mirror of https://github.com/kubernetes/kops.git
autogen: update vendor
This commit is contained in:
parent
63b991795c
commit
12d2f2439c
|
@ -0,0 +1,116 @@
|
||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package apitesting
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"mime"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
runtimeserializer "k8s.io/apimachinery/pkg/runtime/serializer"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/serializer/recognizer"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
testCodecMediaType string
|
||||||
|
testStorageCodecMediaType string
|
||||||
|
)
|
||||||
|
|
||||||
|
// TestCodec returns the codec for the API version to test against, as set by the
|
||||||
|
// KUBE_TEST_API_TYPE env var.
|
||||||
|
func TestCodec(codecs runtimeserializer.CodecFactory, gvs ...schema.GroupVersion) runtime.Codec {
|
||||||
|
if len(testCodecMediaType) != 0 {
|
||||||
|
serializerInfo, ok := runtime.SerializerInfoForMediaType(codecs.SupportedMediaTypes(), testCodecMediaType)
|
||||||
|
if !ok {
|
||||||
|
panic(fmt.Sprintf("no serializer for %s", testCodecMediaType))
|
||||||
|
}
|
||||||
|
return codecs.CodecForVersions(serializerInfo.Serializer, codecs.UniversalDeserializer(), schema.GroupVersions(gvs), nil)
|
||||||
|
}
|
||||||
|
return codecs.LegacyCodec(gvs...)
|
||||||
|
}
|
||||||
|
|
||||||
|
// TestStorageCodec returns the codec for the API version to test against used in storage, as set by the
|
||||||
|
// KUBE_TEST_API_STORAGE_TYPE env var.
|
||||||
|
func TestStorageCodec(codecs runtimeserializer.CodecFactory, gvs ...schema.GroupVersion) runtime.Codec {
|
||||||
|
if len(testStorageCodecMediaType) != 0 {
|
||||||
|
serializerInfo, ok := runtime.SerializerInfoForMediaType(codecs.SupportedMediaTypes(), testStorageCodecMediaType)
|
||||||
|
if !ok {
|
||||||
|
panic(fmt.Sprintf("no serializer for %s", testStorageCodecMediaType))
|
||||||
|
}
|
||||||
|
|
||||||
|
// etcd2 only supports string data - we must wrap any result before returning
|
||||||
|
// TODO: remove for etcd3 / make parameterizable
|
||||||
|
serializer := serializerInfo.Serializer
|
||||||
|
if !serializerInfo.EncodesAsText {
|
||||||
|
serializer = runtime.NewBase64Serializer(serializer, serializer)
|
||||||
|
}
|
||||||
|
|
||||||
|
decoder := recognizer.NewDecoder(serializer, codecs.UniversalDeserializer())
|
||||||
|
return codecs.CodecForVersions(serializer, decoder, schema.GroupVersions(gvs), nil)
|
||||||
|
|
||||||
|
}
|
||||||
|
return codecs.LegacyCodec(gvs...)
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
var err error
|
||||||
|
if apiMediaType := os.Getenv("KUBE_TEST_API_TYPE"); len(apiMediaType) > 0 {
|
||||||
|
testCodecMediaType, _, err = mime.ParseMediaType(apiMediaType)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if storageMediaType := os.Getenv("KUBE_TEST_API_STORAGE_TYPE"); len(storageMediaType) > 0 {
|
||||||
|
testStorageCodecMediaType, _, err = mime.ParseMediaType(storageMediaType)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// InstallOrDieFunc mirrors install functions that require success
|
||||||
|
type InstallOrDieFunc func(scheme *runtime.Scheme)
|
||||||
|
|
||||||
|
// SchemeForInstallOrDie builds a simple test scheme and codecfactory pair for easy unit testing from higher level install methods
|
||||||
|
func SchemeForInstallOrDie(installFns ...InstallOrDieFunc) (*runtime.Scheme, runtimeserializer.CodecFactory) {
|
||||||
|
scheme := runtime.NewScheme()
|
||||||
|
codecFactory := runtimeserializer.NewCodecFactory(scheme)
|
||||||
|
for _, installFn := range installFns {
|
||||||
|
installFn(scheme)
|
||||||
|
}
|
||||||
|
|
||||||
|
return scheme, codecFactory
|
||||||
|
}
|
||||||
|
|
||||||
|
// InstallFunc mirrors install functions that can return an error
|
||||||
|
type InstallFunc func(scheme *runtime.Scheme) error
|
||||||
|
|
||||||
|
// SchemeForOrDie builds a simple test scheme and codecfactory pair for easy unit testing from the bare registration methods.
|
||||||
|
func SchemeForOrDie(installFns ...InstallFunc) (*runtime.Scheme, runtimeserializer.CodecFactory) {
|
||||||
|
scheme := runtime.NewScheme()
|
||||||
|
codecFactory := runtimeserializer.NewCodecFactory(scheme)
|
||||||
|
for _, installFn := range installFns {
|
||||||
|
if err := installFn(scheme); err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return scheme, codecFactory
|
||||||
|
}
|
|
@ -0,0 +1,73 @@
|
||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package fuzzer
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"math/rand"
|
||||||
|
|
||||||
|
"sigs.k8s.io/randfill"
|
||||||
|
|
||||||
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
runtimeserializer "k8s.io/apimachinery/pkg/runtime/serializer"
|
||||||
|
kjson "k8s.io/apimachinery/pkg/util/json"
|
||||||
|
)
|
||||||
|
|
||||||
|
// FuzzerFuncs returns a list of func(*SomeType, c randfill.Continue) functions.
|
||||||
|
type FuzzerFuncs func(codecs runtimeserializer.CodecFactory) []interface{}
|
||||||
|
|
||||||
|
// FuzzerFor can randomly populate api objects that are destined for version.
|
||||||
|
func FuzzerFor(funcs FuzzerFuncs, src rand.Source, codecs runtimeserializer.CodecFactory) *randfill.Filler {
|
||||||
|
f := randfill.New().NilChance(.5).NumElements(0, 1)
|
||||||
|
if src != nil {
|
||||||
|
f.RandSource(src)
|
||||||
|
}
|
||||||
|
f.Funcs(funcs(codecs)...)
|
||||||
|
return f
|
||||||
|
}
|
||||||
|
|
||||||
|
// MergeFuzzerFuncs will merge the given funcLists, overriding early funcs with later ones if there first
|
||||||
|
// argument has the same type.
|
||||||
|
func MergeFuzzerFuncs(funcs ...FuzzerFuncs) FuzzerFuncs {
|
||||||
|
return FuzzerFuncs(func(codecs runtimeserializer.CodecFactory) []interface{} {
|
||||||
|
result := []interface{}{}
|
||||||
|
for _, f := range funcs {
|
||||||
|
if f != nil {
|
||||||
|
result = append(result, f(codecs)...)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return result
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func NormalizeJSONRawExtension(ext *runtime.RawExtension) {
|
||||||
|
if json.Valid(ext.Raw) {
|
||||||
|
// RawExtension->JSON encodes struct fields in field index order while map[string]interface{}->JSON encodes
|
||||||
|
// struct fields (i.e. keys in the map) lexicographically. We have to sort the fields here to ensure the
|
||||||
|
// JSON in the (RawExtension->)JSON->map[string]interface{}->JSON round trip results in identical JSON.
|
||||||
|
var u any
|
||||||
|
err := kjson.Unmarshal(ext.Raw, &u)
|
||||||
|
if err != nil {
|
||||||
|
panic(fmt.Sprintf("Failed to encode object: %v", err))
|
||||||
|
}
|
||||||
|
ext.Raw, err = kjson.Marshal(&u)
|
||||||
|
if err != nil {
|
||||||
|
panic(fmt.Sprintf("Failed to encode object: %v", err))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,86 @@
|
||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package fuzzer
|
||||||
|
|
||||||
|
import (
|
||||||
|
"reflect"
|
||||||
|
)
|
||||||
|
|
||||||
|
// ValueFuzz recursively changes all basic type values in an object. Any kind of references will not
|
||||||
|
// be touch, i.e. the addresses of slices, maps, pointers will stay unchanged.
|
||||||
|
func ValueFuzz(obj interface{}) {
|
||||||
|
valueFuzz(reflect.ValueOf(obj))
|
||||||
|
}
|
||||||
|
|
||||||
|
func valueFuzz(obj reflect.Value) {
|
||||||
|
switch obj.Kind() {
|
||||||
|
case reflect.Array:
|
||||||
|
for i := 0; i < obj.Len(); i++ {
|
||||||
|
valueFuzz(obj.Index(i))
|
||||||
|
}
|
||||||
|
case reflect.Slice:
|
||||||
|
if obj.IsNil() {
|
||||||
|
// TODO: set non-nil value
|
||||||
|
} else {
|
||||||
|
for i := 0; i < obj.Len(); i++ {
|
||||||
|
valueFuzz(obj.Index(i))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
case reflect.Interface, reflect.Pointer:
|
||||||
|
if obj.IsNil() {
|
||||||
|
// TODO: set non-nil value
|
||||||
|
} else {
|
||||||
|
valueFuzz(obj.Elem())
|
||||||
|
}
|
||||||
|
case reflect.Struct:
|
||||||
|
for i, n := 0, obj.NumField(); i < n; i++ {
|
||||||
|
valueFuzz(obj.Field(i))
|
||||||
|
}
|
||||||
|
case reflect.Map:
|
||||||
|
if obj.IsNil() {
|
||||||
|
// TODO: set non-nil value
|
||||||
|
} else {
|
||||||
|
for _, k := range obj.MapKeys() {
|
||||||
|
// map values are not addressable. We need a copy.
|
||||||
|
v := obj.MapIndex(k)
|
||||||
|
copy := reflect.New(v.Type())
|
||||||
|
copy.Elem().Set(v)
|
||||||
|
valueFuzz(copy.Elem())
|
||||||
|
obj.SetMapIndex(k, copy.Elem())
|
||||||
|
}
|
||||||
|
// TODO: set some new value
|
||||||
|
}
|
||||||
|
case reflect.Func: // ignore, we don't have function types in our API
|
||||||
|
default:
|
||||||
|
if !obj.CanSet() {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
switch obj.Kind() {
|
||||||
|
case reflect.String:
|
||||||
|
obj.SetString(obj.String() + "x")
|
||||||
|
case reflect.Bool:
|
||||||
|
obj.SetBool(!obj.Bool())
|
||||||
|
case reflect.Float32, reflect.Float64:
|
||||||
|
obj.SetFloat(obj.Float()*2.0 + 1.0)
|
||||||
|
case reflect.Int8, reflect.Int16, reflect.Int32, reflect.Int64, reflect.Int:
|
||||||
|
obj.SetInt(obj.Int() + 1)
|
||||||
|
case reflect.Uint8, reflect.Uint16, reflect.Uint32, reflect.Uint64, reflect.Uint:
|
||||||
|
obj.SetUint(obj.Uint() + 1)
|
||||||
|
default:
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
529
vendor/k8s.io/apimachinery/pkg/api/apitesting/roundtrip/compatibility.go
generated
vendored
Normal file
529
vendor/k8s.io/apimachinery/pkg/api/apitesting/roundtrip/compatibility.go
generated
vendored
Normal file
|
@ -0,0 +1,529 @@
|
||||||
|
/*
|
||||||
|
Copyright 2019 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package roundtrip
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
gojson "encoding/json"
|
||||||
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
"path/filepath"
|
||||||
|
"reflect"
|
||||||
|
"sort"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/google/go-cmp/cmp" //nolint:depguard
|
||||||
|
|
||||||
|
apiequality "k8s.io/apimachinery/pkg/api/equality"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/serializer/json"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/serializer/protobuf"
|
||||||
|
"k8s.io/apimachinery/pkg/util/sets"
|
||||||
|
)
|
||||||
|
|
||||||
|
// CompatibilityTestOptions holds configuration for running a compatibility test using in-memory objects
|
||||||
|
// and serialized files on disk representing the current code and serialized data from previous versions.
|
||||||
|
//
|
||||||
|
// Example use: `NewCompatibilityTestOptions(scheme).Complete(t).Run(t)`
|
||||||
|
type CompatibilityTestOptions struct {
|
||||||
|
// Scheme is used to create new objects for filling, decoding, and for constructing serializers.
|
||||||
|
// Required.
|
||||||
|
Scheme *runtime.Scheme
|
||||||
|
|
||||||
|
// TestDataDir points to a directory containing compatibility test data.
|
||||||
|
// Complete() populates this with "testdata" if unset.
|
||||||
|
TestDataDir string
|
||||||
|
|
||||||
|
// TestDataDirCurrentVersion points to a directory containing compatibility test data for the current version.
|
||||||
|
// Complete() populates this with "<TestDataDir>/HEAD" if unset.
|
||||||
|
// Within this directory, `<group>.<version>.<kind>.[json|yaml|pb]` files are required to exist, and are:
|
||||||
|
// * verified to match serialized FilledObjects[GVK]
|
||||||
|
// * verified to decode without error
|
||||||
|
// * verified to round-trip byte-for-byte when re-encoded
|
||||||
|
// * verified to be semantically equal when decoded into memory
|
||||||
|
TestDataDirCurrentVersion string
|
||||||
|
|
||||||
|
// TestDataDirsPreviousVersions is a list of directories containing compatibility test data for previous versions.
