Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions internal/controller/gateway_controller.go
Original file line number Diff line number Diff line change
Expand Up @@ -140,6 +140,10 @@ func (r *GatewayReconciler) Reconcile(ctx context.Context, req ctrl.Request) (ct
}
return ctrl.Result{}, err
}
if !r.checkGatewayClass(gateway) {
return ctrl.Result{}, nil
}

conditionProgrammedStatus, conditionProgrammedMsg := true, "Programmed"

r.Log.Info("gateway has been accepted", "gateway", gateway.GetName())
Expand Down
6 changes: 4 additions & 2 deletions internal/controller/indexer/ssl_host.go
Original file line number Diff line number Diff line change
Expand Up @@ -69,9 +69,11 @@ func GatewayTLSHostIndexFunc(rawObj client.Object) []string {
}
}

tlsHostIndexLogger.Info("GatewayTLSHostIndexFunc", "hosts", hostSetToSlice(hosts), "len", len(hostSetToSlice(hosts)))
hostsSlice := hostSetToSlice(hosts)

return hostSetToSlice(hosts)
tlsHostIndexLogger.V(1).Info("GatewayTLSHostIndexFunc", "hosts", hostsSlice)

return hostsSlice
}

// IngressTLSHostIndexFunc indexes Ingresses by their TLS SNI hosts.
Expand Down
21 changes: 5 additions & 16 deletions test/e2e/crds/v2/route.go
Original file line number Diff line number Diff line change
Expand Up @@ -2145,22 +2145,11 @@ spec:
time.Sleep(6 * time.Second)

By("verify wss connection")
u := url.URL{
Scheme: "wss",
Host: s.GetAPISIXHTTPSEndpoint(),
Path: "/ws",
}
headers := http.Header{"Host": []string{"api6.com"}}
dialer := websocket.Dialer{
TLSClientConfig: &tls.Config{
InsecureSkipVerify: true,
ServerName: "api6.com",
},
}

conn, resp, err := dialer.Dial(u.String(), headers)
Expect(err).ShouldNot(HaveOccurred(), "WebSocket handshake")
Expect(resp.StatusCode).Should(Equal(http.StatusSwitchingProtocols))
hostname := "api6.com"
conn := s.NewWebsocketClient(&tls.Config{
InsecureSkipVerify: true,
ServerName: hostname,
}, "/ws", http.Header{"Host": []string{hostname}})

defer func() {
_ = conn.Close()
Expand Down
3 changes: 3 additions & 0 deletions test/e2e/framework/manifests/apisix.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -66,15 +66,18 @@ metadata:
name: apisix
labels:
app.kubernetes.io/name: apisix
app: apisix
spec:
replicas: {{ default 1 .Replicas }}
selector:
matchLabels:
app.kubernetes.io/name: apisix
app: apisix
template:
metadata:
labels:
app.kubernetes.io/name: apisix
app: apisix
spec:
initContainers:
- name: config-setup
Expand Down
10 changes: 8 additions & 2 deletions test/e2e/framework/manifests/nginx.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -124,13 +124,19 @@ spec:
containers:
- livenessProbe:
failureThreshold: 3
initialDelaySeconds: 1
periodSeconds: 5
initialDelaySeconds: 10
periodSeconds: 15
successThreshold: 1
httpGet:
path: /healthz
port: 80
timeoutSeconds: 2
readinessProbe:
httpGet:
path: /healthz
port: 80
initialDelaySeconds: 5
periodSeconds: 5
image: "openresty/openresty:1.27.1.2-4-bullseye-fat"
imagePullPolicy: IfNotPresent
name: nginx
Expand Down
26 changes: 5 additions & 21 deletions test/e2e/gatewayapi/httproute.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,6 @@ import (
"crypto/tls"
"fmt"
"net/http"
"net/url"
"strings"
"time"

Expand Down Expand Up @@ -2504,36 +2503,21 @@ spec:

It("WSS backend", func() {
s.ResourceApplied("HTTPRoute", "nginx-wss", fmt.Sprintf(httprouteWithWSS, s.Namespace()), 1)
time.Sleep(6 * time.Second)

By("verify wss connection")
u := url.URL{
Scheme: "wss",
Host: s.GetAPISIXHTTPSEndpoint(),
Path: "/ws",
}
headers := http.Header{"Host": []string{"api6.com"}}

hostname := "api6.com"

dialer := websocket.Dialer{
TLSClientConfig: &tls.Config{
InsecureSkipVerify: true,
ServerName: hostname,
},
}

conn, resp, err := dialer.Dial(u.String(), headers)
Expect(err).ShouldNot(HaveOccurred(), "WebSocket handshake")
Expect(resp.StatusCode).Should(Equal(http.StatusSwitchingProtocols))
conn := s.NewWebsocketClient(&tls.Config{
InsecureSkipVerify: true,
ServerName: hostname,
}, "/ws", http.Header{"Host": []string{hostname}})

defer func() {
_ = conn.Close()
}()

By("send and receive message through WebSocket")
testMessage := "hello, this is APISIX"
err = conn.WriteMessage(websocket.TextMessage, []byte(testMessage))
err := conn.WriteMessage(websocket.TextMessage, []byte(testMessage))
Expect(err).ShouldNot(HaveOccurred(), "writing WebSocket message")

// Then our echo
Expand Down
36 changes: 11 additions & 25 deletions test/e2e/ingress/ingress.go
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,6 @@ import (
"encoding/base64"
"fmt"
"net/http"
"net/url"
"strings"
"time"

