mirror of
https://github.com/kubernetes-sigs/external-dns.git
synced 2025-08-05 09:06:58 +02:00
* Add annotation filter to Ambassador Host Source This change makes the Ambassador Host source respect the External-DNS annotationFilter allowing for an Ambassador Host resource to specify what External-DNS deployment to use when there are multiple External-DNS deployments within the same cluster. Before this change if you had two External-DNS deployments within the cluster and used the Ambassador Host source the first External-DNS to process the resource will create the record and not the one that was specified in the filter annotation. I added the `filterByAnnotations` function so that it matched the same way the other sources have implemented annotation filtering. I didn't add the controller check only because I wanted to keep this change to implementing the annotationFilter. Example: Create two External-DNS deployments 1 public and 1 private and set the Ambassador Host to use the public External-DNS using the annotation filter. ``` --- apiVersion: apps/v1 kind: Deployment metadata: name: external-dns-private spec: strategy: type: Recreate selector: matchLabels: app: external-dns-private template: metadata: labels: app: external-dns-private annotations: iam.amazonaws.com/role: {ARN} # AWS ARN role spec: serviceAccountName: external-dns containers: - name: external-dns image: k8s.gcr.io/external-dns/external-dns:latest args: - --source=ambassador-host - --domain-filter=example.net # will make ExternalDNS see only the hosted zones matching provided domain, omit to process all available hosted zones - --provider=aws - --policy=upsert-only # would prevent ExternalDNS from deleting any records, omit to enable full synchronization - --aws-zone-type=private # only look at public hosted zones (valid values are public, private or no value for both) - --registry=txt - --txt-owner-id= {Hosted Zone ID} # Insert Route53 Hosted Zone ID here - --annotation-filter=kubernetes.io/ingress.class in (private) --- apiVersion: apps/v1 kind: Deployment metadata: name: external-dns-public spec: strategy: type: Recreate selector: matchLabels: app: external-dns-public template: metadata: labels: app: external-dns-public annotations: iam.amazonaws.com/role: {ARN} # AWS ARN role spec: serviceAccountName: external-dns containers: - name: external-dns image: k8s.gcr.io/external-dns/external-dns:latest args: - --source=ambassador-host - --domain-filter=example.net # will make ExternalDNS see only the hosted zones matching provided domain, omit to process all available hosted zones - --provider=aws - --policy=upsert-only # would prevent ExternalDNS from deleting any records, omit to enable full synchronization - --aws-zone-type= # only look at public hosted zones (valid values are public, private or no value for both) - --registry=txt - --txt-owner-id= {Hosted Zone ID} # Insert Route53 Hosted Zone ID here - --annotation-filter=kubernetes.io/ingress.class in (public) --- apiVersion: getambassador.io/v3alpha1 kind: Host metadata: name: your-hostname annotations: external-dns.ambassador-service: emissary-ingress/emissary kubernetes.io/ingress.class: public spec: acmeProvider: authority: none hostname: your-hostname.example.com ``` Fixes kubernetes-sigs/external-dns#2632 * Add Label filltering for Ambassador Host source Currently the `--label-filter` flag can only be used to filter CRDs, Ingress, Service and Openshift Route objects which match the label selector passed through that flag. This change extends the functionality to the Ambassador Host type object. When the flag is not specified the default value is `labels.Everything()` which is an empty string, the same as before. An annotation based filter is inefficient because the filtering has to be done in the controller instead of the API server like with label filtering. The Annotation based filtering has been left in for legacy reasons so the Ambassador Host source can be used inconjunction with the other sources that don't yet support label filltering. It is possible to use label based filltering with annotation based filltering so you can initially filter by label then filter the returned hosts by annotation. This is not recomended * Update Ambassador Host source docs Add that the Ambassador Host source now supports both annotation and label filltering.
