mirror of
https://github.com/kubernetes-sigs/external-dns.git
synced 2025-08-05 17:16:59 +02:00
1485 lines
39 KiB
Go
1485 lines
39 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package source
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"github.com/stretchr/testify/suite"
|
|
networkv1 "k8s.io/api/networking/v1"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/labels"
|
|
"k8s.io/client-go/kubernetes/fake"
|
|
|
|
"sigs.k8s.io/external-dns/endpoint"
|
|
)
|
|
|
|
// Validates that ingressSource is a Source
|
|
var _ Source = &ingressSource{}
|
|
|
|
type IngressSuite struct {
|
|
suite.Suite
|
|
sc Source
|
|
fooWithTargets *networkv1.Ingress
|
|
}
|
|
|
|
func (suite *IngressSuite) SetupTest() {
|
|
fakeClient := fake.NewSimpleClientset()
|
|
|
|
suite.fooWithTargets = (fakeIngress{
|
|
name: "foo-with-targets",
|
|
namespace: "default",
|
|
dnsnames: []string{"foo"},
|
|
ips: []string{"8.8.8.8"},
|
|
hostnames: []string{"v1"},
|
|
annotations: map[string]string{ALBDualstackAnnotationKey: ALBDualstackAnnotationValue},
|
|
}).Ingress()
|
|
_, err := fakeClient.NetworkingV1().Ingresses(suite.fooWithTargets.Namespace).Create(context.Background(), suite.fooWithTargets, metav1.CreateOptions{})
|
|
suite.NoError(err, "should succeed")
|
|
|
|
suite.sc, err = NewIngressSource(
|
|
context.TODO(),
|
|
fakeClient,
|
|
"",
|
|
"",
|
|
"{{.Name}}",
|
|
false,
|
|
false,
|
|
false,
|
|
false,
|
|
labels.Everything(),
|
|
[]string{},
|
|
)
|
|
suite.NoError(err, "should initialize ingress source")
|
|
}
|
|
|
|
func (suite *IngressSuite) TestResourceLabelIsSet() {
|
|
endpoints, _ := suite.sc.Endpoints(context.Background())
|
|
for _, ep := range endpoints {
|
|
suite.Equal("ingress/default/foo-with-targets", ep.Labels[endpoint.ResourceLabelKey], "should set correct resource label")
|
|
}
|
|
}
|
|
|
|
func (suite *IngressSuite) TestDualstackLabelIsSet() {
|
|
endpoints, _ := suite.sc.Endpoints(context.Background())
|
|
for _, ep := range endpoints {
|
|
suite.Equal("true", ep.Labels[endpoint.DualstackLabelKey], "should set dualstack label to true")
|
|
}
|
|
}
|
|
|
|
func TestIngress(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
suite.Run(t, new(IngressSuite))
|
|
t.Run("endpointsFromIngress", testEndpointsFromIngress)
|
|
t.Run("endpointsFromIngressHostnameSourceAnnotation", testEndpointsFromIngressHostnameSourceAnnotation)
|
|
t.Run("Endpoints", testIngressEndpoints)
|
|
}
|
|
|
|
func TestNewIngressSource(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
for _, ti := range []struct {
|
|
title string
|
|
annotationFilter string
|
|
fqdnTemplate string
|
|
combineFQDNAndAnnotation bool
|
|
expectError bool
|
|
ingressClassNames []string
|
|
}{
|
|
{
|
|
title: "invalid template",
|
|
expectError: true,
|
|
fqdnTemplate: "{{.Name",
|
|
},
|
|
{
|
|
title: "valid empty template",
|
|
expectError: false,
|
|
},
|
|
{
|
|
title: "valid template",
|
|
expectError: false,
|
|
fqdnTemplate: "{{.Name}}-{{.Namespace}}.ext-dns.test.com",
|
|
},
|
|
{
|
|
title: "valid template",
|
|
expectError: false,
|
|
fqdnTemplate: "{{.Name}}-{{.Namespace}}.ext-dns.test.com, {{.Name}}-{{.Namespace}}.ext-dna.test.com",
|
|
},
|
|
{
|
|
title: "valid template",
|
|
expectError: false,
|
|
fqdnTemplate: "{{.Name}}-{{.Namespace}}.ext-dns.test.com, {{.Name}}-{{.Namespace}}.ext-dna.test.com",
|
|
combineFQDNAndAnnotation: true,
|
|
},
|
|
{
|
|
title: "non-empty annotation filter label",
|
|
expectError: false,
|
|
annotationFilter: "kubernetes.io/ingress.class=nginx",
|
|
},
|
|
{
|
|
title: "non-empty ingress class name list",
|
|
expectError: false,
|
|
ingressClassNames: []string{"internal", "external"},
|
|
},
|
|
{
|
|
title: "ingress class name and annotation filter jointly specified",
|
|
expectError: true,
|
|
ingressClassNames: []string{"internal", "external"},
|
|
annotationFilter: "kubernetes.io/ingress.class=nginx",
|
|
},
|
|
} {
|
|
ti := ti
|
|
t.Run(ti.title, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
