Skip to content

Commit 7054bc0

Browse files
committed
Updated RouteSelector tests to use SectionNames
Signed-off-by: Martin Hesko <[email protected]>
1 parent 489cc18 commit 7054bc0

9 files changed

+133
-70
lines changed

testsuite/tests/singlecluster/limitador/route/test_limit_targeting_two_rules.py

-33
This file was deleted.

testsuite/tests/singlecluster/limitador/route/test_route_rule.py

-27
This file was deleted.

testsuite/tests/singlecluster/limitador/route/conftest.py testsuite/tests/singlecluster/limitador/section/conftest.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
"""Conftest for RLP targeting route tests """
1+
"""Conftest for RLP section_name targeting tests"""
22

33
import pytest
44

Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
"""Tests that the RLP is correctly applies to the Gateway Listener."""
2+
3+
import pytest
4+
5+
from testsuite.kuadrant.policy.rate_limit import Limit, RateLimitPolicy
6+
7+
pytestmark = [pytest.mark.kuadrant_only, pytest.mark.limitador]
8+
9+
10+
@pytest.fixture(scope="module")
11+
def rate_limit(cluster, blame, module_label, gateway, route): # pylint: disable=unused-argument
12+
"""Add a RateLimitPolicy targeting the Gateway Listener."""
13+
rlp = RateLimitPolicy.create_instance(cluster, blame("limit"), gateway, "api", labels={"testRun": module_label})
14+
rlp.add_limit("basic", [Limit(5, "10s")])
15+
return rlp
16+
17+
18+
def test_listener_match(client):
19+
"""Tests that RLP correctly applies to the given Gateway Listener"""
20+
responses = client.get_many("/get", 5)
21+
responses.assert_all(status_code=200)
22+
23+
assert client.get("/get").status_code == 429
24+
assert client.get("/anything").status_code == 429
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
"""Test multiple RLP's targeting different HTTPRouteRules do not interfere with each other."""
2+
3+
import pytest
4+
5+
from testsuite.kuadrant.policy.rate_limit import Limit, RateLimitPolicy
6+
7+
8+
pytestmark = [pytest.mark.kuadrant_only, pytest.mark.limitador]
9+
10+
11+
@pytest.fixture(scope="module")
12+
def rate_limit(cluster, blame, module_label, route):
13+
"""Add a RateLimitPolicy targeting the first HTTPRouteRule."""
14+
rate_limit = RateLimitPolicy.create_instance(
15+
cluster, blame("limit"), route, "rule-1", labels={"testRun": module_label}
16+
)
17+
rate_limit.add_limit("basic", [Limit(3, "5s")])
18+
return rate_limit
19+
20+
21+
@pytest.fixture(scope="module")
22+
def rate_limit2(request, cluster, blame, module_label, route):
23+
"""Add a RateLimitPolicy targeting the second HTTPRouteRule."""
24+
rlp = RateLimitPolicy.create_instance(cluster, blame("limit"), route, "rule-2", labels={"testRun": module_label})
25+
rlp.add_limit("basic", [Limit(2, "5s")])
26+
request.addfinalizer(rlp.delete)
27+
rlp.commit()
28+
rlp.wait_for_ready()
29+
return rlp
30+
31+
32+
def test_multiple_limits_targeting_rules(client, rate_limit2): # pylint: disable=unused-argument
33+
"""Test targeting separate HTTPRouteRules with different limits"""
34+
responses = client.get_many("/get", 3)
35+
assert all(
36+
r.status_code == 200 for r in responses
37+
), f"Rate Limited resource unexpectedly rejected requests {responses}"
38+
39+
responses = client.get_many("/anything", 2)
40+
assert all(
41+
r.status_code == 200 for r in responses
42+
), f"Rate Limited resource unexpectedly rejected requests {responses}"
43+
44+
assert client.get("/get").status_code == 429
45+
assert client.get("/anything").status_code == 429
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
"""Test that multiple limits targeting same Gateway Listener are correctly applied"""
2+
3+
import pytest
4+
5+
from testsuite.kuadrant.policy.rate_limit import Limit, RateLimitPolicy
6+
7+
8+
pytestmark = [pytest.mark.kuadrant_only, pytest.mark.limitador]
9+
10+
11+
@pytest.fixture(scope="module")
12+
def rate_limit(cluster, blame, module_label, gateway, route): # pylint: disable=unused-argument
13+
"""Add a RateLimitPolicy targeting the Gateway Listener with multiple limits."""
14+
rate_limit = RateLimitPolicy.create_instance(
15+
cluster, blame("limit"), gateway, "api", labels={"testRun": module_label}
16+
)
17+
rate_limit.add_limit("test1", [Limit(8, "10s")])
18+
rate_limit.add_limit("test2", [Limit(3, "5s")])
19+
return rate_limit
20+
21+
22+
def test_two_limits_targeting_one_listener(client):
23+
"""Test that one limit ends up shadowing others"""
24+
responses = client.get_many("/get", 3)
25+
assert all(
26+
r.status_code == 200 for r in responses
27+
), f"Rate Limited resource unexpectedly rejected requests {responses}"
28+
assert client.get("/get").status_code == 429

