mirror of
https://github.com/fluxcd/flagger.git
synced 2026-04-09 20:27:21 +00:00
It can take some time for changes to propagate for cloud load balancers, so flagger should ensure the route changes are current before proceeding with any more. Signed-off-by: Steven Davidovitz <sdavidovitz@groq.com>
710 lines
26 KiB
Go
710 lines
26 KiB
Go
/*
|
|
Copyright 2020 The Flux authors
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package router
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/google/go-cmp/cmp"
|
|
"github.com/google/go-cmp/cmp/cmpopts"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/utils/ptr"
|
|
|
|
flaggerv1 "github.com/fluxcd/flagger/pkg/apis/flagger/v1beta1"
|
|
v1 "github.com/fluxcd/flagger/pkg/apis/gatewayapi/v1"
|
|
istiov1alpha1 "github.com/fluxcd/flagger/pkg/apis/istio/common/v1alpha1"
|
|
istiov1beta1 "github.com/fluxcd/flagger/pkg/apis/istio/v1beta1"
|
|
)
|
|
|
|
func TestGatewayAPIRouter_Reconcile(t *testing.T) {
|
|
canary := newTestGatewayAPICanary()
|
|
mocks := newFixture(canary)
|
|
router := &GatewayAPIRouter{
|
|
gatewayAPIClient: mocks.meshClient,
|
|
kubeClient: mocks.kubeClient,
|
|
logger: mocks.logger,
|
|
}
|
|
|
|
err := router.Reconcile(canary)
|
|
require.NoError(t, err)
|
|
|
|
httpRoute, err := router.gatewayAPIClient.GatewayapiV1().HTTPRoutes("default").Get(context.TODO(), "podinfo", metav1.GetOptions{})
|
|
require.NoError(t, err)
|
|
|
|
routeRules := httpRoute.Spec.Rules
|
|
require.Equal(t, len(routeRules), 1)
|
|
|
|
backendRefs := routeRules[0].BackendRefs
|
|
require.Equal(t, len(backendRefs), 2)
|
|
assert.Equal(t, int32(100), *backendRefs[0].Weight)
|
|
assert.Equal(t, int32(0), *backendRefs[1].Weight)
|
|
|
|
timeout := routeRules[0].Timeouts
|
|
assert.Equal(t, string(*timeout.Request), canary.Spec.Service.Timeout)
|
|
|
|
// assert that http route annotations injected by the networking controller is preserved.
|
|
httpRoute.Annotations["foo"] = "bar"
|
|
_, err = router.gatewayAPIClient.GatewayapiV1().HTTPRoutes("default").Update(context.TODO(), httpRoute, metav1.UpdateOptions{})
|
|
require.NoError(t, err)
|
|
err = router.Reconcile(canary)
|
|
require.NoError(t, err)
|
|
|
|
httpRoute, err = router.gatewayAPIClient.GatewayapiV1().HTTPRoutes("default").Get(context.TODO(), "podinfo", metav1.GetOptions{})
|
|
require.NoError(t, err)
|
|
assert.Equal(t, httpRoute.Annotations["foo"], "bar")
|
|
}
|
|
|
|
func TestGatewayAPIRouter_Routes(t *testing.T) {
|
|
canary := newTestGatewayAPICanary()
|
|
mocks := newFixture(canary)
|
|
router := &GatewayAPIRouter{
|
|
gatewayAPIClient: mocks.meshClient,
|
|
kubeClient: mocks.kubeClient,
|
|
logger: mocks.logger,
|
|
}
|
|
|
|
err := router.Reconcile(canary)
|
|
require.NoError(t, err)
|
|
|
|
t.Run("normal", func(t *testing.T) {
|
|
err = router.SetRoutes(canary, 50, 50, false)
|
|
require.NoError(t, err)
|
|
|
|
httpRoute, err := router.gatewayAPIClient.GatewayapiV1().HTTPRoutes("default").Get(context.TODO(), "podinfo", metav1.GetOptions{})
|
|
require.NoError(t, err)
|
|
|
|
primary := httpRoute.Spec.Rules[0].BackendRefs[0]
|
|
assert.Equal(t, int32(50), *primary.Weight)
|
|
})
|
|
|
|
t.Run("session affinity", func(t *testing.T) {
|
|
canary := mocks.canary.DeepCopy()
|
|
cookieKey := "flagger-cookie"
|
|
// enable session affinity and start canary run
|
|
canary.Spec.Analysis.SessionAffinity = &flaggerv1.SessionAffinity{
|
|
CookieName: cookieKey,
|
|
Domain: "flagger.app",
|
|
HttpOnly: true,
|
|
MaxAge: 300,
|
|
Partitioned: true,
|
|
Path: "/app",
|
|
SameSite: "Strict",
|
|
Secure: true,
|
|
}
|
|
_, pSvcName, cSvcName := canary.GetServiceNames()
|
|
|
|
err := router.SetRoutes(canary, 90, 10, false)
|
|
require.NoError(t, err)
|
|
|
|
hr, err := mocks.meshClient.GatewayapiV1().HTTPRoutes("default").Get(context.TODO(), "podinfo", metav1.GetOptions{})
|
|
require.NoError(t, err)
|
|
assert.Len(t, hr.Spec.Rules, 2)
|
|
|
|
stickyRule := hr.Spec.Rules[0]
|
|
weightedRule := hr.Spec.Rules[1]
|
|
|
|
// stickyRoute should match against a cookie and direct all traffic to the canary when a canary run is active.