_, err := NewIngressSource(
|
|
context.TODO(),
|
|
fake.NewSimpleClientset(),
|
|
"",
|
|
ti.annotationFilter,
|
|
ti.fqdnTemplate,
|
|
ti.combineFQDNAndAnnotation,
|
|
false,
|
|
false,
|
|
false,
|
|
labels.Everything(),
|
|
ti.ingressClassNames,
|
|
)
|
|
if ti.expectError {
|
|
assert.Error(t, err)
|
|
} else {
|
|
assert.NoError(t, err)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func testEndpointsFromIngress(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
for _, ti := range []struct {
|
|
title string
|
|
ingress fakeIngress
|
|
ignoreHostnameAnnotation bool
|
|
ignoreIngressTLSSpec bool
|
|
ignoreIngressRulesSpec bool
|
|
expected []*endpoint.Endpoint
|
|
}{
|
|
{
|
|
title: "one rule.host one lb.hostname",
|
|
ingress: fakeIngress{
|
|
dnsnames: []string{"foo.bar"}, // Kubernetes requires removal of trailing dot
|
|
hostnames: []string{"lb.com"}, // Kubernetes omits the trailing dot
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "foo.bar",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"lb.com"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "one rule.host one lb.IP",
|
|
ingress: fakeIngress{
|
|
dnsnames: []string{"foo.bar"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "foo.bar",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"8.8.8.8"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "one rule.host two lb.IP and two lb.Hostname",
|
|
ingress: fakeIngress{
|
|
dnsnames: []string{"foo.bar"},
|
|
ips: []string{"8.8.8.8", "127.0.0.1"},
|
|
hostnames: []string{"elb.com", "alb.com"},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "foo.bar",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"8.8.8.8", "127.0.0.1"},
|
|
},
|
|
{
|
|
DNSName: "foo.bar",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"elb.com", "alb.com"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "no rule.host",
|
|
ingress: fakeIngress{
|
|
ips: []string{"8.8.8.8", "127.0.0.1"},
|
|
hostnames: []string{"elb.com", "alb.com"},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
},
|
|
{
|
|
title: "one empty rule.host",
|
|
ingress: fakeIngress{
|
|
dnsnames: []string{""},
|
|
ips: []string{"8.8.8.8", "127.0.0.1"},
|
|
hostnames: []string{"elb.com", "alb.com"},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
},
|
|
{
|
|
title: "no targets",
|
|
ingress: fakeIngress{
|
|
dnsnames: []string{""},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
},
|
|
{
|
|
title: "ignore rules with one rule.host one lb.hostname",
|
|
ingress: fakeIngress{
|
|
dnsnames: []string{"test"}, // Kubernetes requires removal of trailing dot
|
|
hostnames: []string{"lb.com"}, // Kubernetes omits the trailing dot
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
ignoreIngressRulesSpec: true,
|
|
},
|
|
{
|
|
title: "invalid hostname does not generate endpoints",
|
|
ingress: fakeIngress{
|
|
dnsnames: []string{"this-is-an-exceedingly-long-label-that-external-dns-should-reject.example.org"},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
},
|
|
} {
|
|
t.Run(ti.title, func(t *testing.T) {
|
|
realIngress := ti.ingress.Ingress()
|
|
validateEndpoints(t, endpointsFromIngress(realIngress, ti.ignoreHostnameAnnotation, ti.ignoreIngressTLSSpec, ti.ignoreIngressRulesSpec), ti.expected)
|
|
})
|
|
}
|
|
}
|
|
|
|
func testEndpointsFromIngressHostnameSourceAnnotation(t *testing.T) {
|
|
// Host names and host name annotation provided, with various values of the ingress-hostname-source annotation
|
|
for _, ti := range []struct {
|
|
title string
|
|
ingress fakeIngress
|
|
expected []*endpoint.Endpoint
|
|
}{
|
|
{
|
|
title: "No ingress-hostname-source annotation, one rule.host, one annotation host",
|
|
ingress: fakeIngress{
|
|
dnsnames: []string{"foo.bar"},
|
|
annotations: map[string]string{hostnameAnnotationKey: "foo.baz"},
|
|
hostnames: []string{"lb.com"},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "foo.bar",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"lb.com"},
