mirror of https://github.com/kubernetes/kops.git
353 lines
11 KiB
Go
353 lines
11 KiB
Go
/*
|
|
Copyright 2019 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package cloudup
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"k8s.io/kops/pkg/testutils"
|
|
|
|
kopsapi "k8s.io/kops/pkg/apis/kops"
|
|
"k8s.io/kops/pkg/assets"
|
|
"k8s.io/kops/pkg/client/simple/vfsclientset"
|
|
"k8s.io/kops/upup/pkg/fi"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/awsup"
|
|
"k8s.io/kops/util/pkg/vfs"
|
|
)
|
|
|
|
func buildMinimalCluster() (*awsup.MockAWSCloud, *kopsapi.Cluster) {
|
|
cloud := awsup.InstallMockAWSCloud(testAWSRegion, "abcd")
|
|
|
|
c := testutils.BuildMinimalCluster("testcluster.test.com")
|
|
|
|
return cloud, c
|
|
}
|
|
|
|
func TestPopulateCluster_Default_NoError(t *testing.T) {
|
|
ctx := context.TODO()
|
|
cloud, c := buildMinimalCluster()
|
|
|
|
err := PerformAssignments(c, vfs.Context, cloud)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
_, err = mockedPopulateClusterSpec(ctx, c, cloud)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_Subnets(t *testing.T) {
|
|
tests := []struct {
|
|
NonMasqueradeCIDR string
|
|
ExpectedClusterCIDR string
|
|
ExpectedServiceClusterIPRange string
|
|
}{
|
|
{
|
|
NonMasqueradeCIDR: "100.64.0.0/10",
|
|
ExpectedClusterCIDR: "100.96.0.0/11",
|
|
ExpectedServiceClusterIPRange: "100.64.0.0/13",
|
|
},
|
|
{
|
|
NonMasqueradeCIDR: "10.0.0.0/9",
|
|
ExpectedClusterCIDR: "10.64.0.0/10",
|
|
ExpectedServiceClusterIPRange: "100.64.0.0/13",
|
|
},
|
|
{
|
|
NonMasqueradeCIDR: "10.0.0.0/8",
|
|
ExpectedClusterCIDR: "10.128.0.0/9",
|
|
ExpectedServiceClusterIPRange: "100.64.0.0/13",
|
|
},
|
|
{
|
|
NonMasqueradeCIDR: "::/0",
|
|
ExpectedServiceClusterIPRange: "fd00:5e4f:ce::/108",
|
|
},
|
|
}
|
|
for _, tc := range tests {
|
|
t.Run(tc.NonMasqueradeCIDR, func(t *testing.T) {
|
|
ctx := context.TODO()
|
|
cloud, c := buildMinimalCluster()
|
|
c.Spec.Networking.NonMasqueradeCIDR = tc.NonMasqueradeCIDR
|
|
c.Spec.Networking.Kubenet = nil
|
|
c.Spec.Networking.CNI = &kopsapi.CNINetworkingSpec{}
|
|
c.Spec.ExternalCloudControllerManager = &kopsapi.CloudControllerManagerConfig{}
|
|
c.Spec.CloudProvider.AWS.EBSCSIDriver = &kopsapi.EBSCSIDriverSpec{
|
|
Enabled: fi.PtrTo(true),
|
|
}
|
|
|
|
err := PerformAssignments(c, vfs.Context, cloud)
|
|
require.NoError(t, err, "PerformAssignments")
|
|
|
|
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
|
|
require.NoError(t, err, "PopulateClusterSpec")
|
|
|
|
assert.Equal(t, tc.ExpectedClusterCIDR, full.Spec.KubeControllerManager.ClusterCIDR, "ClusterCIDR")
|
|
assert.Equal(t, tc.ExpectedServiceClusterIPRange, full.Spec.Networking.ServiceClusterIPRange, "ServiceClusterIPRange")
|
|
})
|
|
}
|
|
}
|
|
|
|
func mockedPopulateClusterSpec(ctx context.Context, c *kopsapi.Cluster, cloud fi.Cloud) (*kopsapi.Cluster, error) {
|
|
vfs.Context.ResetMemfsContext(true)
|
|
|
|
assetBuilder := assets.NewAssetBuilder(vfs.Context, c.Spec.Assets, false)
|
|
basePath, err := vfs.Context.BuildVfsPath("memfs://tests")
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error building vfspath: %v", err)
|
|
}
|
|
clientset := vfsclientset.NewVFSClientset(vfs.Context, basePath)
|
|
