prefect unit test cases for core.pkg.ingress.controller.util
This commit is contained in:
parent
8f9b71002b
commit
f5706d1d74
1 changed files with 111 additions and 0 deletions
|
@ -19,10 +19,25 @@ package controller
|
||||||
import (
|
import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"k8s.io/ingress/core/pkg/ingress"
|
||||||
|
"k8s.io/ingress/core/pkg/ingress/annotations/auth"
|
||||||
|
"k8s.io/ingress/core/pkg/ingress/annotations/authreq"
|
||||||
|
"k8s.io/ingress/core/pkg/ingress/annotations/ipwhitelist"
|
||||||
|
"k8s.io/ingress/core/pkg/ingress/annotations/proxy"
|
||||||
|
"k8s.io/ingress/core/pkg/ingress/annotations/ratelimit"
|
||||||
|
"k8s.io/ingress/core/pkg/ingress/annotations/rewrite"
|
||||||
|
"k8s.io/ingress/core/pkg/ingress/resolver"
|
||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
"k8s.io/kubernetes/pkg/apis/extensions"
|
"k8s.io/kubernetes/pkg/apis/extensions"
|
||||||
|
"reflect"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
type fakeError struct{}
|
||||||
|
|
||||||
|
func (fe *fakeError) Error() string {
|
||||||
|
return "fakeError"
|
||||||
|
}
|
||||||
|
|
||||||
func TestIsValidClass(t *testing.T) {
|
func TestIsValidClass(t *testing.T) {
|
||||||
ing := &extensions.Ingress{
|
ing := &extensions.Ingress{
|
||||||
ObjectMeta: api.ObjectMeta{
|
ObjectMeta: api.ObjectMeta{
|
||||||
|
@ -48,3 +63,99 @@ func TestIsValidClass(t *testing.T) {
|
||||||
t.Errorf("Expected invalid class but %v returned", b)
|
t.Errorf("Expected invalid class but %v returned", b)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestIsHostValid(t *testing.T) {
|
||||||
|
fkCert := &ingress.SSLCert{
|
||||||
|
CAFileName: "foo",
|
||||||
|
PemFileName: "foo.cr",
|
||||||
|
PemSHA: "perha",
|
||||||
|
CN: []string{
|
||||||
|
"*.cluster.local", "default.local",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
fooTests := []struct {
|
||||||
|
cr *ingress.SSLCert
|
||||||
|
host string
|
||||||
|
er bool
|
||||||
|
}{
|
||||||
|
{nil, "foo1.cluster.local", false},
|
||||||
|
{fkCert, "foo1.cluster.local", true},
|
||||||
|
{fkCert, "default.local", true},
|
||||||
|
{fkCert, "foo2.cluster.local.t", false},
|
||||||
|
{fkCert, "", false},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, foo := range fooTests {
|
||||||
|
r := isHostValid(foo.host, foo.cr)
|
||||||
|
if r != foo.er {
|
||||||
|
t.Errorf("Returned %v but expected %v for foo=%v", r, foo.er, foo)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestMatchHostnames(t *testing.T) {
|
||||||
|
fooTests := []struct {
|
||||||
|
pattern string
|
||||||
|
host string
|
||||||
|
er bool
|
||||||
|
}{
|
||||||
|
{"*.cluster.local.", "foo1.cluster.local.", true},
|
||||||
|
{"foo1.cluster.local.", "foo2.cluster.local.", false},
|
||||||
|
{"cluster.local.", "foo1.cluster.local.", false},
|
||||||
|
{".", "foo1.cluster.local.", false},
|
||||||
|
{"cluster.local.", ".", false},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, foo := range fooTests {
|
||||||
|
r := matchHostnames(foo.pattern, foo.host)
|
||||||
|
if r != foo.er {
|
||||||
|
t.Errorf("Returned %v but expected %v for foo=%v", r, foo.er, foo)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestMergeLocationAnnotations(t *testing.T) {
|
||||||
|
// initial parameters
|
||||||
|
loc := ingress.Location{}
|
||||||
|
annotations := map[string]interface{}{
|
||||||
|
"Path": "/checkpath",
|
||||||
|
"IsDefBackend": true,
|
||||||
|
"Backend": "foo_backend",
|
||||||
|
"BasicDigestAuth": auth.BasicDigest{},
|
||||||
|
DeniedKeyName: &fakeError{},
|
||||||
|
"EnableCORS": true,
|
||||||
|
"ExternalAuth": authreq.External{},
|
||||||
|
"RateLimit": ratelimit.RateLimit{},
|
||||||
|
"Redirect": rewrite.Redirect{},
|
||||||
|
"Whitelist": ipwhitelist.SourceRange{},
|
||||||
|
"Proxy": proxy.Configuration{},
|
||||||
|
"CertificateAuth": resolver.AuthSSLCert{},
|
||||||
|
"UsePortInRedirects": true,
|
||||||
|
}
|
||||||
|
|
||||||
|
// create test table
|
||||||
|
type fooMergeLocationAnnotationsStruct struct {
|
||||||
|
fName string
|
||||||
|
er interface{}
|
||||||
|
}
|
||||||
|
fooTests := []fooMergeLocationAnnotationsStruct{}
|
||||||
|
for name, value := range annotations {
|
||||||
|
fva := fooMergeLocationAnnotationsStruct{name, value}
|
||||||
|
fooTests = append(fooTests, fva)
|
||||||
|
}
|
||||||
|
|
||||||
|
// execute test
|
||||||
|
mergeLocationAnnotations(&loc, annotations)
|
||||||
|
|
||||||
|
// check result
|
||||||
|
for _, foo := range fooTests {
|
||||||
|
fv := reflect.ValueOf(loc).FieldByName(foo.fName).Interface()
|
||||||
|
if !reflect.DeepEqual(fv, foo.er) {
|
||||||
|
t.Errorf("Returned %v but expected %v for the field %s", fv, foo.er, foo.fName)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if _, ok := annotations[DeniedKeyName]; ok {
|
||||||
|
t.Errorf("%s should be removed after mergeLocationAnnotations", DeniedKeyName)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
Loading…
Reference in a new issue