|
|
},
|
|
{
|
|
DNSName: "foo.baz",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"lb.com"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "No ingress-hostname-source annotation, one rule.host",
|
|
ingress: fakeIngress{
|
|
dnsnames: []string{"foo.bar"},
|
|
hostnames: []string{"lb.com"},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "foo.bar",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"lb.com"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "No ingress-hostname-source annotation, one rule.host, one annotation host",
|
|
ingress: fakeIngress{
|
|
dnsnames: []string{"foo.bar"},
|
|
annotations: map[string]string{hostnameAnnotationKey: "foo.baz"},
|
|
hostnames: []string{"lb.com"},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "foo.bar",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"lb.com"},
|
|
},
|
|
{
|
|
DNSName: "foo.baz",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"lb.com"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "Ingress-hostname-source=defined-hosts-only, one rule.host, one annotation host",
|
|
ingress: fakeIngress{
|
|
dnsnames: []string{"foo.bar"},
|
|
annotations: map[string]string{hostnameAnnotationKey: "foo.baz", ingressHostnameSourceKey: "defined-hosts-only"},
|
|
hostnames: []string{"lb.com"},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "foo.bar",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"lb.com"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "Ingress-hostname-source=annotation-only, one rule.host, one annotation host",
|
|
ingress: fakeIngress{
|
|
dnsnames: []string{"foo.bar"},
|
|
annotations: map[string]string{hostnameAnnotationKey: "foo.baz", ingressHostnameSourceKey: "annotation-only"},
|
|
hostnames: []string{"lb.com"},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "foo.baz",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"lb.com"},
|
|
},
|
|
},
|
|
},
|
|
} {
|
|
t.Run(ti.title, func(t *testing.T) {
|
|
realIngress := ti.ingress.Ingress()
|
|
validateEndpoints(t, endpointsFromIngress(realIngress, false, false, false), ti.expected)
|
|
})
|
|
}
|
|
}
|
|
|
|
func testIngressEndpoints(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
namespace := "testing"
|
|
for _, ti := range []struct {
|
|
title string
|
|
targetNamespace string
|
|
annotationFilter string
|
|
ingressItems []fakeIngress
|
|
expected []*endpoint.Endpoint
|
|
expectError bool
|
|
fqdnTemplate string
|
|
combineFQDNAndAnnotation bool
|
|
ignoreHostnameAnnotation bool
|
|
ignoreIngressTLSSpec bool
|
|
ignoreIngressRulesSpec bool
|
|
ingressLabelSelector labels.Selector
|
|
ingressClassNames []string
|
|
}{
|
|
{
|
|
title: "no ingress",
|
|
targetNamespace: "",
|
|
},
|
|
{
|
|
title: "two simple ingresses",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
{
|
|
name: "fake2",
|
|
namespace: namespace,
|
|
dnsnames: []string{"new.org"},
|
|
hostnames: []string{"lb.com"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"8.8.8.8"},
|
|
},
|
|
{
|
|
DNSName: "new.org",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"lb.com"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "ipv6 ingress",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"2001:DB8::1"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
RecordType: endpoint.RecordTypeAAAA,
|
|
Targets: endpoint.Targets{"2001:DB8::1"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "ignore rules",
|
|
targetNamespace: "",
|
|
ignoreIngressRulesSpec: true,
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
{
|
|
name: "fake2",
|
|
namespace: namespace,
|
|
dnsnames: []string{"new.org"},
|
|
hostnames: []string{"lb.com"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
},
|
|
{
|
|
title: "two simple ingresses on different namespaces",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: "testing1",
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
{
|
|
name: "fake2",
|
|
namespace: "testing2",
|
|
dnsnames: []string{"new.org"},
|
