testing",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.2",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Port: 802,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Name: "service3",
|
|
UID: "3",
|
|
Namespace: "testing",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.3",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Name: "http",
|
|
Port: 80,
|
|
},
|
|
{
|
|
Name: "https",
|
|
Port: 443,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
endpoints := []k8s.Endpoints{
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Name: "service1",
|
|
UID: "1",
|
|
Namespace: "testing",
|
|
},
|
|
Subsets: []k8s.EndpointSubset{
|
|
{
|
|
Addresses: []k8s.EndpointAddress{
|
|
{
|
|
IP: "10.10.0.1",
|
|
},
|
|
},
|
|
Ports: []k8s.EndpointPort{
|
|
{
|
|
Port: 8080,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Addresses: []k8s.EndpointAddress{
|
|
{
|
|
IP: "10.21.0.1",
|
|
},
|
|
},
|
|
Ports: []k8s.EndpointPort{
|
|
{
|
|
Port: 8080,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Name: "service3",
|
|
UID: "3",
|
|
Namespace: "testing",
|
|
},
|
|
Subsets: []k8s.EndpointSubset{
|
|
{
|
|
Addresses: []k8s.EndpointAddress{
|
|
{
|
|
IP: "10.15.0.1",
|
|
},
|
|
},
|
|
Ports: []k8s.EndpointPort{
|
|
{
|
|
Name: "http",
|
|
Port: 8080,
|
|
},
|
|
{
|
|
Name: "https",
|
|
Port: 8443,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Addresses: []k8s.EndpointAddress{
|
|
{
|
|
IP: "10.15.0.2",
|
|
},
|
|
},
|
|
Ports: []k8s.EndpointPort{
|
|
{
|
|
Name: "http",
|
|
Port: 9080,
|
|
},
|
|
{
|
|
Name: "https",
|
|
Port: 9443,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
watchChan := make(chan interface{})
|
|
client := clientMock{
|
|
ingresses: ingresses,
|
|
services: services,
|
|
endpoints: endpoints,
|
|
watchChan: watchChan,
|
|
}
|
|
provider := Kubernetes{}
|
|
actual, err := provider.loadIngresses(client)
|
|
if err != nil {
|
|
t.Fatalf("error %+v", err)
|
|
}
|
|
|
|
expected := &types.Configuration{
|
|
Backends: map[string]*types.Backend{
|
|
"foo/bar": {
|
|
Servers: map[string]types.Server{
|
|
"http://10.10.0.1:8080": {
|
|
URL: "http://10.10.0.1:8080",
|
|
Weight: 1,
|
|
},
|
|
"http://10.21.0.1:8080": {
|
|
URL: "http://10.21.0.1:8080",
|
|
Weight: 1,
|
|
},
|
|
},
|
|
CircuitBreaker: nil,
|
|
LoadBalancer: nil,
|
|
},
|
|
"bar": {
|
|
Servers: map[string]types.Server{
|
|
"2": {
|
|
URL: "http://10.0.0.2:802",
|
|
Weight: 1,
|
|
},
|
|
"https://10.15.0.1:8443": {
|
|
URL: "https://10.15.0.1:8443",
|
|
Weight: 1,
|
|
},
|
|
"https://10.15.0.2:9443": {
|
|
URL: "https://10.15.0.2:9443",
|
|
Weight: 1,
|
|
},
|
|
},
|
|
CircuitBreaker: nil,
|
|
LoadBalancer: nil,
|
|
},
|
|
},
|
|
Frontends: map[string]*types.Frontend{
|
|
"foo/bar": {
|
|
Backend: "foo/bar",
|
|
PassHostHeader: true,
|
|
Priority: len("/bar"),
|
|
Routes: map[string]types.Route{
|
|
"/bar": {
|
|
Rule: "PathPrefix:/bar",
|
|
},
|
|
"foo": {
|
|
Rule: "Host:foo",
|
|
},
|
|
},
|
|
},
|
|
"bar": {
|
|
Backend: "bar",
|
|
PassHostHeader: true,
|
|
Routes: map[string]types.Route{
|
|
"bar": {
|
|
Rule: "Host:bar",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
actualJSON, _ := json.Marshal(actual)
|
|
expectedJSON, _ := json.Marshal(expected)
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Fatalf("expected %+v, got %+v", string(expectedJSON), string(actualJSON))
|
|
}
|
|
}
|
|
|
|
func TestRuleType(t *testing.T) {
|
|
ingresses := []k8s.Ingress{
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Annotations: map[string]string{"traefik.frontend.rule.type": "PathPrefixStrip"}, //camel case
|
|
},
|
|
Spec: k8s.IngressSpec{
|
|
Rules: []k8s.IngressRule{
|
|
{
|
|
Host: "foo1",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Path: "/bar1",
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service1",
