mirror of
https://github.com/alibaba/higress.git
synced 2026-03-11 20:20:55 +08:00
206 lines
5.6 KiB
Go
206 lines
5.6 KiB
Go
// Copyright Istio Authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
// Updated based on Istio codebase by Higress
|
|
|
|
package istio
|
|
|
|
import (
|
|
"testing"
|
|
"time"
|
|
|
|
. "github.com/onsi/gomega"
|
|
networking "istio.io/api/networking/v1alpha3"
|
|
"istio.io/istio/pilot/pkg/config/memory"
|
|
"istio.io/istio/pilot/pkg/model"
|
|
"istio.io/istio/pilot/pkg/networking/core/v1alpha3"
|
|
"istio.io/istio/pilot/pkg/serviceregistry/kube/controller"
|
|
"istio.io/istio/pilot/pkg/serviceregistry/util/xdsfake"
|
|
"istio.io/istio/pkg/config"
|
|
istioconst "istio.io/istio/pkg/config/constants"
|
|
"istio.io/istio/pkg/config/schema/collections"
|
|
"istio.io/istio/pkg/config/schema/gvk"
|
|
"istio.io/istio/pkg/kube"
|
|
"istio.io/istio/pkg/kube/kclient/clienttest"
|
|
"istio.io/istio/pkg/test"
|
|
"istio.io/istio/pkg/util/sets"
|
|
v1 "k8s.io/api/core/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
k8s "sigs.k8s.io/gateway-api/apis/v1alpha2"
|
|
k8sbeta "sigs.k8s.io/gateway-api/apis/v1beta1"
|
|
|
|
"github.com/alibaba/higress/pkg/config/constants"
|
|
)
|
|
|
|
var (
|
|
gatewayClassSpec = &k8s.GatewayClassSpec{
|
|
ControllerName: constants.ManagedGatewayController,
|
|
}
|
|
gatewaySpec = &k8s.GatewaySpec{
|
|
GatewayClassName: "gwclass",
|
|
Listeners: []k8s.Listener{
|
|
{
|
|
Name: "default",
|
|
Port: 9009,
|
|
Protocol: "HTTP",
|
|
AllowedRoutes: &k8s.AllowedRoutes{Namespaces: &k8s.RouteNamespaces{From: func() *k8s.FromNamespaces { x := k8sbeta.NamespacesFromAll; return &x }()}},
|
|
},
|
|
},
|
|
}
|
|
httpRouteSpec = &k8s.HTTPRouteSpec{
|
|
CommonRouteSpec: k8s.CommonRouteSpec{ParentRefs: []k8s.ParentReference{{
|
|
Name: "gwspec",
|
|
}}},
|
|
Hostnames: []k8s.Hostname{"test.cluster.local"},
|
|
}
|
|
|
|
expectedgw = &networking.Gateway{
|
|
Servers: []*networking.Server{
|
|
{
|
|
Port: &networking.Port{
|
|
Number: 9009,
|
|
Name: "default",
|
|
Protocol: "HTTP",
|
|
},
|
|
Hosts: []string{"*/*"},
|
|
},
|
|
},
|
|
}
|
|
)
|
|
|
|
var AlwaysReady = func(class schema.GroupVersionResource, stop <-chan struct{}) bool {
|
|
return true
|
|
}
|
|
|
|
func TestListInvalidGroupVersionKind(t *testing.T) {
|
|
g := NewWithT(t)
|
|
clientSet := kube.NewFakeClient()
|
|
store := memory.NewController(memory.Make(collections.All))
|
|
controller := NewController(clientSet, store, AlwaysReady, nil, controller.Options{})
|
|
|
|
typ := config.GroupVersionKind{Kind: "wrong-kind"}
|
|
c := controller.List(typ, "ns1")
|
|
g.Expect(c).To(HaveLen(0))
|
|
}
|
|
|
|
func TestListGatewayResourceType(t *testing.T) {
|
|
g := NewWithT(t)
|
|
|
|
clientSet := kube.NewFakeClient()
|
|
store := memory.NewController(memory.Make(collections.All))
|
|
