package integration import ( "bytes" "encoding/json" "errors" "flag" "fmt" "io" "net/http" "os" "path/filepath" "regexp" "time" "github.com/go-check/check" "github.com/pmezard/go-difflib/difflib" "github.com/rs/zerolog/log" "github.com/traefik/traefik/v2/integration/try" "github.com/traefik/traefik/v2/pkg/api" checker "github.com/vdemeester/shakers" ) var updateExpected = flag.Bool("update_expected", false, "Update expected files in testdata") // K8sSuite tests suite. type K8sSuite struct{ BaseSuite } func (s *K8sSuite) SetUpSuite(c *check.C) { s.createComposeProject(c, "k8s") s.composeUp(c) abs, err := filepath.Abs("./fixtures/k8s/config.skip/kubeconfig.yaml") c.Assert(err, checker.IsNil) err = try.Do(60*time.Second, func() error { _, err := os.Stat(abs) return err }) c.Assert(err, checker.IsNil) err = os.Setenv("KUBECONFIG", abs) c.Assert(err, checker.IsNil) } func (s *K8sSuite) TearDownSuite(c *check.C) { s.composeDown(c) generatedFiles := []string{ "./fixtures/k8s/config.skip/kubeconfig.yaml", "./fixtures/k8s/config.skip/k3s.log", "./fixtures/k8s/coredns.yaml", "./fixtures/k8s/rolebindings.yaml", "./fixtures/k8s/traefik.yaml", "./fixtures/k8s/ccm.yaml", } for _, filename := range generatedFiles { if err := os.Remove(filename); err != nil { log.Warn().Err(err).Send() } } } func (s *K8sSuite) TestIngressConfiguration(c *check.C) { cmd, display := s.traefikCmd(withConfigFile("fixtures/k8s_default.toml")) defer display(c) err := cmd.Start() c.Assert(err, checker.IsNil) defer s.killCmd(cmd) testConfiguration(c, "testdata/rawdata-ingress.json", "8080") } func (s *K8sSuite) TestIngressLabelSelector(c *check.C) { cmd, display := s.traefikCmd(withConfigFile("fixtures/k8s_ingress_label_selector.toml")) defer display(c) err := cmd.Start() c.Assert(err, checker.IsNil) defer s.killCmd(cmd) testConfiguration(c, "testdata/rawdata-ingress-label-selector.json", "8080") } func (s *K8sSuite) TestCRDConfiguration(c *check.C) { cmd, display := s.traefikCmd(withConfigFile("fixtures/k8s_crd.toml")) defer display(c) err := cmd.Start() c.Assert(err, checker.IsNil) defer s.killCmd(cmd) testConfiguration(c, "testdata/rawdata-crd.json", "8000") } func (s *K8sSuite) TestCRDLabelSelector(c *check.C) { cmd, display := s.traefikCmd(withConfigFile("fixtures/k8s_crd_label_selector.toml")) defer display(c) err := cmd.Start() c.Assert(err, checker.IsNil) defer s.killCmd(cmd) testConfiguration(c, "testdata/rawdata-crd-label-selector.json", "8000") } func (s *K8sSuite) TestGatewayConfiguration(c *check.C) { cmd, display := s.traefikCmd(withConfigFile("fixtures/k8s_gateway.toml")) defer display(c) err := cmd.Start() c.Assert(err, checker.IsNil) defer s.killCmd(cmd) testConfiguration(c, "testdata/rawdata-gateway.json", "8080") } func (s *K8sSuite) TestIngressclass(c *check.C) { cmd, display := s.traefikCmd(withConfigFile("fixtures/k8s_ingressclass.toml")) defer display(c) err := cmd.Start() c.Assert(err, checker.IsNil) defer s.killCmd(cmd) testConfiguration(c, "testdata/rawdata-ingressclass.json", "8080") } func (s *K8sSuite) TestDisableIngressclassLookup(c *check.C) { cmd, display := s.traefikCmd(withConfigFile("fixtures/k8s_ingressclass_disabled.toml")) defer display(c) err := cmd.Start() c.Assert(err, checker.IsNil) defer s.killCmd(cmd) testConfiguration(c, "testdata/rawdata-ingressclass-disabled.json", "8080") } func testConfiguration(c *check.C, path, apiPort string) { err := try.GetRequest("http://127.0.0.1:"+apiPort+"/api/entrypoints", 20*time.Second, try.BodyContains(`"name":"web"`)) c.Assert(err, checker.IsNil) expectedJSON := filepath.FromSlash(path) if *updateExpected { fi, err := os.Create(expectedJSON) c.Assert(err, checker.IsNil) err = fi.Close() c.Assert(err, checker.IsNil) } var buf bytes.Buffer err = try.GetRequest("http://127.0.0.1:"+apiPort+"/api/rawdata", 1*time.Minute, try.StatusCodeIs(http.StatusOK), matchesConfig(expectedJSON, &buf)) if !*updateExpected { if err != nil { c.Error(err) } return } if err != nil { c.Logf("In file update mode, got expected error: %v", err) } var rtRepr api.RunTimeRepresentation err = json.Unmarshal(buf.Bytes(), &rtRepr) c.Assert(err, checker.IsNil) newJSON, err := json.MarshalIndent(rtRepr, "", "\t") c.Assert(err, checker.IsNil) err = os.WriteFile(expectedJSON, newJSON, 0o644) c.Assert(err, checker.IsNil) c.Errorf("We do not want a passing test in file update mode") } func matchesConfig(wantConfig string, buf *bytes.Buffer) try.ResponseCondition { return func(res *http.Response) error { body, err := io.ReadAll(res.Body) if err != nil { return fmt.Errorf("failed to read response body: %w", err) } if err := res.Body.Close(); err != nil { return err } var obtained api.RunTimeRepresentation err = json.Unmarshal(body, &obtained) if err != nil { return err } if buf != nil { buf.Reset() if _, err := io.Copy(buf, bytes.NewReader(body)); err != nil { return err } } got, err := json.MarshalIndent(obtained, "", "\t") if err != nil { return err } expected, err := os.ReadFile(wantConfig) if err != nil { return err } // The pods IPs are dynamic, so we cannot predict them, // which is why we have to ignore them in the comparison. rxURL := regexp.MustCompile(`"(url|address)":\s+(".*")`) sanitizedExpected := rxURL.ReplaceAll(expected, []byte(`"$1": "XXXX"`)) sanitizedGot := rxURL.ReplaceAll(got, []byte(`"$1": "XXXX"`)) rxServerStatus := regexp.MustCompile(`"http://.*?":\s+(".*")`) sanitizedExpected = rxServerStatus.ReplaceAll(sanitizedExpected, []byte(`"http://XXXX": $1`)) sanitizedGot = rxServerStatus.ReplaceAll(sanitizedGot, []byte(`"http://XXXX": $1`)) if bytes.Equal(sanitizedExpected, sanitizedGot) { return nil } diff := difflib.UnifiedDiff{ FromFile: "Expected", A: difflib.SplitLines(string(sanitizedExpected)), ToFile: "Got", B: difflib.SplitLines(string(sanitizedGot)), Context: 3, } text, err := difflib.GetUnifiedDiffString(diff) if err != nil { return err } return errors.New(text) } }