|
hostnames: []string{"lb.com"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"8.8.8.8"},
|
|
},
|
|
{
|
|
DNSName: "new.org",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"lb.com"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "two simple ingresses on different namespaces with target namespace",
|
|
targetNamespace: "testing1",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: "testing1",
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
{
|
|
name: "fake2",
|
|
namespace: "testing2",
|
|
dnsnames: []string{"new.org"},
|
|
hostnames: []string{"lb.com"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"8.8.8.8"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "valid matching annotation filter expression",
|
|
targetNamespace: "",
|
|
annotationFilter: "kubernetes.io/ingress.class in (alb, nginx)",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
"kubernetes.io/ingress.class": "nginx",
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"8.8.8.8"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "valid non-matching annotation filter expression",
|
|
targetNamespace: "",
|
|
annotationFilter: "kubernetes.io/ingress.class in (alb, nginx)",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
"kubernetes.io/ingress.class": "tectonic",
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
},
|
|
{
|
|
title: "invalid annotation filter expression",
|
|
targetNamespace: "",
|
|
annotationFilter: "kubernetes.io/ingress.name in (a b)",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
"kubernetes.io/ingress.class": "alb",
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
expectError: true,
|
|
},
|
|
{
|
|
title: "valid matching annotation filter label",
|
|
targetNamespace: "",
|
|
annotationFilter: "kubernetes.io/ingress.class=nginx",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
"kubernetes.io/ingress.class": "nginx",
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"8.8.8.8"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "valid non-matching annotation filter label",
|
|
targetNamespace: "",
|
|
annotationFilter: "kubernetes.io/ingress.class=nginx",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
"kubernetes.io/ingress.class": "alb",
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
},
|
|
{
|
|
title: "our controller type is dns-controller",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
controllerAnnotationKey: controllerAnnotationValue,
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"8.8.8.8"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "different controller types are ignored",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
controllerAnnotationKey: "some-other-tool",
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
},
|
|
{
|
|
title: "template for ingress if host is missing",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
controllerAnnotationKey: controllerAnnotationValue,
|
|
},
|
|
dnsnames: []string{},
|
|
ips: []string{"8.8.8.8"},
|
|
hostnames: []string{"elb.com"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "fake1.ext-dns.test.com",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"8.8.8.8"},
|
|
},
|
|
{
|
|
DNSName: "fake1.ext-dns.test.com",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"elb.com"},
|
|
},
|
|
},
|
|
fqdnTemplate: "{{.Name}}.ext-dns.test.com",
|
|
},
|
|
{
|
|
title: "another controller annotation skipped even with template",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
controllerAnnotationKey: "other-controller",
|
|
},
|
|
dnsnames: []string{},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
fqdnTemplate: "{{.Name}}.ext-dns.test.com",
|
|
},
|
|
{
|
|
title: "multiple FQDN template hostnames",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{},
|
|
dnsnames: []string{},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "fake1.ext-dns.test.com",
|
|
Targets: endpoint.Targets{"8.8.8.8"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
{
|
|