|
|
ServicePort: k8s.FromInt(801),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Annotations: map[string]string{"traefik.frontend.rule.type": "path"}, //lower case
|
|
},
|
|
Spec: k8s.IngressSpec{
|
|
Rules: []k8s.IngressRule{
|
|
{
|
|
Host: "foo1",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Path: "/bar2",
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service1",
|
|
ServicePort: k8s.FromInt(801),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Annotations: map[string]string{"traefik.frontend.rule.type": "PathPrefix"}, //path prefix
|
|
},
|
|
Spec: k8s.IngressSpec{
|
|
Rules: []k8s.IngressRule{
|
|
{
|
|
Host: "foo2",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Path: "/bar1",
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service1",
|
|
ServicePort: k8s.FromInt(801),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Annotations: map[string]string{"traefik.frontend.rule.type": "PathStrip"}, //path strip
|
|
},
|
|
Spec: k8s.IngressSpec{
|
|
Rules: []k8s.IngressRule{
|
|
{
|
|
Host: "foo2",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Path: "/bar2",
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service1",
|
|
ServicePort: k8s.FromInt(801),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Annotations: map[string]string{"traefik.frontend.rule.type": "PathXXStrip"}, //wrong rule
|
|
},
|
|
Spec: k8s.IngressSpec{
|
|
Rules: []k8s.IngressRule{
|
|
{
|
|
Host: "foo1",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Path: "/bar3",
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service1",
|
|
ServicePort: k8s.FromInt(801),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
services := []k8s.Service{
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Name: "service1",
|
|
UID: "1",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.1",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Name: "http",
|
|
Port: 801,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
watchChan := make(chan interface{})
|
|
client := clientMock{
|
|
ingresses: ingresses,
|
|
services: services,
|
|
watchChan: watchChan,
|
|
}
|
|
provider := Kubernetes{DisablePassHostHeaders: true}
|
|
actualConfig, err := provider.loadIngresses(client)
|
|
actual := actualConfig.Frontends
|
|
if err != nil {
|
|
t.Fatalf("error %+v", err)
|
|
}
|
|
|
|
expected := map[string]*types.Frontend{
|
|
"foo1/bar1": {
|
|
Backend: "foo1/bar1",
|
|
Priority: len("/bar1"),
|
|
Routes: map[string]types.Route{
|
|
"/bar1": {
|
|
Rule: "PathPrefixStrip:/bar1",
|
|
},
|
|
"foo1": {
|
|
Rule: "Host:foo1",
|
|
},
|
|
},
|
|
},
|
|
"foo1/bar2": {
|
|
Backend: "foo1/bar2",
|
|
Priority: len("/bar2"),
|
|
Routes: map[string]types.Route{
|
|
"/bar2": {
|
|
Rule: "Path:/bar2",
|
|
},
|
|
"foo1": {
|
|
Rule: "Host:foo1",
|
|
},
|
|
},
|
|
},
|
|
"foo2/bar1": {
|
|
Backend: "foo2/bar1",
|
|
Priority: len("/bar1"),
|
|
Routes: map[string]types.Route{
|
|
"/bar1": {
|
|
Rule: "PathPrefix:/bar1",
|
|
},
|
|
"foo2": {
|
|
Rule: "Host:foo2",
|
|
},
|
|
},
|
|
},
|
|
"foo2/bar2": {
|
|
Backend: "foo2/bar2",
|
|
Priority: len("/bar2"),
|
|
Routes: map[string]types.Route{
|
|
"/bar2": {
|
|
Rule: "PathStrip:/bar2",
|
|
},
|
|
"foo2": {
|
|
Rule: "Host:foo2",
|
|
},
|
|
},
|
|
},
|
|
"foo1/bar3": {
|
|
Backend: "foo1/bar3",
|
|
Priority: len("/bar3"),
|
|
Routes: map[string]types.Route{
|
|
"/bar3": {
|
|
Rule: "PathPrefix:/bar3",
|
|
},
|
|
"foo1": {
|
|
Rule: "Host:foo1",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
actualJSON, _ := json.Marshal(actual)
|
|
expectedJSON, _ := json.Marshal(expected)
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Fatalf("expected %+v, got %+v", string(expectedJSON), string(actualJSON))
|
|
}
|
|
}
|
|
|
|
func TestGetPassHostHeader(t *testing.T) {
|
|
