kops/upup/pkg/fi/cloudup/populate_cluster_spec_test.go

353 lines
11 KiB
Go

/*
Copyright 2019 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package cloudup
import (
"context"
"fmt"
"strings"
"testing"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"k8s.io/kops/pkg/testutils"
kopsapi "k8s.io/kops/pkg/apis/kops"
"k8s.io/kops/pkg/assets"
"k8s.io/kops/pkg/client/simple/vfsclientset"
"k8s.io/kops/upup/pkg/fi"
"k8s.io/kops/upup/pkg/fi/cloudup/awsup"
"k8s.io/kops/util/pkg/vfs"
)
func buildMinimalCluster() (*awsup.MockAWSCloud, *kopsapi.Cluster) {
cloud := awsup.InstallMockAWSCloud(testAWSRegion, "abcd")
c := testutils.BuildMinimalCluster("testcluster.test.com")
return cloud, c
}
func TestPopulateCluster_Default_NoError(t *testing.T) {
ctx := context.TODO()
cloud, c := buildMinimalCluster()
err := PerformAssignments(c, vfs.Context, cloud)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
_, err = mockedPopulateClusterSpec(ctx, c, cloud)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
}
func TestPopulateCluster_Subnets(t *testing.T) {
tests := []struct {
NonMasqueradeCIDR string
ExpectedClusterCIDR string
ExpectedServiceClusterIPRange string
}{
{
NonMasqueradeCIDR: "100.64.0.0/10",
ExpectedClusterCIDR: "100.96.0.0/11",
ExpectedServiceClusterIPRange: "100.64.0.0/13",
},
{
NonMasqueradeCIDR: "10.0.0.0/9",
ExpectedClusterCIDR: "10.64.0.0/10",
ExpectedServiceClusterIPRange: "100.64.0.0/13",
},
{
NonMasqueradeCIDR: "10.0.0.0/8",
ExpectedClusterCIDR: "10.128.0.0/9",
ExpectedServiceClusterIPRange: "100.64.0.0/13",
},
{
NonMasqueradeCIDR: "::/0",
ExpectedServiceClusterIPRange: "fd00:5e4f:ce::/108",
},
}
for _, tc := range tests {
t.Run(tc.NonMasqueradeCIDR, func(t *testing.T) {
ctx := context.TODO()
cloud, c := buildMinimalCluster()
c.Spec.Networking.NonMasqueradeCIDR = tc.NonMasqueradeCIDR
c.Spec.Networking.Kubenet = nil
c.Spec.Networking.CNI = &kopsapi.CNINetworkingSpec{}
c.Spec.ExternalCloudControllerManager = &kopsapi.CloudControllerManagerConfig{}
c.Spec.CloudProvider.AWS.EBSCSIDriver = &kopsapi.EBSCSIDriverSpec{
Enabled: fi.PtrTo(true),
}
err := PerformAssignments(c, vfs.Context, cloud)
require.NoError(t, err, "PerformAssignments")
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
require.NoError(t, err, "PopulateClusterSpec")
assert.Equal(t, tc.ExpectedClusterCIDR, full.Spec.KubeControllerManager.ClusterCIDR, "ClusterCIDR")
assert.Equal(t, tc.ExpectedServiceClusterIPRange, full.Spec.Networking.ServiceClusterIPRange, "ServiceClusterIPRange")
})
}
}
func mockedPopulateClusterSpec(ctx context.Context, c *kopsapi.Cluster, cloud fi.Cloud) (*kopsapi.Cluster, error) {
vfs.Context.ResetMemfsContext(true)
assetBuilder := assets.NewAssetBuilder(vfs.Context, c.Spec.Assets, false)
basePath, err := vfs.Context.BuildVfsPath("memfs://tests")
if err != nil {
return nil, fmt.Errorf("error building vfspath: %v", err)
}
clientset := vfsclientset.NewVFSClientset(vfs.Context, basePath)
return PopulateClusterSpec(ctx, clientset, c, nil, cloud, assetBuilder)
}
func TestPopulateCluster_StorageDefault(t *testing.T) {
ctx := context.TODO()
cloud, c := buildMinimalCluster()
err := PerformAssignments(c, vfs.Context, cloud)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if fi.ValueOf(full.Spec.KubeAPIServer.StorageBackend) != "etcd3" {
t.Fatalf("Unexpected StorageBackend: %v", *full.Spec.KubeAPIServer.StorageBackend)
}
}
func TestPopulateCluster_EvictionHard(t *testing.T) {
ctx := context.TODO()
cloud, c := buildMinimalCluster()
err := PerformAssignments(c, vfs.Context, cloud)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
c.Spec.Kubelet = &kopsapi.KubeletConfigSpec{
EvictionHard: fi.PtrTo("memory.available<250Mi"),
}
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if fi.ValueOf(full.Spec.Kubelet.EvictionHard) != "memory.available<250Mi" {
t.Fatalf("Unexpected StorageBackend: %v", *full.Spec.Kubelet.EvictionHard)
}
}
func build(c *kopsapi.Cluster) (*kopsapi.Cluster, error) {
ctx := context.TODO()
cloud, err := BuildCloud(c)
if err != nil {
return nil, fmt.Errorf("error from BuildCloud: %v", err)
}
err = PerformAssignments(c, vfs.Context, cloud)
if err != nil {
return nil, fmt.Errorf("error from PerformAssignments: %v", err)
}
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
if err != nil {
return nil, fmt.Errorf("Unexpected error from PopulateCluster: %v", err)
}
return full, nil
}
func TestPopulateCluster_Custom_CIDR(t *testing.T) {
ctx := context.TODO()
cloud, c := buildMinimalCluster()