|
||||||
|
// Complete() populates this with "<TestDataDir>/v*" directories if nil.
|
||||||
|
// Within these directories, `<group>.<version>.<kind>.[json|yaml|pb]` files are optional. If present, they are:
|
||||||
|
// * verified to decode without error
|
||||||
|
// * verified to round-trip byte-for-byte when re-encoded (or to match a `<group>.<version>.<kind>.[json|yaml|pb].after_roundtrip.[json|yaml|pb]` file if it exists)
|
||||||
|
// * verified to be semantically equal when decoded into memory
|
||||||
|
TestDataDirsPreviousVersions []string
|
||||||
|
|
||||||
|
// Kinds is a list of fully qualified kinds to test.
|
||||||
|
// Complete() populates this with Scheme.AllKnownTypes() if unset.
|
||||||
|
Kinds []schema.GroupVersionKind
|
||||||
|
|
||||||
|
// FilledObjects is an optional set of pre-filled objects to use for verifying HEAD fixtures.
|
||||||
|
// Complete() populates this with the result of CompatibilityTestObject(Kinds[*], Scheme, FillFuncs) for any missing kinds.
|
||||||
|
// Objects must deterministically populate every field and be identical on every invocation.
|
||||||
|
FilledObjects map[schema.GroupVersionKind]runtime.Object
|
||||||
|
|
||||||
|
// FillFuncs is an optional map of custom functions to use to fill instances of particular types.
|
||||||
|
FillFuncs map[reflect.Type]FillFunc
|
||||||
|
|
||||||
|
JSON runtime.Serializer
|
||||||
|
YAML runtime.Serializer
|
||||||
|
Proto runtime.Serializer
|
||||||
|
}
|
||||||
|
|
||||||
|
// FillFunc is a function that populates all serializable fields in obj.
|
||||||
|
// s and i are string and integer values relevant to the object being populated
|
||||||
|
// (for example, the json key or protobuf tag containing the object)
|
||||||
|
// that can be used when filling the object to make the object content identifiable
|
||||||
|
type FillFunc func(s string, i int, obj interface{})
|
||||||
|
|
||||||
|
func NewCompatibilityTestOptions(scheme *runtime.Scheme) *CompatibilityTestOptions {
|
||||||
|
return &CompatibilityTestOptions{Scheme: scheme}
|
||||||
|
}
|
||||||
|
|
||||||
|
// coreKinds includes kinds that typically only need to be tested in a single API group
|
||||||
|
var coreKinds = sets.NewString(
|
||||||
|
"CreateOptions", "UpdateOptions", "PatchOptions", "DeleteOptions",
|
||||||
|
"GetOptions", "ListOptions", "ExportOptions",
|
||||||
|
"WatchEvent",
|
||||||
|
)
|
||||||
|
|
||||||
|
func (c *CompatibilityTestOptions) Complete(t *testing.T) *CompatibilityTestOptions {
|
||||||
|
t.Helper()
|
||||||
|
|
||||||
|
// Verify scheme
|
||||||
|
if c.Scheme == nil {
|
||||||
|
t.Fatal("scheme is required")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Populate testdata dirs
|
||||||
|
if c.TestDataDir == "" {
|
||||||
|
c.TestDataDir = "testdata"
|
||||||
|
}
|
||||||
|
if c.TestDataDirCurrentVersion == "" {
|
||||||
|
c.TestDataDirCurrentVersion = filepath.Join(c.TestDataDir, "HEAD")
|
||||||
|
}
|
||||||
|
if c.TestDataDirsPreviousVersions == nil {
|
||||||
|
dirs, err := filepath.Glob(filepath.Join(c.TestDataDir, "v*"))
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
sort.Strings(dirs)
|
||||||
|
c.TestDataDirsPreviousVersions = dirs
|
||||||
|
}
|
||||||
|
|
||||||
|
// Populate kinds
|
||||||
|
if len(c.Kinds) == 0 {
|
||||||
|
gvks := []schema.GroupVersionKind{}
|
||||||
|
for gvk := range c.Scheme.AllKnownTypes() {
|
||||||
|
if gvk.Version == "" || gvk.Version == runtime.APIVersionInternal {
|
||||||
|
// only test external types
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if strings.HasSuffix(gvk.Kind, "List") {
|
||||||
|
// omit list types
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if gvk.Group != "" && coreKinds.Has(gvk.Kind) {
|
||||||
|
// only test options types in the core API group
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
gvks = append(gvks, gvk)
|
||||||
|
}
|
||||||
|
c.Kinds = gvks
|
||||||
|
}
|
||||||
|
|
||||||
|
// Sort kinds to get deterministic test order
|
||||||
|
sort.Slice(c.Kinds, func(i, j int) bool {
|
||||||
|
if c.Kinds[i].Group != c.Kinds[j].Group {
|
||||||
|
return c.Kinds[i].Group < c.Kinds[j].Group
|
||||||
|
}
|
||||||
|
if c.Kinds[i].Version != c.Kinds[j].Version {
|
||||||
|
return c.Kinds[i].Version < c.Kinds[j].Version
|
||||||
|
}
|
||||||
|
if c.Kinds[i].Kind != c.Kinds[j].Kind {
|
||||||
|
return c.Kinds[i].Kind < c.Kinds[j].Kind
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
})
|
||||||
|
|
||||||
|
// Fill any missing objects
|
||||||
|
if c.FilledObjects == nil {
|
||||||
|
c.FilledObjects = map[schema.GroupVersionKind]runtime.Object{}
|
||||||
|
}
|
||||||
|
fillFuncs := defaultFillFuncs()
|
||||||
|
for k, v := range c.FillFuncs {
|
||||||
|
fillFuncs[k] = v
|
||||||
|
}
|
||||||
|
for _, gvk := range c.Kinds {
|
||||||
|
if _, ok := c.FilledObjects[gvk]; ok {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
obj, err := CompatibilityTestObject(c.Scheme, gvk, fillFuncs)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
c.FilledObjects[gvk] = obj
|
||||||
|
}
|
||||||
|
|
||||||
|
if c.JSON == nil {
|
||||||
|
c.JSON = json.NewSerializerWithOptions(json.DefaultMetaFactory, c.Scheme, c.Scheme, json.SerializerOptions{Pretty: true})
|
||||||
|
}
|
||||||
|
if c.YAML == nil {
|
||||||
|
c.YAML = json.NewSerializerWithOptions(json.DefaultMetaFactory, c.Scheme, c.Scheme, json.SerializerOptions{Yaml: true})
|
||||||
|
}
|
||||||
|
if c.Proto == nil {
|
||||||
|
c.Proto = protobuf.NewSerializer(c.Scheme, c.Scheme)
|
||||||
|
}
|
||||||
|
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *CompatibilityTestOptions) Run(t *testing.T) {
|
||||||
|
usedHEADFixtures := sets.NewString()
|
||||||
|
|
||||||
|
for _, gvk := range c.Kinds {
|
||||||
|
t.Run(makeName(gvk), func(t *testing.T) {
|
||||||
|
|
||||||
|
t.Run("HEAD", func(t *testing.T) {
|
||||||
|
c.runCurrentVersionTest(t, gvk, usedHEADFixtures)
|
||||||
|
})
|
||||||
|
|
||||||
|
for _, previousVersionDir := range c.TestDataDirsPreviousVersions {
|
||||||
|
t.Run(filepath.Base(previousVersionDir), func(t *testing.T) {
|
||||||
|
c.runPreviousVersionTest(t, gvk, previousVersionDir, nil)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check for unused HEAD fixtures
|
||||||
|
t.Run("unused_fixtures", func(t *testing.T) {
|
||||||
|
files, err := os.ReadDir(c.TestDataDirCurrentVersion)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
allFixtures := sets.NewString()
|
||||||
|
for _, file := range files {
|
||||||
|
allFixtures.Insert(file.Name())
|
||||||
|
}
|
||||||
|
|
||||||
|
if unused := allFixtures.Difference(usedHEADFixtures); len(unused) > 0 {
|
||||||
|
t.Fatalf("remove unused fixtures from %s:\n%s", c.TestDataDirCurrentVersion, strings.Join(unused.List(), "\n"))
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *CompatibilityTestOptions) runCurrentVersionTest(t *testing.T, gvk schema.GroupVersionKind, usedFiles sets.String) {
|
||||||
|
expectedObject := c.FilledObjects[gvk]
|
||||||
|
expectedJSON, expectedYAML, expectedProto := c.encode(t, expectedObject)
|
||||||
|
|
||||||
|
actualJSON, actualYAML, actualProto, err := read(c.TestDataDirCurrentVersion, gvk, "", usedFiles)
|
||||||
|
if err != nil && !os.IsNotExist(err) {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
needsUpdate := false
|
||||||
|
if os.IsNotExist(err) {
|
||||||
|
t.Errorf("current version compatibility files did not exist: %v", err)
|
||||||
|
needsUpdate = true
|
||||||
|
} else {
|
||||||
|
if !bytes.Equal(expectedJSON, actualJSON) {
|
||||||
|
t.Errorf("json differs")
|
||||||
|
t.Log(cmp.Diff(string(actualJSON), string(expectedJSON)))
|
||||||
|
needsUpdate = true
|
||||||
|
}
|
||||||
|
|
||||||
|
if !bytes.Equal(expectedYAML, actualYAML) {
|
||||||
|
t.Errorf("yaml differs")
|
||||||
|
t.Log(cmp.Diff(string(actualYAML), string(expectedYAML)))
|
||||||
|
needsUpdate = true
|
||||||
|
}
|
||||||
|
|
||||||
|
if !bytes.Equal(expectedProto, actualProto) {
|
||||||
|
t.Errorf("proto differs")
|
||||||
|
needsUpdate = true
|
||||||
|
t.Log(cmp.Diff(dumpProto(t, actualProto[4:]), dumpProto(t, expectedProto[4:])))
|
||||||
|
// t.Logf("json (for locating the offending field based on surrounding data): %s", string(expectedJSON))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if needsUpdate {
|
||||||
|
const updateEnvVar = "UPDATE_COMPATIBILITY_FIXTURE_DATA"
|
||||||
|
if os.Getenv(updateEnvVar) == "true" {
|
||||||
|
writeFile(t, c.TestDataDirCurrentVersion, gvk, "", "json", expectedJSON)
|
||||||
|
writeFile(t, c.TestDataDirCurrentVersion, gvk, "", "yaml", expectedYAML)
|
||||||
|
writeFile(t, c.TestDataDirCurrentVersion, gvk, "", "pb", expectedProto)
|
||||||
|
t.Logf("wrote expected compatibility data... verify, commit, and rerun tests")
|
||||||
|
} else {
|
||||||
|
t.Logf("if the diff is expected because of a new type or a new field, re-run with %s=true to update the compatibility data", updateEnvVar)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
emptyObj, err := c.Scheme.New(gvk)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
{
|
||||||
|
// compact before decoding since embedded RawExtension fields retain indenting
|
||||||
|
compacted := &bytes.Buffer{}
|
||||||
|
if err := gojson.Compact(compacted, actualJSON); err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
jsonDecoded := emptyObj.DeepCopyObject()
|
||||||
|
jsonDecoded, _, err = c.JSON.Decode(compacted.Bytes(), &gvk, jsonDecoded)
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
} else if !apiequality.Semantic.DeepEqual(expectedObject, jsonDecoded) {
|
||||||
|
t.Errorf("expected and decoded json objects differed:\n%s", cmp.Diff(expectedObject, jsonDecoded))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
{
|
||||||
|
yamlDecoded := emptyObj.DeepCopyObject()
|
||||||
|
yamlDecoded, _, err = c.YAML.Decode(actualYAML, &gvk, yamlDecoded)
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
} else if !apiequality.Semantic.DeepEqual(expectedObject, yamlDecoded) {
|
||||||
|
t.Errorf("expected and decoded yaml objects differed:\n%s", cmp.Diff(expectedObject, yamlDecoded))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
{
|
||||||
|
protoDecoded := emptyObj.DeepCopyObject()
|
||||||
|
protoDecoded, _, err = c.Proto.Decode(actualProto, &gvk, protoDecoded)
|
||||||
|
if err != nil {
|
||||||
|
t.Error(err)
|
||||||
|
} else if !apiequality.Semantic.DeepEqual(expectedObject, protoDecoded) {
|
||||||
|
t.Errorf("expected and decoded proto objects differed:\n%s", cmp.Diff(expectedObject, protoDecoded))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *CompatibilityTestOptions) encode(t *testing.T, obj runtime.Object) (json, yaml, proto []byte) {
|
||||||
|
jsonBytes := bytes.NewBuffer(nil)
|
||||||
|
if err := c.JSON.Encode(obj, jsonBytes); err != nil {
