123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505 |
- /*
- Copyright 2015 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package container
- import (
- "reflect"
- "testing"
- "github.com/stretchr/testify/assert"
- "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- )
- func TestEnvVarsToMap(t *testing.T) {
- vars := []EnvVar{
- {
- Name: "foo",
- Value: "bar",
- },
- {
- Name: "zoo",
- Value: "baz",
- },
- }
- varMap := EnvVarsToMap(vars)
- if e, a := len(vars), len(varMap); e != a {
- t.Errorf("Unexpected map length; expected: %d, got %d", e, a)
- }
- if a := varMap["foo"]; a != "bar" {
- t.Errorf("Unexpected value of key 'foo': %v", a)
- }
- if a := varMap["zoo"]; a != "baz" {
- t.Errorf("Unexpected value of key 'zoo': %v", a)
- }
- }
- func TestExpandCommandAndArgs(t *testing.T) {
- cases := []struct {
- name string
- container *v1.Container
- envs []EnvVar
- expectedCommand []string
- expectedArgs []string
- }{
- {
- name: "none",
- container: &v1.Container{},
- },
- {
- name: "command expanded",
- container: &v1.Container{
- Command: []string{"foo", "$(VAR_TEST)", "$(VAR_TEST2)"},
- },
- envs: []EnvVar{
- {
- Name: "VAR_TEST",
- Value: "zoo",
- },
- {
- Name: "VAR_TEST2",
- Value: "boo",
- },
- },
- expectedCommand: []string{"foo", "zoo", "boo"},
- },
- {
- name: "args expanded",
- container: &v1.Container{
- Args: []string{"zap", "$(VAR_TEST)", "$(VAR_TEST2)"},
- },
- envs: []EnvVar{
- {
- Name: "VAR_TEST",
- Value: "hap",
- },
- {
- Name: "VAR_TEST2",
- Value: "trap",
- },
- },
- expectedArgs: []string{"zap", "hap", "trap"},
- },
- {
- name: "both expanded",
- container: &v1.Container{
- Command: []string{"$(VAR_TEST2)--$(VAR_TEST)", "foo", "$(VAR_TEST3)"},
- Args: []string{"foo", "$(VAR_TEST)", "$(VAR_TEST2)"},
- },
- envs: []EnvVar{
- {
- Name: "VAR_TEST",
- Value: "zoo",
- },
- {
- Name: "VAR_TEST2",
- Value: "boo",
- },
- {
- Name: "VAR_TEST3",
- Value: "roo",
- },
- },
- expectedCommand: []string{"boo--zoo", "foo", "roo"},
- expectedArgs: []string{"foo", "zoo", "boo"},
- },
- }
- for _, tc := range cases {
- actualCommand, actualArgs := ExpandContainerCommandAndArgs(tc.container, tc.envs)
- if e, a := tc.expectedCommand, actualCommand; !reflect.DeepEqual(e, a) {
- t.Errorf("%v: unexpected command; expected %v, got %v", tc.name, e, a)
- }
- if e, a := tc.expectedArgs, actualArgs; !reflect.DeepEqual(e, a) {
- t.Errorf("%v: unexpected args; expected %v, got %v", tc.name, e, a)
- }
- }
- }
- func TestExpandVolumeMountsWithSubpath(t *testing.T) {
- cases := []struct {
- name string
- container *v1.Container
- envs []EnvVar
- expectedSubPath string
- expectedMountPath string
- expectedOk bool
- }{
- {
- name: "subpath with no expansion",
- container: &v1.Container{
- VolumeMounts: []v1.VolumeMount{{SubPathExpr: "foo"}},
- },
- expectedSubPath: "foo",
- expectedMountPath: "",
- expectedOk: true,
- },
- {
- name: "volumes with expanded subpath",
- container: &v1.Container{
- VolumeMounts: []v1.VolumeMount{{SubPathExpr: "foo/$(POD_NAME)"}},
- },
- envs: []EnvVar{
- {
- Name: "POD_NAME",
- Value: "bar",
- },
- },
- expectedSubPath: "foo/bar",
- expectedMountPath: "",
- expectedOk: true,
- },
- {
- name: "volumes expanded with empty subpath",
- container: &v1.Container{
- VolumeMounts: []v1.VolumeMount{{SubPathExpr: ""}},
- },
- envs: []EnvVar{
- {
- Name: "POD_NAME",
- Value: "bar",
- },
- },
- expectedSubPath: "",
- expectedMountPath: "",
- expectedOk: true,
- },
- {
- name: "volumes expanded with no envs subpath",
- container: &v1.Container{
- VolumeMounts: []v1.VolumeMount{{SubPathExpr: "/foo/$(POD_NAME)"}},
- },