Expand Down Expand Up @@ -944,14 +943,13 @@ spec:
By("create Ingress")
err := s.CreateResourceFromStringWithNamespace(fmt.Sprintf(ingress, s.Namespace()), s.Namespace())
Expect(err).NotTo(HaveOccurred(), "creating Ingress")
time.Sleep(5 * time.Second)

By("verify Ingress works")
s.NewAPISIXClient().
GET("/get").
WithHost("ingress.example.com").
Expect().
Status(200)
s.RequestAssert(&scaffold.RequestAssert{
Method: "GET",
Host: "ingress.example.com",
Check: scaffold.WithExpectedStatus(http.StatusOK),
})

By("create additional gateway group to get new admin key")
additionalGatewayGroupID, _, err = s.Deployer.CreateAdditionalGateway("gateway-proxy-update")
Expand Down Expand Up @@ -1070,33 +1068,21 @@ spec:
createSecret(s, _secretName)
By("create Ingress")
Expect(s.CreateResourceFromString(fmt.Sprintf(ingressWithWSS, s.Namespace()))).ShouldNot(HaveOccurred(), "creating Ingress")
time.Sleep(6 * time.Second)

By("verify wss connection")
u := url.URL{
Scheme: "wss",
Host: s.GetAPISIXHTTPSEndpoint(),
Path: "/ws",
}
headers := http.Header{"Host": []string{"api6.com"}}
dialer := websocket.Dialer{
TLSClientConfig: &tls.Config{
InsecureSkipVerify: true,
ServerName: "api6.com",
},
}

conn, resp, err := dialer.Dial(u.String(), headers)
Expect(err).ShouldNot(HaveOccurred(), "WebSocket handshake")
Expect(resp.StatusCode).Should(Equal(http.StatusSwitchingProtocols))
hostname := "api6.com"
conn := s.NewWebsocketClient(&tls.Config{
InsecureSkipVerify: true,
ServerName: hostname,
}, "/ws", http.Header{"Host": []string{hostname}})

defer func() {
_ = conn.Close()
}()

By("send and receive message through WebSocket")
testMessage := "hello, this is APISIX"
err = conn.WriteMessage(websocket.TextMessage, []byte(testMessage))
err := conn.WriteMessage(websocket.TextMessage, []byte(testMessage))
Expect(err).ShouldNot(HaveOccurred(), "writing WebSocket message")

// Then our echo
Expand Down
13 changes: 13 additions & 0 deletions test/e2e/scaffold/apisix_deployer.go
Original file line number Diff line number Diff line change
Expand Up @@ -111,6 +111,19 @@ func (s *APISIXDeployer) AfterEach() {
if output != "" {
_, _ = fmt.Fprintln(GinkgoWriter, output)
}

_, _ = fmt.Fprintln(GinkgoWriter, "Dumping APISIX logs:")
output = s.GetDeploymentLogs("apisix")
if output != "" {
_, _ = fmt.Fprintln(GinkgoWriter, output)
}
if framework.ProviderType == framework.ProviderTypeAPISIXStandalone && s.adminTunnel != nil {
client := NewClient("http", s.adminTunnel.Endpoint())
reporter := &ErrorReporter{}
body := client.GET("/apisix/admin/configs").WithHeader("X-API-KEY", s.AdminKey()).WithReporter(reporter).Expect().Body().Raw()
_, _ = fmt.Fprintln(GinkgoWriter, "Dumping APISIX configs:")
_, _ = fmt.Fprintln(GinkgoWriter, body)
}
}

// Delete all additional gateways
Expand Down
35 changes: 35 additions & 0 deletions test/e2e/scaffold/scaffold.go
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,7 @@ import (

"github.com/api7/gopkg/pkg/log"
"github.com/gavv/httpexpect/v2"
"github.com/gorilla/websocket"
"github.com/gruntwork-io/terratest/modules/k8s"
"github.com/gruntwork-io/terratest/modules/testing"
. "github.com/onsi/ginkgo/v2" //nolint:staticcheck
Expand Down Expand Up @@ -562,6 +563,40 @@ func (s *Scaffold) GetMetricsEndpoint() string {
return fmt.Sprintf("http://%s/metrics", tunnel.Endpoint())
}

func (s *Scaffold) NewWebsocketClient(tls *tls.Config, path string, headers http.Header) *websocket.Conn {
var host = s.ApisixHTTPEndpoint()
var scheme = "ws"
if tls != nil {
scheme = "wss"
host = s.GetAPISIXHTTPSEndpoint()
}

dialer := websocket.Dialer{
TLSClientConfig: tls,
}

u := url.URL{
Scheme: scheme,
Host: host,
Path: path,
}
var conn *websocket.Conn

s.RetryAssertion(func() error {
c, resp, err := dialer.Dial(u.String(), headers)
if err != nil {
return err
}
if resp == nil || resp.StatusCode != http.StatusSwitchingProtocols {
_ = c.Close()
return fmt.Errorf("unexpected status code: %d", resp.StatusCode)
}
conn = c
return nil
}).ShouldNot(HaveOccurred(), "establishing websocket connection")
return conn
}

func (s *Scaffold) ControlAPIClient() (ControlAPIClient, error) {
tunnel := k8s.NewTunnel(s.kubectlOptions, k8s.ResourceTypeService, "apisix-control-api", 9090, 9090)
if err := tunnel.ForwardPortE(s.t); err != nil {
Expand Down
Loading