DNSName: "fake1.ext-dna.test.com",
|
|
Targets: endpoint.Targets{"8.8.8.8"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
},
|
|
fqdnTemplate: "{{.Name}}.ext-dns.test.com, {{.Name}}.ext-dna.test.com",
|
|
},
|
|
{
|
|
title: "multiple FQDN template hostnames",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{},
|
|
dnsnames: []string{},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
{
|
|
name: "fake2",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
targetAnnotationKey: "ingress-target.com",
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "fake1.ext-dns.test.com",
|
|
Targets: endpoint.Targets{"8.8.8.8"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
{
|
|
DNSName: "fake1.ext-dna.test.com",
|
|
Targets: endpoint.Targets{"8.8.8.8"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
{
|
|
DNSName: "example.org",
|
|
Targets: endpoint.Targets{"ingress-target.com"},
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
},
|
|
{
|
|
DNSName: "fake2.ext-dns.test.com",
|
|
Targets: endpoint.Targets{"ingress-target.com"},
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
},
|
|
{
|
|
DNSName: "fake2.ext-dna.test.com",
|
|
Targets: endpoint.Targets{"ingress-target.com"},
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
},
|
|
},
|
|
fqdnTemplate: "{{.Name}}.ext-dns.test.com, {{.Name}}.ext-dna.test.com",
|
|
combineFQDNAndAnnotation: true,
|
|
},
|
|
{
|
|
title: "ingress rules with annotation",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
targetAnnotationKey: "ingress-target.com",
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{},
|
|
},
|
|
{
|
|
name: "fake2",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
targetAnnotationKey: "ingress-target.com",
|
|
},
|
|
dnsnames: []string{"example2.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
{
|
|
name: "fake3",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
targetAnnotationKey: "1.2.3.4",
|
|
},
|
|
dnsnames: []string{"example3.org"},
|
|
ips: []string{},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
Targets: endpoint.Targets{"ingress-target.com"},
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
},
|
|
{
|
|
DNSName: "example2.org",
|
|
Targets: endpoint.Targets{"ingress-target.com"},
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
},
|
|
{
|
|
DNSName: "example3.org",
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "ingress rules with single tls having single hostname",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
tlsdnsnames: [][]string{{"example.org"}},
|
|
ips: []string{"1.2.3.4"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "ingress rules with single tls having multiple hostnames",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
tlsdnsnames: [][]string{{"example.org", "example2.org"}},
|
|
ips: []string{"1.2.3.4"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
{
|
|
DNSName: "example2.org",
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "ingress rules with multiple tls having multiple hostnames",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
tlsdnsnames: [][]string{{"example.org", "example2.org"}, {"example3.org", "example4.org"}},
|
|
ips: []string{"1.2.3.4"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
{
|
|
DNSName: "example2.org",
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
{
|
|
DNSName: "example3.org",
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
{
|
|
DNSName: "example4.org",
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "ingress rules with hostname annotation",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
hostnameAnnotationKey: "dns-through-hostname.com",
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"1.2.3.4"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
{
|
|
DNSName: "dns-through-hostname.com",
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "ingress rules with hostname annotation having multiple hostnames",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
