mirror of
https://github.com/containous/traefik.git
synced 2024-12-22 13:34:03 +03:00
225 lines
5.7 KiB
Go
225 lines
5.7 KiB
Go
package integration
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/json"
|
|
"errors"
|
|
"flag"
|
|
"fmt"
|
|
"io"
|
|
"net"
|
|
"net/http"
|
|
"os"
|
|
"path/filepath"
|
|
"regexp"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/pmezard/go-difflib/difflib"
|
|
"github.com/rs/zerolog/log"
|
|
"github.com/stretchr/testify/require"
|
|
"github.com/stretchr/testify/suite"
|
|
"github.com/traefik/traefik/v3/integration/try"
|
|
"github.com/traefik/traefik/v3/pkg/api"
|
|
)
|
|
|
|
var updateExpected = flag.Bool("update_expected", false, "Update expected files in testdata")
|
|
|
|
// K8sSuite tests suite.
|
|
type K8sSuite struct{ BaseSuite }
|
|
|
|
func TestK8sSuite(t *testing.T) {
|
|
suite.Run(t, new(K8sSuite))
|
|
}
|
|
|
|
func (s *K8sSuite) SetupSuite() {
|
|
s.BaseSuite.SetupSuite()
|
|
|
|
s.createComposeProject("k8s")
|
|
s.composeUp()
|
|
|
|
abs, err := filepath.Abs("./fixtures/k8s/config.skip/kubeconfig.yaml")
|
|
require.NoError(s.T(), err)
|
|
|
|
err = try.Do(60*time.Second, func() error {
|
|
_, err := os.Stat(abs)
|
|
return err
|
|
})
|
|
require.NoError(s.T(), err)
|
|
|
|
data, err := os.ReadFile(abs)
|
|
require.NoError(s.T(), err)
|
|
|
|
content := strings.ReplaceAll(string(data), "https://server:6443", fmt.Sprintf("https://%s", net.JoinHostPort(s.getComposeServiceIP("server"), "6443")))
|
|
|
|
err = os.WriteFile(abs, []byte(content), 0o644)
|
|
require.NoError(s.T(), err)
|
|
|
|
err = os.Setenv("KUBECONFIG", abs)
|
|
require.NoError(s.T(), err)
|
|
}
|
|
|
|
func (s *K8sSuite) TearDownSuite() {
|
|
s.BaseSuite.TearDownSuite()
|
|
|
|
generatedFiles := []string{
|
|
"./fixtures/k8s/config.skip/kubeconfig.yaml",
|
|
"./fixtures/k8s/config.skip/k3s.log",
|
|
"./fixtures/k8s/coredns.yaml",
|
|
"./fixtures/k8s/rolebindings.yaml",
|
|
"./fixtures/k8s/traefik.yaml",
|
|
"./fixtures/k8s/ccm.yaml",
|
|
}
|
|
|
|
for _, filename := range generatedFiles {
|
|
if err := os.Remove(filename); err != nil {
|
|
log.Warn().Err(err).Send()
|
|
}
|
|
}
|
|
}
|
|
|
|
func (s *K8sSuite) TestIngressConfiguration() {
|
|
s.traefikCmd(withConfigFile("fixtures/k8s_default.toml"))
|
|
|
|
s.testConfiguration("testdata/rawdata-ingress.json", "8080")
|
|
}
|
|
|
|
func (s *K8sSuite) TestIngressLabelSelector() {
|
|
s.traefikCmd(withConfigFile("fixtures/k8s_ingress_label_selector.toml"))
|
|
|
|
s.testConfiguration("testdata/rawdata-ingress-label-selector.json", "8080")
|
|
}
|
|
|
|
func (s *K8sSuite) TestCRDConfiguration() {
|
|
s.traefikCmd(withConfigFile("fixtures/k8s_crd.toml"))
|
|
|
|
s.testConfiguration("testdata/rawdata-crd.json", "8000")
|
|
}
|
|
|
|
func (s *K8sSuite) TestCRDLabelSelector() {
|
|
s.traefikCmd(withConfigFile("fixtures/k8s_crd_label_selector.toml"))
|
|
|
|
s.testConfiguration("testdata/rawdata-crd-label-selector.json", "8000")
|
|
}
|
|
|
|
func (s *K8sSuite) TestGatewayConfiguration() {
|
|
s.traefikCmd(withConfigFile("fixtures/k8s_gateway.toml"))
|
|
|
|
s.testConfiguration("testdata/rawdata-gateway.json", "8080")
|
|
}
|
|
|
|
func (s *K8sSuite) TestIngressclass() {
|
|
s.traefikCmd(withConfigFile("fixtures/k8s_ingressclass.toml"))
|
|
|
|