|
|
cookieMatch := stickyRule.Matches[0].Headers[0]
|
|
assert.Equal(t, *cookieMatch.Type, v1.HeaderMatchRegularExpression)
|
|
assert.Equal(t, string(cookieMatch.Name), cookieHeader)
|
|
assert.Contains(t, cookieMatch.Value, cookieKey)
|
|
|
|
assert.Equal(t, len(stickyRule.BackendRefs), 2)
|
|
for _, backendRef := range stickyRule.BackendRefs {
|
|
if string(backendRef.BackendRef.Name) == pSvcName {
|
|
assert.Equal(t, *backendRef.BackendRef.Weight, int32(0))
|
|
}
|
|
if string(backendRef.BackendRef.Name) == cSvcName {
|
|
assert.Equal(t, *backendRef.BackendRef.Weight, int32(100))
|
|
}
|
|
}
|
|
|
|
// weightedRoute should do regular weight based routing and inject the Set-Cookie header
|
|
// for all responses returned from the canary deployment.
|
|
var found bool
|
|
for _, backendRef := range weightedRule.BackendRefs {
|
|
if string(backendRef.Name) == cSvcName {
|
|
found = true
|
|
filter := backendRef.Filters[0]
|
|
val := filter.ResponseHeaderModifier.Add[0].Value
|
|
assert.Equal(t, filter.Type, v1.HTTPRouteFilterResponseHeaderModifier)
|
|
assert.NotNil(t, filter.ResponseHeaderModifier)
|
|
assert.Equal(t, string(filter.ResponseHeaderModifier.Add[0].Name), setCookieHeader)
|
|
assert.True(t, strings.HasPrefix(val, cookieKey))
|
|
assert.True(t, strings.Contains(val, "Domain=flagger.app"))
|
|
assert.True(t, strings.Contains(val, "HttpOnly"))
|
|
assert.True(t, strings.Contains(val, "Max-Age=300"))
|
|
assert.True(t, strings.Contains(val, "Partitioned"))
|
|
assert.True(t, strings.Contains(val, "Path=/app"))
|
|
assert.True(t, strings.Contains(val, "SameSite=Strict"))
|
|
assert.True(t, strings.Contains(val, "Secure"))
|
|
assert.Equal(t, *backendRef.Weight, int32(10))
|
|
}
|
|
if string(backendRef.Name) == pSvcName {
|
|
assert.Equal(t, *backendRef.Weight, int32(90))
|
|
}
|
|
}
|
|
assert.True(t, found)
|
|
assert.True(t, strings.HasPrefix(canary.Status.SessionAffinityCookie, cookieKey))
|
|
|
|
// reconcile Canary and HTTPRoute
|
|
err = router.Reconcile(canary)
|
|
require.NoError(t, err)
|
|
|
|
// HTTPRoute should be unchanged
|
|
hr, err = mocks.meshClient.GatewayapiV1().HTTPRoutes("default").Get(context.TODO(), "podinfo", metav1.GetOptions{})
|
|
require.NoError(t, err)
|
|
assert.Len(t, hr.Spec.Rules, 2)
|
|
assert.Empty(t, cmp.Diff(hr.Spec.Rules[0], stickyRule))
|
|
assert.Empty(t, cmp.Diff(hr.Spec.Rules[1], weightedRule))
|
|
|
|
// further continue the canary run
|
|
err = router.SetRoutes(canary, 50, 50, false)
|
|
require.NoError(t, err)
|
|
hr, err = mocks.meshClient.GatewayapiV1().HTTPRoutes("default").Get(context.TODO(), "podinfo", metav1.GetOptions{})
|
|
require.NoError(t, err)
|
|
|
|
stickyRule = hr.Spec.Rules[0]
|
|
weightedRule = hr.Spec.Rules[1]
|
|
|
|
// stickyRoute should match against a cookie and direct all traffic to the canary when a canary run is active.