|
||||||
|
t.Fatalf("error encoding json: %v", err)
|
||||||
|
}
|
||||||
|
yamlBytes := bytes.NewBuffer(nil)
|
||||||
|
if err := c.YAML.Encode(obj, yamlBytes); err != nil {
|
||||||
|
t.Fatalf("error encoding yaml: %v", err)
|
||||||
|
}
|
||||||
|
protoBytes := bytes.NewBuffer(nil)
|
||||||
|
if err := c.Proto.Encode(obj, protoBytes); err != nil {
|
||||||
|
t.Fatalf("error encoding proto: %v", err)
|
||||||
|
}
|
||||||
|
return jsonBytes.Bytes(), yamlBytes.Bytes(), protoBytes.Bytes()
|
||||||
|
}
|
||||||
|
|
||||||
|
func read(dir string, gvk schema.GroupVersionKind, suffix string, usedFiles sets.String) (json, yaml, proto []byte, err error) {
|
||||||
|
jsonFilename := makeName(gvk) + suffix + ".json"
|
||||||
|
actualJSON, jsonErr := ioutil.ReadFile(filepath.Join(dir, jsonFilename))
|
||||||
|
yamlFilename := makeName(gvk) + suffix + ".yaml"
|
||||||
|
actualYAML, yamlErr := ioutil.ReadFile(filepath.Join(dir, yamlFilename))
|
||||||
|
protoFilename := makeName(gvk) + suffix + ".pb"
|
||||||
|
actualProto, protoErr := ioutil.ReadFile(filepath.Join(dir, protoFilename))
|
||||||
|
if usedFiles != nil {
|
||||||
|
usedFiles.Insert(jsonFilename)
|
||||||
|
usedFiles.Insert(yamlFilename)
|
||||||
|
usedFiles.Insert(protoFilename)
|
||||||
|
}
|
||||||
|
if jsonErr != nil {
|
||||||
|
return actualJSON, actualYAML, actualProto, jsonErr
|
||||||
|
}
|
||||||
|
if yamlErr != nil {
|
||||||
|
return actualJSON, actualYAML, actualProto, yamlErr
|
||||||
|
}
|
||||||
|
if protoErr != nil {
|
||||||
|
return actualJSON, actualYAML, actualProto, protoErr
|
||||||
|
}
|
||||||
|
return actualJSON, actualYAML, actualProto, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func writeFile(t *testing.T, dir string, gvk schema.GroupVersionKind, suffix, extension string, data []byte) {
|
||||||
|
if err := os.MkdirAll(dir, os.FileMode(0755)); err != nil {
|
||||||
|
t.Fatal("error making directory", err)
|
||||||
|
}
|
||||||
|
if err := ioutil.WriteFile(filepath.Join(dir, makeName(gvk)+suffix+"."+extension), data, os.FileMode(0644)); err != nil {
|
||||||
|
t.Fatalf("error writing %s: %v", extension, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func deleteFile(t *testing.T, dir string, gvk schema.GroupVersionKind, suffix, extension string) {
|
||||||
|
if err := os.Remove(filepath.Join(dir, makeName(gvk)+suffix+"."+extension)); err != nil {
|
||||||
|
t.Fatalf("error removing %s: %v", extension, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *CompatibilityTestOptions) runPreviousVersionTest(t *testing.T, gvk schema.GroupVersionKind, previousVersionDir string, usedFiles sets.String) {
|
||||||
|
jsonBeforeRoundTrip, yamlBeforeRoundTrip, protoBeforeRoundTrip, err := read(previousVersionDir, gvk, "", usedFiles)
|
||||||
|
if os.IsNotExist(err) || (len(jsonBeforeRoundTrip) == 0 && len(yamlBeforeRoundTrip) == 0 && len(protoBeforeRoundTrip) == 0) {
|
||||||
|
t.SkipNow()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
emptyObj, err := c.Scheme.New(gvk)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// compact before decoding since embedded RawExtension fields retain indenting
|
||||||
|
compacted := &bytes.Buffer{}
|
||||||
|
if err := gojson.Compact(compacted, jsonBeforeRoundTrip); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
jsonDecoded := emptyObj.DeepCopyObject()
|
||||||
|
jsonDecoded, _, err = c.JSON.Decode(compacted.Bytes(), &gvk, jsonDecoded)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
jsonBytes := bytes.NewBuffer(nil)
|
||||||
|
if err := c.JSON.Encode(jsonDecoded, jsonBytes); err != nil {
|
||||||
|
t.Fatalf("error encoding json: %v", err)
|
||||||
|
}
|
||||||
|
jsonAfterRoundTrip := jsonBytes.Bytes()
|
||||||
|
|
||||||
|
yamlDecoded := emptyObj.DeepCopyObject()
|
||||||
|
yamlDecoded, _, err = c.YAML.Decode(yamlBeforeRoundTrip, &gvk, yamlDecoded)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
} else if !apiequality.Semantic.DeepEqual(jsonDecoded, yamlDecoded) {
|
||||||
|
t.Errorf("decoded json and yaml objects differ:\n%s", cmp.Diff(jsonDecoded, yamlDecoded))
|
||||||
|
}
|
||||||
|
yamlBytes := bytes.NewBuffer(nil)
|
||||||
|
if err := c.YAML.Encode(yamlDecoded, yamlBytes); err != nil {
|
||||||
|
t.Fatalf("error encoding yaml: %v", err)
|
||||||
|
}
|
||||||
|
yamlAfterRoundTrip := yamlBytes.Bytes()
|
||||||
|
|
||||||
|
protoDecoded := emptyObj.DeepCopyObject()
|
||||||
|
protoDecoded, _, err = c.Proto.Decode(protoBeforeRoundTrip, &gvk, protoDecoded)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
} else if !apiequality.Semantic.DeepEqual(jsonDecoded, protoDecoded) {
|
||||||
|
t.Errorf("decoded json and proto objects differ:\n%s", cmp.Diff(jsonDecoded, protoDecoded))
|
||||||
|
}
|
||||||
|
protoBytes := bytes.NewBuffer(nil)
|
||||||
|
if err := c.Proto.Encode(protoDecoded, protoBytes); err != nil {
|
||||||
|
t.Fatalf("error encoding proto: %v", err)
|
||||||
|
}
|
||||||
|
protoAfterRoundTrip := protoBytes.Bytes()
|
||||||
|
|
||||||
|
jsonNeedsRemove := false
|
||||||
|
yamlNeedsRemove := false
|
||||||
|
protoNeedsRemove := false
|
||||||
|
|
||||||
|
expectedJSONAfterRoundTrip, expectedYAMLAfterRoundTrip, expectedProtoAfterRoundTrip, _ := read(previousVersionDir, gvk, ".after_roundtrip", usedFiles)
|
||||||
|
if len(expectedJSONAfterRoundTrip) == 0 {
|
||||||
|
expectedJSONAfterRoundTrip = jsonBeforeRoundTrip
|
||||||
|
} else if bytes.Equal(jsonBeforeRoundTrip, expectedJSONAfterRoundTrip) {
|
||||||
|
t.Errorf("JSON after_roundtrip file is identical and should be removed")
|
||||||
|
jsonNeedsRemove = true
|
||||||
|
}
|
||||||
|
if len(expectedYAMLAfterRoundTrip) == 0 {
|
||||||
|
expectedYAMLAfterRoundTrip = yamlBeforeRoundTrip
|
||||||
|
} else if bytes.Equal(yamlBeforeRoundTrip, expectedYAMLAfterRoundTrip) {
|
||||||
|
t.Errorf("YAML after_roundtrip file is identical and should be removed")
|
||||||
|
yamlNeedsRemove = true
|
||||||
|
}
|
||||||
|
if len(expectedProtoAfterRoundTrip) == 0 {
|
||||||
|
expectedProtoAfterRoundTrip = protoBeforeRoundTrip
|
||||||
|
} else if bytes.Equal(protoBeforeRoundTrip, expectedProtoAfterRoundTrip) {
|
||||||
|
t.Errorf("Proto after_roundtrip file is identical and should be removed")
|
||||||
|
protoNeedsRemove = true
|
||||||
|
}
|
||||||
|
|
||||||
|
jsonNeedsUpdate := false
|
||||||
|
yamlNeedsUpdate := false
|
||||||
|
protoNeedsUpdate := false
|
||||||
|
|
||||||
|
if !bytes.Equal(expectedJSONAfterRoundTrip, jsonAfterRoundTrip) {
|
||||||
|
t.Errorf("json differs")
|
||||||
|
t.Log(cmp.Diff(string(expectedJSONAfterRoundTrip), string(jsonAfterRoundTrip)))
|
||||||
|
jsonNeedsUpdate = true
|
||||||
|
}
|
||||||
|
|
||||||
|
if !bytes.Equal(expectedYAMLAfterRoundTrip, yamlAfterRoundTrip) {
|
||||||
|
t.Errorf("yaml differs")
|
||||||
|
t.Log(cmp.Diff(string(expectedYAMLAfterRoundTrip), string(yamlAfterRoundTrip)))
|
||||||
|
yamlNeedsUpdate = true
|
||||||
|
}
|
||||||
|
|
||||||
|
if !bytes.Equal(expectedProtoAfterRoundTrip, protoAfterRoundTrip) {
|
||||||
|
t.Errorf("proto differs")
|
||||||
|
protoNeedsUpdate = true
|
||||||
|
t.Log(cmp.Diff(dumpProto(t, expectedProtoAfterRoundTrip[4:]), dumpProto(t, protoAfterRoundTrip[4:])))
|
||||||
|
// t.Logf("json (for locating the offending field based on surrounding data): %s", string(expectedJSON))
|
||||||
|
}
|
||||||
|
|
||||||
|
if jsonNeedsUpdate || yamlNeedsUpdate || protoNeedsUpdate || jsonNeedsRemove || yamlNeedsRemove || protoNeedsRemove {
|
||||||
|
const updateEnvVar = "UPDATE_COMPATIBILITY_FIXTURE_DATA"
|
||||||
|
if os.Getenv(updateEnvVar) == "true" {
|
||||||
|
if jsonNeedsUpdate {
|
||||||
|
writeFile(t, previousVersionDir, gvk, ".after_roundtrip", "json", jsonAfterRoundTrip)
|
||||||
|
} else if jsonNeedsRemove {
|
||||||
|
deleteFile(t, previousVersionDir, gvk, ".after_roundtrip", "json")
|
||||||
|
}
|
||||||
|
|
||||||
|
if yamlNeedsUpdate {
|
||||||
|
writeFile(t, previousVersionDir, gvk, ".after_roundtrip", "yaml", yamlAfterRoundTrip)
|
||||||
|
} else if yamlNeedsRemove {
|
||||||
|
deleteFile(t, previousVersionDir, gvk, ".after_roundtrip", "yaml")
|
||||||
|
}
|
||||||
|
|
||||||
|
if protoNeedsUpdate {
|
||||||
|
writeFile(t, previousVersionDir, gvk, ".after_roundtrip", "pb", protoAfterRoundTrip)
|
||||||
|
} else if protoNeedsRemove {
|
||||||
|
deleteFile(t, previousVersionDir, gvk, ".after_roundtrip", "pb")
|
||||||
|
}
|
||||||
|
t.Logf("wrote expected compatibility data... verify, commit, and rerun tests")
|
||||||
|
} else {
|
||||||
|
t.Logf("if the diff is expected because of a new type or a new field, re-run with %s=true to update the compatibility data", updateEnvVar)
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func makeName(gvk schema.GroupVersionKind) string {
|
||||||
|
g := gvk.Group
|
||||||
|
if g == "" {
|
||||||
|
g = "core"
|
||||||
|
}
|
||||||
|
return g + "." + gvk.Version + "." + gvk.Kind
|
||||||
|
}
|
||||||
|
|
||||||
|
func dumpProto(t *testing.T, data []byte) string {
|
||||||
|
t.Helper()
|
||||||
|
protoc, err := exec.LookPath("protoc")
|
||||||
|
if err != nil {
|
||||||
|
t.Log(err)
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
cmd := exec.Command(protoc, "--decode_raw")
|
||||||
|
cmd.Stdin = bytes.NewBuffer(data)
|
||||||
|
d, err := cmd.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
t.Log(err)
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
return string(d)
|
||||||
|
}
|
191
vendor/k8s.io/apimachinery/pkg/api/apitesting/roundtrip/construct.go
generated
vendored
Normal file
191
vendor/k8s.io/apimachinery/pkg/api/apitesting/roundtrip/construct.go
generated
vendored
Normal file
|
@ -0,0 +1,191 @@
|
||||||
|
/*
|
||||||
|
Copyright 2022 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package roundtrip
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"reflect"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
apimeta "k8s.io/apimachinery/pkg/api/meta"
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
"k8s.io/apimachinery/pkg/util/intstr"
|
||||||
|
)
|
||||||
|
|
||||||
|
func defaultFillFuncs() map[reflect.Type]FillFunc {
|
||||||
|
funcs := map[reflect.Type]FillFunc{}
|
||||||
|
funcs[reflect.TypeOf(&runtime.RawExtension{})] = func(s string, i int, obj interface{}) {
|
||||||
|
// generate a raw object in normalized form
|
||||||
|
// TODO: test non-normalized round-tripping... YAMLToJSON normalizes and makes exact comparisons fail
|
||||||
|
obj.(*runtime.RawExtension).Raw = []byte(`{"apiVersion":"example.com/v1","kind":"CustomType","spec":{"replicas":1},"status":{"available":1}}`)
|
||||||
|
}
|
||||||
|
funcs[reflect.TypeOf(&metav1.TypeMeta{})] = func(s string, i int, obj interface{}) {
|
||||||
|
// APIVersion and Kind are not serialized in all formats (notably protobuf), so clear by default for cross-format checking.