ingresses := []k8s.Ingress{{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Namespace: "awesome",
|
|
},
|
|
Spec: k8s.IngressSpec{
|
|
Rules: []k8s.IngressRule{
|
|
{
|
|
Host: "foo",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Path: "/bar",
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service1",
|
|
ServicePort: k8s.FromInt(801),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}}
|
|
services := []k8s.Service{
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Name: "service1",
|
|
Namespace: "awesome",
|
|
UID: "1",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.1",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Name: "http",
|
|
Port: 801,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
watchChan := make(chan interface{})
|
|
client := clientMock{
|
|
ingresses: ingresses,
|
|
services: services,
|
|
watchChan: watchChan,
|
|
}
|
|
provider := Kubernetes{DisablePassHostHeaders: true}
|
|
actual, err := provider.loadIngresses(client)
|
|
if err != nil {
|
|
t.Fatalf("error %+v", err)
|
|
}
|
|
|
|
expected := &types.Configuration{
|
|
Backends: map[string]*types.Backend{
|
|
"foo/bar": {
|
|
Servers: map[string]types.Server{
|
|
"1": {
|
|
URL: "http://10.0.0.1:801",
|
|
Weight: 1,
|
|
},
|
|
},
|
|
CircuitBreaker: nil,
|
|
LoadBalancer: nil,
|
|
},
|
|
},
|
|
Frontends: map[string]*types.Frontend{
|
|
"foo/bar": {
|
|
Backend: "foo/bar",
|
|
Priority: len("/bar"),
|
|
Routes: map[string]types.Route{
|
|
"/bar": {
|
|
Rule: "PathPrefix:/bar",
|
|
},
|
|
"foo": {
|
|
Rule: "Host:foo",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
actualJSON, _ := json.Marshal(actual)
|
|
expectedJSON, _ := json.Marshal(expected)
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Fatalf("expected %+v, got %+v", string(expectedJSON), string(actualJSON))
|
|
}
|
|
}
|
|
|
|
func TestOnlyReferencesServicesFromOwnNamespace(t *testing.T) {
|
|
ingresses := []k8s.Ingress{
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Namespace: "awesome",
|
|
},
|
|
Spec: k8s.IngressSpec{
|
|
Rules: []k8s.IngressRule{
|
|
{
|
|
Host: "foo",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service",
|
|
ServicePort: k8s.FromInt(80),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
services := []k8s.Service{
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Name: "service",
|
|
UID: "1",
|
|
Namespace: "awesome",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.1",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Name: "http",
|
|
Port: 80,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Name: "service",
|
|
UID: "2",
|
|
Namespace: "not-awesome",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.2",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Name: "http",
|
|
Port: 80,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
watchChan := make(chan interface{})
|
|
client := clientMock{
|
|
ingresses: ingresses,
|
|
services: services,
|
|
watchChan: watchChan,
|
|
}
|
|
provider := Kubernetes{}
|
|
actual, err := provider.loadIngresses(client)
|
|
if err != nil {
|
|
t.Fatalf("error %+v", err)
|
|
}
|
|
|
|
expected := &types.Configuration{
|
|
Backends: map[string]*types.Backend{
|
|
"foo": {
|
|
Servers: map[string]types.Server{
|
|
"1": {
|
|
URL: "http://10.0.0.1:80",
|
|
Weight: 1,
|
|
},
|
|
},
|
|
CircuitBreaker: nil,
|
|
LoadBalancer: nil,
|
|
},
|
|
},
|
|
Frontends: map[string]*types.Frontend{
|
|
"foo": {
|
|
Backend: "foo",
|
|
PassHostHeader: true,
|
|
Routes: map[string]types.Route{
|
|
"foo": {
|
|
Rule: "Host:foo",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
actualJSON, _ := json.Marshal(actual)
|
|
expectedJSON, _ := json.Marshal(expected)
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Fatalf("expected %+v, got %+v", string(expectedJSON), string(actualJSON))
|
|
}
|
|
}
|