- expectedSubPath: "/foo/$(POD_NAME)",
- expectedMountPath: "",
- expectedOk: false,
- },
- {
- name: "volumes expanded with leading environment variable",
- container: &v1.Container{
- VolumeMounts: []v1.VolumeMount{{SubPathExpr: "$(POD_NAME)/bar"}},
- },
- envs: []EnvVar{
- {
- Name: "POD_NAME",
- Value: "foo",
- },
- },
- expectedSubPath: "foo/bar",
- expectedMountPath: "",
- expectedOk: true,
- },
- {
- name: "volumes with volume and subpath",
- container: &v1.Container{
- VolumeMounts: []v1.VolumeMount{{MountPath: "/foo", SubPathExpr: "$(POD_NAME)/bar"}},
- },
- envs: []EnvVar{
- {
- Name: "POD_NAME",
- Value: "foo",
- },
- },
- expectedSubPath: "foo/bar",
- expectedMountPath: "/foo",
- expectedOk: true,
- },
- {
- name: "volumes with volume and no subpath",
- container: &v1.Container{
- VolumeMounts: []v1.VolumeMount{{MountPath: "/foo"}},
- },
- envs: []EnvVar{
- {
- Name: "POD_NAME",
- Value: "foo",
- },
- },
- expectedSubPath: "",
- expectedMountPath: "/foo",
- expectedOk: true,
- },
- {
- name: "subpaths with empty environment variable",
- container: &v1.Container{
- VolumeMounts: []v1.VolumeMount{{SubPathExpr: "foo/$(POD_NAME)/$(ANNOTATION)"}},
- },
- envs: []EnvVar{
- {
- Name: "ANNOTATION",
- Value: "",
- },
- },
- expectedSubPath: "foo/$(POD_NAME)/$(ANNOTATION)",
- expectedMountPath: "",
- expectedOk: false,
- },
- {
- name: "subpaths with missing env variables",
- container: &v1.Container{
- VolumeMounts: []v1.VolumeMount{{SubPathExpr: "foo/$(ODD_NAME)/$(POD_NAME)"}},
- },
- envs: []EnvVar{
- {
- Name: "ODD_NAME",
- Value: "bar",
- },
- },
- expectedSubPath: "foo/$(ODD_NAME)/$(POD_NAME)",
- expectedMountPath: "",
- expectedOk: false,
- },
- {
- name: "subpaths with empty expansion",
- container: &v1.Container{
- VolumeMounts: []v1.VolumeMount{{SubPathExpr: "$()"}},
- },
- expectedSubPath: "$()",
- expectedMountPath: "",
- expectedOk: false,
- },
- {
- name: "subpaths with nested expandable envs",
- container: &v1.Container{
- VolumeMounts: []v1.VolumeMount{{SubPathExpr: "$(POD_NAME$(ANNOTATION))"}},
- },
- envs: []EnvVar{
- {
- Name: "POD_NAME",
- Value: "foo",
- },
- {
- Name: "ANNOTATION",
- Value: "bar",
- },
- },
- expectedSubPath: "$(POD_NAME$(ANNOTATION))",
- expectedMountPath: "",
- expectedOk: false,
- },
- }
- for _, tc := range cases {
- actualSubPath, err := ExpandContainerVolumeMounts(tc.container.VolumeMounts[0], tc.envs)
- ok := err == nil
- if e, a := tc.expectedOk, ok; !reflect.DeepEqual(e, a) {
- t.Errorf("%v: unexpected validation failure of subpath; expected %v, got %v", tc.name, e, a)
- }
- if !ok {
- // if ExpandContainerVolumeMounts returns an error, we don't care what the actualSubPath value is
- continue
- }
- if e, a := tc.expectedSubPath, actualSubPath; !reflect.DeepEqual(e, a) {
- t.Errorf("%v: unexpected subpath; expected %v, got %v", tc.name, e, a)
- }
- if e, a := tc.expectedMountPath, tc.container.VolumeMounts[0].MountPath; !reflect.DeepEqual(e, a) {
- t.Errorf("%v: unexpected mountpath; expected %v, got %v", tc.name, e, a)
- }
- }
- }
- func TestShouldContainerBeRestarted(t *testing.T) {
- pod := &v1.Pod{
- ObjectMeta: metav1.ObjectMeta{
- UID: "12345678",
- Name: "foo",
- Namespace: "new",
- },
- Spec: v1.PodSpec{
- Containers: []v1.Container{
- {Name: "no-history"},
- {Name: "alive"},
- {Name: "succeed"},
- {Name: "failed"},
- {Name: "unknown"},
- },
- },
- }
- podStatus := &PodStatus{
- ID: pod.UID,
- Name: pod.Name,
- Namespace: pod.Namespace,
- ContainerStatuses: []*ContainerStatus{
- {
- Name: "alive",
- State: ContainerStateRunning,
- },
- {
- Name: "succeed",
- State: ContainerStateExited,