|
||||||
|
obj.(*metav1.TypeMeta).APIVersion = ""
|
||||||
|
obj.(*metav1.TypeMeta).Kind = ""
|
||||||
|
}
|
||||||
|
funcs[reflect.TypeOf(&metav1.FieldsV1{})] = func(s string, i int, obj interface{}) {
|
||||||
|
obj.(*metav1.FieldsV1).Raw = []byte(`{}`)
|
||||||
|
}
|
||||||
|
funcs[reflect.TypeOf(&metav1.Time{})] = func(s string, i int, obj interface{}) {
|
||||||
|
// use the integer as an offset from the year
|
||||||
|
obj.(*metav1.Time).Time = time.Date(2000+i, 1, 1, 1, 1, 1, 0, time.UTC)
|
||||||
|
}
|
||||||
|
funcs[reflect.TypeOf(&metav1.MicroTime{})] = func(s string, i int, obj interface{}) {
|
||||||
|
// use the integer as an offset from the year, and as a microsecond
|
||||||
|
obj.(*metav1.MicroTime).Time = time.Date(2000+i, 1, 1, 1, 1, 1, i*int(time.Microsecond), time.UTC)
|
||||||
|
}
|
||||||
|
funcs[reflect.TypeOf(&intstr.IntOrString{})] = func(s string, i int, obj interface{}) {
|
||||||
|
// use the string as a string value
|
||||||
|
obj.(*intstr.IntOrString).Type = intstr.String
|
||||||
|
obj.(*intstr.IntOrString).StrVal = s + "Value"
|
||||||
|
}
|
||||||
|
return funcs
|
||||||
|
}
|
||||||
|
|
||||||
|
// CompatibilityTestObject returns a deterministically filled object for the specified GVK
|
||||||
|
func CompatibilityTestObject(scheme *runtime.Scheme, gvk schema.GroupVersionKind, fillFuncs map[reflect.Type]FillFunc) (runtime.Object, error) {
|
||||||
|
// Construct the object
|
||||||
|
obj, err := scheme.New(gvk)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
fill("", 0, reflect.TypeOf(obj), reflect.ValueOf(obj), fillFuncs, map[reflect.Type]bool{})
|
||||||
|
|
||||||
|
// Set the kind and apiVersion
|
||||||
|
if typeAcc, err := apimeta.TypeAccessor(obj); err != nil {
|
||||||
|
return nil, err
|
||||||
|
} else {
|
||||||
|
typeAcc.SetKind(gvk.Kind)
|
||||||
|
typeAcc.SetAPIVersion(gvk.GroupVersion().String())
|
||||||
|
}
|
||||||
|
|
||||||
|
return obj, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func fill(dataString string, dataInt int, t reflect.Type, v reflect.Value, fillFuncs map[reflect.Type]FillFunc, filledTypes map[reflect.Type]bool) {
|
||||||
|
if filledTypes[t] {
|
||||||
|
// we already filled this type, avoid recursing infinitely
|
||||||
|
return
|
||||||
|
}
|
||||||
|
filledTypes[t] = true
|
||||||
|
defer delete(filledTypes, t)
|
||||||
|
|
||||||
|
// if nil, populate pointers with a zero-value instance of the underlying type
|
||||||
|
if t.Kind() == reflect.Pointer && v.IsNil() {
|
||||||
|
if v.CanSet() {
|
||||||
|
v.Set(reflect.New(t.Elem()))
|
||||||
|
} else if v.IsNil() {
|
||||||
|
panic(fmt.Errorf("unsettable nil pointer of type %v in field %s", t, dataString))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if f, ok := fillFuncs[t]; ok {
|
||||||
|
// use the custom fill function for this type
|
||||||
|
f(dataString, dataInt, v.Interface())
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
switch t.Kind() {
|
||||||
|
case reflect.Slice:
|
||||||
|
// populate with a single-item slice
|
||||||
|
v.Set(reflect.MakeSlice(t, 1, 1))
|
||||||
|
// recurse to populate the item, preserving the data context
|
||||||
|
if t.Elem().Kind() == reflect.Pointer {
|
||||||
|
fill(dataString, dataInt, t.Elem(), v.Index(0), fillFuncs, filledTypes)
|
||||||
|
} else {
|
||||||
|
fill(dataString, dataInt, reflect.PointerTo(t.Elem()), v.Index(0).Addr(), fillFuncs, filledTypes)
|
||||||
|
}
|
||||||
|
|
||||||
|
case reflect.Map:
|
||||||
|
// construct the key, which must be a string type, possibly converted to a type alias of string
|
||||||
|
key := reflect.ValueOf(dataString + "Key").Convert(t.Key())
|
||||||
|
// construct a zero-value item
|
||||||
|
item := reflect.New(t.Elem())
|
||||||
|
// recurse to populate the item, preserving the data context
|
||||||
|
fill(dataString, dataInt, t.Elem(), item.Elem(), fillFuncs, filledTypes)
|
||||||
|
// store in the map
|
||||||
|
v.Set(reflect.MakeMap(t))
|
||||||
|
v.SetMapIndex(key, item.Elem())
|
||||||
|
|
||||||
|
case reflect.Struct:
|
||||||
|
for i := 0; i < t.NumField(); i++ {
|
||||||
|
field := t.Field(i)
|
||||||
|
|
||||||
|
if !field.IsExported() {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// use the json field name, which must be stable
|
||||||
|
dataString := strings.Split(field.Tag.Get("json"), ",")[0]
|
||||||
|
if dataString == "-" {
|
||||||
|
// unserialized field, no need to fill it
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if len(dataString) == 0 {
|
||||||
|
// fall back to the struct field name if there is no json field name
|
||||||
|
dataString = "<no json tag> " + field.Name
|
||||||
|
}
|
||||||
|
|
||||||
|
// use the protobuf tag, which must be stable
|
||||||
|
dataInt := 0
|
||||||
|
if protobufTagParts := strings.Split(field.Tag.Get("protobuf"), ","); len(protobufTagParts) > 1 {
|
||||||
|
if tag, err := strconv.Atoi(protobufTagParts[1]); err != nil {
|
||||||
|
panic(err)
|
||||||
|
} else {
|
||||||
|
dataInt = tag
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if dataInt == 0 {
|
||||||
|
// fall back to the length of dataString as a backup
|
||||||
|
dataInt = -len(dataString)
|
||||||
|
}
|
||||||
|
|
||||||
|
fieldType := field.Type
|
||||||
|
fieldValue := v.Field(i)
|
||||||
|
|
||||||
|
fill(dataString, dataInt, reflect.PointerTo(fieldType), fieldValue.Addr(), fillFuncs, filledTypes)
|
||||||
|
}
|
||||||
|
|
||||||
|
case reflect.Pointer:
|
||||||
|
fill(dataString, dataInt, t.Elem(), v.Elem(), fillFuncs, filledTypes)
|
||||||
|
|
||||||
|
case reflect.String:
|
||||||
|
// use Convert to set into string alias types correctly
|
||||||
|
v.Set(reflect.ValueOf(dataString + "Value").Convert(t))
|
||||||
|
|
||||||
|
case reflect.Bool:
|
||||||
|
// set to true to ensure we serialize omitempty fields
|
||||||
|
v.Set(reflect.ValueOf(true).Convert(t))
|
||||||
|
|
||||||
|
case reflect.Int8, reflect.Int16, reflect.Int32, reflect.Int64, reflect.Uint8, reflect.Uint16, reflect.Uint32, reflect.Uint64:
|
||||||
|
// use Convert to set into int alias types and different int widths correctly
|
||||||
|
v.Set(reflect.ValueOf(dataInt).Convert(t))
|
||||||
|
|
||||||
|
case reflect.Float32, reflect.Float64:
|
||||||
|
// use Convert to set into float types
|
||||||
|
v.Set(reflect.ValueOf(float32(dataInt) + 0.5).Convert(t))
|
||||||
|
|
||||||
|
default:
|
||||||
|
panic(fmt.Errorf("unhandled type %v in field %s", t, dataString))
|
||||||
|
}
|
||||||
|
}
|
23
vendor/k8s.io/apimachinery/pkg/api/apitesting/roundtrip/fuzz_norace.go
generated
vendored
Normal file
23
vendor/k8s.io/apimachinery/pkg/api/apitesting/roundtrip/fuzz_norace.go
generated
vendored
Normal file
|
@ -0,0 +1,23 @@
|
||||||
|
//go:build !race
|
||||||
|
// +build !race
|
||||||
|
|
||||||
|
/*
|
||||||
|
Copyright 2021 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package roundtrip
|
||||||
|
|
||||||
|
// in non-race-detection mode, a higher number of iterations is reasonable
|
||||||
|
const defaultFuzzIters = 20
|
23
vendor/k8s.io/apimachinery/pkg/api/apitesting/roundtrip/fuzz_race.go
generated
vendored
Normal file
23
vendor/k8s.io/apimachinery/pkg/api/apitesting/roundtrip/fuzz_race.go
generated
vendored
Normal file
|
@ -0,0 +1,23 @@
|
||||||
|
//go:build race
|
||||||
|
// +build race
|
||||||
|
|
||||||
|
/*
|
||||||
|
Copyright 2021 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package roundtrip
|
||||||
|
|
||||||
|
// in race-detection mode, lower the number of iterations to keep reasonable runtimes in CI
|
||||||
|
const defaultFuzzIters = 5
|
434
vendor/k8s.io/apimachinery/pkg/api/apitesting/roundtrip/roundtrip.go
generated
vendored
Normal file
434
vendor/k8s.io/apimachinery/pkg/api/apitesting/roundtrip/roundtrip.go
generated
vendored
Normal file
|
@ -0,0 +1,434 @@
|
||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package roundtrip
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/hex"
|
||||||
|
"math/rand"
|
||||||
|
"reflect"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/google/go-cmp/cmp" //nolint:depguard
|
||||||
|
flag "github.com/spf13/pflag"
|
||||||
|
"sigs.k8s.io/randfill"
|
||||||
|
|
||||||
|
apitesting "k8s.io/apimachinery/pkg/api/apitesting"
|
||||||
|
"k8s.io/apimachinery/pkg/api/apitesting/fuzzer"
|
||||||
|
apiequality "k8s.io/apimachinery/pkg/api/equality"
|
||||||
|
apimeta "k8s.io/apimachinery/pkg/api/meta"
|
||||||
|
metafuzzer "k8s.io/apimachinery/pkg/apis/meta/fuzzer"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
runtimeserializer "k8s.io/apimachinery/pkg/runtime/serializer"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/serializer/json"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/serializer/protobuf"
|
||||||
|
"k8s.io/apimachinery/pkg/util/dump"
|
||||||
|
"k8s.io/apimachinery/pkg/util/sets"
|
||||||
|
)
|
||||||
|
|
||||||
|
type InstallFunc func(scheme *runtime.Scheme)
|
||||||
|
|
||||||
|
// RoundTripTestForAPIGroup is convenient to call from your install package to make sure that a "bare" install of your group provides
|
||||||
|
// enough information to round trip
|
||||||
|
func RoundTripTestForAPIGroup(t *testing.T, installFn InstallFunc, fuzzingFuncs fuzzer.FuzzerFuncs) {
|
||||||
|
scheme := runtime.NewScheme()
|
||||||
|
installFn(scheme)
|
||||||
|
|
||||||
|
RoundTripTestForScheme(t, scheme, fuzzingFuncs)
|
||||||
|
}
|
||||||
|
|
||||||
|
// RoundTripTestForScheme is convenient to call if you already have a scheme and want to make sure that its well-formed
|
||||||
|
func RoundTripTestForScheme(t *testing.T, scheme *runtime.Scheme, fuzzingFuncs fuzzer.FuzzerFuncs) {
|
||||||
|
codecFactory := runtimeserializer.NewCodecFactory(scheme)
|
||||||
|
f := fuzzer.FuzzerFor(
|
||||||
|
fuzzer.MergeFuzzerFuncs(metafuzzer.Funcs, fuzzingFuncs),
|
||||||
|
rand.NewSource(rand.Int63()),
|
||||||
|
codecFactory,
|
||||||
|
)
|
||||||
|
RoundTripTypesWithoutProtobuf(t, scheme, codecFactory, f, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// RoundTripProtobufTestForAPIGroup is convenient to call from your install package to make sure that a "bare" install of your group provides
|
||||||
|
// enough information to round trip
|
||||||
|
func RoundTripProtobufTestForAPIGroup(t *testing.T, installFn InstallFunc, fuzzingFuncs fuzzer.FuzzerFuncs) {
|
||||||
|
scheme := runtime.NewScheme()
|
||||||
|
installFn(scheme)
|
||||||
|
|
||||||
|
RoundTripProtobufTestForScheme(t, scheme, fuzzingFuncs)
|
||||||
|
}
|
||||||
|
|
||||||
|
// RoundTripProtobufTestForScheme is convenient to call if you already have a scheme and want to make sure that its well-formed
|
||||||
|
func RoundTripProtobufTestForScheme(t *testing.T, scheme *runtime.Scheme, fuzzingFuncs fuzzer.FuzzerFuncs) {
|
||||||
|
codecFactory := runtimeserializer.NewCodecFactory(scheme)
|
||||||
|
fuzzer := fuzzer.FuzzerFor(
|
||||||
|
fuzzer.MergeFuzzerFuncs(metafuzzer.Funcs, fuzzingFuncs),
|
||||||
|
rand.NewSource(rand.Int63()),
|
||||||
|
codecFactory,
|
||||||
|
)
|
||||||
|
RoundTripTypes(t, scheme, codecFactory, fuzzer, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
var FuzzIters = flag.Int("fuzz-iters", defaultFuzzIters, "How many fuzzing iterations to do.")