testsuite/tests/singlecluster/limitador/route/test_multiple_same_rule.py testsuite/tests/singlecluster/limitador/section/test_multiple_same_rule.py

+9-9
Original file line numberDiff line numberDiff line change
@@ -2,24 +2,24 @@
22

33
import pytest
44

5-
from testsuite.kuadrant.policy import CelPredicate
6-
from testsuite.kuadrant.policy.rate_limit import Limit
5+
from testsuite.kuadrant.policy.rate_limit import Limit, RateLimitPolicy
76

87

98
pytestmark = [pytest.mark.kuadrant_only, pytest.mark.limitador]
109

1110

1211
@pytest.fixture(scope="module")
13-
def rate_limit(rate_limit):
14-
"""Add limit to the policy"""
15-
when = CelPredicate("request.path == '/get'")
16-
rate_limit.add_limit("test1", [Limit(8, "10s")], when=[when])
17-
rate_limit.add_limit("test2", [Limit(3, "5s")], when=[when])
12+
def rate_limit(cluster, blame, module_label, route):
13+
"""Add a RateLimitPolicy targeting the first HTTPRouteRule with two limits."""
14+
rate_limit = RateLimitPolicy.create_instance(
15+
cluster, blame("limit"), route, "rule-1", labels={"testRun": module_label}
16+
)
17+
rate_limit.add_limit("test1", [Limit(8, "10s")])
18+
rate_limit.add_limit("test2", [Limit(3, "5s")])
1819
return rate_limit
1920

2021

21-
@pytest.mark.issue("https://github.com/Kuadrant/testsuite/issues/561")
22-
def test_two_rules_targeting_one_limit(client):
22+
def test_two_limits_targeting_one_rule(client):
2323
"""Test that one limit ends up shadowing others"""
2424
responses = client.get_many("/get", 3)
2525
assert all(
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
"""Tests that the RLP is correctly applied to the route rule"""
2+
3+
import pytest
4+
5+
from testsuite.kuadrant.policy.rate_limit import Limit, RateLimitPolicy
6+
7+
pytestmark = [pytest.mark.kuadrant_only, pytest.mark.limitador]
8+
9+
10+
@pytest.fixture(scope="module")
11+
def rate_limit(cluster, blame, module_label, route):
12+
"""Add a RateLimitPolicy targeting the first HTTPRouteRule."""
13+
rlp = RateLimitPolicy.create_instance(cluster, blame("limit"), route, "rule-1", labels={"testRun": module_label})
14+
rlp.add_limit("basic", [Limit(5, "10s")])
15+
return rlp
16+
17+
18+
def test_rule_match(client):
19+
"""Tests that RLP correctly applies to the given HTTPRouteRule"""
20+
responses = client.get_many("/get", 5)
21+
responses.assert_all(status_code=200)
22+
23+
assert client.get("/get").status_code == 429
24+
25+
response = client.get("/anything")
26+
assert response.status_code == 200

0 commit comments

Comments
 (0)