|
|
cookieMatch = stickyRule.Matches[0].Headers[0]
|
|
assert.Equal(t, *cookieMatch.Type, v1.HeaderMatchRegularExpression)
|
|
assert.Equal(t, string(cookieMatch.Name), cookieHeader)
|
|
assert.Contains(t, cookieMatch.Value, cookieKey)
|
|
|
|
assert.Equal(t, len(stickyRule.BackendRefs), 2)
|
|
for _, backendRef := range stickyRule.BackendRefs {
|
|
if string(backendRef.BackendRef.Name) == pSvcName {
|
|
assert.Equal(t, *backendRef.BackendRef.Weight, int32(0))
|
|
}
|
|
if string(backendRef.BackendRef.Name) == cSvcName {
|
|
assert.Equal(t, *backendRef.BackendRef.Weight, int32(100))
|
|
}
|
|
}
|
|
|
|
// weightedRoute should do regular weight based routing and inject the Set-Cookie header
|
|
// for all responses returned from the canary deployment.
|
|
found = false
|
|
for _, backendRef := range weightedRule.BackendRefs {
|
|
if string(backendRef.Name) == cSvcName {
|
|
found = true
|
|
filter := backendRef.Filters[0]
|
|
val := filter.ResponseHeaderModifier.Add[0].Value
|
|
assert.Equal(t, filter.Type, v1.HTTPRouteFilterResponseHeaderModifier)
|
|
assert.NotNil(t, filter.ResponseHeaderModifier)
|
|
assert.Equal(t, string(filter.ResponseHeaderModifier.Add[0].Name), setCookieHeader)
|
|
assert.True(t, strings.HasPrefix(val, cookieKey))
|
|
assert.True(t, strings.Contains(val, "Domain=flagger.app"))
|
|
assert.True(t, strings.Contains(val, "HttpOnly"))
|
|
assert.True(t, strings.Contains(val, "Max-Age=300"))
|
|
assert.True(t, strings.Contains(val, "Partitioned"))
|
|
assert.True(t, strings.Contains(val, "Path=/app"))
|
|
assert.True(t, strings.Contains(val, "SameSite=Strict"))
|
|
assert.True(t, strings.Contains(val, "Secure"))
|
|
|
|
assert.Equal(t, *backendRef.Weight, int32(50))
|
|
}
|
|
if string(backendRef.Name) == pSvcName {
|
|
assert.Equal(t, *backendRef.Weight, int32(50))
|
|
}
|
|
}
|
|
assert.True(t, found)
|
|
|
|
// promotion
|
|
err = router.SetRoutes(canary, 100, 0, false)
|
|
require.NoError(t, err)
|
|
hr, err = mocks.meshClient.GatewayapiV1().HTTPRoutes("default").Get(context.TODO(), "podinfo", metav1.GetOptions{})
|
|
require.NoError(t, err)
|
|
|
|
assert.Empty(t, canary.Status.SessionAffinityCookie)
|
|
assert.Contains(t, canary.Status.PreviousSessionAffinityCookie, cookieKey)
|
|
|
|
stickyRule = hr.Spec.Rules[0]
|
|
weightedRule = hr.Spec.Rules[1]
|
|
|
|
// Assert that the stucky rule matches against the previous cookie and tells clients to delete it.
|
|
cookieMatch = stickyRule.Matches[0].Headers[0]
|
|
assert.Equal(t, *cookieMatch.Type, v1.HeaderMatchRegularExpression)
|
|
assert.Equal(t, string(cookieMatch.Name), cookieHeader)
|
|
assert.Contains(t, cookieMatch.Value, cookieKey)
|
|
|
|
assert.Equal(t, stickyRule.Filters[0].Type, v1.HTTPRouteFilterResponseHeaderModifier)
|
|
headerModifier := stickyRule.Filters[0].ResponseHeaderModifier
|
|
assert.NotNil(t, headerModifier)
|
|
assert.Equal(t, string(headerModifier.Add[0].Name), setCookieHeader)
|
|
assert.Equal(t, headerModifier.Add[0].Value, fmt.Sprintf("%s; %s=%d", canary.Status.PreviousSessionAffinityCookie, maxAgeAttr, -1))
|
|
|
|
for _, backendRef := range stickyRule.BackendRefs {
|
|
if string(backendRef.BackendRef.Name) == pSvcName {
|
|
assert.Equal(t, *backendRef.BackendRef.Weight, int32(100))
|
|
}
|
|
if string(backendRef.BackendRef.Name) == cSvcName {
|
