665aeb34b2
Co-authored-by: Mathieu Lonjaret <mathieu.lonjaret@gmail.com>
175 lines
4.3 KiB
Go
175 lines
4.3 KiB
Go
package crd
|
|
|
|
import (
|
|
"fmt"
|
|
"io/ioutil"
|
|
"path/filepath"
|
|
|
|
"github.com/containous/traefik/v2/pkg/provider/kubernetes/crd/traefik/v1alpha1"
|
|
"github.com/containous/traefik/v2/pkg/provider/kubernetes/k8s"
|
|
corev1 "k8s.io/api/core/v1"
|
|
"k8s.io/client-go/kubernetes/scheme"
|
|
)
|
|
|
|
var _ Client = (*clientMock)(nil)
|
|
|
|
func init() {
|
|
// required by k8s.MustParseYaml
|
|
err := v1alpha1.AddToScheme(scheme.Scheme)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
|
|
type clientMock struct {
|
|
services []*corev1.Service
|
|
secrets []*corev1.Secret
|
|
endpoints []*corev1.Endpoints
|
|
|
|
apiServiceError error
|
|
apiSecretError error
|
|
apiEndpointsError error
|
|
|
|
ingressRoutes []*v1alpha1.IngressRoute
|
|
ingressRouteTCPs []*v1alpha1.IngressRouteTCP
|
|
ingressRouteUDPs []*v1alpha1.IngressRouteUDP
|
|
middlewares []*v1alpha1.Middleware
|
|
tlsOptions []*v1alpha1.TLSOption
|
|
tlsStores []*v1alpha1.TLSStore
|
|
traefikServices []*v1alpha1.TraefikService
|
|
|
|
watchChan chan interface{}
|
|
}
|
|
|
|
func newClientMock(paths ...string) clientMock {
|
|
var c clientMock
|
|
|
|
for _, path := range paths {
|
|
yamlContent, err := ioutil.ReadFile(filepath.FromSlash("./fixtures/" + path))
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
k8sObjects := k8s.MustParseYaml(yamlContent)
|
|
for _, obj := range k8sObjects {
|
|
switch o := obj.(type) {
|
|
case *corev1.Service:
|
|
c.services = append(c.services, o)
|
|
case *corev1.Endpoints:
|
|
c.endpoints = append(c.endpoints, o)
|
|
case *v1alpha1.IngressRoute:
|
|
c.ingressRoutes = append(c.ingressRoutes, o)
|
|
case *v1alpha1.IngressRouteTCP:
|
|
c.ingressRouteTCPs = append(c.ingressRouteTCPs, o)
|
|
case *v1alpha1.IngressRouteUDP:
|
|
c.ingressRouteUDPs = append(c.ingressRouteUDPs, o)
|
|
case *v1alpha1.Middleware:
|
|
c.middlewares = append(c.middlewares, o)
|
|
case *v1alpha1.TraefikService:
|
|
c.traefikServices = append(c.traefikServices, o)
|
|
case *v1alpha1.TLSOption:
|
|
c.tlsOptions = append(c.tlsOptions, o)
|
|
case *v1alpha1.TLSStore:
|
|
c.tlsStores = append(c.tlsStores, o)
|
|
case *corev1.Secret:
|
|
c.secrets = append(c.secrets, o)
|
|
default:
|
|
panic(fmt.Sprintf("Unknown runtime object %+v %T", o, o))
|
|
}
|
|
}
|
|
}
|
|
|
|
return c
|
|
}
|
|
|
|
func (c clientMock) GetIngressRoutes() []*v1alpha1.IngressRoute {
|
|
return c.ingressRoutes
|
|
}
|
|
|
|
func (c clientMock) GetIngressRouteTCPs() []*v1alpha1.IngressRouteTCP {
|
|
return c.ingressRouteTCPs
|
|
}
|
|
|
|
func (c clientMock) GetIngressRouteUDPs() []*v1alpha1.IngressRouteUDP {
|
|
return c.ingressRouteUDPs
|
|
}
|
|
|
|
func (c clientMock) GetMiddlewares() []*v1alpha1.Middleware {
|
|
return c.middlewares
|
|
}
|
|
|
|
func (c clientMock) GetTraefikService(namespace, name string) (*v1alpha1.TraefikService, bool, error) {
|
|
for _, svc := range c.traefikServices {
|
|
if svc.Namespace == namespace && svc.Name == name {
|
|
return svc, true, nil
|
|
}
|
|
}
|
|
|
|
return nil, false, nil
|
|
}
|
|
|
|
func (c clientMock) GetTraefikServices() []*v1alpha1.TraefikService {
|
|
return c.traefikServices
|
|
}
|
|
|
|
func (c clientMock) GetTLSOptions() []*v1alpha1.TLSOption {
|
|
return c.tlsOptions
|
|
}
|
|
|
|
func (c clientMock) GetTLSStores() []*v1alpha1.TLSStore {
|
|
return c.tlsStores
|
|
}
|
|
|
|
func (c clientMock) GetTLSOption(namespace, name string) (*v1alpha1.TLSOption, bool, error) {
|
|
for _, option := range c.tlsOptions {
|
|
if option.Namespace == namespace && option.Name == name {
|
|
return option, true, nil
|
|
}
|
|
}
|
|
|
|
return nil, false, nil
|
|
}
|
|
|
|
func (c clientMock) GetService(namespace, name string) (*corev1.Service, bool, error) {
|
|
if c.apiServiceError != nil {
|
|
return nil, false, c.apiServiceError
|
|
}
|
|
|
|
for _, service := range c.services {
|
|
if service.Namespace == namespace && service.Name == name {
|
|
return service, true, nil
|
|
}
|
|
}
|
|
return nil, false, c.apiServiceError
|
|
}
|
|
|
|
func (c clientMock) GetEndpoints(namespace, name string) (*corev1.Endpoints, bool, error) {
|
|
if c.apiEndpointsError != nil {
|
|
return nil, false, c.apiEndpointsError
|
|
}
|
|
|
|
for _, endpoints := range c.endpoints {
|
|
if endpoints.Namespace == namespace && endpoints.Name == name {
|
|
return endpoints, true, nil
|
|
}
|
|
}
|
|
|
|
return &corev1.Endpoints{}, false, nil
|
|
}
|
|
|
|
func (c clientMock) GetSecret(namespace, name string) (*corev1.Secret, bool, error) {
|
|
if c.apiSecretError != nil {
|
|
return nil, false, c.apiSecretError
|
|
}
|
|
|
|
for _, secret := range c.secrets {
|
|
if secret.Namespace == namespace && secret.Name == name {
|
|
return secret, true, nil
|
|
}
|
|
}
|
|
return nil, false, nil
|
|
}
|
|
|
|
func (c clientMock) WatchAll(namespaces []string, stopCh <-chan struct{}) (<-chan interface{}, error) {
|
|
return c.watchChan, nil
|
|
}
|