|
|
|
func TestLoadNamespacedIngresses(t *testing.T) {
|
|
ingresses := []k8s.Ingress{
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Namespace: "awesome",
|
|
},
|
|
Spec: k8s.IngressSpec{
|
|
Rules: []k8s.IngressRule{
|
|
{
|
|
Host: "foo",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Path: "/bar",
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service1",
|
|
ServicePort: k8s.FromInt(801),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Host: "bar",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service3",
|
|
ServicePort: k8s.FromInt(443),
|
|
},
|
|
},
|
|
{
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service2",
|
|
ServicePort: k8s.FromInt(802),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Namespace: "not-awesome",
|
|
},
|
|
Spec: k8s.IngressSpec{
|
|
Rules: []k8s.IngressRule{
|
|
{
|
|
Host: "baz",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Path: "/baz",
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service1",
|
|
ServicePort: k8s.FromInt(801),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
services := []k8s.Service{
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Namespace: "awesome",
|
|
Name: "service1",
|
|
UID: "1",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.1",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Name: "http",
|
|
Port: 801,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Name: "service1",
|
|
Namespace: "not-awesome",
|
|
UID: "1",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.1",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Name: "http",
|
|
Port: 801,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Name: "service2",
|
|
Namespace: "awesome",
|
|
UID: "2",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.2",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Port: 802,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Name: "service3",
|
|
Namespace: "awesome",
|
|
UID: "3",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.3",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Name: "http",
|
|
Port: 443,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
watchChan := make(chan interface{})
|
|
client := clientMock{
|
|
ingresses: ingresses,
|
|
services: services,
|
|
watchChan: watchChan,
|
|
}
|
|
provider := Kubernetes{
|
|
Namespaces: []string{"awesome"},
|
|
}
|
|
actual, err := provider.loadIngresses(client)
|
|
if err != nil {
|
|
t.Fatalf("error %+v", err)
|
|
}
|
|
|
|
expected := &types.Configuration{
|
|
Backends: map[string]*types.Backend{
|
|
"foo/bar": {
|
|
Servers: map[string]types.Server{
|
|
"1": {
|
|
URL: "http://10.0.0.1:801",
|
|
Weight: 1,
|
|
},
|
|
},
|
|
CircuitBreaker: nil,
|
|
LoadBalancer: nil,
|
|
},
|
|
"bar": {
|
|
Servers: map[string]types.Server{
|
|
"2": {
|
|
URL: "http://10.0.0.2:802",
|
|
Weight: 1,
|
|
},
|
|
"3": {
|
|
URL: "https://10.0.0.3:443",
|
|
Weight: 1,
|
|
},
|
|
},
|
|
CircuitBreaker: nil,
|
|
LoadBalancer: nil,
|
|
},
|
|
},
|
|
Frontends: map[string]*types.Frontend{
|
|
"foo/bar": {
|
|
Backend: "foo/bar",
|
|
PassHostHeader: true,
|
|
Priority: len("/bar"),
|
|
Routes: map[string]types.Route{
|
|
"/bar": {
|
|
Rule: "PathPrefix:/bar",
|
|
},
|
|
"foo": {
|
|
Rule: "Host:foo",
|
|
},
|
|
},
|
|
},
|
|
"bar": {
|
|
Backend: "bar",
|
|
PassHostHeader: true,
|
|
Routes: map[string]types.Route{
|
|
"bar": {
|
|
Rule: "Host:bar",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
actualJSON, _ := json.Marshal(actual)
|
|
expectedJSON, _ := json.Marshal(expected)
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Fatalf("expected %+v, got %+v", string(expectedJSON), string(actualJSON))
|
|
}
|
|
}
|
|
|
|
func TestLoadMultipleNamespacedIngresses(t *testing.T) {
|
|
ingresses := []k8s.Ingress{
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Namespace: "awesome",