696 lines
19 KiB
Go
696 lines
19 KiB
Go
/*
|
|
Copyright 2019 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package source
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"testing"
|
|
|
|
ambassador "github.com/datawire/ambassador/pkg/api/getambassador.io/v2"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"github.com/stretchr/testify/suite"
|
|
v1 "k8s.io/api/core/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
|
|
"k8s.io/apimachinery/pkg/labels"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
fakeDynamic "k8s.io/client-go/dynamic/fake"
|
|
fakeKube "k8s.io/client-go/kubernetes/fake"
|
|
"sigs.k8s.io/external-dns/endpoint"
|
|
)
|
|
|
|
const defaultAmbassadorNamespace = "ambassador"
|
|
const defaultAmbassadorServiceName = "ambassador"
|
|
|
|
// This is a compile-time validation that ambassadorHostSource is a Source.
|
|
var _ Source = &ambassadorHostSource{}
|
|
|
|
type AmbassadorSuite struct {
|
|
suite.Suite
|
|
}
|
|
|
|
func TestAmbassadorSource(t *testing.T) {
|
|
suite.Run(t, new(AmbassadorSuite))
|
|
t.Run("Interface", testAmbassadorSourceImplementsSource)
|
|
}
|
|
|
|
// testAmbassadorSourceImplementsSource tests that ambassadorHostSource is a valid Source.
|
|
func testAmbassadorSourceImplementsSource(t *testing.T) {
|
|
require.Implements(t, (*Source)(nil), new(ambassadorHostSource))
|
|
}
|
|
|
|
func TestAmbassadorHostSource(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
hostAnnotation := fmt.Sprintf("%s/%s", defaultAmbassadorNamespace, defaultAmbassadorServiceName)
|
|
|
|
for _, ti := range []struct {
|
|
title string
|
|
annotationFilter string
|
|
labelSelector labels.Selector
|
|
host ambassador.Host
|
|
service v1.Service
|
|
expected []*endpoint.Endpoint
|
|
}{
|
|
{
|
|
title: "Simple host",
|
|
labelSelector: labels.Everything(),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "www.example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"1.1.1.1"},
|
|
},
|
|
},
|
|
}, {
|
|
title: "Service with load balancer hostname",
|
|
labelSelector: labels.Everything(),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
Hostname: "dns.google",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "www.example.org",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"dns.google"},
|
|
},
|
|
},
|
|
}, {
|
|
title: "Service with external IP",
|
|
labelSelector: labels.Everything(),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "service-external-ip",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Spec: v1.ServiceSpec{
|
|
ExternalIPs: []string{"2.2.2.2"},
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "www.example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"2.2.2.2"},
|
|
},
|
|
},
|
|
}, {
|
|
title: "Host with target annotation",
|
|
labelSelector: labels.Everything(),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
targetAnnotationKey: "3.3.3.3",
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "www.example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"3.3.3.3"},
|
|
},
|
|
},
|
|
}, {
|
|
title: "Host with TTL annotation",
|
|
labelSelector: labels.Everything(),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
ttlAnnotationKey: "180",
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "www.example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"1.1.1.1"},
|
|
RecordTTL: 180,
|
|
},
|
|
},
|
|
}, {
|
|
title: "Host with provider specific annotation",
|
|
labelSelector: labels.Everything(),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
CloudflareProxiedKey: "true",
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "www.example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"1.1.1.1"},
|
|
ProviderSpecific: endpoint.ProviderSpecific{{
|
|
Name: "external-dns.alpha.kubernetes.io/cloudflare-proxied",
|
|
Value: "true",
|
|
}},
|
|
},
|
|
},
|
|
}, {
|
|
