2017-09-04 04:10:44 -07:00
|
|
|
// Copyright 2016 The Prometheus Authors
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package kubernetes
|
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/prometheus/common/model"
|
Refactor SD configuration to remove `config` dependency (#3629)
* refactor: move targetGroup struct and CheckOverflow() to their own package
* refactor: move auth and security related structs to a utility package, fix import error in utility package
* refactor: Azure SD, remove SD struct from config
* refactor: DNS SD, remove SD struct from config into dns package
* refactor: ec2 SD, move SD struct from config into the ec2 package
* refactor: file SD, move SD struct from config to file discovery package
* refactor: gce, move SD struct from config to gce discovery package
* refactor: move HTTPClientConfig and URL into util/config, fix import error in httputil
* refactor: consul, move SD struct from config into consul discovery package
* refactor: marathon, move SD struct from config into marathon discovery package
* refactor: triton, move SD struct from config to triton discovery package, fix test
* refactor: zookeeper, move SD structs from config to zookeeper discovery package
* refactor: openstack, remove SD struct from config, move into openstack discovery package
* refactor: kubernetes, move SD struct from config into kubernetes discovery package
* refactor: notifier, use targetgroup package instead of config
* refactor: tests for file, marathon, triton SD - use targetgroup package instead of config.TargetGroup
* refactor: retrieval, use targetgroup package instead of config.TargetGroup
* refactor: storage, use config util package
* refactor: discovery manager, use targetgroup package instead of config.TargetGroup
* refactor: use HTTPClient and TLS config from configUtil instead of config
* refactor: tests, use targetgroup package instead of config.TargetGroup
* refactor: fix tagetgroup.Group pointers that were removed by mistake
* refactor: openstack, kubernetes: drop prefixes
* refactor: remove import aliases forced due to vscode bug
* refactor: move main SD struct out of config into discovery/config
* refactor: rename configUtil to config_util
* refactor: rename yamlUtil to yaml_config
* refactor: kubernetes, remove prefixes
* refactor: move the TargetGroup package to discovery/
* refactor: fix order of imports
2017-12-29 12:01:34 -08:00
|
|
|
"github.com/prometheus/prometheus/discovery/targetgroup"
|
2017-09-04 04:10:44 -07:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
|
|
"k8s.io/client-go/pkg/apis/extensions/v1beta1"
|
|
|
|
)
|
|
|
|
|
|
|
|
func makeIngress(tls []v1beta1.IngressTLS) *v1beta1.Ingress {
|
|
|
|
return &v1beta1.Ingress{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "testingress",
|
|
|
|
Namespace: "default",
|
|
|
|
Labels: map[string]string{"testlabel": "testvalue"},
|
|
|
|
Annotations: map[string]string{"testannotation": "testannotationvalue"},
|
|
|
|
},
|
|
|
|
Spec: v1beta1.IngressSpec{
|
|
|
|
TLS: tls,
|
|
|
|
Rules: []v1beta1.IngressRule{
|
|
|
|
{
|
|
|
|
Host: "example.com",
|
|
|
|
IngressRuleValue: v1beta1.IngressRuleValue{
|
|
|
|
HTTP: &v1beta1.HTTPIngressRuleValue{
|
|
|
|
Paths: []v1beta1.HTTPIngressPath{
|
