mirror of https://github.com/linkerd/linkerd2.git
403 lines
13 KiB
Go
403 lines
13 KiB
Go
package cmd
|
|
|
|
import (
|
|
"bufio"
|
|
"bytes"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"log"
|
|
"os"
|
|
"path/filepath"
|
|
"testing"
|
|
|
|
"github.com/linkerd/linkerd2/controller/gen/config"
|
|
pb "github.com/linkerd/linkerd2/controller/gen/config"
|
|
)
|
|
|
|
type testCase struct {
|
|
inputFileName string
|
|
goldenFileName string
|
|
reportFileName string
|
|
testInjectConfig *config.All
|
|
enableDebugSidecarFlag bool
|
|
}
|
|
|
|
func mkFilename(filename string, verbose bool) string {
|
|
if verbose {
|
|
return fmt.Sprintf("%s.verbose", filename)
|
|
}
|
|
return filename
|
|
}
|
|
|
|
func testUninjectAndInject(t *testing.T, tc testCase) {
|
|
file, err := os.Open("testdata/" + tc.inputFileName)
|
|
if err != nil {
|
|
t.Errorf("error opening test input file: %v\n", err)
|
|
}
|
|
|
|
read := bufio.NewReader(file)
|
|
|
|
output := new(bytes.Buffer)
|
|
report := new(bytes.Buffer)
|
|
transformer := &resourceTransformerInject{
|
|
configs: tc.testInjectConfig,
|
|
overrideAnnotations: map[string]string{},
|
|
enableDebugSidecar: tc.enableDebugSidecarFlag,
|
|
}
|
|
|
|
if exitCode := uninjectAndInject([]io.Reader{read}, report, output, transformer); exitCode != 0 {
|
|
t.Errorf("Unexpected error injecting YAML: %v\n", report)
|
|
}
|
|
diffTestdata(t, tc.goldenFileName, output.String())
|
|
|
|
reportFileName := mkFilename(tc.reportFileName, verbose)
|
|
diffTestdata(t, reportFileName, report.String())
|
|
}
|
|
|
|
func testInstallConfig() *pb.All {
|
|
_, c, err := testInstallOptions().validateAndBuild("", nil)
|
|
if err != nil {
|
|
log.Fatalf("test install options must be valid: %s", err)
|
|
}
|
|
return c
|
|
}
|
|
|
|
func TestUninjectAndInject(t *testing.T) {
|
|
defaultConfig := testInstallConfig()
|
|
defaultConfig.Global.Version = "test-inject-control-plane-version"
|
|
defaultConfig.Proxy.ProxyVersion = "test-inject-proxy-version"
|
|
|
|
overrideConfig := testInstallConfig()
|
|
overrideConfig.Proxy.ProxyVersion = "override"
|
|
|
|
proxyResourceConfig := testInstallConfig()
|
|
proxyResourceConfig.Proxy.ProxyVersion = defaultConfig.Proxy.ProxyVersion
|
|
proxyResourceConfig.Proxy.Resource = &config.ResourceRequirements{
|
|
RequestCpu: "110m",
|
|
RequestMemory: "100Mi",
|
|
LimitCpu: "160m",
|
|
LimitMemory: "150Mi",
|
|
}
|
|
|
|
noInitContainerConfig := testInstallConfig()
|
|
noInitContainerConfig.Proxy.ProxyVersion = defaultConfig.Proxy.ProxyVersion
|
|
noInitContainerConfig.Global.CniEnabled = true
|
|
|
|
testCases := []testCase{
|
|
{
|
|
inputFileName: "inject_emojivoto_deployment.input.yml",
|
|
goldenFileName: "inject_emojivoto_deployment.golden.yml",
|
|
reportFileName: "inject_emojivoto_deployment.report",
|
|
testInjectConfig: defaultConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_list.input.yml",
|
|
goldenFileName: "inject_emojivoto_list.golden.yml",
|
|
reportFileName: "inject_emojivoto_list.report",
|
|
testInjectConfig: defaultConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_deployment_hostNetwork_false.input.yml",
|
|
goldenFileName: "inject_emojivoto_deployment_hostNetwork_false.golden.yml",
|
|
reportFileName: "inject_emojivoto_deployment_hostNetwork_false.report",
|
|
testInjectConfig: defaultConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_deployment_hostNetwork_true.input.yml",