return PopulateClusterSpec(ctx, clientset, c, nil, cloud, assetBuilder)
|
|
}
|
|
|
|
func TestPopulateCluster_StorageDefault(t *testing.T) {
|
|
ctx := context.TODO()
|
|
cloud, c := buildMinimalCluster()
|
|
|
|
err := PerformAssignments(c, vfs.Context, cloud)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
|
|
if fi.ValueOf(full.Spec.KubeAPIServer.StorageBackend) != "etcd3" {
|
|
t.Fatalf("Unexpected StorageBackend: %v", *full.Spec.KubeAPIServer.StorageBackend)
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_EvictionHard(t *testing.T) {
|
|
ctx := context.TODO()
|
|
cloud, c := buildMinimalCluster()
|
|
|
|
err := PerformAssignments(c, vfs.Context, cloud)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
c.Spec.Kubelet = &kopsapi.KubeletConfigSpec{
|
|
EvictionHard: fi.PtrTo("memory.available<250Mi"),
|
|
}
|
|
|
|
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
|
|
if fi.ValueOf(full.Spec.Kubelet.EvictionHard) != "memory.available<250Mi" {
|
|
t.Fatalf("Unexpected StorageBackend: %v", *full.Spec.Kubelet.EvictionHard)
|
|
}
|
|
}
|
|
|
|
func build(c *kopsapi.Cluster) (*kopsapi.Cluster, error) {
|
|
ctx := context.TODO()
|
|
cloud, err := BuildCloud(c)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error from BuildCloud: %v", err)
|
|
}
|
|
|
|
err = PerformAssignments(c, vfs.Context, cloud)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
return full, nil
|
|
}
|
|
|
|
func TestPopulateCluster_Custom_CIDR(t *testing.T) {
|
|
ctx := context.TODO()
|
|
|
|
cloud, c := buildMinimalCluster()
|
|
c.Spec.Networking.NetworkCIDR = "172.20.2.0/24"
|
|
c.Spec.Networking.Subnets = []kopsapi.ClusterSubnetSpec{
|
|
{Name: "subnet-us-test-1a", Zone: "us-test-1a", CIDR: "172.20.2.0/27", Type: kopsapi.SubnetTypePublic},
|
|
{Name: "subnet-us-test-1b", Zone: "us-test-1b", CIDR: "172.20.2.32/27", Type: kopsapi.SubnetTypePublic},
|
|
{Name: "subnet-us-test-1c", Zone: "us-test-1c", CIDR: "172.20.2.64/27", Type: kopsapi.SubnetTypePublic},
|
|
}
|
|
|
|
err := PerformAssignments(c, vfs.Context, cloud)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
if full.Spec.Networking.NetworkCIDR != "172.20.2.0/24" {
|
|
t.Fatalf("Unexpected NetworkCIDR: %v", full.Spec.Networking.NetworkCIDR)
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_IsolateMasters(t *testing.T) {
|
|
ctx := context.TODO()
|
|
cloud, c := buildMinimalCluster()
|
|
c.Spec.Networking.IsolateControlPlane = fi.PtrTo(true)
|
|
|
|
err := PerformAssignments(c, vfs.Context, cloud)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
if fi.ValueOf(full.Spec.ControlPlaneKubelet.EnableDebuggingHandlers) != false {
|
|
t.Fatalf("Unexpected EnableDebuggingHandlers: %v", fi.ValueOf(full.Spec.ControlPlaneKubelet.EnableDebuggingHandlers))
|
|
}
|
|
if fi.ValueOf(full.Spec.ControlPlaneKubelet.ReconcileCIDR) != false {
|
|
t.Fatalf("Unexpected ReconcileCIDR: %v", fi.ValueOf(full.Spec.ControlPlaneKubelet.ReconcileCIDR))
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_IsolateMastersFalse(t *testing.T) {
|
|
ctx := context.TODO()
|
|
cloud, c := buildMinimalCluster()
|
|
// default: c.Spec.IsolateControlPlane = fi.PtrTo(false)
|
|
|
|
err := PerformAssignments(c, vfs.Context, cloud)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