title: "Host with missing Ambassador annotation",
|
|
labelSelector: labels.Everything(),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
}, {
|
|
title: "valid matching annotation filter expression",
|
|
annotationFilter: "kubernetes.io/ingress.class in (external-ingress)",
|
|
labelSelector: labels.Everything(),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
"kubernetes.io/ingress.class": "external-ingress",
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "www.example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"1.1.1.1"},
|
|
},
|
|
},
|
|
}, {
|
|
title: "valid non-matching annotation filter expression",
|
|
annotationFilter: "kubernetes.io/ingress.class in (external-ingress)",
|
|
labelSelector: labels.Everything(),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
"kubernetes.io/ingress.class": "internal-ingress",
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
}, {
|
|
title: "invalid annotation filter expression",
|
|
annotationFilter: "kubernetes.io/ingress.class in (invalid-ingress)",
|
|
labelSelector: labels.Everything(),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
"kubernetes.io/ingress.class": "external-ingress",
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
}, {
|
|
title: "valid non-matching annotation filter label",
|
|
annotationFilter: "kubernetes.io/ingress.class=external-ingress",
|
|
labelSelector: labels.Everything(),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
"kubernetes.io/ingress.class": "internal-ingress",
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
},
|
|
{
|
|
title: "valid non-matching label filter expression",
|
|
labelSelector: labels.SelectorFromSet(labels.Set{"kubernetes.io/ingress.class": "external-ingress"}),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
"kubernetes.io/ingress.class": "internal-ingress",
|
|
},
|
|
Labels: map[string]string{
|
|
"kubernetes.io/ingress.class": "internal-ingress",
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
},
|
|
{
|
|
title: "valid matching label filter expression for single host",
|
|
labelSelector: labels.SelectorFromSet(labels.Set{"kubernetes.io/ingress.class": "external-ingress"}),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
},
|
|
Labels: map[string]string{
|
|
"kubernetes.io/ingress.class": "external-ingress",
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
Hostname: "dns.google",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "www.example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"1.1.1.1"},
|
|
},
|
|
{
|
|
DNSName: "www.example.org",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"dns.google"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "valid matching label filter expression and matching annotation filter",
|
|
annotationFilter: "kubernetes.io/ingress.class in (external-ingress)",
|
|
labelSelector: labels.SelectorFromSet(labels.Set{"kubernetes.io/ingress.class": "external-ingress"}),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
"kubernetes.io/ingress.class": "external-ingress",
|
|
},
|
|
Labels: map[string]string{
|
|
"kubernetes.io/ingress.class": "external-ingress",
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
Hostname: "dns.google",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "www.example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"1.1.1.1"},
|
|
},
|
|
{
|
|
DNSName: "www.example.org",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"dns.google"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "valid non matching label filter expression and valid matching annotation filter",
|
|
annotationFilter: "kubernetes.io/ingress.class in (external-ingress)",
|
|
labelSelector: labels.SelectorFromSet(labels.Set{"kubernetes.io/ingress.class": "external-ingress"}),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
"kubernetes.io/ingress.class": "external-ingress",
|
|
},
|
|
