Skip to content

Commit 4b0768d

Browse files
pkg: test ClusterPropagationPolicy validation hook
In this commit, we introduce unit tests for the `ValidatingAdmission` webhook for the `ClusterPropagationPolicy` resource. The tests cover various validation scenarios to ensure the webhook correctly handles admission requests: - Tests how the webhook responds when decoding the request object fails. - Ensures that updates to the `SchedulerName` field are denied, as it should remain immutable. - Validates that changes to the `ClusterPropagationPolicyPermanentIDLabel` label and its absence in creation requests are correctly handled. - Confirms that valid `ClusterPropagationPolicy` objects are allowed through without errors. Signed-off-by: Mohamed Awnallah <[email protected]>
1 parent 32c2ef7 commit 4b0768d

File tree

1 file changed

+180
-0
lines changed

1 file changed

+180
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,180 @@
1+
/*
2+
Copyright 2024 The Karmada Authors.
3+
4+
Licensed under the Apache License, Version 2.0 (the "License");
5+
you may not use this file except in compliance with the License.
6+
You may obtain a copy of the License at
7+
8+
http://www.apache.org/licenses/LICENSE-2.0
9+
10+
Unless required by applicable law or agreed to in writing, software
11+
distributed under the License is distributed on an "AS IS" BASIS,
12+
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13+
See the License for the specific language governing permissions and
14+
limitations under the License.
15+
*/
16+
17+
package clusterpropagationpolicy
18+
19+
import (
20+
"context"
21+
"errors"
22+
"fmt"
23+
"net/http"
24+
"reflect"
25+
"testing"
26+
27+
admissionv1 "k8s.io/api/admission/v1"
28+
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
29+
"k8s.io/apimachinery/pkg/runtime"
30+
"sigs.k8s.io/controller-runtime/pkg/webhook/admission"
31+
32+
policyv1alpha1 "github.com/karmada-io/karmada/pkg/apis/policy/v1alpha1"
33+
"github.com/karmada-io/karmada/pkg/scheduler"
34+
)
35+
36+
type fakeValidationDecoder struct {
37+
err error
38+
obj runtime.Object
39+
}
40+
41+
// Decode mocks the Decode method of admission.Decoder.
42+
func (f *fakeValidationDecoder) Decode(_ admission.Request, obj runtime.Object) error {
43+
if f.err != nil {
44+
return f.err
45+
}
46+
if f.obj != nil {
47+
reflect.ValueOf(obj).Elem().Set(reflect.ValueOf(f.obj).Elem())
48+
}
49+
return nil
50+
}
51+
52+
// DecodeRaw mocks the DecodeRaw method of admission.Decoder.
53+
func (f *fakeValidationDecoder) DecodeRaw(rawObject runtime.RawExtension, obj runtime.Object) error {
54+
if f.err != nil {
55+
return f.err
56+
}
57+
if f.obj != nil {
58+
reflect.ValueOf(obj).Elem().Set(reflect.ValueOf(rawObject.Object).Elem())
59+
}
60+
return nil
61+
}
62+
63+
func TestValidatingAdmission_Handle(t *testing.T) {
64+
tests := []struct {
65+
name string
66+
decoder admission.Decoder
67+
req admission.Request
68+
want admission.Response
69+
}{
70+
{
71+
name: "Handle_DecodeError_DeniesAdmission",
72+
decoder: &fakeValidationDecoder{
73+
err: errors.New("decode error"),
74+
},
75+
req: admission.Request{},
76+
want: admission.Errored(http.StatusBadRequest, errors.New("decode error")),