|
|
|
{Path: "/"},
|
|
|
|
{Path: "/foo"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// No backend config, ignored
|
|
|
|
Host: "nobackend.example.com",
|
|
|
|
IngressRuleValue: v1beta1.IngressRuleValue{
|
|
|
|
HTTP: &v1beta1.HTTPIngressRuleValue{},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Host: "test.example.com",
|
|
|
|
IngressRuleValue: v1beta1.IngressRuleValue{
|
|
|
|
HTTP: &v1beta1.HTTPIngressRuleValue{
|
|
|
|
Paths: []v1beta1.HTTPIngressPath{{}},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-09 09:35:14 -07:00
|
|
|
func expectedTargetGroups(tls bool) map[string]*targetgroup.Group {
|
2017-09-04 04:10:44 -07:00
|
|
|
scheme := "http"
|
|
|
|
if tls {
|
|
|
|
scheme = "https"
|
|
|
|
}
|
2018-04-09 09:35:14 -07:00
|
|
|
return map[string]*targetgroup.Group{
|
|
|
|
"ingress/default/testingress": {
|
2017-09-04 04:10:44 -07:00
|
|
|
Targets: []model.LabelSet{
|
|
|
|
{
|
|
|
|
"__meta_kubernetes_ingress_scheme": lv(scheme),
|
|
|
|
"__meta_kubernetes_ingress_host": "example.com",
|
|
|
|
"__meta_kubernetes_ingress_path": "/",
|
|
|
|
"__address__": "example.com",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"__meta_kubernetes_ingress_scheme": lv(scheme),
|
|
|
|
"__meta_kubernetes_ingress_host": "example.com",
|
|
|
|
"__meta_kubernetes_ingress_path": "/foo",
|
|
|
|
"__address__": "example.com",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"__meta_kubernetes_ingress_scheme": lv(scheme),
|
|
|
|
"__meta_kubernetes_ingress_host": "test.example.com",
|
|
|
|
"__address__": "test.example.com",
|
|
|
|
"__meta_kubernetes_ingress_path": "/",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Labels: model.LabelSet{
|
|
|
|
"__meta_kubernetes_ingress_name": "testingress",
|
|
|
|
"__meta_kubernetes_namespace": "default",
|
|
|
|
"__meta_kubernetes_ingress_label_testlabel": "testvalue",
|
|
|
|
"__meta_kubernetes_ingress_annotation_testannotation": "testannotationvalue",
|
|
|
|
},
|
|
|
|
Source: "ingress/default/testingress",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-09 09:35:14 -07:00
|
|
|
func TestIngressDiscoveryAdd(t *testing.T) {
|
|
|
|
n, c, w := makeDiscovery(RoleIngress, NamespaceDiscovery{Names: []string{"default"}})
|
2017-09-04 04:10:44 -07:00
|
|
|
|
|
|
|
k8sDiscoveryTest{
|
2018-04-09 09:35:14 -07:00
|
|
|
discovery: n,
|
|
|
|
afterStart: func() {
|
|
|
|
obj := makeIngress(nil)
|
|
|
|
c.ExtensionsV1beta1().Ingresses("default").Create(obj)
|
|
|
|
w.Ingresses().Add(obj)
|
|
|
|
},
|
|
|
|
expectedMaxItems: 1,
|
|
|
|
expectedRes: expectedTargetGroups(false),
|
2017-09-04 04:10:44 -07:00
|
|
|
}.Run(t)
|
|
|
|
}
|
|
|
|
|
2018-04-09 09:35:14 -07:00
|
|
|
func TestIngressDiscoveryAddTLS(t *testing.T) {
|
|
|
|
n, c, w := makeDiscovery(RoleIngress, NamespaceDiscovery{Names: []string{"default"}})
|
2017-09-04 04:10:44 -07:00
|
|
|
|
|
|
|
k8sDiscoveryTest{
|
2018-04-09 09:35:14 -07:00
|
|
|
discovery: n,
|
|
|
|
afterStart: func() {
|
|
|
|
obj := makeIngress([]v1beta1.IngressTLS{{}})
|
|
|
|
c.ExtensionsV1beta1().Ingresses("default").Create(obj)
|
|
|
|
w.Ingresses().Add(obj)
|
|
|
|
},
|
|
|
|
expectedMaxItems: 1,
|
|
|
|
expectedRes: expectedTargetGroups(true),
|
2017-09-04 04:10:44 -07:00
|
|
|
}.Run(t)
|
|
|
|
}
|