|
|
goldenFileName: "inject_emojivoto_deployment_hostNetwork_true.input.yml",
|
|
reportFileName: "inject_emojivoto_deployment_hostNetwork_true.report",
|
|
testInjectConfig: defaultConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_deployment_injectDisabled.input.yml",
|
|
goldenFileName: "inject_emojivoto_deployment_injectDisabled.input.yml",
|
|
reportFileName: "inject_emojivoto_deployment_injectDisabled.report",
|
|
testInjectConfig: defaultConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_deployment_controller_name.input.yml",
|
|
goldenFileName: "inject_emojivoto_deployment_controller_name.golden.yml",
|
|
reportFileName: "inject_emojivoto_deployment_controller_name.report",
|
|
testInjectConfig: defaultConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_statefulset.input.yml",
|
|
goldenFileName: "inject_emojivoto_statefulset.golden.yml",
|
|
reportFileName: "inject_emojivoto_statefulset.report",
|
|
testInjectConfig: defaultConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_pod.input.yml",
|
|
goldenFileName: "inject_emojivoto_pod.golden.yml",
|
|
reportFileName: "inject_emojivoto_pod.report",
|
|
testInjectConfig: defaultConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_pod_with_requests.input.yml",
|
|
goldenFileName: "inject_emojivoto_pod_with_requests.golden.yml",
|
|
reportFileName: "inject_emojivoto_pod_with_requests.report",
|
|
testInjectConfig: proxyResourceConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_deployment_udp.input.yml",
|
|
goldenFileName: "inject_emojivoto_deployment_udp.golden.yml",
|
|
reportFileName: "inject_emojivoto_deployment_udp.report",
|
|
testInjectConfig: defaultConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_already_injected.input.yml",
|
|
goldenFileName: "inject_emojivoto_already_injected.golden.yml",
|
|
reportFileName: "inject_emojivoto_already_injected.report",
|
|
testInjectConfig: defaultConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_istio.input.yml",
|
|
goldenFileName: "inject_emojivoto_istio.input.yml",
|
|
reportFileName: "inject_emojivoto_istio.report",
|
|
testInjectConfig: defaultConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_contour.input.yml",
|
|
goldenFileName: "inject_contour.input.yml",
|
|
reportFileName: "inject_contour.report",
|
|
testInjectConfig: defaultConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_deployment_empty_resources.input.yml",
|
|
goldenFileName: "inject_emojivoto_deployment_empty_resources.golden.yml",
|
|
reportFileName: "inject_emojivoto_deployment_empty_resources.report",
|
|
testInjectConfig: defaultConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_list_empty_resources.input.yml",
|
|
goldenFileName: "inject_emojivoto_list_empty_resources.golden.yml",
|
|
reportFileName: "inject_emojivoto_list_empty_resources.report",
|
|
testInjectConfig: defaultConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_deployment.input.yml",
|
|
goldenFileName: "inject_emojivoto_deployment_no_init_container.golden.yml",
|
|
reportFileName: "inject_emojivoto_deployment.report",
|
|
testInjectConfig: noInitContainerConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_deployment_config_overrides.input.yml",
|
|
goldenFileName: "inject_emojivoto_deployment_config_overrides.golden.yml",
|
|
reportFileName: "inject_emojivoto_deployment.report",
|
|
testInjectConfig: overrideConfig,
|
|
},
|
|
{
|