if fi.ValueOf(full.Spec.ControlPlaneKubelet.EnableDebuggingHandlers) != true {
|
|
t.Fatalf("Unexpected EnableDebuggingHandlers: %v", fi.ValueOf(full.Spec.ControlPlaneKubelet.EnableDebuggingHandlers))
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_Name_Required(t *testing.T) {
|
|
cloud, c := buildMinimalCluster()
|
|
c.ObjectMeta.Name = ""
|
|
|
|
expectErrorFromPopulateCluster(t, c, cloud, "Name")
|
|
}
|
|
|
|
func TestPopulateCluster_Zone_Required(t *testing.T) {
|
|
cloud, c := buildMinimalCluster()
|
|
c.Spec.Networking.Subnets = nil
|
|
|
|
expectErrorFromPopulateCluster(t, c, cloud, "subnet")
|
|
}
|
|
|
|
func TestPopulateCluster_NetworkCIDR_Required(t *testing.T) {
|
|
cloud, c := buildMinimalCluster()
|
|
c.Spec.Networking.NetworkCIDR = ""
|
|
|
|
expectErrorFromPopulateCluster(t, c, cloud, "networkCIDR")
|
|
}
|
|
|
|
func TestPopulateCluster_NonMasqueradeCIDR_Required(t *testing.T) {
|
|
cloud, c := buildMinimalCluster()
|
|
c.Spec.Networking.NonMasqueradeCIDR = ""
|
|
|
|
expectErrorFromPopulateCluster(t, c, cloud, "nonMasqueradeCIDR")
|
|
}
|
|
|
|
func TestPopulateCluster_CloudProvider_Required(t *testing.T) {
|
|
cloud, c := buildMinimalCluster()
|
|
c.Spec.CloudProvider = kopsapi.CloudProviderSpec{}
|
|
|
|
expectErrorFromPopulateCluster(t, c, cloud, "cloudProvider")
|
|
}
|
|
|
|
func expectErrorFromPopulateCluster(t *testing.T, c *kopsapi.Cluster, cloud fi.Cloud, message string) {
|
|
ctx := context.TODO()
|
|
_, err := mockedPopulateClusterSpec(ctx, c, cloud)
|
|
if err == nil {
|
|
t.Fatalf("Expected error from PopulateCluster")
|
|
}
|
|
actualMessage := fmt.Sprintf("%v", err)
|
|
if !strings.Contains(actualMessage, message) {
|
|
t.Fatalf("Expected error %q, got %q", message, actualMessage)
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_APIServerCount(t *testing.T) {
|
|
_, c := buildMinimalCluster()
|
|
|
|
full, err := build(c)
|
|
if err != nil {
|
|
t.Fatalf("error during build: %v", err)
|
|
}
|
|
|
|
if fi.ValueOf(full.Spec.KubeAPIServer.APIServerCount) != 3 {
|
|
t.Fatalf("Unexpected APIServerCount: %v", fi.ValueOf(full.Spec.KubeAPIServer.APIServerCount))
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_AnonymousAuth(t *testing.T) {
|
|
ctx := context.TODO()
|
|
|
|
cloud, c := buildMinimalCluster()
|
|
c.Spec.KubernetesVersion = "1.20.0"
|
|
|
|
err := PerformAssignments(c, vfs.Context, cloud)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
|
|
if full.Spec.KubeAPIServer.AnonymousAuth == nil {
|
|
t.Fatalf("AnonymousAuth not specified")
|
|
}
|
|
|
|
if fi.ValueOf(full.Spec.KubeAPIServer.AnonymousAuth) != false {
|
|
t.Fatalf("Unexpected AnonymousAuth: %v", fi.ValueOf(full.Spec.KubeAPIServer.AnonymousAuth))
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_KubeController_High_Enough_Version(t *testing.T) {
|
|
ctx := context.TODO()
|
|
cloud, c := buildMinimalCluster()
|
|
c.Spec.KubernetesVersion = "v1.9.0"
|
|
|
|
err := PerformAssignments(c, vfs.Context, cloud)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
|
|
if full.Spec.KubeControllerManager.AttachDetachReconcileSyncPeriod == nil {
|
|
t.Fatalf("AttachDetachReconcileSyncPeriod not set correctly")
|
|
}
|
|
}
|