2016-11-10 22:56:29 +00:00
|
|
|
/*
|
|
|
|
Copyright 2015 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package controller
|
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
|
|
|
|
2017-02-14 14:02:23 +00:00
|
|
|
"reflect"
|
|
|
|
|
2017-01-24 03:08:46 +00:00
|
|
|
"k8s.io/ingress/core/pkg/ingress"
|
|
|
|
"k8s.io/ingress/core/pkg/ingress/annotations/auth"
|
|
|
|
"k8s.io/ingress/core/pkg/ingress/annotations/authreq"
|
2017-02-06 18:16:36 +00:00
|
|
|
"k8s.io/ingress/core/pkg/ingress/annotations/authtls"
|
2017-01-24 03:08:46 +00:00
|
|
|
"k8s.io/ingress/core/pkg/ingress/annotations/ipwhitelist"
|
|
|
|
"k8s.io/ingress/core/pkg/ingress/annotations/proxy"
|
|
|
|
"k8s.io/ingress/core/pkg/ingress/annotations/ratelimit"
|
|
|
|
"k8s.io/ingress/core/pkg/ingress/annotations/rewrite"
|
2016-11-10 22:56:29 +00:00
|
|
|
)
|
|
|
|
|
2017-01-24 03:08:46 +00:00
|
|
|
type fakeError struct{}
|
|
|
|
|
|
|
|
func (fe *fakeError) Error() string {
|
|
|
|
return "fakeError"
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestIsHostValid(t *testing.T) {
|
|
|
|
fkCert := &ingress.SSLCert{
|
|
|
|
CAFileName: "foo",
|
|
|
|
PemFileName: "foo.cr",
|
|
|
|
PemSHA: "perha",
|
|
|
|
CN: []string{
|
|
|
|
"*.cluster.local", "default.local",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
fooTests := []struct {
|
|
|
|
cr *ingress.SSLCert
|
|
|
|
host string
|
|
|
|
er bool
|
|
|
|
}{
|
|
|
|
{nil, "foo1.cluster.local", false},
|
|
|
|
{fkCert, "foo1.cluster.local", true},
|
|
|
|
{fkCert, "default.local", true},
|
|
|
|
{fkCert, "foo2.cluster.local.t", false},
|
|
|
|
{fkCert, "", false},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, foo := range fooTests {
|
|
|
|
r := isHostValid(foo.host, foo.cr)
|
|
|
|
if r != foo.er {
|
|
|
|
t.Errorf("Returned %v but expected %v for foo=%v", r, foo.er, foo)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMatchHostnames(t *testing.T) {
|
|
|
|
fooTests := []struct {
|
|
|
|
pattern string
|
|
|
|
host string
|
|
|
|
er bool
|
|
|
|
}{
|
|
|
|
{"*.cluster.local.", "foo1.cluster.local.", true},
|
|
|
|
{"foo1.cluster.local.", "foo2.cluster.local.", false},
|
|
|
|
{"cluster.local.", "foo1.cluster.local.", false},
|
|
|
|
{".", "foo1.cluster.local.", false},
|
|
|
|
{"cluster.local.", ".", false},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, foo := range fooTests {
|
|
|
|
r := matchHostnames(foo.pattern, foo.host)
|
|
|
|
if r != foo.er {
|
|
|
|
t.Errorf("Returned %v but expected %v for foo=%v", r, foo.er, foo)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestMergeLocationAnnotations(t *testing.T) {
|
|
|
|
// initial parameters
|
|
|
|
loc := ingress.Location{}
|
|
|
|
annotations := map[string]interface{}{
|
|
|
|
"Path": "/checkpath",
|
|
|
|
"IsDefBackend": true,
|
|
|
|
"Backend": "foo_backend",
|
|
|
|
"BasicDigestAuth": auth.BasicDigest{},
|
|
|
|
DeniedKeyName: &fakeError{},
|
|
|
|
"EnableCORS": true,
|
|
|
|
"ExternalAuth": authreq.External{},
|
|
|
|
"RateLimit": ratelimit.RateLimit{},
|
|
|
|
"Redirect": rewrite.Redirect{},
|
|
|
|
"Whitelist": ipwhitelist.SourceRange{},
|
|
|
|
"Proxy": proxy.Configuration{},
|
2017-02-06 18:16:36 +00:00
|
|
|
"CertificateAuth": authtls.AuthSSLConfig{},
|
2017-01-24 03:08:46 +00:00
|
|
|
"UsePortInRedirects": true,
|
|
|
|
}
|
|
|
|
|
|
|
|
// create test table
|
|
|
|
type fooMergeLocationAnnotationsStruct struct {
|
|
|
|
fName string
|
|
|
|
er interface{}
|
|
|
|
}
|
|
|
|
fooTests := []fooMergeLocationAnnotationsStruct{}
|
|
|
|
for name, value := range annotations {
|
|
|
|
fva := fooMergeLocationAnnotationsStruct{name, value}
|
|
|
|
fooTests = append(fooTests, fva)
|
|
|
|
}
|
|
|
|
|
|
|
|
// execute test
|
|
|
|
mergeLocationAnnotations(&loc, annotations)
|
|
|
|
|
|
|
|
// check result
|
|
|
|
for _, foo := range fooTests {
|
|
|
|
fv := reflect.ValueOf(loc).FieldByName(foo.fName).Interface()
|
|
|
|
if !reflect.DeepEqual(fv, foo.er) {
|
|
|
|
t.Errorf("Returned %v but expected %v for the field %s", fv, foo.er, foo.fName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if _, ok := annotations[DeniedKeyName]; ok {
|
|
|
|
t.Errorf("%s should be removed after mergeLocationAnnotations", DeniedKeyName)
|
|
|
|
}
|
|
|
|
}
|