hostnameAnnotationKey: "dns-through-hostname.com, another-dns-through-hostname.com",
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"1.2.3.4"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
{
|
|
DNSName: "dns-through-hostname.com",
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
{
|
|
DNSName: "another-dns-through-hostname.com",
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "ingress rules with hostname and target annotation",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
hostnameAnnotationKey: "dns-through-hostname.com",
|
|
targetAnnotationKey: "ingress-target.com",
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
Targets: endpoint.Targets{"ingress-target.com"},
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
},
|
|
{
|
|
DNSName: "dns-through-hostname.com",
|
|
Targets: endpoint.Targets{"ingress-target.com"},
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "ingress rules with annotation and custom TTL",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
targetAnnotationKey: "ingress-target.com",
|
|
ttlAnnotationKey: "6",
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{},
|
|
},
|
|
{
|
|
name: "fake2",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
targetAnnotationKey: "ingress-target.com",
|
|
ttlAnnotationKey: "1",
|
|
},
|
|
dnsnames: []string{"example2.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
{
|
|
name: "fake3",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
targetAnnotationKey: "ingress-target.com",
|
|
ttlAnnotationKey: "10s",
|
|
},
|
|
dnsnames: []string{"example3.org"},
|
|
ips: []string{"8.8.4.4"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"ingress-target.com"},
|
|
RecordTTL: endpoint.TTL(6),
|
|
},
|
|
{
|
|
DNSName: "example2.org",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"ingress-target.com"},
|
|
RecordTTL: endpoint.TTL(1),
|
|
},
|
|
{
|
|
DNSName: "example3.org",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"ingress-target.com"},
|
|
RecordTTL: endpoint.TTL(10),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "ingress rules with alias and target annotation",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
targetAnnotationKey: "ingress-target.com",
|
|
aliasAnnotationKey: "true",
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
Targets: endpoint.Targets{"ingress-target.com"},
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
ProviderSpecific: endpoint.ProviderSpecific{{
|
|
Name: "alias", Value: "true",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "ingress rules with alias set false and target annotation",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
targetAnnotationKey: "ingress-target.com",
|
|
aliasAnnotationKey: "false",
|
|
},
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
Targets: endpoint.Targets{"ingress-target.com"},
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "template for ingress with annotation",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
targetAnnotationKey: "ingress-target.com",
|
|
},
|
|
dnsnames: []string{},
|
|
ips: []string{},
|
|
hostnames: []string{},
|
|
},
|
|
{
|
|
name: "fake2",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
targetAnnotationKey: "ingress-target.com",
|
|
},
|
|
dnsnames: []string{},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
{
|
|
name: "fake3",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
targetAnnotationKey: "1.2.3.4",
|
|
},
|
|
dnsnames: []string{},
|
|
ips: []string{},
|
|
hostnames: []string{},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "fake1.ext-dns.test.com",
|
|
Targets: endpoint.Targets{"ingress-target.com"},
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
},
|
|
{
|
|
DNSName: "fake2.ext-dns.test.com",
|
|
Targets: endpoint.Targets{"ingress-target.com"},
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
},
|
|
{
|
|
DNSName: "fake3.ext-dns.test.com",
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
RecordType: endpoint.RecordTypeA,