|
|
},
|
|
Spec: k8s.IngressSpec{
|
|
Rules: []k8s.IngressRule{
|
|
{
|
|
Host: "foo",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Path: "/bar",
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service1",
|
|
ServicePort: k8s.FromInt(801),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Host: "bar",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service3",
|
|
ServicePort: k8s.FromInt(443),
|
|
},
|
|
},
|
|
{
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service2",
|
|
ServicePort: k8s.FromInt(802),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Namespace: "somewhat-awesome",
|
|
},
|
|
Spec: k8s.IngressSpec{
|
|
Rules: []k8s.IngressRule{
|
|
{
|
|
Host: "awesome",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Path: "/quix",
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service1",
|
|
ServicePort: k8s.FromInt(801),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Namespace: "not-awesome",
|
|
},
|
|
Spec: k8s.IngressSpec{
|
|
Rules: []k8s.IngressRule{
|
|
{
|
|
Host: "baz",
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Path: "/baz",
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service1",
|
|
ServicePort: k8s.FromInt(801),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
services := []k8s.Service{
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Name: "service1",
|
|
Namespace: "awesome",
|
|
UID: "1",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.1",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Name: "http",
|
|
Port: 801,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Namespace: "somewhat-awesome",
|
|
Name: "service1",
|
|
UID: "17",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.4",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Name: "http",
|
|
Port: 801,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Namespace: "awesome",
|
|
Name: "service2",
|
|
UID: "2",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.2",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Port: 802,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Namespace: "awesome",
|
|
Name: "service3",
|
|
UID: "3",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.3",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Name: "http",
|
|
Port: 443,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
watchChan := make(chan interface{})
|
|
client := clientMock{
|
|
ingresses: ingresses,
|
|
services: services,
|
|
watchChan: watchChan,
|
|
}
|
|
provider := Kubernetes{
|
|
Namespaces: []string{"awesome", "somewhat-awesome"},
|
|
}
|
|
actual, err := provider.loadIngresses(client)
|
|
if err != nil {
|
|
t.Fatalf("error %+v", err)
|
|
}
|
|
|
|
expected := &types.Configuration{
|
|
Backends: map[string]*types.Backend{
|
|
"foo/bar": {
|
|
Servers: map[string]types.Server{
|
|
"1": {
|
|
URL: "http://10.0.0.1:801",
|
|
Weight: 1,
|
|
},
|
|
},
|
|
CircuitBreaker: nil,
|
|
LoadBalancer: nil,
|
|
},
|
|
"bar": {
|
|
Servers: map[string]types.Server{
|
|
"2": {
|
|
URL: "http://10.0.0.2:802",
|
|
Weight: 1,
|
|
},
|
|
"3": {
|
|
URL: "https://10.0.0.3:443",
|
|
Weight: 1,
|
|
},
|
|
},
|
|
CircuitBreaker: nil,
|
|
LoadBalancer: nil,
|
|
},
|
|
"awesome/quix": {
|
|
Servers: map[string]types.Server{
|
|
"17": {
|
|
URL: "http://10.0.0.4:801",
|
|
Weight: 1,
|
|
},
|
|
},
|
|
CircuitBreaker: nil,
|
|
LoadBalancer: nil,
|
|
},
|
|
},
|
|
Frontends: map[string]*types.Frontend{
|
|
"foo/bar": {
|
|
Backend: "foo/bar",
|
|
PassHostHeader: true,
|
|
Priority: len("/bar"),
|
|
Routes: map[string]types.Route{
|
|
"/bar": {
|
|
Rule: "PathPrefix:/bar",
|
|
},
|
|
"foo": {
|
|
Rule: "Host:foo",
|
|
},
|
|
},
|
|
},
|
|
"bar": {
|
|
Backend: "bar",
|
|
PassHostHeader: true,
|
|
Routes: map[string]types.Route{
|
|
"bar": {
|
|