controller := NewController(clientSet, store, AlwaysReady, nil, controller.Options{})
|
|
|
|
store.Create(config.Config{
|
|
Meta: config.Meta{
|
|
GroupVersionKind: gvk.GatewayClass,
|
|
Name: "gwclass",
|
|
Namespace: "ns1",
|
|
},
|
|
Spec: gatewayClassSpec,
|
|
})
|
|
if _, err := store.Create(config.Config{
|
|
Meta: config.Meta{
|
|
GroupVersionKind: gvk.KubernetesGateway,
|
|
Name: "gwspec",
|
|
Namespace: "ns1",
|
|
},
|
|
Spec: gatewaySpec,
|
|
}); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
store.Create(config.Config{
|
|
Meta: config.Meta{
|
|
GroupVersionKind: gvk.HTTPRoute,
|
|
Name: "http-route",
|
|
Namespace: "ns1",
|
|
},
|
|
Spec: httpRouteSpec,
|
|
})
|
|
|
|
cg := v1alpha3.NewConfigGenTest(t, v1alpha3.TestOptions{})
|
|
g.Expect(controller.Reconcile(cg.PushContext())).ToNot(HaveOccurred())
|
|
cfg := controller.List(gvk.Gateway, "ns1")
|
|
g.Expect(cfg).To(HaveLen(1))
|
|
for _, c := range cfg {
|
|
g.Expect(c.GroupVersionKind).To(Equal(gvk.Gateway))
|
|
g.Expect(c.Name).To(Equal("gwspec" + "-" + istioconst.KubernetesGatewayName + "-default"))
|
|
g.Expect(c.Namespace).To(Equal("ns1"))
|
|
g.Expect(c.Spec).To(Equal(expectedgw))
|
|
}
|
|
}
|
|
|
|
func TestNamespaceEvent(t *testing.T) {
|
|
clientSet := kube.NewFakeClient()
|
|
store := memory.NewController(memory.Make(collections.All))
|
|
c := NewController(clientSet, store, AlwaysReady, nil, controller.Options{})
|
|
s := xdsfake.NewFakeXDS()
|
|
|
|
c.RegisterEventHandler(gvk.Namespace, func(_, cfg config.Config, _ model.Event) {
|
|
s.ConfigUpdate(&model.PushRequest{
|
|
Full: true,
|
|
Reason: model.NewReasonStats(model.NamespaceUpdate),
|
|
})
|
|
})
|
|
|
|
stop := test.NewStop(t)
|
|
c.Run(stop)
|
|
kube.WaitForCacheSync("test", stop, c.HasSynced)
|
|
c.state.ReferencedNamespaceKeys = sets.String{"allowed": struct{}{}}
|
|
|
|
ns1 := &v1.Namespace{ObjectMeta: metav1.ObjectMeta{
|
|
Name: "ns1",
|
|
Labels: map[string]string{
|
|
"foo": "bar",
|
|
},
|
|
}}
|
|
ns2 := &v1.Namespace{ObjectMeta: metav1.ObjectMeta{
|
|
Name: "ns2",
|
|
Labels: map[string]string{
|
|
"allowed": "true",
|
|
},
|
|
}}
|
|
ns := clienttest.Wrap(t, c.namespaces)
|
|
|
|
ns.Create(ns1)
|
|
s.AssertEmpty(t, time.Millisecond*10)
|
|
|
|
ns.Create(ns2)
|
|
s.AssertEmpty(t, time.Millisecond*10)
|
|
|
|
ns1.Annotations = map[string]string{"foo": "bar"}
|
|
ns.Update(ns1)
|
|
s.AssertEmpty(t, time.Millisecond*10)
|
|
|
|
ns2.Annotations = map[string]string{"foo": "bar"}
|
|
ns.Update(ns2)
|
|
s.AssertEmpty(t, time.Millisecond*10)
|
|
|
|
ns1.Labels["bar"] = "foo"
|
|
ns.Update(ns1)
|
|
s.AssertEmpty(t, time.Millisecond*10)
|
|
|
|
ns2.Labels["foo"] = "bar"
|
|
ns.Update(ns2)
|
|
s.WaitOrFail(t, "xds full")
|
|
|
|
ns1.Labels["allowed"] = "true"
|
|
ns.Update(ns1)
|
|
s.WaitOrFail(t, "xds full")
|
|
|
|
ns2.Labels["allowed"] = "false"
|
|
ns.Update(ns2)
|
|
s.WaitOrFail(t, "xds full")
|
|
}
|