|
assert.Equal(t, *backendRef.BackendRef.Weight, int32(0))
|
|
}
|
|
}
|
|
|
|
for _, backendRef := range weightedRule.BackendRefs {
|
|
if string(backendRef.Name) == cSvcName {
|
|
// Assert the weighted rule does not send Set-Cookie headers anymore
|
|
assert.Len(t, backendRef.Filters, 0)
|
|
assert.Equal(t, *backendRef.Weight, int32(0))
|
|
}
|
|
if string(backendRef.Name) == pSvcName {
|
|
assert.Equal(t, *backendRef.Weight, int32(100))
|
|
}
|
|
}
|
|
assert.True(t, found)
|
|
})
|
|
|
|
t.Run("b/g mirror", func(t *testing.T) {
|
|
canary := mocks.canary.DeepCopy()
|
|
canary.Spec.Analysis.Mirror = true
|
|
canary.Spec.Analysis.Iterations = 5
|
|
_, _, cSvcName := canary.GetServiceNames()
|
|
|
|
err = router.SetRoutes(canary, 100, 0, true)
|
|
hr, err := mocks.meshClient.GatewayapiV1().HTTPRoutes("default").Get(context.TODO(), "podinfo", metav1.GetOptions{})
|
|
require.NoError(t, err)
|
|
assert.Len(t, hr.Spec.Rules, 1)
|
|
|
|
rule := hr.Spec.Rules[0]
|
|
var found bool
|
|
for _, filter := range rule.Filters {
|
|
if filter.Type == v1.HTTPRouteFilterRequestMirror && filter.RequestMirror != nil &&
|
|
string(filter.RequestMirror.BackendRef.Name) == cSvcName {
|
|
found = true
|
|
}
|
|
}
|
|
assert.True(t, found, "could not find request mirror filter in HTTPRoute")
|
|
|
|
// Mark the status as progressing to assert that request mirror filter is ignored.
|
|
canary.Status.Phase = flaggerv1.CanaryPhaseProgressing
|
|
err = router.Reconcile(canary)
|
|
require.NoError(t, err)
|
|
|
|
hr, err = mocks.meshClient.GatewayapiV1().HTTPRoutes("default").Get(context.TODO(), "podinfo", metav1.GetOptions{})
|
|
require.NoError(t, err)
|
|
assert.Len(t, hr.Spec.Rules, 1)
|
|
assert.Empty(t, cmp.Diff(hr.Spec.Rules[0], rule))
|
|
|
|
err = router.SetRoutes(canary, 100, 0, false)
|
|
hr, err = mocks.meshClient.GatewayapiV1().HTTPRoutes("default").Get(context.TODO(), "podinfo", metav1.GetOptions{})
|
|
require.NoError(t, err)
|
|
assert.Len(t, hr.Spec.Rules, 1)
|
|
assert.Len(t, hr.Spec.Rules[0].Filters, 0)
|
|
})
|
|
}
|
|
|
|
func TestGatewayAPIRouter_getSessionAffinityRouteRules(t *testing.T) {
|
|
t.Run("without primary cookie", func(t *testing.T) {
|
|
canary := newTestGatewayAPICanary()
|
|
mocks := newFixture(canary)
|
|
cookieKey := "flagger-cookie"
|
|
canary.Spec.Analysis.SessionAffinity = &flaggerv1.SessionAffinity{
|
|
CookieName: cookieKey,
|
|
MaxAge: 300,
|
|
}
|
|
|
|
router := &GatewayAPIRouter{
|
|
gatewayAPIClient: mocks.meshClient,
|
|
kubeClient: mocks.kubeClient,
|
|
logger: mocks.logger,
|
|
}
|
|
_, pSvcName, cSvcName := canary.GetServiceNames()
|
|
weightedRouteRule := &v1.HTTPRouteRule{
|
|
BackendRefs: []v1.HTTPBackendRef{
|
|
{
|
|
BackendRef: router.makeBackendRef(pSvcName, initialPrimaryWeight, canary.Spec.Service.Port),
|
|
},
|
|
{
|
|
BackendRef: router.makeBackendRef(cSvcName, initialCanaryWeight, canary.Spec.Service.Port),
|
|
},
|
|
},
|
|
}
|
|
rules, err := router.getSessionAffinityRouteRules(canary, 10, weightedRouteRule)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, len(rules), 2)
|
|
assert.True(t, strings.HasPrefix(canary.Status.SessionAffinityCookie, cookieKey))
|
|
|
|
stickyRule := rules[0]
|
|
cookieMatch := stickyRule.Matches[0].Headers[0]
|
|
assert.Equal(t, *cookieMatch.Type, v1.HeaderMatchRegularExpression)
