f71ae55476
This commit adds support for creation of loadbalancer, listeners, members, pools with using the CRD, it is also filling the status field in the CRD. Depends-On: https://review.opendev.org/#/c/743214/ Change-Id: I42f90c836397b0d71969642d6ba31bfb49786a43
354 lines
12 KiB
Python
354 lines
12 KiB
Python
# Copyright 2018 Red Hat, Inc.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
from unittest import mock
|
|
|
|
import munch
|
|
from openstack import exceptions as os_exc
|
|
from os_vif import objects
|
|
from oslo_config import cfg
|
|
|
|
from kuryr_kubernetes import constants as k_const
|
|
from kuryr_kubernetes import exceptions as k_exc
|
|
from kuryr_kubernetes.objects import vif
|
|
from kuryr_kubernetes.tests import base as test_base
|
|
from kuryr_kubernetes.tests.unit import kuryr_fixtures as k_fix
|
|
from kuryr_kubernetes import utils
|
|
|
|
CONF = cfg.CONF
|
|
|
|
|
|
class TestUtils(test_base.TestCase):
|
|
|
|
@mock.patch('socket.gethostname')
|
|
def test_get_node_name(self, m_gethostname):
|
|
m_gethostname.return_value = 'foo'
|
|
res = utils.get_node_name()
|
|
self.assertEqual('foo', res)
|
|
m_gethostname.assert_called_once_with()
|
|
|
|
@mock.patch('requests.get')
|
|
def test_get_leader_name(self, m_get):
|
|
m_get.return_value = mock.Mock(json=mock.Mock(
|
|
return_value={'name': 'foo'}))
|
|
res = utils.get_leader_name()
|
|
m_get.assert_called_once_with(
|
|
'http://localhost:%d' % CONF.kubernetes.controller_ha_elector_port)
|
|
self.assertEqual('foo', res)
|
|
|
|
@mock.patch('requests.get')
|
|
def test_get_leader_name_malformed(self, m_get):
|
|
m_get.return_value = mock.Mock(json=mock.Mock(
|
|
return_value={'name2': 'foo'}))
|
|
res = utils.get_leader_name()
|
|
m_get.assert_called_once_with(
|
|
'http://localhost:%d' % CONF.kubernetes.controller_ha_elector_port)
|
|
self.assertIsNone(res)
|
|
|
|
@mock.patch('requests.get')
|
|
def test_get_leader_name_exc(self, m_get):
|
|
m_get.side_effect = Exception
|
|
res = utils.get_leader_name()
|
|
m_get.assert_called_once_with(
|
|
'http://localhost:%d' % CONF.kubernetes.controller_ha_elector_port)
|
|
self.assertIsNone(res)
|
|
|
|
@mock.patch('kuryr_kubernetes.os_vif_util.neutron_to_osvif_network')
|
|
@mock.patch('kuryr_kubernetes.os_vif_util.neutron_to_osvif_subnet')
|
|
def test_get_subnet(self, m_osv_subnet, m_osv_network):
|
|
os_net = self.useFixture(k_fix.MockNetworkClient()).client
|
|
|
|
subnet = mock.MagicMock()
|
|
network = mock.MagicMock()
|
|
subnet_id = mock.sentinel.subnet_id
|
|
network_id = mock.sentinel.network_id
|
|
|
|
neutron_subnet = munch.Munch({'network_id': network_id})
|
|
neutron_network = mock.sentinel.neutron_network
|
|
|
|
os_net.get_subnet.return_value = neutron_subnet
|
|
os_net.get_network.return_value = neutron_network
|
|
|
|
m_osv_subnet.return_value = subnet
|
|
m_osv_network.return_value = network
|
|
|
|
ret = utils.get_subnet(subnet_id)
|
|
|
|
self.assertEqual(network, ret)
|
|
os_net.get_subnet.assert_called_once_with(subnet_id)
|
|
os_net.get_network.assert_called_once_with(network_id)
|
|
m_osv_subnet.assert_called_once_with(neutron_subnet)
|
|
m_osv_network.assert_called_once_with(neutron_network)
|
|
network.subnets.objects.append.assert_called_once_with(subnet)
|
|
|
|
def test_extract_pod_annotation(self):
|
|
vif_obj = objects.vif.VIFBase()
|
|
ps = vif.PodState(default_vif=vif_obj)
|
|
d = ps.obj_to_primitive()