|
||||||
|
|
||||||
|
// globalNonRoundTrippableTypes are kinds that are effectively reserved across all GroupVersions
|
||||||
|
// They don't roundtrip
|
||||||
|
var globalNonRoundTrippableTypes = sets.NewString(
|
||||||
|
"ExportOptions",
|
||||||
|
"GetOptions",
|
||||||
|
// WatchEvent does not include kind and version and can only be deserialized
|
||||||
|
// implicitly (if the caller expects the specific object). The watch call defines
|
||||||
|
// the schema by content type, rather than via kind/version included in each
|
||||||
|
// object.
|
||||||
|
"WatchEvent",
|
||||||
|
// ListOptions is now part of the meta group
|
||||||
|
"ListOptions",
|
||||||
|
// Delete options is only read in metav1
|
||||||
|
"DeleteOptions",
|
||||||
|
)
|
||||||
|
|
||||||
|
// GlobalNonRoundTrippableTypes returns the kinds that are effectively reserved across all GroupVersions.
|
||||||
|
// They don't roundtrip and thus can be excluded in any custom/downstream roundtrip tests
|
||||||
|
//
|
||||||
|
// kinds := scheme.AllKnownTypes()
|
||||||
|
// for gvk := range kinds {
|
||||||
|
// if roundtrip.GlobalNonRoundTrippableTypes().Has(gvk.Kind) {
|
||||||
|
// continue
|
||||||
|
// }
|
||||||
|
// t.Run(gvk.Group+"."+gvk.Version+"."+gvk.Kind, func(t *testing.T) {
|
||||||
|
// // roundtrip test
|
||||||
|
// })
|
||||||
|
// }
|
||||||
|
func GlobalNonRoundTrippableTypes() sets.String {
|
||||||
|
return sets.NewString(globalNonRoundTrippableTypes.List()...)
|
||||||
|
}
|
||||||
|
|
||||||
|
// RoundTripTypesWithoutProtobuf applies the round-trip test to all round-trippable Kinds
|
||||||
|
// in the scheme. It will skip all the GroupVersionKinds in the skip list.
|
||||||
|
func RoundTripTypesWithoutProtobuf(t *testing.T, scheme *runtime.Scheme, codecFactory runtimeserializer.CodecFactory, fuzzer *randfill.Filler, nonRoundTrippableTypes map[schema.GroupVersionKind]bool) {
|
||||||
|
roundTripTypes(t, scheme, codecFactory, fuzzer, nonRoundTrippableTypes, true)
|
||||||
|
}
|
||||||
|
|
||||||
|
func RoundTripTypes(t *testing.T, scheme *runtime.Scheme, codecFactory runtimeserializer.CodecFactory, fuzzer *randfill.Filler, nonRoundTrippableTypes map[schema.GroupVersionKind]bool) {
|
||||||
|
roundTripTypes(t, scheme, codecFactory, fuzzer, nonRoundTrippableTypes, false)
|
||||||
|
}
|
||||||
|
|
||||||
|
func roundTripTypes(t *testing.T, scheme *runtime.Scheme, codecFactory runtimeserializer.CodecFactory, fuzzer *randfill.Filler, nonRoundTrippableTypes map[schema.GroupVersionKind]bool, skipProtobuf bool) {
|
||||||
|
for _, group := range groupsFromScheme(scheme) {
|
||||||
|
t.Logf("starting group %q", group)
|
||||||
|
internalVersion := schema.GroupVersion{Group: group, Version: runtime.APIVersionInternal}
|
||||||
|
internalKindToGoType := scheme.KnownTypes(internalVersion)
|
||||||
|
|
||||||
|
for kind := range internalKindToGoType {
|
||||||
|
if globalNonRoundTrippableTypes.Has(kind) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
internalGVK := internalVersion.WithKind(kind)
|
||||||
|
roundTripSpecificKind(t, internalGVK, scheme, codecFactory, fuzzer, nonRoundTrippableTypes, skipProtobuf)
|
||||||
|
}
|
||||||
|
|
||||||
|
t.Logf("finished group %q", group)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// RoundTripExternalTypes applies the round-trip test to all external round-trippable Kinds
|
||||||
|
// in the scheme. It will skip all the GroupVersionKinds in the nonRoundTripExternalTypes list .
|
||||||
|
func RoundTripExternalTypes(t *testing.T, scheme *runtime.Scheme, codecFactory runtimeserializer.CodecFactory, fuzzer *randfill.Filler, nonRoundTrippableTypes map[schema.GroupVersionKind]bool) {
|
||||||
|
kinds := scheme.AllKnownTypes()
|
||||||
|
for gvk := range kinds {
|
||||||
|
if gvk.Version == runtime.APIVersionInternal || globalNonRoundTrippableTypes.Has(gvk.Kind) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
t.Run(gvk.Group+"."+gvk.Version+"."+gvk.Kind, func(t *testing.T) {
|
||||||
|
roundTripSpecificKind(t, gvk, scheme, codecFactory, fuzzer, nonRoundTrippableTypes, false)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// RoundTripExternalTypesWithoutProtobuf applies the round-trip test to all external round-trippable Kinds
|
||||||
|
// in the scheme. It will skip all the GroupVersionKinds in the nonRoundTripExternalTypes list.
|
||||||
|
func RoundTripExternalTypesWithoutProtobuf(t *testing.T, scheme *runtime.Scheme, codecFactory runtimeserializer.CodecFactory, fuzzer *randfill.Filler, nonRoundTrippableTypes map[schema.GroupVersionKind]bool) {
|
||||||
|
kinds := scheme.AllKnownTypes()
|
||||||
|
for gvk := range kinds {
|
||||||
|
if gvk.Version == runtime.APIVersionInternal || globalNonRoundTrippableTypes.Has(gvk.Kind) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
t.Run(gvk.Group+"."+gvk.Version+"."+gvk.Kind, func(t *testing.T) {
|
||||||
|
roundTripSpecificKind(t, gvk, scheme, codecFactory, fuzzer, nonRoundTrippableTypes, true)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func RoundTripSpecificKindWithoutProtobuf(t *testing.T, gvk schema.GroupVersionKind, scheme *runtime.Scheme, codecFactory runtimeserializer.CodecFactory, fuzzer *randfill.Filler, nonRoundTrippableTypes map[schema.GroupVersionKind]bool) {
|
||||||
|
roundTripSpecificKind(t, gvk, scheme, codecFactory, fuzzer, nonRoundTrippableTypes, true)
|
||||||
|
}
|
||||||
|
|
||||||
|
func RoundTripSpecificKind(t *testing.T, gvk schema.GroupVersionKind, scheme *runtime.Scheme, codecFactory runtimeserializer.CodecFactory, fuzzer *randfill.Filler, nonRoundTrippableTypes map[schema.GroupVersionKind]bool) {
|
||||||
|
roundTripSpecificKind(t, gvk, scheme, codecFactory, fuzzer, nonRoundTrippableTypes, false)
|
||||||
|
}
|
||||||
|
|
||||||
|
func roundTripSpecificKind(t *testing.T, gvk schema.GroupVersionKind, scheme *runtime.Scheme, codecFactory runtimeserializer.CodecFactory, fuzzer *randfill.Filler, nonRoundTrippableTypes map[schema.GroupVersionKind]bool, skipProtobuf bool) {
|
||||||
|
if nonRoundTrippableTypes[gvk] {
|
||||||
|
t.Logf("skipping %v", gvk)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Try a few times, since runTest uses random values.
|
||||||
|
for i := 0; i < *FuzzIters; i++ {
|
||||||
|
if gvk.Version == runtime.APIVersionInternal {
|
||||||
|
roundTripToAllExternalVersions(t, scheme, codecFactory, fuzzer, gvk, nonRoundTrippableTypes, skipProtobuf)
|
||||||
|
} else {
|
||||||
|
roundTripOfExternalType(t, scheme, codecFactory, fuzzer, gvk, skipProtobuf)
|
||||||
|
}
|
||||||
|
if t.Failed() {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// fuzzInternalObject fuzzes an arbitrary runtime object using the appropriate
|
||||||
|
// fuzzer registered with the apitesting package.
|
||||||
|
func fuzzInternalObject(t *testing.T, fuzzer *randfill.Filler, object runtime.Object) runtime.Object {
|
||||||
|
fuzzer.Fill(object)
|
||||||
|
|
||||||
|
j, err := apimeta.TypeAccessor(object)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Unexpected error %v for %#v", err, object)
|
||||||
|
}
|
||||||
|
j.SetKind("")
|
||||||
|
j.SetAPIVersion("")
|
||||||
|
|
||||||
|
return object
|
||||||
|
}
|
||||||
|
|
||||||
|
func groupsFromScheme(scheme *runtime.Scheme) []string {
|
||||||
|
ret := sets.String{}
|
||||||
|
for gvk := range scheme.AllKnownTypes() {
|
||||||
|
ret.Insert(gvk.Group)
|
||||||
|
}
|
||||||
|
return ret.List()
|
||||||
|
}
|
||||||
|
|
||||||
|
func roundTripToAllExternalVersions(t *testing.T, scheme *runtime.Scheme, codecFactory runtimeserializer.CodecFactory, fuzzer *randfill.Filler, internalGVK schema.GroupVersionKind, nonRoundTrippableTypes map[schema.GroupVersionKind]bool, skipProtobuf bool) {
|
||||||
|
object, err := scheme.New(internalGVK)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Couldn't make a %v? %v", internalGVK, err)
|
||||||
|
}
|
||||||
|
if _, err := apimeta.TypeAccessor(object); err != nil {
|
||||||
|
t.Fatalf("%q is not a TypeMeta and cannot be tested - add it to nonRoundTrippableInternalTypes: %v", internalGVK, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
fuzzInternalObject(t, fuzzer, object)
|
||||||
|
|
||||||
|
// find all potential serializations in the scheme.
|
||||||
|
// TODO fix this up to handle kinds that cross registered with different names.
|
||||||
|
for externalGVK, externalGoType := range scheme.AllKnownTypes() {
|
||||||
|
if externalGVK.Version == runtime.APIVersionInternal {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if externalGVK.GroupKind() != internalGVK.GroupKind() {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if nonRoundTrippableTypes[externalGVK] {
|
||||||
|
t.Logf("\tskipping %v %v", externalGVK, externalGoType)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
t.Logf("\tround tripping to %v %v", externalGVK, externalGoType)
|
||||||
|
|
||||||
|
roundTrip(t, scheme, apitesting.TestCodec(codecFactory, externalGVK.GroupVersion()), object)
|
||||||
|
|
||||||
|
// TODO remove this hack after we're past the intermediate steps
|
||||||
|
if !skipProtobuf && externalGVK.Group != "kubeadm.k8s.io" {
|
||||||
|
s := protobuf.NewSerializer(scheme, scheme)
|
||||||
|
protobufCodec := codecFactory.CodecForVersions(s, s, externalGVK.GroupVersion(), nil)
|
||||||
|
roundTrip(t, scheme, protobufCodec, object)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func roundTripOfExternalType(t *testing.T, scheme *runtime.Scheme, codecFactory runtimeserializer.CodecFactory, fuzzer *randfill.Filler, externalGVK schema.GroupVersionKind, skipProtobuf bool) {
|
||||||
|
object, err := scheme.New(externalGVK)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Couldn't make a %v? %v", externalGVK, err)
|
||||||
|
}
|
||||||
|
typeAcc, err := apimeta.TypeAccessor(object)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%q is not a TypeMeta and cannot be tested - add it to nonRoundTrippableInternalTypes: %v", externalGVK, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
fuzzInternalObject(t, fuzzer, object)
|
||||||
|
|
||||||
|
typeAcc.SetKind(externalGVK.Kind)
|
||||||
|
typeAcc.SetAPIVersion(externalGVK.GroupVersion().String())
|
||||||
|
|
||||||
|
roundTrip(t, scheme, json.NewSerializerWithOptions(json.DefaultMetaFactory, scheme, scheme, json.SerializerOptions{}), object)
|
||||||
|
|
||||||
|
// TODO remove this hack after we're past the intermediate steps
|
||||||
|
if !skipProtobuf {
|
||||||
|
roundTrip(t, scheme, protobuf.NewSerializer(scheme, scheme), object)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// roundTrip applies a single round-trip test to the given runtime object
|
||||||
|
// using the given codec. The round-trip test ensures that an object can be
|
||||||
|
// deep-copied, converted, marshaled and back without loss of data.