|
|
assert.Equal(t, string(cookieMatch.Name), cookieHeader)
|
|
assert.Contains(t, cookieMatch.Value, cookieKey)
|
|
|
|
assert.Equal(t, len(stickyRule.BackendRefs), 2)
|
|
for _, backendRef := range stickyRule.BackendRefs {
|
|
if string(backendRef.BackendRef.Name) == pSvcName {
|
|
assert.Equal(t, *backendRef.BackendRef.Weight, int32(0))
|
|
}
|
|
if string(backendRef.BackendRef.Name) == cSvcName {
|
|
assert.Equal(t, *backendRef.BackendRef.Weight, int32(100))
|
|
}
|
|
}
|
|
|
|
weightedRule := rules[1]
|
|
var found bool
|
|
for _, backendRef := range weightedRule.BackendRefs {
|
|
if string(backendRef.Name) == cSvcName {
|
|
found = true
|
|
filter := backendRef.Filters[0]
|
|
assert.Equal(t, filter.Type, v1.HTTPRouteFilterResponseHeaderModifier)
|
|
assert.NotNil(t, filter.ResponseHeaderModifier)
|
|
assert.Equal(t, string(filter.ResponseHeaderModifier.Add[0].Name), setCookieHeader)
|
|
assert.Equal(t, filter.ResponseHeaderModifier.Add[0].Value, fmt.Sprintf("%s; %s=%d", canary.Status.SessionAffinityCookie, maxAgeAttr, 300))
|
|
}
|
|
}
|
|
assert.True(t, found)
|
|
|
|
rules, err = router.getSessionAffinityRouteRules(canary, 0, weightedRouteRule)
|
|
require.NoError(t, err)
|
|
assert.Empty(t, canary.Status.SessionAffinityCookie)
|
|
assert.Contains(t, canary.Status.PreviousSessionAffinityCookie, cookieKey)
|
|
|
|
stickyRule = rules[0]
|
|
cookieMatch = stickyRule.Matches[0].Headers[0]
|
|
assert.Equal(t, *cookieMatch.Type, v1.HeaderMatchRegularExpression)
|
|
assert.Equal(t, string(cookieMatch.Name), cookieHeader)
|
|
assert.Contains(t, cookieMatch.Value, cookieKey)
|
|
|
|
assert.Equal(t, stickyRule.Filters[0].Type, v1.HTTPRouteFilterResponseHeaderModifier)
|
|
headerModifier := stickyRule.Filters[0].ResponseHeaderModifier
|
|
assert.NotNil(t, headerModifier)
|
|
assert.Equal(t, string(headerModifier.Add[0].Name), setCookieHeader)
|
|
assert.Equal(t, headerModifier.Add[0].Value, fmt.Sprintf("%s; %s=%d", canary.Status.PreviousSessionAffinityCookie, maxAgeAttr, -1))
|
|
})
|
|
|
|
t.Run("with primary cookie", func(t *testing.T) {
|
|
canary := newTestGatewayAPICanary()
|
|
mocks := newFixture(canary)
|
|
canaryCookieKey := "canary-flagger-cookie"
|
|
primaryCookieKey := "primary-flagger-cookie"
|
|
canary.Spec.Analysis.Interval = "15s"
|
|
canary.Spec.Analysis.SessionAffinity = &flaggerv1.SessionAffinity{
|
|
CookieName: canaryCookieKey,
|
|
PrimaryCookieName: primaryCookieKey,
|
|
MaxAge: 300,
|
|
}
|
|
|
|
router := &GatewayAPIRouter{
|
|
gatewayAPIClient: mocks.meshClient,
|
|
kubeClient: mocks.kubeClient,
|
|
logger: mocks.logger,
|
|
}
|
|
_, pSvcName, cSvcName := canary.GetServiceNames()
|
|
weightedRouteRule := &v1.HTTPRouteRule{
|
|
BackendRefs: []v1.HTTPBackendRef{
|
|
{
|
|
BackendRef: router.makeBackendRef(pSvcName, initialPrimaryWeight, canary.Spec.Service.Port),
|
|
},
|
|
{
|
|
BackendRef: router.makeBackendRef(cSvcName, initialCanaryWeight, canary.Spec.Service.Port),
|
|
},
|
|
},
|
|
}
|
|
rules, err := router.getSessionAffinityRouteRules(canary, 10, weightedRouteRule)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, len(rules), 3)
|
|
assert.True(t, strings.HasPrefix(canary.Status.SessionAffinityCookie, canaryCookieKey))
|
|
|
|
canaryStickyRule := rules[0]
|
|
cookieMatch := canaryStickyRule.Matches[0].Headers[0]