|
|
result = utils.extract_pod_annotation(d)
|
|
self.assertEqual(vif.PodState.obj_name(), result.obj_name())
|
|
self.assertEqual(vif_obj, result.default_vif)
|
|
|
|
def test_extract_pod_annotation_convert(self):
|
|
vif_obj = objects.vif.VIFBase()
|
|
d = vif_obj.obj_to_primitive()
|
|
result = utils.extract_pod_annotation(d)
|
|
self.assertEqual(vif.PodState.obj_name(), result.obj_name())
|
|
self.assertEqual(vif_obj, result.default_vif)
|
|
|
|
def test__has_kuryrnet_crd(self):
|
|
kuryrnet_crd = {
|
|
"apiVersion": "openstack.org/v1",
|
|
"items": [
|
|
|
|
],
|
|
"kind": "KuryrNetList",
|
|
"metadata": {
|
|
"continue": "",
|
|
"resourceVersion": "33018",
|
|
"selfLink": "/apis/openstack.org/v1/kuryrnets"
|
|
}
|
|
}
|
|
|
|
kubernetes = self.useFixture(k_fix.MockK8sClient()).client
|
|
kubernetes.get.return_value = kuryrnet_crd
|
|
|
|
kuryrnets_url = k_const.K8S_API_CRD_KURYRNETS
|
|
resp = utils.has_kuryr_crd(kuryrnets_url)
|
|
|
|
self.assertEqual(resp, True)
|
|
|
|
def test__has_kuryrnetpolicy_crd(self):
|
|
kuryrnetpolicies_crd = {
|
|
"apiVersion": "openstack.org/v1",
|
|
"items": [
|
|
|
|
],
|
|
"kind": "KuryrNetPolicyList",
|
|
"metadata": {
|
|
"continue": "",
|
|
"resourceVersion": "34186",
|
|
"selfLink": "/apis/openstack.org/v1/kuryrnetpolicies"
|
|
}
|
|
}
|
|
kubernetes = self.useFixture(k_fix.MockK8sClient()).client
|
|
kubernetes.get.return_value = kuryrnetpolicies_crd
|
|
|
|
kuryrnetpolicies_url = k_const.K8S_API_CRD_KURYRNETPOLICIES
|
|
resp = utils.has_kuryr_crd(kuryrnetpolicies_url)
|
|
|
|
self.assertEqual(resp, True)
|
|
|
|
def test__has_kuryr_crd_error(self):
|
|
crds = [k_const.K8S_API_CRD_KURYRNETS,
|
|
k_const.K8S_API_CRD_KURYRNETPOLICIES,
|
|
k_const.K8S_API_CRD_KURYRLOADBALANCERS]
|
|
|
|
for crd_url in crds:
|
|
kubernetes = self.useFixture(k_fix.MockK8sClient()).client
|
|
kubernetes.get.side_effect = k_exc.K8sClientException
|
|
|
|
resp = utils.has_kuryr_crd(crd_url)
|
|
self.assertEqual(resp, False)
|
|
|
|
kubernetes.get.assert_called_once()
|
|
|
|
def test_get_endpoints_link(self):
|
|
service = {'metadata': {
|
|
'selfLink': "/api/v1/namespaces/default/services/test"}}
|
|
ret = utils.get_endpoints_link(service)
|
|
expected_link = "/api/v1/namespaces/default/endpoints/test"
|
|
self.assertEqual(expected_link, ret)
|
|
|
|
def test_get_service_ports(self):
|
|
service = {'spec': {'ports': [
|
|
{'port': 1, 'targetPort': 1},
|
|
{'port': 2, 'name': 'X', 'protocol': 'UDP', 'targetPort': 2}
|
|
]}}
|
|
expected_ret = [
|
|
{'port': 1, 'name': None, 'protocol': 'TCP', 'targetPort': '1'},
|
|
{'port': 2, 'name': 'X', 'protocol': 'UDP', 'targetPort': '2'}]
|
|
|
|
ret = utils.get_service_ports(service)
|
|
self.assertEqual(expected_ret, ret)
|
|
|
|
@mock.patch('kuryr_kubernetes.utils.get_service_ports')
|
|
def test_has_port_changes(self, m_get_service_ports):
|
|
service = {
|
|
'metadata': {
|
|
'selfLink': ""
|
|
},
|
|
'spec': {
|
|
'ports': [
|
|
{
|
|
'port': 1,
|
|
'name': 'X',
|
|
'protocol': 'TCP',
|
|
'targetPort': '1'
|
|
}
|
|
]
|
|
}
|
|
}
|
|
lb_crd_spec = {
|
|
'spec': {
|
|
'ports': [
|
|
{
|
|
'name': 'Y',
|
|
'protocol': 'TCP',
|
|
'port': 2,
|
|
'targetPort': 2
|
|
}
|
|
]
|
|
}
|
|
}
|
|
ret = utils.has_port_changes(service, lb_crd_spec)
|
|
self.assertTrue(ret)
|
|
|
|
@mock.patch('kuryr_kubernetes.utils.get_service_ports')
|
|
def test_has_port_changes_more_ports(self, m_get_service_ports):