|
||||||
|
//
|
||||||
|
// For internal types this means
|
||||||
|
//
|
||||||
|
// internal -> external -> json/protobuf -> external -> internal.
|
||||||
|
//
|
||||||
|
// For external types this means
|
||||||
|
//
|
||||||
|
// external -> json/protobuf -> external.
|
||||||
|
func roundTrip(t *testing.T, scheme *runtime.Scheme, codec runtime.Codec, object runtime.Object) {
|
||||||
|
original := object
|
||||||
|
|
||||||
|
// deep copy the original object
|
||||||
|
object = object.DeepCopyObject()
|
||||||
|
name := reflect.TypeOf(object).Elem().Name()
|
||||||
|
if !apiequality.Semantic.DeepEqual(original, object) {
|
||||||
|
t.Errorf("%v: DeepCopy altered the object, diff: %v", name, cmp.Diff(original, object))
|
||||||
|
t.Errorf("%s", dump.Pretty(original))
|
||||||
|
t.Errorf("%s", dump.Pretty(object))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// encode (serialize) the deep copy using the provided codec
|
||||||
|
data, err := runtime.Encode(codec, object)
|
||||||
|
if err != nil {
|
||||||
|
if runtime.IsNotRegisteredError(err) {
|
||||||
|
t.Logf("%v: not registered: %v (%s)", name, err, dump.Pretty(object))
|
||||||
|
} else {
|
||||||
|
t.Errorf("%v: %v (%s)", name, err, dump.Pretty(object))
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// ensure that the deep copy is equal to the original; neither the deep
|
||||||
|
// copy or conversion should alter the object
|
||||||
|
// TODO eliminate this global
|
||||||
|
if !apiequality.Semantic.DeepEqual(original, object) {
|
||||||
|
t.Errorf("%v: encode altered the object, diff: %v", name, cmp.Diff(original, object))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// encode (serialize) a second time to verify that it was not varying
|
||||||
|
secondData, err := runtime.Encode(codec, object)
|
||||||
|
if err != nil {
|
||||||
|
if runtime.IsNotRegisteredError(err) {
|
||||||
|
t.Logf("%v: not registered: %v (%s)", name, err, dump.Pretty(object))
|
||||||
|
} else {
|
||||||
|
t.Errorf("%v: %v (%s)", name, err, dump.Pretty(object))
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// serialization to the wire must be stable to ensure that we don't write twice to the DB
|
||||||
|
// when the object hasn't changed.
|
||||||
|
if !bytes.Equal(data, secondData) {
|
||||||
|
t.Errorf("%v: serialization is not stable: %s", name, dump.Pretty(object))
|
||||||
|
}
|
||||||
|
|
||||||
|
// decode (deserialize) the encoded data back into an object
|
||||||
|
obj2, err := runtime.Decode(codec, data)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("%v: %v\nCodec: %#v\nData: %s\nSource: %s", name, err, codec, dataAsString(data), dump.Pretty(object))
|
||||||
|
panic("failed")
|
||||||
|
}
|
||||||
|
|
||||||
|
// ensure that the object produced from decoding the encoded data is equal
|
||||||
|
// to the original object
|
||||||
|
if !apiequality.Semantic.DeepEqual(original, obj2) {
|
||||||
|
t.Errorf("%v: diff: %v\nCodec: %#v\nSource:\n\n%s\n\nEncoded:\n\n%s\n\nFinal:\n\n%s", name, cmp.Diff(original, obj2), codec, dump.Pretty(original), dataAsString(data), dump.Pretty(obj2))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// decode the encoded data into a new object (instead of letting the codec
|
||||||
|
// create a new object)
|
||||||
|
obj3 := reflect.New(reflect.TypeOf(object).Elem()).Interface().(runtime.Object)
|
||||||
|
if err := runtime.DecodeInto(codec, data, obj3); err != nil {
|
||||||
|
t.Errorf("%v: %v", name, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// special case for kinds which are internal and external at the same time (many in meta.k8s.io are). For those
|
||||||
|
// runtime.DecodeInto above will return the external variant and set the APIVersion and kind, while the input
|
||||||
|
// object might be internal. Hence, we clear those values for obj3 for that case to correctly compare.
|
||||||
|
intAndExt, err := internalAndExternalKind(scheme, object)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("%v: %v", name, err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if intAndExt {
|
||||||
|
typeAcc, err := apimeta.TypeAccessor(object)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%v: error accessing TypeMeta: %v", name, err)
|
||||||
|
}
|
||||||
|
if len(typeAcc.GetAPIVersion()) == 0 {
|
||||||
|
typeAcc, err := apimeta.TypeAccessor(obj3)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("%v: error accessing TypeMeta: %v", name, err)
|
||||||
|
}
|
||||||
|
typeAcc.SetAPIVersion("")
|
||||||
|
typeAcc.SetKind("")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ensure that the new runtime object is equal to the original after being
|
||||||
|
// decoded into
|
||||||
|
if !apiequality.Semantic.DeepEqual(object, obj3) {
|
||||||
|
t.Errorf("%v: diff: %v\nCodec: %#v", name, cmp.Diff(object, obj3), codec)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// do structure-preserving fuzzing of the deep-copied object. If it shares anything with the original,
|
||||||
|
// the deep-copy was actually only a shallow copy. Then original and obj3 will be different after fuzzing.
|
||||||
|
// NOTE: we use the encoding+decoding here as an alternative, guaranteed deep-copy to compare against.
|
||||||
|
fuzzer.ValueFuzz(object)
|
||||||
|
if !apiequality.Semantic.DeepEqual(original, obj3) {
|
||||||
|
t.Errorf("%v: fuzzing a copy altered the original, diff: %v", name, cmp.Diff(original, obj3))
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func internalAndExternalKind(scheme *runtime.Scheme, object runtime.Object) (bool, error) {
|
||||||
|
kinds, _, err := scheme.ObjectKinds(object)
|
||||||
|
if err != nil {
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
internal, external := false, false
|
||||||
|
for _, k := range kinds {
|
||||||
|
if k.Version == runtime.APIVersionInternal {
|
||||||
|
internal = true
|
||||||
|
} else {
|
||||||
|
external = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return internal && external, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// dataAsString returns the given byte array as a string; handles detecting
|
||||||
|
// protocol buffers.
|
||||||
|
func dataAsString(data []byte) string {
|
||||||
|
dataString := string(data)
|
||||||
|
if !strings.HasPrefix(dataString, "{") {
|
||||||
|
dataString = "\n" + hex.Dump(data)
|
||||||
|
}
|
||||||
|
return dataString
|
||||||
|
}
|
247
vendor/k8s.io/apimachinery/pkg/api/apitesting/roundtrip/unstructured.go
generated
vendored
Normal file
247
vendor/k8s.io/apimachinery/pkg/api/apitesting/roundtrip/unstructured.go
generated
vendored
Normal file
|
@ -0,0 +1,247 @@
|
||||||
|
/*
|
||||||
|
Copyright 2024 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package roundtrip
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"fmt"
|
||||||
|
"math/rand"
|
||||||
|
"os"
|
||||||
|
"strconv"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"k8s.io/apimachinery/pkg/api/apitesting/fuzzer"
|
||||||
|
apiequality "k8s.io/apimachinery/pkg/api/equality"
|
||||||
|
metafuzzer "k8s.io/apimachinery/pkg/apis/meta/fuzzer"
|
||||||
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime/serializer"
|
||||||
|
cborserializer "k8s.io/apimachinery/pkg/runtime/serializer/cbor"
|
||||||
|
cbor "k8s.io/apimachinery/pkg/runtime/serializer/cbor/direct"
|
||||||
|
jsonserializer "k8s.io/apimachinery/pkg/runtime/serializer/json"
|
||||||
|
"k8s.io/apimachinery/pkg/util/sets"
|
||||||
|
|
||||||
|
"github.com/google/go-cmp/cmp" //nolint:depguard
|
||||||
|
)
|
||||||
|
|
||||||
|
// RoundtripToUnstructured verifies the roundtrip faithfulness of all external types in a scheme
|
||||||
|
// from native to unstructured and back using both the JSON and CBOR serializers. The intermediate
|
||||||
|
// unstructured objects produced by both encodings must be identical and be themselves
|
||||||
|
// roundtrippable to JSON and CBOR.
|
||||||
|
//
|
||||||
|
// Values for all external types in the scheme are generated by fuzzing the a value of the
|
||||||
|
// corresponding internal type and converting it, except for types whose registered GVK appears in
|
||||||
|
// the "nointernal" set, which are fuzzed directly.
|
||||||
|
func RoundtripToUnstructured(t *testing.T, scheme *runtime.Scheme, funcs fuzzer.FuzzerFuncs, skipped sets.Set[schema.GroupVersionKind], nointernal sets.Set[schema.GroupVersionKind]) {
|
||||||
|
codecs := serializer.NewCodecFactory(scheme)
|
||||||
|
|
||||||
|
seed := int64(time.Now().Nanosecond())
|
||||||
|
if override := os.Getenv("TEST_RAND_SEED"); len(override) > 0 {
|
||||||
|
overrideSeed, err := strconv.ParseInt(override, 10, 64)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
seed = overrideSeed
|
||||||
|
t.Logf("using overridden seed: %d", seed)
|
||||||
|
} else {
|
||||||
|
t.Logf("seed (override with TEST_RAND_SEED if desired): %d", seed)
|
||||||
|
}
|
||||||
|
|
||||||
|
var buf bytes.Buffer
|
||||||
|
for gvk := range scheme.AllKnownTypes() {
|
||||||
|
if globalNonRoundTrippableTypes.Has(gvk.Kind) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if gvk.Version == runtime.APIVersionInternal {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
subtestName := fmt.Sprintf("%s.%s/%s", gvk.Version, gvk.Group, gvk.Kind)
|
||||||
|
if gvk.Group == "" {
|
||||||
|
subtestName = fmt.Sprintf("%s/%s", gvk.Version, gvk.Kind)
|
||||||
|
}
|
||||||
|
|
||||||
|
t.Run(subtestName, func(t *testing.T) {
|
||||||
|
if skipped.Has(gvk) {
|
||||||
|
t.SkipNow()
|
||||||
|
}
|
||||||
|
|
||||||
|
fuzzer := fuzzer.FuzzerFor(fuzzer.MergeFuzzerFuncs(metafuzzer.Funcs, funcs), rand.NewSource(seed), codecs)
|
||||||
|
|
||||||
|
for i := 0; i < *FuzzIters; i++ {
|
||||||
|
item, err := scheme.New(gvk)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("couldn't create external object %v: %v", gvk.Kind, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if nointernal.Has(gvk) {
|
||||||
|
fuzzer.Fill(item)
|
||||||
|
} else {
|
||||||
|
internalObj, err := scheme.New(gvk.GroupKind().WithVersion(runtime.APIVersionInternal))
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("couldn't create internal object %v: %v", gvk.Kind, err)
|
||||||
|
}
|
||||||
|
fuzzer.Fill(internalObj)
|
||||||
|
|
||||||
|
if err := scheme.Convert(internalObj, item, nil); err != nil {
|
||||||
|
t.Fatalf("conversion for %v failed: %v", gvk.Kind, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Decoding into Unstructured requires that apiVersion and kind be
|
||||||
|
// serialized, so populate TypeMeta.