|
|
},
|
|
},
|
|
fqdnTemplate: "{{.Name}}.ext-dns.test.com",
|
|
},
|
|
{
|
|
title: "Ingress with empty annotation",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
targetAnnotationKey: "",
|
|
},
|
|
dnsnames: []string{},
|
|
ips: []string{},
|
|
hostnames: []string{},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
fqdnTemplate: "{{.Name}}.ext-dns.test.com",
|
|
},
|
|
{
|
|
title: "ignore hostname annotation",
|
|
targetNamespace: "",
|
|
ignoreHostnameAnnotation: true,
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
},
|
|
{
|
|
name: "fake2",
|
|
namespace: namespace,
|
|
annotations: map[string]string{
|
|
hostnameAnnotationKey: "dns-through-hostname.com",
|
|
},
|
|
dnsnames: []string{"new.org"},
|
|
hostnames: []string{"lb.com"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"8.8.8.8"},
|
|
},
|
|
{
|
|
DNSName: "new.org",
|
|
RecordType: endpoint.RecordTypeCNAME,
|
|
Targets: endpoint.Targets{"lb.com"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "ignore tls section",
|
|
targetNamespace: "",
|
|
ignoreIngressTLSSpec: true,
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
tlsdnsnames: [][]string{{"example.org"}},
|
|
ips: []string{"1.2.3.4"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
},
|
|
{
|
|
title: "reading tls section",
|
|
targetNamespace: "",
|
|
ignoreIngressTLSSpec: false,
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
tlsdnsnames: [][]string{{"example.org"}},
|
|
ips: []string{"1.2.3.4"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
title: "ingressClassName filtering",
|
|
targetNamespace: "",
|
|
ingressClassNames: []string{"public", "dmz"},
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "none",
|
|
namespace: namespace,
|
|
tlsdnsnames: [][]string{{"none.example.org"}},
|
|
ips: []string{"1.0.0.0"},
|
|
},
|
|
{
|
|
name: "fake-public",
|
|
namespace: namespace,
|
|
tlsdnsnames: [][]string{{"example.org"}},
|
|
ips: []string{"1.2.3.4"},
|
|
ingressClassName: "public", // match
|
|
},
|
|
{
|
|
name: "fake-internal",
|
|
namespace: namespace,
|
|
tlsdnsnames: [][]string{{"int.example.org"}},
|
|
ips: []string{"2.3.4.5"},
|
|
ingressClassName: "internal",
|
|
},
|
|
{
|
|
name: "fake-dmz",
|
|
namespace: namespace,
|
|
tlsdnsnames: [][]string{{"dmz.example.org"}},
|
|
ips: []string{"3.4.5.6"},
|
|
ingressClassName: "dmz", // match
|
|
},
|
|
{
|
|
name: "annotated-dmz",
|
|
namespace: namespace,
|
|
tlsdnsnames: [][]string{{"annodmz.example.org"}},
|
|
ips: []string{"4.5.6.7"},
|
|
annotations: map[string]string{
|
|
"kubernetes.io/ingress.class": "dmz", // match
|
|
},
|
|
},
|
|
{
|
|
name: "fake-internal-annotated-dmz",
|
|
namespace: namespace,
|
|
tlsdnsnames: [][]string{{"int-annodmz.example.org"}},
|
|
ips: []string{"5.6.7.8"},
|
|
annotations: map[string]string{
|
|
"kubernetes.io/ingress.class": "dmz", // match but ignored (non-empty ingressClassName)
|
|
},
|
|
ingressClassName: "internal",
|
|
},
|
|
{
|
|
name: "fake-dmz-annotated-internal",
|
|
namespace: namespace,
|
|
tlsdnsnames: [][]string{{"dmz-annoint.example.org"}},
|
|
ips: []string{"6.7.8.9"},
|
|
annotations: map[string]string{
|
|
"kubernetes.io/ingress.class": "internal",
|
|
},
|
|
ingressClassName: "dmz", // match
|
|
},
|
|
{
|
|
name: "empty-annotated-dmz",
|
|
namespace: namespace,
|
|
tlsdnsnames: [][]string{{"empty-annotdmz.example.org"}},
|
|
ips: []string{"7.8.9.0"},
|
|
annotations: map[string]string{
|
|
"kubernetes.io/ingress.class": "dmz", // match (empty ingressClassName)
|
|
},
|
|
ingressClassName: "",
|
|
},
|
|
{
|
|
name: "empty-annotated-internal",
|
|
namespace: namespace,
|
|
tlsdnsnames: [][]string{{"empty-annotint.example.org"}},
|
|
ips: []string{"8.9.0.1"},
|
|
annotations: map[string]string{
|
|
"kubernetes.io/ingress.class": "internal",
|
|
},
|
|
ingressClassName: "",
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"1.2.3.4"},
|
|
},
|
|
{
|
|
DNSName: "dmz.example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"3.4.5.6"},