|
inputFileName: "inject_emojivoto_deployment.input.yml",
|
|
goldenFileName: "inject_emojivoto_deployment_debug.golden.yml",
|
|
reportFileName: "inject_emojivoto_deployment.report",
|
|
testInjectConfig: defaultConfig,
|
|
enableDebugSidecarFlag: true,
|
|
},
|
|
}
|
|
|
|
for i, tc := range testCases {
|
|
tc := tc // pin
|
|
verbose = true
|
|
t.Run(fmt.Sprintf("%d: %s --verbose", i, tc.inputFileName), func(t *testing.T) {
|
|
testUninjectAndInject(t, tc)
|
|
})
|
|
verbose = false
|
|
t.Run(fmt.Sprintf("%d: %s", i, tc.inputFileName), func(t *testing.T) {
|
|
testUninjectAndInject(t, tc)
|
|
})
|
|
}
|
|
}
|
|
|
|
type injectCmd struct {
|
|
inputFileName string
|
|
stdErrGoldenFileName string
|
|
stdOutGoldenFileName string
|
|
exitCode int
|
|
}
|
|
|
|
func testInjectCmd(t *testing.T, tc injectCmd) {
|
|
testConfig := testInstallConfig()
|
|
testConfig.Proxy.ProxyVersion = "testinjectversion"
|
|
|
|
errBuffer := &bytes.Buffer{}
|
|
outBuffer := &bytes.Buffer{}
|
|
|
|
in, err := os.Open(fmt.Sprintf("testdata/%s", tc.inputFileName))
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error: %v", err)
|
|
}
|
|
|
|
transformer := &resourceTransformerInject{configs: testConfig}
|
|
exitCode := runInjectCmd([]io.Reader{in}, errBuffer, outBuffer, transformer)
|
|
if exitCode != tc.exitCode {
|
|
t.Fatalf("Expected exit code to be %d but got: %d", tc.exitCode, exitCode)
|
|
}
|
|
if tc.stdOutGoldenFileName != "" {
|
|
diffTestdata(t, tc.stdOutGoldenFileName, outBuffer.String())
|
|
} else if outBuffer.Len() != 0 {
|
|
t.Fatalf("Expected no standard output, but got: %s", outBuffer)
|
|
}
|
|
|
|
stdErrGoldenFileName := mkFilename(tc.stdErrGoldenFileName, verbose)
|
|
diffTestdata(t, stdErrGoldenFileName, errBuffer.String())
|
|
}
|
|
|
|
func TestRunInjectCmd(t *testing.T) {
|
|
testCases := []injectCmd{
|
|
{
|
|
inputFileName: "inject_gettest_deployment.bad.input.yml",
|
|
stdErrGoldenFileName: "inject_gettest_deployment.bad.golden",
|
|
exitCode: 1,
|
|
},
|
|
{
|
|
inputFileName: "inject_gettest_deployment.good.input.yml",
|
|
stdOutGoldenFileName: "inject_gettest_deployment.good.golden.yml",
|
|
stdErrGoldenFileName: "inject_gettest_deployment.good.golden.stderr",
|
|
exitCode: 0,
|
|
},
|
|
}
|
|
|
|
for i, tc := range testCases {
|
|
tc := tc // pin
|
|
verbose = true
|
|
t.Run(fmt.Sprintf("%d: %s --verbose", i, tc.inputFileName), func(t *testing.T) {
|
|
testInjectCmd(t, tc)
|
|
})
|
|
verbose = false
|
|
t.Run(fmt.Sprintf("%d: %s", i, tc.inputFileName), func(t *testing.T) {
|
|
testInjectCmd(t, tc)
|
|
})
|
|
}
|
|
}
|
|
|
|
type injectFilePath struct {
|
|
resource string
|
|
resourceFile string
|
|
expectedFile string
|
|
stdErrFile string
|
|
}
|
|
|
|
func testInjectFilePath(t *testing.T, tc injectFilePath) {
|
|
in, err := read("testdata/" + tc.resourceFile)
|
|
if err != nil {
|
|
t.Fatal("Unexpected error: ", err)
|
|
}
|
|
|
|
errBuf := &bytes.Buffer{}
|
|
actual := &bytes.Buffer{}
|
|
transformer := &resourceTransformerInject{configs: testInstallConfig()}
|
|
if exitCode := runInjectCmd(in, errBuf, actual, transformer); exitCode != 0 {
|
|
t.Fatal("Unexpected error. Exit code from runInjectCmd: ", exitCode)
|
|
}
|
|
diffTestdata(t, tc.expectedFile, actual.String())
|
|
|
|
stdErrFile := mkFilename(tc.stdErrFile, verbose)
|
|
diffTestdata(t, stdErrFile, errBuf.String())
|
|
}
|
|
|
|
func testReadFromFolder(t *testing.T, resourceFolder string, expectedFolder string) {