|
|
assert.Equal(t, *cookieMatch.Type, v1.HeaderMatchRegularExpression)
|
|
assert.Equal(t, string(cookieMatch.Name), cookieHeader)
|
|
assert.Contains(t, cookieMatch.Value, canaryCookieKey)
|
|
|
|
assert.Equal(t, len(canaryStickyRule.BackendRefs), 2)
|
|
for _, backendRef := range canaryStickyRule.BackendRefs {
|
|
if string(backendRef.BackendRef.Name) == pSvcName {
|
|
assert.Equal(t, *backendRef.BackendRef.Weight, int32(0))
|
|
}
|
|
if string(backendRef.BackendRef.Name) == cSvcName {
|
|
assert.Equal(t, *backendRef.BackendRef.Weight, int32(100))
|
|
}
|
|
}
|
|
|
|
primaryStickyRule := rules[1]
|
|
cookieMatch = primaryStickyRule.Matches[0].Headers[0]
|
|
assert.Equal(t, *cookieMatch.Type, v1.HeaderMatchRegularExpression)
|
|
assert.Equal(t, string(cookieMatch.Name), cookieHeader)
|
|
assert.Contains(t, cookieMatch.Value, primaryCookieKey)
|
|
|
|
assert.Equal(t, len(primaryStickyRule.BackendRefs), 2)
|
|
for _, backendRef := range primaryStickyRule.BackendRefs {
|
|
if string(backendRef.BackendRef.Name) == pSvcName {
|
|
assert.Equal(t, *backendRef.BackendRef.Weight, int32(100))
|
|
}
|
|
if string(backendRef.BackendRef.Name) == cSvcName {
|
|
assert.Equal(t, *backendRef.BackendRef.Weight, int32(0))
|
|
}
|
|
}
|
|
|
|
weightedRule := rules[2]
|
|
var c int
|
|
for _, backendRef := range weightedRule.BackendRefs {
|
|
if string(backendRef.Name) == cSvcName {
|
|
c += 1
|
|
filter := backendRef.Filters[0]
|
|
assert.Equal(t, filter.Type, v1.HTTPRouteFilterResponseHeaderModifier)
|
|
assert.NotNil(t, filter.ResponseHeaderModifier)
|
|
assert.Equal(t, string(filter.ResponseHeaderModifier.Add[0].Name), setCookieHeader)
|
|
assert.Equal(t, filter.ResponseHeaderModifier.Add[0].Value, fmt.Sprintf("%s; %s=%d", canary.Status.SessionAffinityCookie, maxAgeAttr, 300))
|
|
}
|
|
|
|
if string(backendRef.Name) == pSvcName {
|
|
c += 1
|
|
filter := backendRef.Filters[0]
|
|
assert.Equal(t, filter.Type, v1.HTTPRouteFilterResponseHeaderModifier)
|
|
assert.NotNil(t, filter.ResponseHeaderModifier)
|
|
assert.Equal(t, string(filter.ResponseHeaderModifier.Add[0].Name), setCookieHeader)
|
|
assert.Contains(t, filter.ResponseHeaderModifier.Add[0].Value, canary.Spec.Analysis.SessionAffinity.PrimaryCookieName)
|
|
interval, err := time.ParseDuration(canary.Spec.Analysis.Interval)
|
|
require.NoError(t, err)
|
|
assert.Contains(t, filter.ResponseHeaderModifier.Add[0].Value, fmt.Sprintf("%s=%d", maxAgeAttr, int(interval.Seconds())))
|
|
}
|
|
}
|
|
assert.Equal(t, 2, c)
|
|
|
|
rules, err = router.getSessionAffinityRouteRules(canary, 0, weightedRouteRule)
|
|
require.NoError(t, err)
|
|
assert.Empty(t, canary.Status.SessionAffinityCookie)
|
|
assert.Contains(t, canary.Status.PreviousSessionAffinityCookie, canaryCookieKey)
|
|
|
|
canaryStickyRule = rules[0]
|
|
cookieMatch = canaryStickyRule.Matches[0].Headers[0]
|
|
assert.Equal(t, *cookieMatch.Type, v1.HeaderMatchRegularExpression)
|
|
assert.Equal(t, string(cookieMatch.Name), cookieHeader)
|
|
assert.Contains(t, cookieMatch.Value, canaryCookieKey)
|
|
|
|
assert.Equal(t, canaryStickyRule.Filters[0].Type, v1.HTTPRouteFilterResponseHeaderModifier)
|
|
headerModifier := canaryStickyRule.Filters[0].ResponseHeaderModifier
|
|
assert.NotNil(t, headerModifier)
|
|
assert.Equal(t, string(headerModifier.Add[0].Name), setCookieHeader)