c.Spec.Networking.NetworkCIDR = "172.20.2.0/24"
c.Spec.Networking.Subnets = []kopsapi.ClusterSubnetSpec{
{Name: "subnet-us-test-1a", Zone: "us-test-1a", CIDR: "172.20.2.0/27", Type: kopsapi.SubnetTypePublic},
{Name: "subnet-us-test-1b", Zone: "us-test-1b", CIDR: "172.20.2.32/27", Type: kopsapi.SubnetTypePublic},
{Name: "subnet-us-test-1c", Zone: "us-test-1c", CIDR: "172.20.2.64/27", Type: kopsapi.SubnetTypePublic},
}
err := PerformAssignments(c, vfs.Context, cloud)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if full.Spec.Networking.NetworkCIDR != "172.20.2.0/24" {
t.Fatalf("Unexpected NetworkCIDR: %v", full.Spec.Networking.NetworkCIDR)
}
}
func TestPopulateCluster_IsolateMasters(t *testing.T) {
ctx := context.TODO()
cloud, c := buildMinimalCluster()
c.Spec.Networking.IsolateControlPlane = fi.PtrTo(true)
err := PerformAssignments(c, vfs.Context, cloud)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if fi.ValueOf(full.Spec.ControlPlaneKubelet.EnableDebuggingHandlers) != false {
t.Fatalf("Unexpected EnableDebuggingHandlers: %v", fi.ValueOf(full.Spec.ControlPlaneKubelet.EnableDebuggingHandlers))
}
if fi.ValueOf(full.Spec.ControlPlaneKubelet.ReconcileCIDR) != false {
t.Fatalf("Unexpected ReconcileCIDR: %v", fi.ValueOf(full.Spec.ControlPlaneKubelet.ReconcileCIDR))
}
}
func TestPopulateCluster_IsolateMastersFalse(t *testing.T) {
ctx := context.TODO()
cloud, c := buildMinimalCluster()
// default: c.Spec.IsolateControlPlane = fi.PtrTo(false)
err := PerformAssignments(c, vfs.Context, cloud)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if fi.ValueOf(full.Spec.ControlPlaneKubelet.EnableDebuggingHandlers) != true {
t.Fatalf("Unexpected EnableDebuggingHandlers: %v", fi.ValueOf(full.Spec.ControlPlaneKubelet.EnableDebuggingHandlers))
}
}
func TestPopulateCluster_Name_Required(t *testing.T) {
cloud, c := buildMinimalCluster()
c.ObjectMeta.Name = ""
expectErrorFromPopulateCluster(t, c, cloud, "Name")
}
func TestPopulateCluster_Zone_Required(t *testing.T) {
cloud, c := buildMinimalCluster()
c.Spec.Networking.Subnets = nil
expectErrorFromPopulateCluster(t, c, cloud, "subnet")
}
func TestPopulateCluster_NetworkCIDR_Required(t *testing.T) {
cloud, c := buildMinimalCluster()
c.Spec.Networking.NetworkCIDR = ""
expectErrorFromPopulateCluster(t, c, cloud, "networkCIDR")
}
func TestPopulateCluster_NonMasqueradeCIDR_Required(t *testing.T) {
cloud, c := buildMinimalCluster()
c.Spec.Networking.NonMasqueradeCIDR = ""
expectErrorFromPopulateCluster(t, c, cloud, "nonMasqueradeCIDR")
}
func TestPopulateCluster_CloudProvider_Required(t *testing.T) {
cloud, c := buildMinimalCluster()
c.Spec.CloudProvider = kopsapi.CloudProviderSpec{}
expectErrorFromPopulateCluster(t, c, cloud, "cloudProvider")
}
func expectErrorFromPopulateCluster(t *testing.T, c *kopsapi.Cluster, cloud fi.Cloud, message string) {
ctx := context.TODO()
_, err := mockedPopulateClusterSpec(ctx, c, cloud)
if err == nil {
t.Fatalf("Expected error from PopulateCluster")
}
actualMessage := fmt.Sprintf("%v", err)
if !strings.Contains(actualMessage, message) {
t.Fatalf("Expected error %q, got %q", message, actualMessage)
}
}
func TestPopulateCluster_APIServerCount(t *testing.T) {
_, c := buildMinimalCluster()
full, err := build(c)
if err != nil {
t.Fatalf("error during build: %v", err)
}
if fi.ValueOf(full.Spec.KubeAPIServer.APIServerCount) != 3 {
t.Fatalf("Unexpected APIServerCount: %v", fi.ValueOf(full.Spec.KubeAPIServer.APIServerCount))
}
}
func TestPopulateCluster_AnonymousAuth(t *testing.T) {
ctx := context.TODO()
cloud, c := buildMinimalCluster()
c.Spec.KubernetesVersion = "1.20.0"
err := PerformAssignments(c, vfs.Context, cloud)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if full.Spec.KubeAPIServer.AnonymousAuth == nil {
t.Fatalf("AnonymousAuth not specified")
}
if fi.ValueOf(full.Spec.KubeAPIServer.AnonymousAuth) != false {
t.Fatalf("Unexpected AnonymousAuth: %v", fi.ValueOf(full.Spec.KubeAPIServer.AnonymousAuth))
}
}
func TestPopulateCluster_KubeController_High_Enough_Version(t *testing.T) {
ctx := context.TODO()
cloud, c := buildMinimalCluster()
c.Spec.KubernetesVersion = "v1.9.0"
err := PerformAssignments(c, vfs.Context, cloud)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
full, err := mockedPopulateClusterSpec(ctx, c, cloud)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if full.Spec.KubeControllerManager.AttachDetachReconcileSyncPeriod == nil {
t.Fatalf("AttachDetachReconcileSyncPeriod not set correctly")
}
}