// TestHandleRoute test route watch events func TestHandleRoute(t *testing.T) { rejections := &fakeRejections{} router := newTestRouter(make(map[string]ServiceUnit)) templatePlugin := newDefaultTemplatePlugin(router, true) // TODO: move tests that rely on unique hosts to pkg/router/controller and remove them from // here plugin := controller.NewUniqueHost(templatePlugin, controller.HostForRoute, rejections) original := unversioned.Time{Time: time.Now()} //add route := &routeapi.Route{ ObjectMeta: kapi.ObjectMeta{ CreationTimestamp: original, Namespace: "foo", Name: "test", }, Spec: routeapi.RouteSpec{ Host: "www.example.com", To: kapi.ObjectReference{ Name: "TestService", }, }, } serviceUnitKey := fmt.Sprintf("%s/%s", route.Namespace, route.Spec.To.Name) plugin.HandleRoute(watch.Added, route) if !router.Committed { t.Errorf("Expected router to be committed after HandleRoute call") } actualSU, ok := router.FindServiceUnit(serviceUnitKey) if !ok { t.Errorf("TestHandleRoute was unable to find the service unit %s after HandleRoute was called", route.Spec.To.Name) } else { serviceAliasCfg, ok := actualSU.ServiceAliasConfigs[router.routeKey(route)] if !ok { t.Errorf("TestHandleRoute expected route key %s", router.routeKey(route)) } else { if serviceAliasCfg.Host != route.Spec.Host || serviceAliasCfg.Path != route.Spec.Path { t.Errorf("Expected route did not match service alias config %v : %v", route, serviceAliasCfg) } } } if len(rejections.rejections) > 0 { t.Fatalf("did not expect a recorded rejection: %#v", rejections) } // attempt to add a second route with a newer time, verify it is ignored duplicateRoute := &routeapi.Route{ ObjectMeta: kapi.ObjectMeta{ CreationTimestamp: unversioned.Time{Time: original.Add(time.Hour)}, Namespace: "foo", Name: "dupe", }, Spec: routeapi.RouteSpec{ Host: "www.example.com", To: kapi.ObjectReference{ Name: "TestService2", }, }, } if err := plugin.HandleRoute(watch.Added, duplicateRoute); err == nil { t.Fatal("unexpected non-error") } if _, ok := router.FindServiceUnit("foo/TestService2"); ok { t.Fatalf("unexpected second unit: %#v", router) } if r, ok := plugin.RoutesForHost("www.example.com"); !ok || r[0].Name != "test" { t.Fatalf("unexpected claimed routes: %#v", r) } if len(rejections.rejections) != 1 || rejections.rejections[0].route.Name != "dupe" || rejections.rejections[0].reason != "HostAlreadyClaimed" || rejections.rejections[0].message != "route test already exposes www.example.com and is older" { t.Fatalf("did not record rejection: %#v", rejections) } rejections.rejections = nil // attempt to remove the second route that is not being used, verify it is ignored if err := plugin.HandleRoute(watch.Deleted, duplicateRoute); err == nil { t.Fatal("unexpected non-error") } if _, ok := router.FindServiceUnit("foo/TestService2"); ok { t.Fatalf("unexpected second unit: %#v", router) } if _, ok := router.FindServiceUnit("foo/TestService"); !ok { t.Fatalf("unexpected first unit: %#v", router) } if r, ok := plugin.RoutesForHost("www.example.com"); !ok || r[0].Name != "test" { t.Fatalf("unexpected claimed routes: %#v", r) } if len(rejections.rejections) != 1 || rejections.rejections[0].route.Name != "dupe" || rejections.rejections[0].reason != "HostAlreadyClaimed" || rejections.rejections[0].message != "route test already exposes www.example.com and is older" { t.Fatalf("did not record rejection: %#v", rejections) } rejections.rejections = nil // add a second route with an older time, verify it takes effect duplicateRoute.CreationTimestamp = unversioned.Time{Time: original.Add(-time.Hour)} if err := plugin.HandleRoute(watch.Added, duplicateRoute); err != nil { t.Fatal("unexpected error") } otherSU, ok := router.FindServiceUnit("foo/TestService2") if !ok { t.Fatalf("missing second unit: %#v", router) } if len(actualSU.ServiceAliasConfigs) != 0 || len(otherSU.ServiceAliasConfigs) != 1 { t.Errorf("incorrect router state: %#v", router) } if _, ok := actualSU.ServiceAliasConfigs[router.routeKey(route)]; ok { t.Errorf("unexpected service alias config %s", router.routeKey(route)) } if len(rejections.rejections) != 1 || rejections.rejections[0].route.Name != "test" || rejections.rejections[0].reason != "HostAlreadyClaimed" || rejections.rejections[0].message != "replaced by older route dupe" { t.Fatalf("did not record rejection: %#v", rejections) } rejections.rejections = nil //mod route.Spec.Host = "www.example2.com" if err := plugin.HandleRoute(watch.Modified, route); err != nil { t.Fatal("unexpected error") } if !router.Committed { t.Errorf("Expected router to be committed after HandleRoute call") } actualSU, ok = router.FindServiceUnit(serviceUnitKey) if !ok { t.Errorf("TestHandleRoute was unable to find the service unit %s after HandleRoute was called", route.Spec.To.Name) } else { serviceAliasCfg, ok := actualSU.ServiceAliasConfigs[router.routeKey(route)] if !ok { t.Errorf("TestHandleRoute expected route key %s", router.routeKey(route)) } else { if serviceAliasCfg.Host != route.Spec.Host || serviceAliasCfg.Path != route.Spec.Path { t.Errorf("Expected route did not match service alias config %v : %v", route, serviceAliasCfg) } } } if plugin.HostLen() != 1 { t.Fatalf("did not clear claimed route: %#v", plugin) } if len(rejections.rejections) != 0 { t.Fatalf("unexpected rejection: %#v", rejections) } //delete if err := plugin.HandleRoute(watch.Deleted, route); err != nil { t.Fatal("unexpected error") } if !router.Committed { t.Errorf("Expected router to be committed after HandleRoute call") } actualSU, ok = router.FindServiceUnit(serviceUnitKey) if !ok { t.Errorf("TestHandleRoute was unable to find the service unit %s after HandleRoute was called", route.Spec.To.Name) } else { _, ok := actualSU.ServiceAliasConfigs[router.routeKey(route)] if ok { t.Errorf("TestHandleRoute did not expect route key %s", router.routeKey(route)) } } if plugin.HostLen() != 0 { t.Errorf("did not clear claimed route: %#v", plugin) } if len(rejections.rejections) != 0 { t.Fatalf("unexpected rejection: %#v", rejections) } }
func TestValidRouteAdmissionFuzzing(t *testing.T) { p := &fakePlugin{} admitAll := func(route *routeapi.Route) error { return nil } recorder := rejectionRecorder{rejections: make(map[string]string)} admitter := NewHostAdmitter(p, RouteAdmissionFunc(admitAll), true, recorder) oldest := unversioned.Time{Time: time.Now()} makeTime := func(d time.Duration) unversioned.Time { return unversioned.Time{Time: oldest.Add(d)} } routes := []*routeapi.Route{ makeRoute("ns1", "r1", "net", "", false, makeTime(0*time.Second)), makeRoute("ns2", "r2", "com", "", false, makeTime(1*time.Second)), makeRoute("ns3", "r3", "domain1.com", "", false, makeTime(2*time.Second)), makeRoute("ns4", "r4", "domain2.com", "", false, makeTime(3*time.Second)), makeRoute("ns5", "r5", "foo.domain1.com", "", false, makeTime(4*time.Second)), makeRoute("ns6", "r6", "bar.domain1.com", "", false, makeTime(5*time.Second)), makeRoute("ns7", "r7", "sub.foo.domain1.com", "", true, makeTime(6*time.Second)), makeRoute("ns8", "r8", "sub.bar.domain1.com", "", true, makeTime(7*time.Second)), makeRoute("ns8", "r9", "sub.bar.domain1.com", "/p1", true, makeTime(8*time.Second)), makeRoute("ns8", "r10", "sub.bar.domain1.com", "/p2", true, makeTime(9*time.Second)), makeRoute("ns8", "r11", "sub.bar.domain1.com", "/p1/p2/p3", true, makeTime(10*time.Second)), makeRoute("ns9", "r12", "sub.bar.domain2.com", "", false, makeTime(11*time.Second)), makeRoute("ns9", "r13", "sub.bar.domain2.com", "/p1", false, makeTime(12*time.Second)), makeRoute("ns9", "r14", "sub.bar.domain2.com", "/p2", false, makeTime(13*time.Second)), } rand.Seed(1) existing := sets.NewInt() errors := sets.NewString() for i := 0; i < 1000; i++ { add := false switch { case len(existing) == len(routes): add = false case len(existing) == 0: add = true default: add = (rand.Intn(4) > 0) } index := 0 if add { index = rand.Intn(len(routes)) if existing.Has(index) { // t.Logf("%d: updated route %d", i, index) if err := admitter.HandleRoute(watch.Modified, routes[index]); err != nil { errors.Insert(fmt.Sprintf("error updating route %s/%s: %v", routes[index].Namespace, routes[index].Name, err.Error())) } } else { // t.Logf("%d: added route %d", i, index) if err := admitter.HandleRoute(watch.Added, routes[index]); err != nil { errors.Insert(fmt.Sprintf("error adding route %s/%s: %v", routes[index].Namespace, routes[index].Name, err.Error())) } } existing.Insert(index) } else { index = existing.List()[rand.Intn(len(existing))] // t.Logf("%d: deleted route %d", i, index) if err := admitter.HandleRoute(watch.Deleted, routes[index]); err != nil { errors.Insert(fmt.Sprintf("error deleting route %s/%s: %v", routes[index].Namespace, routes[index].Name, err.Error())) } existing.Delete(index) } } if len(errors) > 0 { t.Errorf("Unexpected errors:\n%s", strings.Join(errors.List(), "\n")) } if len(recorder.rejections) > 0 { t.Errorf("Unexpected rejections: %#v", recorder.rejections) } }
func TestInvalidRouteAdmissionFuzzing(t *testing.T) { p := &fakePlugin{} admitAll := func(route *routeapi.Route) error { return nil } recorder := rejectionRecorder{rejections: make(map[string]string)} admitter := NewHostAdmitter(p, RouteAdmissionFunc(admitAll), true, recorder) oldest := unversioned.Time{Time: time.Now()} makeTime := func(d time.Duration) unversioned.Time { return unversioned.Time{Time: oldest.Add(d)} } routes := []struct { Route *routeapi.Route ErrIfInt sets.Int ErrIf sets.String }{ // Wildcard and explicit allowed in same namespace {Route: makeRoute("ns1", "r1", "net", "", false, makeTime(0*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns1", "r2", "net", "", true, makeTime(1*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns1", "r3", "www.same.net", "", false, makeTime(2*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns1", "r4", "www.same.net", "", true, makeTime(3*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns1", "r5", "foo.same.net", "", true, makeTime(4*time.Second)), ErrIf: sets.NewString(`ns1/r4`)}, {Route: makeRoute("ns2", "r1", "com", "", false, makeTime(10*time.Second)), ErrIf: sets.NewString(`ns1/r2`)}, {Route: makeRoute("ns2", "r2", "com", "", true, makeTime(11*time.Second)), ErrIf: sets.NewString(`ns1/r1`, `ns1/r2`)}, {Route: makeRoute("ns2", "r3", "www.same.com", "", false, makeTime(12*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns2", "r4", "www.same.com", "", true, makeTime(13*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns2", "r5", "www.same.com", "/abc", true, makeTime(13*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns2", "r6", "foo.same.com", "", true, makeTime(14*time.Second)), ErrIf: sets.NewString(`ns2/r4`)}, {Route: makeRoute("ns2", "r7", "foo.same.com", "/abc", true, makeTime(14*time.Second)), ErrIf: sets.NewString(`ns2/r5`)}, // Fails because of other namespaces {Route: makeRoute("ns3", "r1", "net", "", false, makeTime(20*time.Second)), ErrIf: sets.NewString(`ns1/r1`, `ns1/r2`, `ns2/r2`)}, {Route: makeRoute("ns3", "r2", "net", "", true, makeTime(21*time.Second)), ErrIf: sets.NewString(`ns1/r1`, `ns1/r2`, `ns2/r1`, `ns2/r2`)}, {Route: makeRoute("ns3", "r3", "net", "/p1", true, makeTime(22*time.Second)), ErrIf: sets.NewString(`ns1/r1`, `ns1/r2`, `ns2/r1`, `ns2/r2`)}, {Route: makeRoute("ns3", "r4", "com", "", false, makeTime(23*time.Second)), ErrIf: sets.NewString(`ns1/r2`, `ns2/r1`, `ns2/r2`)}, {Route: makeRoute("ns3", "r5", "com", "", true, makeTime(24*time.Second)), ErrIf: sets.NewString(`ns1/r1`, `ns1/r2`, `ns2/r1`, `ns2/r2`, `ns3/r2`)}, {Route: makeRoute("ns3", "r6", "com", "/p1/p2", true, makeTime(25*time.Second)), ErrIf: sets.NewString(`ns1/r1`, `ns1/r2`, `ns2/r1`, `ns2/r2`)}, // Interleaved ages between namespaces {Route: makeRoute("ns4", "r1", "domain1.com", "", false, makeTime(30*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns5", "r1", "domain1.com", "", false, makeTime(31*time.Second)), ErrIf: sets.NewString(`ns4/r1`)}, {Route: makeRoute("ns4", "r2", "domain1.com", "", false, makeTime(32*time.Second)), ErrIf: sets.NewString(`ns4/r1`, `ns5/r1`)}, {Route: makeRoute("ns5", "r2", "domain1.com", "", false, makeTime(33*time.Second)), ErrIf: sets.NewString(`ns4/r1`, `ns5/r1`, `ns4/r2`)}, // namespace with older wildcard wins over specific and wildcard routes in other namespaces {Route: makeRoute("ns6", "r1", "foo.domain1.com", "", true, makeTime(40*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns7", "r1", "bar.domain1.com", "", true, makeTime(50*time.Second)), ErrIf: sets.NewString(`ns6/r1`)}, {Route: makeRoute("ns7", "r2", "bar.domain1.com", "", false, makeTime(51*time.Second)), ErrIf: sets.NewString(`ns6/r1`)}, {Route: makeRoute("ns7", "r3", "bar.domain1.com", "/foo", false, makeTime(51*time.Second)), ErrIf: sets.NewString(`ns6/r1`)}, {Route: makeRoute("ns8", "r1", "baz.domain1.com", "", true, makeTime(60*time.Second)), ErrIf: sets.NewString(`ns6/r1`, `ns7/r1`, `ns7/r2`, `ns7/r3`)}, {Route: makeRoute("ns8", "r2", "baz.domain1.com", "", false, makeTime(61*time.Second)), ErrIf: sets.NewString(`ns6/r1`, `ns7/r1`)}, // namespace with older explicit host and wildcard wins over specific and wildcard routes in other namespaces {Route: makeRoute("ns9", "r1", "foo.domain2.com", "", false, makeTime(40*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns10", "r1", "bar.domain2.com", "", true, makeTime(50*time.Second)), ErrIf: sets.NewString(`ns9/r1`)}, {Route: makeRoute("ns10", "r2", "bar.domain2.com", "", false, makeTime(51*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns10", "r3", "foo.domain2.com", "", false, makeTime(52*time.Second)), ErrIf: sets.NewString(`ns9/r1`)}, {Route: makeRoute("ns10", "r4", "foo.domain2.com", "/p1", false, makeTime(53*time.Second)), ErrIf: sets.NewString(`ns9/r1`)}, {Route: makeRoute("ns10", "r5", "foo.domain2.com", "/p2", false, makeTime(54*time.Second)), ErrIf: sets.NewString(`ns9/r1`)}, {Route: makeRoute("ns10", "r6", "foo.domain2.com", "/p1/p2/other", false, makeTime(55*time.Second)), ErrIf: sets.NewString(`ns9/r1`)}, {Route: makeRoute("ns10", "r7", "foo.domain2.com", "/someother", false, makeTime(56*time.Second)), ErrIf: sets.NewString(`ns9/r1`)}, {Route: makeRoute("ns11", "r1", "baz.domain2.com", "", true, makeTime(60*time.Second)), ErrIf: sets.NewString(`ns9/r1`, `ns10/r1`, `ns10/r2`, `ns10/r3`, `ns10/r4`, `ns10/r5`, `ns10/r6`, `ns10/r7`)}, {Route: makeRoute("ns11", "r2", "baz.domain2.com", "", false, makeTime(61*time.Second)), ErrIf: sets.NewString(`ns10/r1`)}, // namespace with specific and wildcard route