Rule: "Host:bar",
|
|
},
|
|
},
|
|
},
|
|
"awesome/quix": {
|
|
Backend: "awesome/quix",
|
|
PassHostHeader: true,
|
|
Priority: len("/quix"),
|
|
Routes: map[string]types.Route{
|
|
"/quix": {
|
|
Rule: "PathPrefix:/quix",
|
|
},
|
|
"awesome": {
|
|
Rule: "Host:awesome",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
actualJSON, _ := json.Marshal(actual)
|
|
expectedJSON, _ := json.Marshal(expected)
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Fatalf("expected %+v, got %+v", string(expectedJSON), string(actualJSON))
|
|
}
|
|
}
|
|
|
|
func TestHostlessIngress(t *testing.T) {
|
|
ingresses := []k8s.Ingress{{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Namespace: "awesome",
|
|
},
|
|
Spec: k8s.IngressSpec{
|
|
Rules: []k8s.IngressRule{
|
|
{
|
|
IngressRuleValue: k8s.IngressRuleValue{
|
|
HTTP: &k8s.HTTPIngressRuleValue{
|
|
Paths: []k8s.HTTPIngressPath{
|
|
{
|
|
Path: "/bar",
|
|
Backend: k8s.IngressBackend{
|
|
ServiceName: "service1",
|
|
ServicePort: k8s.FromInt(801),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}}
|
|
services := []k8s.Service{
|
|
{
|
|
ObjectMeta: k8s.ObjectMeta{
|
|
Name: "service1",
|
|
Namespace: "awesome",
|
|
UID: "1",
|
|
},
|
|
Spec: k8s.ServiceSpec{
|
|
ClusterIP: "10.0.0.1",
|
|
Ports: []k8s.ServicePort{
|
|
{
|
|
Name: "http",
|
|
Port: 801,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
watchChan := make(chan interface{})
|
|
client := clientMock{
|
|
ingresses: ingresses,
|
|
services: services,
|
|
watchChan: watchChan,
|
|
}
|
|
provider := Kubernetes{DisablePassHostHeaders: true}
|
|
actual, err := provider.loadIngresses(client)
|
|
if err != nil {
|
|
t.Fatalf("error %+v", err)
|
|
}
|
|
|
|
expected := &types.Configuration{
|
|
Backends: map[string]*types.Backend{
|
|
"/bar": {
|
|
Servers: map[string]types.Server{
|
|
"1": {
|
|
URL: "http://10.0.0.1:801",
|
|
Weight: 1,
|
|
},
|
|
},
|
|
CircuitBreaker: nil,
|
|
LoadBalancer: nil,
|
|
},
|
|
},
|
|
Frontends: map[string]*types.Frontend{
|
|
"/bar": {
|
|
Backend: "/bar",
|
|
Priority: len("/bar"),
|
|
Routes: map[string]types.Route{
|
|
"/bar": {
|
|
Rule: "PathPrefix:/bar",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
actualJSON, _ := json.Marshal(actual)
|
|
expectedJSON, _ := json.Marshal(expected)
|
|
|
|
if !reflect.DeepEqual(actual, expected) {
|
|
t.Fatalf("expected %+v, got %+v", string(expectedJSON), string(actualJSON))
|
|
}
|
|
}
|
|
|
|
type clientMock struct {
|
|
ingresses []k8s.Ingress
|
|
services []k8s.Service
|
|
endpoints []k8s.Endpoints
|
|
watchChan chan interface{}
|
|
}
|
|
|
|
func (c clientMock) GetIngresses(labelString string, predicate func(k8s.Ingress) bool) ([]k8s.Ingress, error) {
|
|
var ingresses []k8s.Ingress
|
|
for _, ingress := range c.ingresses {
|
|
if predicate(ingress) {
|
|
ingresses = append(ingresses, ingress)
|
|
}
|
|
}
|
|
return ingresses, nil
|
|
}
|
|
func (c clientMock) WatchIngresses(labelString string, predicate func(k8s.Ingress) bool, stopCh <-chan bool) (chan interface{}, chan error, error) {
|
|
return c.watchChan, make(chan error), nil
|
|
}
|
|
func (c clientMock) GetService(name, namespace string) (k8s.Service, error) {
|
|
for _, service := range c.services {
|
|
if service.Namespace == namespace && service.Name == name {
|
|
return service, nil
|
|
}
|
|
}
|
|
return k8s.Service{}, nil
|
|
}
|
|
|
|
func (c clientMock) GetEndpoints(name, namespace string) (k8s.Endpoints, error) {
|
|
for _, endpoints := range c.endpoints {
|
|
if endpoints.Namespace == namespace && endpoints.Name == name {
|
|
return endpoints, nil
|
|
}
|
|
}
|
|
return k8s.Endpoints{}, nil
|
|
}
|
|
|
|
func (c clientMock) WatchAll(labelString string, stopCh <-chan bool) (chan interface{}, chan error, error) {
|
|
return c.watchChan, make(chan error), nil
|
|
}
|