|
|
service = {
|
|
'metadata': {
|
|
'selfLink': ""
|
|
},
|
|
'spec': {
|
|
'ports': [
|
|
{
|
|
'port': 1,
|
|
'name': 'X',
|
|
'protocol': 'TCP',
|
|
'targetPort': '1'
|
|
}
|
|
]
|
|
}
|
|
}
|
|
lb_crd_spec = {
|
|
'spec': {
|
|
'ports': [
|
|
{
|
|
'name': 'X',
|
|
'protocol': 'TCP',
|
|
'port': 1,
|
|
'targetPort': 1
|
|
},
|
|
{
|
|
'name': 'Y',
|
|
'protocol': 'TCP',
|
|
'port': 2,
|
|
'targetPort': 2
|
|
}
|
|
]
|
|
}
|
|
}
|
|
|
|
ret = utils.has_port_changes(service, lb_crd_spec)
|
|
self.assertTrue(ret)
|
|
|
|
@mock.patch('kuryr_kubernetes.utils.get_service_ports')
|
|
def test_has_port_changes_no_changes(self, m_get_service_ports):
|
|
|
|
service = {
|
|
'metadata': {
|
|
'selfLink': ""
|
|
},
|
|
'spec': {
|
|
'ports': [
|
|
{
|
|
'port': 1,
|
|
'name': 'X',
|
|
'protocol': 'TCP',
|
|
'targetPort': '1'
|
|
},
|
|
{
|
|
'name': 'Y',
|
|
'protocol': 'TCP',
|
|
'port': 2,
|
|
'targetPort': '2'
|
|
}
|
|
]
|
|
}
|
|
}
|
|
|
|
lb_crd_spec = {
|
|
'spec': {
|
|
'ports': [
|
|
{
|
|
'name': 'X',
|
|
'protocol': 'TCP',
|
|
'port': 1,
|
|
'targetPort': '1'
|
|
},
|
|
{
|
|
'name': 'Y',
|
|
'protocol': 'TCP',
|
|
'port': 2,
|
|
'targetPort': '2'
|
|
}
|
|
]
|
|
}
|
|
}
|
|
|
|
ret = utils.has_port_changes(service, lb_crd_spec)
|
|
self.assertFalse(ret)
|
|
|
|
def test_get_nodes_ips(self):
|
|
os_net = self.useFixture(k_fix.MockNetworkClient()).client
|
|
ip1 = munch.Munch({'fixed_ips': [{'ip_address': '10.0.0.1'}],
|
|
'trunk_details': True})
|
|
ip2 = munch.Munch({'fixed_ips': [{'ip_address': '10.0.0.2'}],
|
|
'trunk_details': True})
|
|
ip3 = munch.Munch({'fixed_ips': [{'ip_address': '10.0.0.3'}],
|
|
'trunk_details': None})
|
|
ports = (p for p in [ip1, ip2, ip3])
|
|
|
|
os_net.ports.return_value = ports
|
|
trunk_ips = utils.get_nodes_ips()
|
|
os_net.ports.assert_called_once_with(status='ACTIVE')
|
|
self.assertEqual(trunk_ips, [ip1.fixed_ips[0]['ip_address'],
|
|
ip2.fixed_ips[0]['ip_address']])
|
|
|
|
def test_get_nodes_ips_tagged(self):
|
|
CONF.set_override('resource_tags', ['foo'], group='neutron_defaults')
|
|
self.addCleanup(CONF.clear_override, 'resource_tags',
|
|
group='neutron_defaults')
|
|
|
|
os_net = self.useFixture(k_fix.MockNetworkClient()).client
|
|
ip1 = munch.Munch({'fixed_ips': [{'ip_address': '10.0.0.1'}],
|
|
'trunk_details': True})
|
|
ip2 = munch.Munch({'fixed_ips': [{'ip_address': '10.0.0.2'}],
|
|
'trunk_details': False})
|
|
ports = (p for p in [ip1, ip2])
|
|
|
|
os_net.ports.return_value = ports
|
|
trunk_ips = utils.get_nodes_ips()
|
|
os_net.ports.assert_called_once_with(status='ACTIVE', tags=['foo'])
|
|
self.assertEqual(trunk_ips, [ip1.fixed_ips[0]['ip_address']])
|
|
|
|
def test_get_subnet_cidr(self):
|
|
os_net = self.useFixture(k_fix.MockNetworkClient()).client
|
|
subnet_id = mock.sentinel.subnet_id
|
|
subnet = munch.Munch(cidr='10.0.0.0/24')
|
|
os_net.get_subnet.return_value = subnet
|
|
|
|
result = utils.get_subnet_cidr(subnet_id)
|
|
os_net.get_subnet.assert_called_once_with(subnet_id)
|
|
self.assertEqual(result, '10.0.0.0/24')
|
|
|
|
def test_get_subnet_cidr_no_such_subnet(self):
|
|
os_net = self.useFixture(k_fix.MockNetworkClient()).client
|
|
subnet_id = mock.sentinel.subnet_id
|
|
os_net.get_subnet.side_effect = os_exc.ResourceNotFound
|
|
|
|
self.assertRaises(os_exc.ResourceNotFound, utils.get_subnet_cidr,
|
|
subnet_id)
|
|
os_net.get_subnet.assert_called_once_with(subnet_id)
|