s.testConfiguration("testdata/rawdata-ingressclass.json", "8080")
|
|
}
|
|
|
|
func (s *K8sSuite) TestDisableIngressclassLookup() {
|
|
s.traefikCmd(withConfigFile("fixtures/k8s_ingressclass_disabled.toml"))
|
|
|
|
s.testConfiguration("testdata/rawdata-ingressclass-disabled.json", "8080")
|
|
}
|
|
|
|
func (s *K8sSuite) testConfiguration(path, apiPort string) {
|
|
err := try.GetRequest("http://127.0.0.1:"+apiPort+"/api/entrypoints", 20*time.Second, try.BodyContains(`"name":"web"`))
|
|
require.NoError(s.T(), err)
|
|
|
|
expectedJSON := filepath.FromSlash(path)
|
|
|
|
if *updateExpected {
|
|
fi, err := os.Create(expectedJSON)
|
|
require.NoError(s.T(), err)
|
|
err = fi.Close()
|
|
require.NoError(s.T(), err)
|
|
}
|
|
|
|
var buf bytes.Buffer
|
|
err = try.GetRequest("http://127.0.0.1:"+apiPort+"/api/rawdata", 1*time.Minute, try.StatusCodeIs(http.StatusOK), matchesConfig(expectedJSON, &buf))
|
|
|
|
if !*updateExpected {
|
|
require.NoError(s.T(), err)
|
|
return
|
|
}
|
|
|
|
if err != nil {
|
|
log.Info().Msgf("In file update mode, got expected error: %v", err)
|
|
}
|
|
|
|
var rtRepr api.RunTimeRepresentation
|
|
err = json.Unmarshal(buf.Bytes(), &rtRepr)
|
|
require.NoError(s.T(), err)
|
|
|
|
newJSON, err := json.MarshalIndent(rtRepr, "", "\t")
|
|
require.NoError(s.T(), err)
|
|
|
|
err = os.WriteFile(expectedJSON, newJSON, 0o644)
|
|
require.NoError(s.T(), err)
|
|
|
|
s.T().Fatal("We do not want a passing test in file update mode")
|
|
}
|
|
|
|
func matchesConfig(wantConfig string, buf *bytes.Buffer) try.ResponseCondition {
|
|
return func(res *http.Response) error {
|
|
body, err := io.ReadAll(res.Body)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to read response body: %w", err)
|
|
}
|
|
|
|
if err := res.Body.Close(); err != nil {
|
|
return err
|
|
}
|
|
|
|
var obtained api.RunTimeRepresentation
|
|
err = json.Unmarshal(body, &obtained)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if buf != nil {
|
|
buf.Reset()
|
|
if _, err := io.Copy(buf, bytes.NewReader(body)); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
got, err := json.MarshalIndent(obtained, "", "\t")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
expected, err := os.ReadFile(wantConfig)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// The pods IPs are dynamic, so we cannot predict them,
|
|
// which is why we have to ignore them in the comparison.
|
|
rxURL := regexp.MustCompile(`"(url|address)":\s+(".*")`)
|
|
sanitizedExpected := rxURL.ReplaceAll(bytes.TrimSpace(expected), []byte(`"$1": "XXXX"`))
|
|
sanitizedGot := rxURL.ReplaceAll(got, []byte(`"$1": "XXXX"`))
|
|
|
|
rxServerStatus := regexp.MustCompile(`"http://.*?":\s+(".*")`)
|
|
sanitizedExpected = rxServerStatus.ReplaceAll(sanitizedExpected, []byte(`"http://XXXX": $1`))
|
|
sanitizedGot = rxServerStatus.ReplaceAll(sanitizedGot, []byte(`"http://XXXX": $1`))
|
|
|
|
if bytes.Equal(sanitizedExpected, sanitizedGot) {
|
|
return nil
|
|
}
|
|
|
|
diff := difflib.UnifiedDiff{
|
|
FromFile: "Expected",
|
|
A: difflib.SplitLines(string(sanitizedExpected)),
|
|
ToFile: "Got",
|
|
B: difflib.SplitLines(string(sanitizedGot)),
|
|
Context: 3,
|
|
}
|
|
|
|
text, err := difflib.GetUnifiedDiffString(diff)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return errors.New(text)
|
|
}
|
|
}
|