|
|
assert.Equal(t, headerModifier.Add[0].Value, fmt.Sprintf("%s; %s=%d", canary.Status.PreviousSessionAffinityCookie, maxAgeAttr, -1))
|
|
})
|
|
}
|
|
|
|
func TestGatewayAPIRouter_makeFilters(t *testing.T) {
|
|
canary := newTestGatewayAPICanary()
|
|
mocks := newFixture(canary)
|
|
canary.Spec.Service.Headers = &istiov1beta1.Headers{
|
|
Response: &istiov1beta1.HeaderOperations{
|
|
Set: map[string]string{"h1": "v1", "h2": "v2", "h3": "v3"},
|
|
Add: map[string]string{"h1": "v1", "h2": "v2", "h3": "v3"},
|
|
},
|
|
Request: &istiov1beta1.HeaderOperations{
|
|
Set: map[string]string{"h1": "v1", "h2": "v2", "h3": "v3"},
|
|
Add: map[string]string{"h1": "v1", "h2": "v2", "h3": "v3"},
|
|
},
|
|
}
|
|
|
|
router := &GatewayAPIRouter{
|
|
gatewayAPIClient: mocks.meshClient,
|
|
kubeClient: mocks.kubeClient,
|
|
logger: mocks.logger,
|
|
}
|
|
|
|
ignoreCmpOptions := []cmp.Option{
|
|
cmpopts.IgnoreFields(v1.BackendRef{}, "Weight"),
|
|
cmpopts.EquateEmpty(),
|
|
}
|
|
|
|
filters := router.makeFilters(canary)
|
|
|
|
for i := 0; i < 10; i++ {
|
|
newFilters := router.makeFilters(canary)
|
|
filtersDiff := cmp.Diff(
|
|
filters, newFilters,
|
|
ignoreCmpOptions...,
|
|
)
|
|
assert.Equal(t, "", filtersDiff)
|
|
}
|
|
}
|
|
|
|
func TestGatewayAPIRouter_makeFilters_CORS(t *testing.T) {
|
|
canary := newTestGatewayAPICanary()
|
|
mocks := newFixture(canary)
|
|
|
|
// Configure CORS policy
|
|
canary.Spec.Service.CorsPolicy = &istiov1beta1.CorsPolicy{
|
|
AllowOrigins: []*istiov1alpha1.StringMatch{{Regex: ".*example.com"}}, // ignored
|
|
AllowOrigin: []string{"https://example.com", "https://app.example.com"},
|
|
AllowMethods: []string{"GET", "POST", "PUT"},
|
|
AllowHeaders: []string{"Content-Type", "Authorization"},
|
|
ExposeHeaders: []string{"X-Custom-Header"},
|
|
AllowCredentials: true,
|
|
MaxAge: "24h",
|
|
}
|
|
|
|
router := &GatewayAPIRouter{
|
|
gatewayAPIClient: mocks.meshClient,
|
|
kubeClient: mocks.kubeClient,
|
|
logger: mocks.logger,
|
|
}
|
|
|
|
filters := router.makeFilters(canary)
|
|
|
|
// Find the CORS filter
|
|
var corsFilter *v1.HTTPRouteFilter
|
|
for i := range filters {
|
|
if filters[i].Type == v1.HTTPRouteFilterCORS {
|
|
corsFilter = &filters[i]
|
|
break
|
|
}
|
|
}
|
|
|
|
require.NotNil(t, corsFilter, "CORS filter should be present")
|
|
require.NotNil(t, corsFilter.CORS, "CORS configuration should not be nil")
|
|
|
|
// Assert AllowOrigins
|
|
assert.Len(t, corsFilter.CORS.AllowOrigins, 2)
|
|
assert.Equal(t, v1.CORSOrigin("https://example.com"), corsFilter.CORS.AllowOrigins[0])
|
|
assert.Equal(t, v1.CORSOrigin("https://app.example.com"), corsFilter.CORS.AllowOrigins[1])
|
|
|
|
// Assert AllowMethods
|
|
assert.Len(t, corsFilter.CORS.AllowMethods, 3)
|
|
assert.Equal(t, v1.HTTPMethodWithWildcard("GET"), corsFilter.CORS.AllowMethods[0])
|
|
assert.Equal(t, v1.HTTPMethodWithWildcard("POST"), corsFilter.CORS.AllowMethods[1])
|
|
assert.Equal(t, v1.HTTPMethodWithWildcard("PUT"), corsFilter.CORS.AllowMethods[2])
|
|
|
|
// Assert AllowHeaders
|
|
assert.Len(t, corsFilter.CORS.AllowHeaders, 2)
|
|
assert.Equal(t, v1.HTTPHeaderName("Content-Type"), corsFilter.CORS.AllowHeaders[0])
|
|
assert.Equal(t, v1.HTTPHeaderName("Authorization"), corsFilter.CORS.AllowHeaders[1])
|
|
|
|
// Assert ExposeHeaders