|
||||||
|
item.GetObjectKind().SetGroupVersionKind(gvk)
|
||||||
|
|
||||||
|
jsonSerializer := jsonserializer.NewSerializerWithOptions(jsonserializer.DefaultMetaFactory, scheme, scheme, jsonserializer.SerializerOptions{})
|
||||||
|
cborSerializer := cborserializer.NewSerializer(scheme, scheme)
|
||||||
|
|
||||||
|
// original->JSON->Unstructured
|
||||||
|
buf.Reset()
|
||||||
|
if err := jsonSerializer.Encode(item, &buf); err != nil {
|
||||||
|
t.Fatalf("error encoding native to json: %v", err)
|
||||||
|
}
|
||||||
|
var uJSON runtime.Object = &unstructured.Unstructured{}
|
||||||
|
uJSON, _, err = jsonSerializer.Decode(buf.Bytes(), &gvk, uJSON)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error decoding json to unstructured: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// original->CBOR->Unstructured
|
||||||
|
buf.Reset()
|
||||||
|
if err := cborSerializer.Encode(item, &buf); err != nil {
|
||||||
|
t.Fatalf("error encoding native to cbor: %v", err)
|
||||||
|
}
|
||||||
|
var uCBOR runtime.Object = &unstructured.Unstructured{}
|
||||||
|
uCBOR, _, err = cborSerializer.Decode(buf.Bytes(), &gvk, uCBOR)
|
||||||
|
if err != nil {
|
||||||
|
diag, _ := cbor.Diagnose(buf.Bytes())
|
||||||
|
t.Fatalf("error decoding cbor to unstructured: %v, diag: %s", err, diag)
|
||||||
|
}
|
||||||
|
|
||||||
|
// original->JSON->Unstructured == original->CBOR->Unstructured
|
||||||
|
if !apiequality.Semantic.DeepEqual(uJSON, uCBOR) {
|
||||||
|
t.Fatalf("unstructured via json differed from unstructured via cbor: %v", cmp.Diff(uJSON, uCBOR))
|
||||||
|
}
|
||||||
|
|
||||||
|
// original->CBOR(nondeterministic)->Unstructured
|
||||||
|
buf.Reset()
|
||||||
|
if err := cborSerializer.EncodeNondeterministic(item, &buf); err != nil {
|
||||||
|
t.Fatalf("error encoding native to cbor: %v", err)
|
||||||
|
}
|
||||||
|
var uCBORNondeterministic runtime.Object = &unstructured.Unstructured{}
|
||||||
|
uCBORNondeterministic, _, err = cborSerializer.Decode(buf.Bytes(), &gvk, uCBORNondeterministic)
|
||||||
|
if err != nil {
|
||||||
|
diag, _ := cbor.Diagnose(buf.Bytes())
|
||||||
|
t.Fatalf("error decoding cbor to unstructured: %v, diag: %s", err, diag)
|
||||||
|
}
|
||||||
|
|
||||||
|
// original->CBOR->Unstructured == original->CBOR(nondeterministic)->Unstructured
|
||||||
|
if !apiequality.Semantic.DeepEqual(uCBOR, uCBORNondeterministic) {
|
||||||
|
t.Fatalf("unstructured via nondeterministic cbor differed from unstructured via cbor: %v", cmp.Diff(uCBOR, uCBORNondeterministic))
|
||||||
|
}
|
||||||
|
|
||||||
|
// original->JSON/CBOR->Unstructured == original->JSON/CBOR->Unstructured->JSON->Unstructured
|
||||||
|
buf.Reset()
|
||||||
|
if err := jsonSerializer.Encode(uJSON, &buf); err != nil {
|
||||||
|
t.Fatalf("error encoding unstructured to json: %v", err)
|
||||||
|
}
|
||||||
|
var uJSON2 runtime.Object = &unstructured.Unstructured{}
|
||||||
|
uJSON2, _, err = jsonSerializer.Decode(buf.Bytes(), &gvk, uJSON2)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error decoding json to unstructured: %v", err)
|
||||||
|
}
|
||||||
|
if !apiequality.Semantic.DeepEqual(uJSON, uJSON2) {
|
||||||
|
t.Errorf("object changed during native-json-unstructured-json-unstructured roundtrip, diff: %s", cmp.Diff(uJSON, uJSON2))
|
||||||
|
}
|
||||||
|
|
||||||
|
// original->JSON/CBOR->Unstructured == original->JSON/CBOR->Unstructured->CBOR->Unstructured
|
||||||
|
buf.Reset()
|
||||||
|
if err := cborSerializer.Encode(uCBOR, &buf); err != nil {
|
||||||
|
t.Fatalf("error encoding unstructured to cbor: %v", err)
|
||||||
|
}
|
||||||
|
var uCBOR2 runtime.Object = &unstructured.Unstructured{}
|
||||||
|
uCBOR2, _, err = cborSerializer.Decode(buf.Bytes(), &gvk, uCBOR2)
|
||||||
|
if err != nil {
|
||||||
|
diag, _ := cbor.Diagnose(buf.Bytes())
|
||||||
|
t.Fatalf("error decoding cbor to unstructured: %v, diag: %s", err, diag)
|
||||||
|
}
|
||||||
|
if !apiequality.Semantic.DeepEqual(uCBOR, uCBOR2) {
|
||||||
|
t.Errorf("object changed during native-cbor-unstructured-cbor-unstructured roundtrip, diff: %s", cmp.Diff(uCBOR, uCBOR2))
|
||||||
|
}
|
||||||
|
|
||||||
|
// original->JSON/CBOR->Unstructured->CBOR->Unstructured == original->JSON/CBOR->Unstructured->CBOR(nondeterministic)->Unstructured
|
||||||
|
buf.Reset()
|
||||||
|
if err := cborSerializer.EncodeNondeterministic(uCBOR, &buf); err != nil {
|
||||||
|
t.Fatalf("error encoding unstructured to cbor: %v", err)
|
||||||
|
}
|
||||||
|
var uCBOR2Nondeterministic runtime.Object = &unstructured.Unstructured{}
|
||||||
|
uCBOR2Nondeterministic, _, err = cborSerializer.Decode(buf.Bytes(), &gvk, uCBOR2Nondeterministic)
|
||||||
|
if err != nil {
|
||||||
|
diag, _ := cbor.Diagnose(buf.Bytes())
|
||||||
|
t.Fatalf("error decoding cbor to unstructured: %v, diag: %s", err, diag)
|
||||||
|
}
|
||||||
|
if !apiequality.Semantic.DeepEqual(uCBOR, uCBOR2Nondeterministic) {
|
||||||
|
t.Errorf("object changed during native-cbor-unstructured-cbor(nondeterministic)-unstructured roundtrip, diff: %s", cmp.Diff(uCBOR, uCBOR2Nondeterministic))
|
||||||
|
}
|
||||||
|
|
||||||
|
// original->JSON/CBOR->Unstructured->JSON->final == original
|
||||||
|
buf.Reset()
|
||||||
|
if err := jsonSerializer.Encode(uJSON, &buf); err != nil {
|
||||||
|
t.Fatalf("error encoding unstructured to json: %v", err)
|
||||||
|
}
|
||||||
|
finalJSON, _, err := jsonSerializer.Decode(buf.Bytes(), &gvk, nil)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("error decoding json to native: %v", err)
|
||||||
|
}
|
||||||
|
if !apiequality.Semantic.DeepEqual(item, finalJSON) {
|
||||||
|
t.Errorf("object changed during native-json-unstructured-json-native roundtrip, diff: %s", cmp.Diff(item, finalJSON))
|
||||||
|
}
|
||||||
|
|
||||||
|
// original->JSON/CBOR->Unstructured->CBOR->final == original
|
||||||
|
buf.Reset()
|
||||||
|
if err := cborSerializer.Encode(uCBOR, &buf); err != nil {
|
||||||
|
t.Fatalf("error encoding unstructured to cbor: %v", err)
|
||||||
|
}
|
||||||
|
finalCBOR, _, err := cborSerializer.Decode(buf.Bytes(), &gvk, nil)
|
||||||
|
if err != nil {
|
||||||
|
diag, _ := cbor.Diagnose(buf.Bytes())
|
||||||
|
t.Fatalf("error decoding cbor to native: %v, diag: %s", err, diag)
|
||||||
|
}
|
||||||
|
if !apiequality.Semantic.DeepEqual(item, finalCBOR) {
|
||||||
|
t.Errorf("object changed during native-cbor-unstructured-cbor-native roundtrip, diff: %s", cmp.Diff(item, finalCBOR))
|
||||||
|
}
|
||||||
|
|
||||||
|
// original->JSON/CBOR->Unstructured->CBOR(nondeterministic)->final == original
|
||||||
|
buf.Reset()
|
||||||
|
if err := cborSerializer.EncodeNondeterministic(uCBOR, &buf); err != nil {
|
||||||
|
t.Fatalf("error encoding unstructured to cbor: %v", err)
|
||||||
|
}
|
||||||
|
finalCBORNondeterministic, _, err := cborSerializer.Decode(buf.Bytes(), &gvk, nil)
|
||||||
|
if err != nil {
|
||||||
|
diag, _ := cbor.Diagnose(buf.Bytes())
|
||||||
|
t.Fatalf("error decoding cbor to native: %v, diag: %s", err, diag)
|
||||||
|
}
|
||||||
|
if !apiequality.Semantic.DeepEqual(item, finalCBORNondeterministic) {
|
||||||
|
t.Errorf("object changed during native-cbor-unstructured-cbor-native roundtrip, diff: %s", cmp.Diff(item, finalCBORNondeterministic))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,339 @@
|
||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package fuzzer
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"math/rand"
|
||||||
|
"sort"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"sigs.k8s.io/randfill"
|
||||||
|
|
||||||
|
apitesting "k8s.io/apimachinery/pkg/api/apitesting"
|
||||||
|
"k8s.io/apimachinery/pkg/api/apitesting/fuzzer"
|
||||||
|
"k8s.io/apimachinery/pkg/api/resource"
|
||||||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||||
|
metav1beta1 "k8s.io/apimachinery/pkg/apis/meta/v1beta1"
|
||||||
|
"k8s.io/apimachinery/pkg/runtime"
|
||||||
|
runtimeserializer "k8s.io/apimachinery/pkg/runtime/serializer"
|
||||||
|
"k8s.io/apimachinery/pkg/types"
|
||||||
|
"k8s.io/apimachinery/pkg/util/sets"
|
||||||
|
)
|
||||||
|
|
||||||
|
func genericFuzzerFuncs(codecs runtimeserializer.CodecFactory) []interface{} {
|
||||||
|
return []interface{}{
|
||||||
|
func(q *resource.Quantity, c randfill.Continue) {
|
||||||
|
*q = *resource.NewQuantity(c.Int63n(1000), resource.DecimalExponent)
|
||||||
|
},
|
||||||
|
func(j *int, c randfill.Continue) {
|
||||||
|
*j = int(c.Int31())
|
||||||
|
},
|
||||||
|
func(j **int, c randfill.Continue) {
|
||||||
|
if c.Bool() {
|
||||||
|
i := int(c.Int31())
|
||||||
|
*j = &i
|
||||||
|
} else {
|
||||||
|
*j = nil
|
||||||
|
}
|
||||||
|
},
|
||||||
|
func(j *runtime.TypeMeta, c randfill.Continue) {
|
||||||
|
// We have to customize the randomization of TypeMetas because their
|
||||||
|
// APIVersion and Kind must remain blank in memory.
|
||||||
|
j.APIVersion = ""
|
||||||
|
j.Kind = ""
|
||||||
|
},
|
||||||
|
func(j *runtime.Object, c randfill.Continue) {
|
||||||
|
// TODO: uncomment when round trip starts from a versioned object
|
||||||
|
if true { // c.Bool() {
|
||||||
|
*j = &runtime.Unknown{
|
||||||
|
// We do not set TypeMeta here because it is not carried through a round trip
|
||||||
|
Raw: []byte(`{"apiVersion":"unknown.group/unknown","kind":"Something","someKey":"someValue"}`),
|
||||||
|
ContentType: runtime.ContentTypeJSON,
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
types := []runtime.Object{&metav1.Status{}, &metav1.APIGroup{}}
|
||||||
|
t := types[c.Rand.Intn(len(types))]
|
||||||
|
c.Fill(t)
|
||||||
|
*j = t
|
||||||
|
}
|
||||||
|
},
|
||||||
|
func(r *runtime.RawExtension, c randfill.Continue) {
|
||||||
|
// Pick an arbitrary type and fuzz it
|
||||||
|
types := []runtime.Object{&metav1.Status{}, &metav1.APIGroup{}}
|
||||||
|
obj := types[c.Rand.Intn(len(types))]
|
||||||
|
c.Fill(obj)
|
||||||
|
|
||||||
|
// Find a codec for converting the object to raw bytes. This is necessary for the
|
||||||
|
// api version and kind to be correctly set be serialization.
|
||||||
|
var codec = apitesting.TestCodec(codecs, metav1.SchemeGroupVersion)
|
||||||
|
|
||||||
|
// Convert the object to raw bytes
|
||||||
|
bytes, err := runtime.Encode(codec, obj)
|
||||||
|
if err != nil {
|
||||||
|
panic(fmt.Sprintf("Failed to encode object: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
// strip trailing newlines which do not survive roundtrips
|
||||||
|
for len(bytes) >= 1 && bytes[len(bytes)-1] == 10 {
|
||||||
|
bytes = bytes[:len(bytes)-1]
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set the bytes field on the RawExtension
|
||||||
|
r.Raw = bytes
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// taken from randfill (nee gofuzz) internals for RandString
|
||||||
|
type charRange struct {
|
||||||
|
first, last rune
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *charRange) choose(r *rand.Rand) rune {
|
||||||
|
count := int64(c.last - c.first + 1)
|
||||||
|
ch := c.first + rune(r.Int63n(count))
|
||||||
|
|
||||||
|
return ch
|
||||||
|
}
|
||||||
|
|
||||||
|
// randomLabelPart produces a valid random label value or name-part
|
||||||
|
// of a label key.