- ExitCode: 0,
- },
- {
- Name: "failed",
- State: ContainerStateExited,
- ExitCode: 1,
- },
- {
- Name: "alive",
- State: ContainerStateExited,
- ExitCode: 2,
- },
- {
- Name: "unknown",
- State: ContainerStateUnknown,
- },
- {
- Name: "failed",
- State: ContainerStateExited,
- ExitCode: 3,
- },
- },
- }
- policies := []v1.RestartPolicy{
- v1.RestartPolicyNever,
- v1.RestartPolicyOnFailure,
- v1.RestartPolicyAlways,
- }
- expected := map[string][]bool{
- "no-history": {true, true, true},
- "alive": {false, false, false},
- "succeed": {false, false, true},
- "failed": {false, true, true},
- "unknown": {true, true, true},
- }
- for _, c := range pod.Spec.Containers {
- for i, policy := range policies {
- pod.Spec.RestartPolicy = policy
- e := expected[c.Name][i]
- r := ShouldContainerBeRestarted(&c, pod, podStatus)
- if r != e {
- t.Errorf("Restart for container %q with restart policy %q expected %t, got %t",
- c.Name, policy, e, r)
- }
- }
- }
- }
- func TestHasPrivilegedContainer(t *testing.T) {
- newBoolPtr := func(b bool) *bool {
- return &b
- }
- tests := map[string]struct {
- securityContext *v1.SecurityContext
- expected bool
- }{
- "nil security context": {
- securityContext: nil,
- expected: false,
- },
- "nil privileged": {
- securityContext: &v1.SecurityContext{},
- expected: false,
- },
- "false privileged": {
- securityContext: &v1.SecurityContext{Privileged: newBoolPtr(false)},
- expected: false,
- },
- "true privileged": {
- securityContext: &v1.SecurityContext{Privileged: newBoolPtr(true)},
- expected: true,
- },
- }
- for k, v := range tests {
- pod := &v1.Pod{
- Spec: v1.PodSpec{
- Containers: []v1.Container{
- {SecurityContext: v.securityContext},
- },
- },
- }
- actual := HasPrivilegedContainer(pod)
- if actual != v.expected {
- t.Errorf("%s expected %t but got %t", k, v.expected, actual)
- }
- }
- // Test init containers as well.
- for k, v := range tests {
- pod := &v1.Pod{
- Spec: v1.PodSpec{
- InitContainers: []v1.Container{
- {SecurityContext: v.securityContext},
- },
- },
- }
- actual := HasPrivilegedContainer(pod)
- if actual != v.expected {
- t.Errorf("%s expected %t but got %t", k, v.expected, actual)
- }
- }
- }
- func TestMakePortMappings(t *testing.T) {
- port := func(name string, protocol v1.Protocol, containerPort, hostPort int32, ip string) v1.ContainerPort {
- return v1.ContainerPort{
- Name: name,
- Protocol: protocol,
- ContainerPort: containerPort,
- HostPort: hostPort,
- HostIP: ip,
- }
- }
- portMapping := func(name string, protocol v1.Protocol, containerPort, hostPort int, ip string) PortMapping {
- return PortMapping{
- Name: name,
- Protocol: protocol,
- ContainerPort: containerPort,
- HostPort: hostPort,
- HostIP: ip,
- }
- }
- tests := []struct {
- container *v1.Container
- expectedPortMappings []PortMapping
- }{
- {
- &v1.Container{
- Name: "fooContainer",
- Ports: []v1.ContainerPort{
- port("", v1.ProtocolTCP, 80, 8080, "127.0.0.1"),
- port("", v1.ProtocolTCP, 443, 4343, "192.168.0.1"),
- port("foo", v1.ProtocolUDP, 555, 5555, ""),
- // Duplicated, should be ignored.
- port("foo", v1.ProtocolUDP, 888, 8888, ""),
- // Duplicated, should be ignored.
- port("", v1.ProtocolTCP, 80, 8888, ""),
- },
- },
- []PortMapping{
- portMapping("fooContainer-TCP:80", v1.ProtocolTCP, 80, 8080, "127.0.0.1"),
- portMapping("fooContainer-TCP:443", v1.ProtocolTCP, 443, 4343, "192.168.0.1"),
- portMapping("fooContainer-foo", v1.ProtocolUDP, 555, 5555, ""),
- },
- },
- }
- for i, tt := range tests {
- actual := MakePortMappings(tt.container)
- assert.Equal(t, tt.expectedPortMappings, actual, "[%d]", i)
- }
- }
|