|
|
assert.Len(t, corsFilter.CORS.ExposeHeaders, 1)
|
|
assert.Equal(t, v1.HTTPHeaderName("X-Custom-Header"), corsFilter.CORS.ExposeHeaders[0])
|
|
|
|
// Assert AllowCredentials
|
|
require.NotNil(t, corsFilter.CORS.AllowCredentials)
|
|
assert.True(t, *corsFilter.CORS.AllowCredentials)
|
|
|
|
// Assert MaxAge (24h = 86400 seconds)
|
|
assert.Equal(t, int32(86400), corsFilter.CORS.MaxAge)
|
|
}
|
|
|
|
func TestGatewayAPIRouter_GetRoutes(t *testing.T) {
|
|
canary := newTestGatewayAPICanary()
|
|
mocks := newFixture(canary)
|
|
router := &GatewayAPIRouter{
|
|
gatewayAPIClient: mocks.meshClient,
|
|
kubeClient: mocks.kubeClient,
|
|
logger: mocks.logger,
|
|
}
|
|
|
|
httpRoute := &v1.HTTPRoute{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "podinfo",
|
|
Generation: 1,
|
|
},
|
|
Spec: v1.HTTPRouteSpec{
|
|
Rules: []v1.HTTPRouteRule{
|
|
{
|
|
BackendRefs: []v1.HTTPBackendRef{
|
|
{
|
|
BackendRef: v1.BackendRef{
|
|
BackendObjectReference: v1.BackendObjectReference{
|
|
Name: "podinfo-canary",
|
|
},
|
|
Weight: ptr.To(int32(10)),
|
|
},
|
|
},
|
|
{
|
|
BackendRef: v1.BackendRef{
|
|
BackendObjectReference: v1.BackendObjectReference{
|
|
Name: "podinfo-primary",
|
|
},
|
|
Weight: ptr.To(int32(90)),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
CommonRouteSpec: v1.CommonRouteSpec{
|
|
ParentRefs: []v1.ParentReference{
|
|
{
|
|
Name: "podinfo",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
httpRoute, err := router.gatewayAPIClient.GatewayapiV1().HTTPRoutes("default").Create(context.TODO(), httpRoute, metav1.CreateOptions{})
|
|
require.NoError(t, err)
|
|
|
|
t.Run("httproute generation", func(t *testing.T) {
|
|
httpRoute.ObjectMeta.Generation = 5
|
|
httpRoute.Status.Parents = []v1.RouteParentStatus{
|
|
{
|
|
ParentRef: v1.ParentReference{
|
|
Name: "podinfo",
|
|
SectionName: ptr.To(v1.SectionName("https")),
|
|
},
|
|
Conditions: []metav1.Condition{
|
|
{
|
|
Type: string(v1.RouteConditionAccepted),
|
|
Status: metav1.ConditionTrue,
|
|
ObservedGeneration: 1,
|
|
},
|
|
},
|
|
},
|
|
{
|
|
ParentRef: v1.ParentReference{
|
|
Name: "podinfo",
|
|
},
|
|
Conditions: []metav1.Condition{
|
|
{
|
|
Type: string(v1.RouteConditionAccepted),
|
|
Status: metav1.ConditionFalse,
|
|
ObservedGeneration: 4,
|
|
},
|
|
},
|
|
},
|
|
}
|
|
httpRoute, err := router.gatewayAPIClient.GatewayapiV1().HTTPRoutes("default").Update(context.TODO(), httpRoute, metav1.UpdateOptions{})
|
|
require.NoError(t, err)
|
|
|
|
_, _, _, err = router.GetRoutes(canary)
|
|
require.Error(t, err)
|
|
|
|
httpRoute.Status.Parents[1].Conditions[0].ObservedGeneration = 5
|
|
_, err = router.gatewayAPIClient.GatewayapiV1().HTTPRoutes("default").Update(context.TODO(), httpRoute, metav1.UpdateOptions{})
|
|
require.NoError(t, err)
|
|
|
|
_, _, _, err = router.GetRoutes(canary)
|
|
require.Error(t, err)
|
|
|
|
httpRoute.Status.Parents[1].Conditions[0].Status = metav1.ConditionTrue
|
|
_, err = router.gatewayAPIClient.GatewayapiV1().HTTPRoutes("default").Update(context.TODO(), httpRoute, metav1.UpdateOptions{})
|
|
require.NoError(t, err)
|
|
|
|
primaryWeight, canaryWeight, mirrored, err := router.GetRoutes(canary)
|
|
require.NoError(t, err)
|
|
assert.Equal(t, 90, primaryWeight)
|
|
assert.Equal(t, 10, canaryWeight)
|
|
assert.False(t, mirrored)
|
|
})
|
|
}
|