with paths wins over specific and wildcard routes in other namespaces {Route: makeRoute("ns12", "r1", "foo.domain3.com", "", false, makeTime(70*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns12", "r2", "bar.domain3.com", "/abc", false, makeTime(71*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns13", "r1", "foo.domain3.com", "", true, makeTime(80*time.Second)), ErrIf: sets.NewString(`ns12/r1`, `ns12/r2`)}, {Route: makeRoute("ns13", "r2", "bar.domain3.com", "", false, makeTime(81*time.Second)), ErrIf: sets.NewString(`ns12/r2`)}, {Route: makeRoute("ns13", "r3", "bar.domain3.com", "/abc", false, makeTime(82*time.Second)), ErrIf: sets.NewString(`ns12/r2`)}, {Route: makeRoute("ns13", "r4", "bar.domain3.com", "/def", false, makeTime(83*time.Second)), ErrIf: sets.NewString(`ns12/r2`)}, {Route: makeRoute("ns13", "r5", "wild.domain3.com", "/aces", true, makeTime(84*time.Second)), ErrIf: sets.NewString(`ns12/r1`, `ns12/r2`)}, {Route: makeRoute("ns13", "r6", "wild.domain3.com", "", true, makeTime(85*time.Second)), ErrIf: sets.NewString(`ns12/r1`, `ns12/r2`, `ns13/r1`)}, {Route: makeRoute("ns14", "r1", "foo.domain3.com", "", false, makeTime(90*time.Second)), ErrIf: sets.NewString(`ns12/r1`, `ns13/r1`, `ns13/r5`, `ns13/r6`)}, {Route: makeRoute("ns14", "r2", "bar.domain3.com", "", false, makeTime(91*time.Second)), ErrIf: sets.NewString(`ns12/r2`, `ns13/r1`, `ns13/r2`, `ns13/r3`, `ns13/r4`, `ns13/r5`, `ns13/r6`)}, // namespace with oldest wildcard and non-wildcard routes with same paths wins {Route: makeRoute("ns15", "r1", "foo.domain4.com", "", false, makeTime(100*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns15", "r2", "foo.domain4.com", "/abc", false, makeTime(101*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns15", "r3", "foo.domain4.com", "", false, makeTime(102*time.Second)), ErrIf: sets.NewString(`ns15/r1`)}, {Route: makeRoute("ns15", "r4", "foo.domain4.com", "/abc", false, makeTime(103*time.Second)), ErrIf: sets.NewString(`ns15/r2`)}, {Route: makeRoute("ns15", "r5", "www.domain4.com", "", true, makeTime(104*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns15", "r6", "www.domain4.com", "/abc", true, makeTime(105*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns15", "r7", "www.domain4.com", "", true, makeTime(106*time.Second)), ErrIf: sets.NewString(`ns15/r5`)}, {Route: makeRoute("ns15", "r8", "www.domain4.com", "/abc", true, makeTime(107*time.Second)), ErrIf: sets.NewString(`ns15/r6`)}, {Route: makeRoute("ns15", "r9", "www.domain4.com", "/def", true, makeTime(108*time.Second)), ErrIf: sets.NewString()}, {Route: makeRoute("ns15", "r10", "www.domain4.com", "/def", true, makeTime(109*time.Second)), ErrIf: sets.NewString(`ns15/r9`)}, } nameToIndex := map[string]int{} for i, tc := range routes { name := tc.Route.Namespace + "/" + tc.Route.Name if _, exists := nameToIndex[name]; exists { t.Fatalf("%d has a duplicate route name %s", i, name) } nameToIndex[name] = i } for i, tc := range routes { errIfInt := sets.NewInt() for name := range tc.ErrIf { if index, ok := nameToIndex[name]; ok { errIfInt.Insert(index) } else { t.Fatalf("%d references an unknown route name: %s", i, name) } } tc.ErrIfInt = errIfInt routes[i] = tc } rand.Seed(1) existing := sets.NewInt() errors := sets.NewString() for i := 0; i < 10000; i++ { add := false switch { case len(existing) == len(routes): add = false case len(existing) == 0: add = true default: add = (rand.Intn(4) > 0) } index := 0 eventType := watch.Deleted if add { index = rand.Intn(len(routes)) if existing.Has(index) { eventType = watch.Modified } else { eventType = watch.Added } } else { index = existing.List()[rand.Intn(len(existing))] eventType = watch.Deleted } route := routes[index].Route err := admitter.HandleRoute(eventType, route) if eventType != watch.Deleted && existing.HasAny(routes[index].ErrIfInt.List()...) { if err == nil { errors.Insert(fmt.Sprintf("no error %s route %s/%s (existing=%v, errif=%v)", eventType, route.Namespace, route.Name, existing.List(), routes[index].ErrIfInt.List())) } } else { if err != nil { errors.Insert(fmt.Sprintf("error %s route %s/%s: %v (existing=%v, errif=%v)", eventType, route.Namespace, route.Name, err.Error(), existing.List(), routes[index].ErrIfInt.List())) } } existingNames := sets.NewString() for _, routes := range admitter.claimedHosts { for _, route := range routes { existingNames.Insert(route.Namespace + "/" + route.Name) } } for _, routes := range admitter.claimedWildcards { for _, route := range routes { existingNames.Insert(route.Namespace + "/" + route.Name) } } for _, routes := range admitter.blockedWildcards { for _, route := range routes { if !existingNames.Has(route.Namespace + "/" + route.Name) { t.Fatalf("blockedWildcards has %s/%s, not in claimedHosts or claimedWildcards", route.Namespace, route.Name) } } } existing = sets.NewInt() for name := range existingNames { index, ok := nameToIndex[name] if !ok { t.Fatalf("unknown route %s", name) } existing.Insert(index) } } if len(errors) > 0 { t.Errorf("Unexpected errors:\n%s", strings.Join(errors.List(), "\n")) } }
func TestWildcardSubDomainOwnership(t *testing.T) { p := &fakePlugin{} recorder := rejectionRecorder{rejections: make(map[string]string)} admitter := NewHostAdmitter(p, wildcardAdmitter, true, recorder) oldest := unversioned.Time{Time: time.Now()} ownerRoute := &routeapi.Route{ ObjectMeta: kapi.ObjectMeta{ CreationTimestamp: oldest, Name: "first", Namespace: "owner", }, Spec: routeapi.RouteSpec{ Host: "owner.namespace.test", WildcardPolicy: routeapi.WildcardPolicySubdomain, }, } err := admitter.HandleRoute(watch.Added, ownerRoute) if err != nil { t.Fatalf("Owner route not admitted: %v", err) } tests := []struct { createdAt unversioned.Time name string namespace string host string policy routeapi.WildcardPolicyType reason string }{ { name: "nohost", namespace: "something", }, { name: "blockedhost", namespace: "blocked", host: "www.internal." + BlockedTestDomain, reason: "RouteNotAdmitted", }, { name: "blockedhost2", namespace: "blocked", host: "www.internal." + BlockedTestDomain, policy: routeapi.WildcardPolicyNone, reason: "RouteNotAdmitted", }, { name: "blockedhostwildcard", namespace: "blocked", host: "www.wildcard." + BlockedTestDomain, policy: routeapi.WildcardPolicySubdomain, reason: "RouteNotAdmitted", }, { createdAt: unversioned.Time{Time: oldest.Add(2 * time.Hour)}, name: "diffnamespace", namespace: "notowner", host: "www.namespace.test", reason: "HostAlreadyClaimed", }, { createdAt: unversioned.Time{Time: oldest.Add(2 * time.Hour)}, name: "diffnamespace2", namespace: "notowner", host: "www.namespace.test", policy: routeapi.WildcardPolicyNone, reason: "HostAlreadyClaimed", }, { createdAt: unversioned.Time{Time: oldest.Add(2 * time.Hour)}, name: "diffnamespacewildcard", namespace: "notowner", host: "www.namespace.test", policy: routeapi.WildcardPolicySubdomain, reason: "HostAlreadyClaimed", }, { createdAt: unversioned.Time{Time: oldest.Add(2 * time.Hour)}, name: "diffns2", namespace: "fortytwo", host: "www.namespace.test", policy: routeapi.WildcardPolicyNone, reason: "HostAlreadyClaimed", }, { createdAt: unversioned.Time{Time: oldest.Add(3 * time.Hour)}, name: "host2diffns2", namespace: "fortytwo", host: "api.namespace.test", policy: routeapi.WildcardPolicyNone, reason: "HostAlreadyClaimed", }, { createdAt: unversioned.Time{Time: oldest.Add(3 * time.Hour)}, name: "host2diffns3", namespace: "fortytwo", host: "api.namespace.test", policy: routeapi.WildcardPolicySubdomain, reason: "HostAlreadyClaimed", }, { createdAt: unversioned.Time{Time: oldest.Add(4 * time.Hour)}, name: "ownernshost", namespace: "owner", host: "api.namespace.test", }, { createdAt: unversioned.Time{Time: oldest.Add(4 * time.Hour)}, name: "ownernswildcardhost", namespace: "owner", host: "wild.namespace.test", policy: routeapi.WildcardPolicySubdomain, reason: "HostAlreadyClaimed", }, { name: "tldhost", namespace: "ns1", host: "ns1.org", }, { name: "tldhost2", namespace: "ns2", host: "ns2.org", policy: routeapi.WildcardPolicyNone, }, { name: "tldhostwildcard", namespace: "wild", host: "wild.play", policy: routeapi.WildcardPolicySubdomain, }, { name: "anothertldhostwildcard", namespace: "oscarwilde", host: "oscarwilde.com", policy: routeapi.WildcardPolicySubdomain, }, { name: "yatldhostwildcard", namespace: "yap", host: "test.me", policy: routeapi.WildcardPolicySubdomain, }, { name: "yatldhost2", namespace: "yap", host: "vinyl.play", policy: routeapi.WildcardPolicyNone, }, { name: "level2sub", namespace: "l2s", host: "test.co.us", }, { name: "level2sub2", namespace: "l2s", host: "unit.co.us", policy: routeapi.WildcardPolicyNone, }, { name: "level2sub3", namespace: "l2s", host: "qe.co.us", policy: routeapi.WildcardPolicySubdomain, }, } for _, tc := range tests { route := &routeapi.Route{ ObjectMeta: kapi.ObjectMeta{ CreationTimestamp: tc.createdAt, Name: tc.name, Namespace: tc.namespace, }, Spec: routeapi.RouteSpec{ Host: tc.host, WildcardPolicy: tc.policy, }, } err := admitter.HandleRoute(watch.Added, route) if tc.reason != "" { if err == nil { t.Fatalf("Test case %s expected errors, got none", tc.name) } k := recorder.rejectionKey(route) if recorder.rejections[k] != tc.reason { t.Fatalf("Test case %s expected error %s, got %s", tc.name, tc.reason, recorder.rejections[k]) } } else { if err != nil { t.Fatalf("Test case %s expected no errors, got %v", tc.name, err) } } } wildcardRoute := &routeapi.Route{ ObjectMeta: kapi.ObjectMeta{ CreationTimestamp: unversioned.Time{Time: oldest.Add(time.Hour)}, Name: "wildcard-owner", Namespace: "owner", }, Spec: routeapi.RouteSpec{ Host: "wildcard.namespace.test", WildcardPolicy: routeapi.WildcardPolicySubdomain, }, } err = admitter.HandleRoute(watch.Added, wildcardRoute) if err != nil { k := recorder.rejectionKey(wildcardRoute) if recorder.rejections[k] != "HostAlreadyClaimed" { t.Fatalf("Wildcard route expected host already claimed error, got %v - error=%v", recorder.rejections[k], err) } } else { t.Fatalf("Newer wildcard route expected errors, got none") } // bounce all the routes from the namespace "owner" and claim // ownership of the subdomain for the namespace "bouncer". bouncer := &routeapi.Route{ ObjectMeta: kapi.ObjectMeta{ CreationTimestamp: unversioned.Time{Time: oldest.Add(-1 * time.Hour)}, Name: "hosted", Namespace: "bouncer", }, Spec: routeapi.RouteSpec{ Host: "api.namespace.test", }, } err = admitter.HandleRoute(watch.Added, bouncer) if err != nil { t.Fatalf("bouncer route expected no errors, got %v", err) } // The bouncer route should kick out the owner and wildcard routes. bouncedRoutes := []*routeapi.Route{ownerRoute, wildcardRoute} for _, route := range bouncedRoutes { k := recorder.rejectionKey(route) if recorder.rejections[k] != "HostAlreadyClaimed" { t.Fatalf("bounced route %s expected a subdomain already claimed error, got %s", k, recorder.rejections[k]) } } }