|
||||||
|
func randomLabelPart(c randfill.Continue, canBeEmpty bool) string {
|
||||||
|
validStartEnd := []charRange{{'0', '9'}, {'a', 'z'}, {'A', 'Z'}}
|
||||||
|
validMiddle := []charRange{{'0', '9'}, {'a', 'z'}, {'A', 'Z'},
|
||||||
|
{'.', '.'}, {'-', '-'}, {'_', '_'}}
|
||||||
|
|
||||||
|
partLen := c.Rand.Intn(64) // len is [0, 63]
|
||||||
|
if !canBeEmpty {
|
||||||
|
partLen = c.Rand.Intn(63) + 1 // len is [1, 63]
|
||||||
|
}
|
||||||
|
|
||||||
|
runes := make([]rune, partLen)
|
||||||
|
if partLen == 0 {
|
||||||
|
return string(runes)
|
||||||
|
}
|
||||||
|
|
||||||
|
runes[0] = validStartEnd[c.Rand.Intn(len(validStartEnd))].choose(c.Rand)
|
||||||
|
for i := range runes[1:] {
|
||||||
|
runes[i+1] = validMiddle[c.Rand.Intn(len(validMiddle))].choose(c.Rand)
|
||||||
|
}
|
||||||
|
runes[len(runes)-1] = validStartEnd[c.Rand.Intn(len(validStartEnd))].choose(c.Rand)
|
||||||
|
|
||||||
|
return string(runes)
|
||||||
|
}
|
||||||
|
|
||||||
|
func randomDNSLabel(c randfill.Continue) string {
|
||||||
|
validStartEnd := []charRange{{'0', '9'}, {'a', 'z'}}
|
||||||
|
validMiddle := []charRange{{'0', '9'}, {'a', 'z'}, {'-', '-'}}
|
||||||
|
|
||||||
|
partLen := c.Rand.Intn(63) + 1 // len is [1, 63]
|
||||||
|
runes := make([]rune, partLen)
|
||||||
|
|
||||||
|
runes[0] = validStartEnd[c.Rand.Intn(len(validStartEnd))].choose(c.Rand)
|
||||||
|
for i := range runes[1:] {
|
||||||
|
runes[i+1] = validMiddle[c.Rand.Intn(len(validMiddle))].choose(c.Rand)
|
||||||
|
}
|
||||||
|
runes[len(runes)-1] = validStartEnd[c.Rand.Intn(len(validStartEnd))].choose(c.Rand)
|
||||||
|
|
||||||
|
return string(runes)
|
||||||
|
}
|
||||||
|
|
||||||
|
func randomLabelKey(c randfill.Continue) string {
|
||||||
|
namePart := randomLabelPart(c, false)
|
||||||
|
prefixPart := ""
|
||||||
|
|
||||||
|
usePrefix := c.Bool()
|
||||||
|
if usePrefix {
|
||||||
|
// we can fit, with dots, at most 3 labels in the 253 allotted characters
|
||||||
|
prefixPartsLen := c.Rand.Intn(2) + 1
|
||||||
|
prefixParts := make([]string, prefixPartsLen)
|
||||||
|
for i := range prefixParts {
|
||||||
|
prefixParts[i] = randomDNSLabel(c)
|
||||||
|
}
|
||||||
|
prefixPart = strings.Join(prefixParts, ".") + "/"
|
||||||
|
}
|
||||||
|
|
||||||
|
return prefixPart + namePart
|
||||||
|
}
|
||||||
|
|
||||||
|
func v1FuzzerFuncs(codecs runtimeserializer.CodecFactory) []interface{} {
|
||||||
|
|
||||||
|
return []interface{}{
|
||||||
|
func(j *metav1.TypeMeta, c randfill.Continue) {
|
||||||
|
// We have to customize the randomization of TypeMetas because their
|
||||||
|
// APIVersion and Kind must remain blank in memory.
|
||||||
|
j.APIVersion = ""
|
||||||
|
j.Kind = ""
|
||||||
|
},
|
||||||
|
func(j *metav1.ObjectMeta, c randfill.Continue) {
|
||||||
|
c.FillNoCustom(j)
|
||||||
|
|
||||||
|
j.ResourceVersion = strconv.FormatUint(c.Uint64(), 10)
|
||||||
|
j.UID = types.UID(c.String(0))
|
||||||
|
|
||||||
|
// Fuzzing sec and nsec in a smaller range (uint32 instead of int64),
|
||||||
|
// so that the result Unix time is a valid date and can be parsed into RFC3339 format.
|
||||||
|
var sec, nsec uint32
|
||||||
|
c.Fill(&sec)
|
||||||
|
c.Fill(&nsec)
|
||||||
|
j.CreationTimestamp = metav1.Unix(int64(sec), int64(nsec)).Rfc3339Copy()
|
||||||
|
|
||||||
|
if j.DeletionTimestamp != nil {
|
||||||
|
c.Fill(&sec)
|
||||||
|
c.Fill(&nsec)
|
||||||
|
t := metav1.Unix(int64(sec), int64(nsec)).Rfc3339Copy()
|
||||||
|
j.DeletionTimestamp = &t
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(j.Labels) == 0 {
|
||||||
|
j.Labels = nil
|
||||||
|
} else {
|
||||||
|
delete(j.Labels, "")
|
||||||
|
}
|
||||||
|
if len(j.Annotations) == 0 {
|
||||||
|
j.Annotations = nil
|
||||||
|
} else {
|
||||||
|
delete(j.Annotations, "")
|
||||||
|
}
|
||||||
|
if len(j.OwnerReferences) == 0 {
|
||||||
|
j.OwnerReferences = nil
|
||||||
|
}
|
||||||
|
if len(j.Finalizers) == 0 {
|
||||||
|
j.Finalizers = nil
|
||||||
|
}
|
||||||
|
},
|
||||||
|
func(j *metav1.ResourceVersionMatch, c randfill.Continue) {
|
||||||
|
matches := []metav1.ResourceVersionMatch{"", metav1.ResourceVersionMatchExact, metav1.ResourceVersionMatchNotOlderThan}
|
||||||
|
*j = matches[c.Rand.Intn(len(matches))]
|
||||||
|
},
|
||||||
|
func(j *metav1.ListMeta, c randfill.Continue) {
|
||||||
|
j.ResourceVersion = strconv.FormatUint(c.Uint64(), 10)
|
||||||
|
j.SelfLink = c.String(0) //nolint:staticcheck // SA1019 backwards compatibility
|
||||||
|
},
|
||||||
|
func(j *metav1.LabelSelector, c randfill.Continue) {
|
||||||
|
c.FillNoCustom(j)
|
||||||
|
// we can't have an entirely empty selector, so force
|
||||||
|
// use of MatchExpression if necessary
|
||||||
|
if len(j.MatchLabels) == 0 && len(j.MatchExpressions) == 0 {
|
||||||
|
j.MatchExpressions = make([]metav1.LabelSelectorRequirement, c.Rand.Intn(2)+1)
|
||||||
|
}
|
||||||
|
|
||||||
|
if j.MatchLabels != nil {
|
||||||
|
fuzzedMatchLabels := make(map[string]string, len(j.MatchLabels))
|
||||||
|
for i := 0; i < len(j.MatchLabels); i++ {
|
||||||
|
fuzzedMatchLabels[randomLabelKey(c)] = randomLabelPart(c, true)
|
||||||
|
}
|
||||||
|
j.MatchLabels = fuzzedMatchLabels
|
||||||
|
}
|
||||||
|
|
||||||
|
validOperators := []metav1.LabelSelectorOperator{
|
||||||
|
metav1.LabelSelectorOpIn,
|
||||||
|
metav1.LabelSelectorOpNotIn,
|
||||||
|
metav1.LabelSelectorOpExists,
|
||||||
|
metav1.LabelSelectorOpDoesNotExist,
|
||||||
|
}
|
||||||
|
|
||||||
|
if j.MatchExpressions != nil {
|
||||||
|
// NB: the label selector parser code sorts match expressions by key, and
|
||||||
|
// sorts and deduplicates the values, so we need to make sure ours are
|
||||||
|
// sorted and deduplicated as well here to preserve round-trip comparison.
|
||||||
|
// In practice, not sorting doesn't hurt anything...
|
||||||
|
|
||||||
|
for i := range j.MatchExpressions {
|
||||||
|
req := metav1.LabelSelectorRequirement{}
|
||||||
|
c.Fill(&req)
|
||||||
|
req.Key = randomLabelKey(c)
|
||||||
|
req.Operator = validOperators[c.Rand.Intn(len(validOperators))]
|
||||||
|
if req.Operator == metav1.LabelSelectorOpIn || req.Operator == metav1.LabelSelectorOpNotIn {
|
||||||
|
if len(req.Values) == 0 {
|
||||||
|
// we must have some values here, so randomly choose a short length
|
||||||
|
req.Values = make([]string, c.Rand.Intn(2)+1)
|
||||||
|
}
|
||||||
|
for i := range req.Values {
|
||||||
|
req.Values[i] = randomLabelPart(c, true)
|
||||||
|
}
|
||||||
|
req.Values = sets.List(sets.New(req.Values...))
|
||||||
|
} else {
|
||||||
|
req.Values = nil
|
||||||
|
}
|
||||||
|
j.MatchExpressions[i] = req
|
||||||
|
}
|
||||||
|
|
||||||
|
sort.Slice(j.MatchExpressions, func(a, b int) bool { return j.MatchExpressions[a].Key < j.MatchExpressions[b].Key })
|
||||||
|
}
|
||||||
|
},
|
||||||
|
func(j *metav1.ManagedFieldsEntry, c randfill.Continue) {
|
||||||
|
c.FillNoCustom(j)
|
||||||
|
j.FieldsV1 = nil
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func v1beta1FuzzerFuncs(codecs runtimeserializer.CodecFactory) []interface{} {
|
||||||
|
return []interface{}{
|
||||||
|
func(r *metav1beta1.TableOptions, c randfill.Continue) {
|
||||||
|
c.FillNoCustom(r)
|
||||||
|
// NoHeaders is not serialized to the wire but is allowed within the versioned
|
||||||
|
// type because we don't use meta internal types in the client and API server.
|
||||||
|
r.NoHeaders = false
|
||||||
|
},
|
||||||
|
func(r *metav1beta1.TableRow, c randfill.Continue) {
|
||||||
|
c.Fill(&r.Object)
|
||||||
|
c.Fill(&r.Conditions)
|
||||||
|
if len(r.Conditions) == 0 {
|
||||||
|
r.Conditions = nil
|
||||||
|
}
|
||||||
|
n := c.Intn(10)
|
||||||
|
if n > 0 {
|
||||||
|
r.Cells = make([]interface{}, n)
|
||||||
|
}
|
||||||
|
for i := range r.Cells {
|
||||||
|
t := c.Intn(6)
|
||||||
|
switch t {
|
||||||
|
case 0:
|
||||||
|
r.Cells[i] = c.String(0)
|
||||||
|
case 1:
|
||||||
|
r.Cells[i] = c.Int63()
|
||||||
|
case 2:
|
||||||
|
r.Cells[i] = c.Bool()
|
||||||
|
case 3:
|
||||||
|
x := map[string]interface{}{}
|
||||||
|
for j := c.Intn(10) + 1; j >= 0; j-- {
|
||||||
|
x[c.String(0)] = c.String(0)
|
||||||
|
}
|
||||||
|
r.Cells[i] = x
|
||||||
|
case 4:
|
||||||
|
x := make([]interface{}, c.Intn(10))
|
||||||
|
for i := range x {
|
||||||
|
x[i] = c.Int63()
|
||||||
|
}
|
||||||
|
r.Cells[i] = x
|
||||||
|
default:
|
||||||
|
r.Cells[i] = nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var Funcs = fuzzer.MergeFuzzerFuncs(
|
||||||
|
genericFuzzerFuncs,
|
||||||
|
v1FuzzerFuncs,
|
||||||
|
v1beta1FuzzerFuncs,
|
||||||
|
)
|
|
@ -1518,6 +1518,9 @@ k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1
|
||||||
k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1
|
k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1beta1
|
||||||
# k8s.io/apimachinery v0.33.2
|
# k8s.io/apimachinery v0.33.2
|
||||||
## explicit; go 1.24.0
|
## explicit; go 1.24.0
|
||||||
|
k8s.io/apimachinery/pkg/api/apitesting
|
||||||
|
k8s.io/apimachinery/pkg/api/apitesting/fuzzer
|
||||||
|
k8s.io/apimachinery/pkg/api/apitesting/roundtrip
|
||||||
k8s.io/apimachinery/pkg/api/equality
|
k8s.io/apimachinery/pkg/api/equality
|
||||||
k8s.io/apimachinery/pkg/api/errors
|
k8s.io/apimachinery/pkg/api/errors
|
||||||
k8s.io/apimachinery/pkg/api/meta
|
k8s.io/apimachinery/pkg/api/meta
|
||||||
|
@ -1525,6 +1528,7 @@ k8s.io/apimachinery/pkg/api/meta/testrestmapper
|
||||||
k8s.io/apimachinery/pkg/api/operation
|
k8s.io/apimachinery/pkg/api/operation
|
||||||
k8s.io/apimachinery/pkg/api/resource
|
k8s.io/apimachinery/pkg/api/resource
|
||||||
k8s.io/apimachinery/pkg/api/validation
|
k8s.io/apimachinery/pkg/api/validation
|
||||||
|
k8s.io/apimachinery/pkg/apis/meta/fuzzer
|
||||||
k8s.io/apimachinery/pkg/apis/meta/internalversion
|
k8s.io/apimachinery/pkg/apis/meta/internalversion
|
||||||
k8s.io/apimachinery/pkg/apis/meta/internalversion/scheme
|
k8s.io/apimachinery/pkg/apis/meta/internalversion/scheme
|
||||||
k8s.io/apimachinery/pkg/apis/meta/internalversion/validation
|
k8s.io/apimachinery/pkg/apis/meta/internalversion/validation
|
||||||
|
|
Loading…
Reference in New Issue