Labels: map[string]string{
|
|
"kubernetes.io/ingress.class": "internal-ingress",
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
Hostname: "dns.google",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
},
|
|
{
|
|
title: "valid matching label filter expression and non matching annotation filter",
|
|
annotationFilter: "kubernetes.io/ingress.class in (external-ingress)",
|
|
labelSelector: labels.SelectorFromSet(labels.Set{"kubernetes.io/ingress.class": "external-ingress"}),
|
|
host: ambassador.Host{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "basic-host",
|
|
Annotations: map[string]string{
|
|
ambHostAnnotation: hostAnnotation,
|
|
"kubernetes.io/ingress.class": "internal-ingress",
|
|
},
|
|
Labels: map[string]string{
|
|
"kubernetes.io/ingress.class": "external-ingress",
|
|
},
|
|
},
|
|
Spec: &ambassador.HostSpec{
|
|
Hostname: "www.example.org",
|
|
},
|
|
},
|
|
service: v1.Service{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: defaultAmbassadorServiceName,
|
|
},
|
|
Status: v1.ServiceStatus{
|
|
LoadBalancer: v1.LoadBalancerStatus{
|
|
Ingress: []v1.LoadBalancerIngress{{
|
|
IP: "1.1.1.1",
|
|
Hostname: "dns.google",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
},
|
|
} {
|
|
ti := ti
|
|
t.Run(ti.title, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
fakeKubernetesClient := fakeKube.NewSimpleClientset()
|
|
ambassadorScheme := runtime.NewScheme()
|
|
ambassador.AddToScheme(ambassadorScheme)
|
|
fakeDynamicClient := fakeDynamic.NewSimpleDynamicClient(ambassadorScheme)
|
|
|
|
namespace := "default"
|
|
|
|
// Create Ambassador service
|
|
_, err := fakeKubernetesClient.CoreV1().Services(defaultAmbassadorNamespace).Create(context.Background(), &ti.service, metav1.CreateOptions{})
|
|
assert.NoError(t, err)
|
|
|
|
// Create host resource
|
|
host, err := createAmbassadorHost(&ti.host)
|
|
assert.NoError(t, err)
|
|
|
|
_, err = fakeDynamicClient.Resource(ambHostGVR).Namespace(namespace).Create(context.Background(), host, metav1.CreateOptions{})
|
|
assert.NoError(t, err)
|
|
|
|
source, err := NewAmbassadorHostSource(context.TODO(), fakeDynamicClient, fakeKubernetesClient, namespace, ti.annotationFilter, ti.labelSelector)
|
|
assert.NoError(t, err)
|
|
assert.NotNil(t, source)
|
|
|
|
endpoints, err := source.Endpoints(context.Background())
|
|
assert.NoError(t, err)
|
|
// Validate returned endpoints against expected endpoints.
|
|
validateEndpoints(t, endpoints, ti.expected)
|
|
})
|
|
}
|
|
}
|
|
|
|
func createAmbassadorHost(host *ambassador.Host) (*unstructured.Unstructured, error) {
|
|
obj := &unstructured.Unstructured{}
|
|
uc, _ := newUnstructuredConverter()
|
|
err := uc.scheme.Convert(host, obj, nil)
|
|
|
|
return obj, err
|
|
}
|
|
|
|
// TestParseAmbLoadBalancerService tests our parsing of Ambassador service info.
|
|
func TestParseAmbLoadBalancerService(t *testing.T) {
|
|
vectors := []struct {
|
|
input string
|
|
ns string
|
|
svc string
|
|
errstr string
|
|
}{
|
|
{"svc", "default", "svc", ""},
|
|
{"ns/svc", "ns", "svc", ""},
|
|
{"svc.ns", "ns", "svc", ""},
|
|
{"svc.ns.foo.bar", "ns.foo.bar", "svc", ""},
|
|
{"ns/svc/foo/bar", "", "", "invalid external-dns service: ns/svc/foo/bar"},
|
|
{"ns/svc/foo.bar", "", "", "invalid external-dns service: ns/svc/foo.bar"},
|
|
{"ns.foo/svc/bar", "", "", "invalid external-dns service: ns.foo/svc/bar"},
|
|
}
|
|
|
|
for _, v := range vectors {
|
|
ns, svc, err := parseAmbLoadBalancerService(v.input)
|
|
|
|
errstr := ""
|
|
|
|
if err != nil {
|
|
errstr = err.Error()
|
|
}
|
|
if v.ns != ns {
|
|
t.Errorf("%s: got ns \"%s\", wanted \"%s\"", v.input, ns, v.ns)
|
|
}
|
|
|
|
if v.svc != svc {
|
|
t.Errorf("%s: got svc \"%s\", wanted \"%s\"", v.input, svc, v.svc)
|
|
}
|
|
|
|
if v.errstr != errstr {
|
|
t.Errorf("%s: got err \"%s\", wanted \"%s\"", v.input, errstr, v.errstr)
|
|
}
|
|
}
|
|
}
|