77+
},
78+
{
79+
name: "Handle_SchedulerNameUpdated_DeniesAdmission",
80+
decoder: &fakeValidationDecoder{
81+
obj: &policyv1alpha1.ClusterPropagationPolicy{
82+
Spec: policyv1alpha1.PropagationSpec{
83+
SchedulerName: "new-scheduler",
84+
},
85+
},
86+
},
87+
req: admission.Request{
88+
AdmissionRequest: admissionv1.AdmissionRequest{
89+
Operation: admissionv1.Update,
90+
OldObject: runtime.RawExtension{
91+
Object: &policyv1alpha1.ClusterPropagationPolicy{
92+
Spec: policyv1alpha1.PropagationSpec{
93+
SchedulerName: scheduler.DefaultScheduler,
94+
},
95+
},
96+
},
97+
},
98+
},
99+
want: admission.Denied("the schedulerName should not be updated"),
100+
},
101+
{
102+
name: "Handle_PermanentIDLabelUpdated_DeniesAdmission",
103+
decoder: &fakeValidationDecoder{
104+
obj: &policyv1alpha1.ClusterPropagationPolicy{
105+
ObjectMeta: metav1.ObjectMeta{
106+
Labels: map[string]string{
107+
policyv1alpha1.ClusterPropagationPolicyPermanentIDLabel: "new-id",
108+
},
109+
},
110+
},
111+
},
112+
req: admission.Request{
113+
AdmissionRequest: admissionv1.AdmissionRequest{
114+
Operation: admissionv1.Update,
115+
OldObject: runtime.RawExtension{
116+
Object: &policyv1alpha1.ClusterPropagationPolicy{
117+
ObjectMeta: metav1.ObjectMeta{
118+
Labels: map[string]string{
119+
policyv1alpha1.ClusterPropagationPolicyPermanentIDLabel: "old-id",
120+
},
121+
},
122+
},
123+
},
124+
},
125+
},
126+
want: admission.Denied(fmt.Sprintf("label %s is immutable, it can only be set by the system "+
127+
"during creation", policyv1alpha1.ClusterPropagationPolicyPermanentIDLabel)),
128+
},
129+
{
130+
name: "Handle_PermanentIDLabelMissing_DeniesAdmission",
131+
decoder: &fakeValidationDecoder{
132+
obj: &policyv1alpha1.ClusterPropagationPolicy{
133+
ObjectMeta: metav1.ObjectMeta{
134+
Labels: map[string]string{},
135+
},
136+
},
137+
},
138+
req: admission.Request{
139+
AdmissionRequest: admissionv1.AdmissionRequest{
140+
Operation: admissionv1.Create,
141+
},
142+
},
143+
want: admission.Denied(fmt.Sprintf("label %s is required, it should be set by the mutating "+
144+
"admission webhook during creation", policyv1alpha1.ClusterPropagationPolicyPermanentIDLabel)),
145+
},
146+
{
147+
name: "Handle_ValidationSucceeds_AllowsAdmission",
148+
decoder: &fakeValidationDecoder{
149+
obj: &policyv1alpha1.ClusterPropagationPolicy{
150+
ObjectMeta: metav1.ObjectMeta{
151+
Labels: map[string]string{
152+
policyv1alpha1.ClusterPropagationPolicyPermanentIDLabel: "new-id",
153+
},
154+
},
155+
Spec: policyv1alpha1.PropagationSpec{
156+
SchedulerName: scheduler.DefaultScheduler,
157+
},
158+
},
159+
},
160+
req: admission.Request{
161+
AdmissionRequest: admissionv1.AdmissionRequest{
162+
Operation: admissionv1.Create,
163+
},
164+
},
165+
want: admission.Allowed(""),
166+
},
167+
}
168+
169+
for _, tt := range tests {
170+
t.Run(tt.name, func(t *testing.T) {
171+
v := &ValidatingAdmission{
172+
Decoder: tt.decoder,
173+
}
174+
got := v.Handle(context.Background(), tt.req)
175+
if !reflect.DeepEqual(got, tt.want) {
176+
t.Errorf("Handle() = %v, want %v", got, tt.want)
177+
}
178+
})
179+
}
180+
}

0 commit comments

Comments
 (0)