ingress-nginx-helm/test/e2e/tcpudp/tcp.go

207 lines
6.3 KiB
Go
Raw Normal View History

2018-11-16 20:33:56 +00:00
/*
Copyright 2018 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package settings
import (
2019-02-17 22:12:10 +00:00
"context"
2018-11-16 20:33:56 +00:00
"fmt"
2019-02-17 22:12:10 +00:00
"net"
"net/http"
2018-11-16 20:33:56 +00:00
"strings"
"time"
2018-11-16 20:33:56 +00:00
"github.com/onsi/ginkgo"
"github.com/stretchr/testify/assert"
2018-11-16 20:33:56 +00:00
corev1 "k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/util/intstr"
"k8s.io/apimachinery/pkg/util/wait"
2018-11-16 20:33:56 +00:00
"k8s.io/ingress-nginx/test/e2e/framework"
)
var _ = framework.IngressNginxDescribe("[TCP] tcp-services", func() {
2018-11-16 20:33:56 +00:00
f := framework.NewDefaultFramework("tcp")
ginkgo.It("should expose a TCP service", func() {
f.NewEchoDeployment()
2018-11-16 20:33:56 +00:00
config, err := f.KubeClientSet.
CoreV1().
ConfigMaps(f.Namespace).
Get(context.TODO(), "tcp-services", metav1.GetOptions{})
assert.Nil(ginkgo.GinkgoT(), err, "unexpected error obtaining tcp-services configmap")
assert.NotNil(ginkgo.GinkgoT(), config, "expected a configmap but none returned")
2018-11-16 20:33:56 +00:00
if config.Data == nil {
config.Data = map[string]string{}
}
config.Data["8080"] = fmt.Sprintf("%v/%v:80", f.Namespace, framework.EchoService)
2019-02-17 22:12:10 +00:00
2018-11-16 20:33:56 +00:00
_, err = f.KubeClientSet.
CoreV1().
ConfigMaps(f.Namespace).
Update(context.TODO(), config, metav1.UpdateOptions{})
assert.Nil(ginkgo.GinkgoT(), err, "unexpected error updating configmap")
2018-11-16 20:33:56 +00:00
svc, err := f.KubeClientSet.
CoreV1().
Services(f.Namespace).
Get(context.TODO(), "nginx-ingress-controller", metav1.GetOptions{})
assert.Nil(ginkgo.GinkgoT(), err, "unexpected error obtaining ingress-nginx service")
assert.NotNil(ginkgo.GinkgoT(), svc, "expected a service but none returned")
2018-11-16 20:33:56 +00:00
svc.Spec.Ports = append(svc.Spec.Ports, corev1.ServicePort{
Name: framework.EchoService,
2018-11-16 20:33:56 +00:00
Port: 8080,
TargetPort: intstr.FromInt(8080),
})
_, err = f.KubeClientSet.
CoreV1().
Services(f.Namespace).
Update(context.TODO(), svc, metav1.UpdateOptions{})
assert.Nil(ginkgo.GinkgoT(), err, "unexpected error updating service")
2018-11-16 20:33:56 +00:00
// wait for update and nginx reload and new endpoint is available
framework.Sleep()
2018-11-16 20:33:56 +00:00
f.WaitForNginxConfiguration(
func(cfg string) bool {
return strings.Contains(cfg, fmt.Sprintf(`ngx.var.proxy_upstream_name="tcp-%v-%v-80"`,
f.Namespace, framework.EchoService))
2018-11-16 20:33:56 +00:00
})
ip := f.GetNginxIP()
f.HTTPTestClient().
GET("/").
WithURL(fmt.Sprintf("http://%v:8080", ip)).
Expect().