|
|
},
|
|
{
|
|
DNSName: "annodmz.example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"4.5.6.7"},
|
|
},
|
|
{
|
|
DNSName: "dmz-annoint.example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"6.7.8.9"},
|
|
},
|
|
{
|
|
DNSName: "empty-annotdmz.example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"7.8.9.0"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ingressLabelSelector: labels.SelectorFromSet(labels.Set{"app": "web-external"}),
|
|
title: "ingress with matching labels",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
labels: map[string]string{"app": "web-external", "name": "reverse-proxy"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{
|
|
{
|
|
DNSName: "example.org",
|
|
RecordType: endpoint.RecordTypeA,
|
|
Targets: endpoint.Targets{"8.8.8.8"},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ingressLabelSelector: labels.SelectorFromSet(labels.Set{"app": "web-external"}),
|
|
title: "ingress without matching labels",
|
|
targetNamespace: "",
|
|
ingressItems: []fakeIngress{
|
|
{
|
|
name: "fake1",
|
|
namespace: namespace,
|
|
dnsnames: []string{"example.org"},
|
|
ips: []string{"8.8.8.8"},
|
|
labels: map[string]string{"app": "web-internal", "name": "reverse-proxy"},
|
|
},
|
|
},
|
|
expected: []*endpoint.Endpoint{},
|
|
},
|
|
} {
|
|
ti := ti
|
|
t.Run(ti.title, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
fakeClient := fake.NewSimpleClientset()
|
|
for _, item := range ti.ingressItems {
|
|
ingress := item.Ingress()
|
|
_, err := fakeClient.NetworkingV1().Ingresses(ingress.Namespace).Create(context.Background(), ingress, metav1.CreateOptions{})
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
if ti.ingressLabelSelector == nil {
|
|
ti.ingressLabelSelector = labels.Everything()
|
|
}
|
|
|
|
source, _ := NewIngressSource(
|
|
context.TODO(),
|
|
fakeClient,
|
|
ti.targetNamespace,
|
|
ti.annotationFilter,
|
|
ti.fqdnTemplate,
|
|
ti.combineFQDNAndAnnotation,
|
|
ti.ignoreHostnameAnnotation,
|
|
ti.ignoreIngressTLSSpec,
|
|
ti.ignoreIngressRulesSpec,
|
|
ti.ingressLabelSelector,
|
|
ti.ingressClassNames,
|
|
)
|
|
// Informer cache has all of the ingresses. Retrieve and validate their endpoints.
|
|
res, err := source.Endpoints(context.Background())
|
|
if ti.expectError {
|
|
require.Error(t, err)
|
|
} else {
|
|
require.NoError(t, err)
|
|
}
|
|
validateEndpoints(t, res, ti.expected)
|
|
})
|
|
}
|
|
}
|
|
|
|
// ingress specific helper functions
|
|
type fakeIngress struct {
|
|
dnsnames []string
|
|
tlsdnsnames [][]string
|
|
ips []string
|
|
hostnames []string
|
|
namespace string
|
|
name string
|
|
annotations map[string]string
|
|
labels map[string]string
|
|
ingressClassName string
|
|
}
|
|
|
|
func (ing fakeIngress) Ingress() *networkv1.Ingress {
|
|
ingress := &networkv1.Ingress{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Namespace: ing.namespace,
|
|
Name: ing.name,
|
|
Annotations: ing.annotations,
|
|
Labels: ing.labels,
|
|
},
|
|
Spec: networkv1.IngressSpec{
|
|
Rules: []networkv1.IngressRule{},
|
|
IngressClassName: &ing.ingressClassName,
|
|
},
|
|
Status: networkv1.IngressStatus{
|
|
LoadBalancer: networkv1.IngressLoadBalancerStatus{
|
|
Ingress: []networkv1.IngressLoadBalancerIngress{},
|
|
},
|
|
},
|
|
}
|
|
for _, dnsname := range ing.dnsnames {
|
|
ingress.Spec.Rules = append(ingress.Spec.Rules, networkv1.IngressRule{
|
|
Host: dnsname,
|
|
})
|
|
}
|
|
for _, hosts := range ing.tlsdnsnames {
|
|
ingress.Spec.TLS = append(ingress.Spec.TLS, networkv1.IngressTLS{
|
|
Hosts: hosts,
|
|
})
|
|
}
|
|
for _, ip := range ing.ips {
|
|
ingress.Status.LoadBalancer.Ingress = append(ingress.Status.LoadBalancer.Ingress, networkv1.IngressLoadBalancerIngress{
|
|
IP: ip,
|
|
})
|
|
}
|
|
for _, hostname := range ing.hostnames {
|
|
ingress.Status.LoadBalancer.Ingress = append(ingress.Status.LoadBalancer.Ingress, networkv1.IngressLoadBalancerIngress{
|
|
Hostname: hostname,
|
|
})
|
|
}
|
|
return ingress
|
|
}
|