|
|
in, err := read("testdata/" + resourceFolder)
|
|
if err != nil {
|
|
t.Fatal("Unexpected error: ", err)
|
|
}
|
|
|
|
errBuf := &bytes.Buffer{}
|
|
actual := &bytes.Buffer{}
|
|
transformer := &resourceTransformerInject{configs: testInstallConfig()}
|
|
if exitCode := runInjectCmd(in, errBuf, actual, transformer); exitCode != 0 {
|
|
t.Fatal("Unexpected error. Exit code from runInjectCmd: ", exitCode)
|
|
}
|
|
|
|
expectedFile := filepath.Join(expectedFolder, "injected_nginx_redis.yaml")
|
|
diffTestdata(t, expectedFile, actual.String())
|
|
|
|
stdErrFileName := mkFilename(filepath.Join(expectedFolder, "injected_nginx_redis.stderr"), verbose)
|
|
diffTestdata(t, stdErrFileName, errBuf.String())
|
|
}
|
|
|
|
func TestInjectFilePath(t *testing.T) {
|
|
var (
|
|
resourceFolder = filepath.Join("inject-filepath", "resources")
|
|
expectedFolder = filepath.Join("inject-filepath", "expected")
|
|
)
|
|
|
|
t.Run("read from files", func(t *testing.T) {
|
|
testCases := []injectFilePath{
|
|
{
|
|
resource: "nginx",
|
|
resourceFile: filepath.Join(resourceFolder, "nginx.yaml"),
|
|
expectedFile: filepath.Join(expectedFolder, "injected_nginx.yaml"),
|
|
stdErrFile: filepath.Join(expectedFolder, "injected_nginx.stderr"),
|
|
},
|
|
{
|
|
resource: "redis",
|
|
resourceFile: filepath.Join(resourceFolder, "db/redis.yaml"),
|
|
expectedFile: filepath.Join(expectedFolder, "injected_redis.yaml"),
|
|
stdErrFile: filepath.Join(expectedFolder, "injected_redis.stderr"),
|
|
},
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
testCase := testCase // pin
|
|
verbose = true
|
|
t.Run(fmt.Sprintf("%d %s", i, testCase.resource), func(t *testing.T) {
|
|
testInjectFilePath(t, testCase)
|
|
})
|
|
verbose = false
|
|
t.Run(fmt.Sprintf("%d %s", i, testCase.resource), func(t *testing.T) {
|
|
testInjectFilePath(t, testCase)
|
|
})
|
|
}
|
|
})
|
|
|
|
verbose = true
|
|
t.Run("read from folder --verbose", func(t *testing.T) {
|
|
testReadFromFolder(t, resourceFolder, expectedFolder)
|
|
})
|
|
verbose = false
|
|
t.Run("read from folder --verbose", func(t *testing.T) {
|
|
testReadFromFolder(t, resourceFolder, expectedFolder)
|
|
})
|
|
}
|
|
|
|
func TestWalk(t *testing.T) {
|
|
// create two data files, one in the root folder and the other in a subfolder.
|
|
// walk should be able to read the content of the two data files recursively.
|
|
var (
|
|
tmpFolderRoot = "linkerd-testdata"
|
|
tmpFolderData = filepath.Join(tmpFolderRoot, "data")
|
|
)
|
|
|
|
if err := os.MkdirAll(tmpFolderData, os.ModeDir|os.ModePerm); err != nil {
|
|
t.Fatal("Unexpected error: ", err)
|
|
}
|
|
defer os.RemoveAll(tmpFolderRoot)
|
|
|
|
var (
|
|
data = []byte(readTestdata(t, "inject_gettest_deployment.bad.input.yml"))
|
|
file1 = filepath.Join(tmpFolderRoot, "root.txt")
|
|
file2 = filepath.Join(tmpFolderData, "data.txt")
|
|
)
|
|
if err := ioutil.WriteFile(file1, data, 0644); err != nil {
|
|
t.Fatal("Unexpected error: ", err)
|
|
}
|
|
if err := ioutil.WriteFile(file2, data, 0644); err != nil {
|
|
t.Fatal("Unexpected error: ", err)
|
|
}
|
|
|
|
actual, err := walk(tmpFolderRoot)
|
|
if err != nil {
|
|
t.Fatal("Unexpected error: ", err)
|
|
}
|
|
|
|
for _, r := range actual {
|
|
b := make([]byte, len(data))
|
|
r.Read(b)
|
|
|
|
if string(b) != string(data) {
|
|
t.Errorf("Content mismatch. Expected %q, but got %q", data, b)
|
|
}
|
|
}
|
|
}
|