Status(http.StatusOK)
2018-11-16 20:33:56 +00:00
})
2019-02-17 22:12:10 +00:00
ginkgo.It("should expose an ExternalName TCP service", func() {
2019-02-17 22:12:10 +00:00
// Setup:
// - Create an external name service for DNS lookups on port 5353. Point it to google's DNS server
// - Expose port 5353 on the nginx ingress NodePort service to open a hole for this test
// - Update the `tcp-services` configmap to proxy traffic to the configured external name service
// Create an external service for DNS
externalService := &corev1.Service{
ObjectMeta: metav1.ObjectMeta{
Name: "dns-external-name-svc",
Namespace: f.Namespace,
2019-02-17 22:12:10 +00:00
},
Spec: corev1.ServiceSpec{
ExternalName: "google-public-dns-a.google.com",
Ports: []corev1.ServicePort{
{
Name: "dns-external-name-svc",
Port: 5353,
TargetPort: intstr.FromInt(53),
},
},
Type: corev1.ServiceTypeExternalName,
},
}
f.EnsureService(externalService)
// Expose the `external name` port on the `ingress-nginx` service
svc, err := f.KubeClientSet.
CoreV1().
Services(f.Namespace).
Get(context.TODO(), "nginx-ingress-controller", metav1.GetOptions{})
assert.Nil(ginkgo.GinkgoT(), err, "unexpected error obtaining ingress-nginx service")
assert.NotNil(ginkgo.GinkgoT(), svc, "expected a service but none returned")
2019-02-17 22:12:10 +00:00
svc.Spec.Ports = append(svc.Spec.Ports, corev1.ServicePort{
Name: "dns-svc",
Port: 5353,
TargetPort: intstr.FromInt(5353),
})
_, err = f.KubeClientSet.
CoreV1().
Services(f.Namespace).
Update(context.TODO(), svc, metav1.UpdateOptions{})
assert.Nil(ginkgo.GinkgoT(), err, "unexpected error updating service")
2019-02-17 22:12:10 +00:00
// Update the TCP configmap to link port 5353 to the DNS external name service
config, err := f.KubeClientSet.
CoreV1().
ConfigMaps(f.Namespace).
Get(context.TODO(), "tcp-services", metav1.GetOptions{})
assert.Nil(ginkgo.GinkgoT(), err, "unexpected error obtaining tcp-services configmap")
assert.NotNil(ginkgo.GinkgoT(), config, "expected a configmap but none returned")
2019-02-17 22:12:10 +00:00
if config.Data == nil {
config.Data = map[string]string{}
}
config.Data["5353"] = fmt.Sprintf("%v/dns-external-name-svc:5353", f.Namespace)
2019-02-17 22:12:10 +00:00
_, err = f.KubeClientSet.
CoreV1().
ConfigMaps(f.Namespace).
Update(context.TODO(), config, metav1.UpdateOptions{})
assert.Nil(ginkgo.GinkgoT(), err, "unexpected error updating configmap")
2019-02-17 22:12:10 +00:00
// Validate that the generated nginx config contains the expected `proxy_upstream_name` value
f.WaitForNginxConfiguration(
func(cfg string) bool {
return strings.Contains(cfg, fmt.Sprintf(`ngx.var.proxy_upstream_name="tcp-%v-dns-external-name-svc-5353"`, f.Namespace))
2019-02-17 22:12:10 +00:00
})
// Execute the test. Use the `external name` service to resolve a domain name.
ip := f.GetNginxIP()
resolver := net.Resolver{
PreferGo: true,
Dial: func(ctx context.Context, network, address string) (net.Conn, error) {
d := net.Dialer{}
return d.DialContext(ctx, "tcp", fmt.Sprintf("%v:5353", ip))
2019-02-17 22:12:10 +00:00
},
}
// add retries to LookupHost to avoid random e2e errors
retry := wait.Backoff{
Steps: 10,
Duration: 2 * time.Second,
Factor: 0.8,
Jitter: 0.2,
}
var ips []string
var retryErr error
err = wait.ExponentialBackoff(retry, func() (bool, error) {
ips, retryErr = resolver.LookupHost(context.Background(), "google-public-dns-b.google.com")
if retryErr == nil {
return true, nil
}
return false, nil
})
if err == wait.ErrWaitTimeout {
err = retryErr
}
assert.Nil(ginkgo.GinkgoT(), err, "unexpected error from DNS resolver")
assert.Contains(ginkgo.GinkgoT(), ips, "8.8.4.4")
2019-02-17 22:12:10 +00:00
})
2018-11-16 20:33:56 +00:00
})