mirror of https://github.com/kubernetes/kops.git
532 lines
14 KiB
Go
532 lines
14 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package cloudup
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
"testing"
|
|
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
|
api "k8s.io/kops/pkg/apis/kops"
|
|
"k8s.io/kops/pkg/assets"
|
|
"k8s.io/kops/pkg/client/simple/vfsclientset"
|
|
"k8s.io/kops/upup/pkg/fi"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/awsup"
|
|
"k8s.io/kops/util/pkg/vfs"
|
|
)
|
|
|
|
func buildMinimalCluster() *api.Cluster {
|
|
awsup.InstallMockAWSCloud(MockAWSRegion, "abcd")
|
|
|
|
c := &api.Cluster{}
|
|
c.ObjectMeta.Name = "testcluster.test.com"
|
|
c.Spec.KubernetesVersion = "1.4.6"
|
|
c.Spec.Subnets = []api.ClusterSubnetSpec{
|
|
{Name: "subnet-us-mock-1a", Zone: "us-mock-1a", CIDR: "172.20.1.0/24"},
|
|
{Name: "subnet-us-mock-1b", Zone: "us-mock-1b", CIDR: "172.20.2.0/24"},
|
|
{Name: "subnet-us-mock-1c", Zone: "us-mock-1c", CIDR: "172.20.3.0/24"},
|
|
}
|
|
|
|
c.Spec.KubernetesAPIAccess = []string{"0.0.0.0/0"}
|
|
c.Spec.SSHAccess = []string{"0.0.0.0/0"}
|
|
|
|
// Default to public topology
|
|
c.Spec.Topology = &api.TopologySpec{
|
|
Masters: api.TopologyPublic,
|
|
Nodes: api.TopologyPublic,
|
|
}
|
|
c.Spec.NetworkCIDR = "172.20.0.0/16"
|
|
c.Spec.NonMasqueradeCIDR = "100.64.0.0/10"
|
|
c.Spec.CloudProvider = "aws"
|
|
|
|
c.Spec.ConfigBase = "s3://unittest-bucket/"
|
|
|
|
// Required to stop a call to cloud provider
|
|
// TODO: Mock cloudprovider
|
|
c.Spec.DNSZone = "test.com"
|
|
|
|
c.Spec.Networking = &api.NetworkingSpec{}
|
|
|
|
return c
|
|
}
|
|
|
|
func addEtcdClusters(c *api.Cluster) {
|
|
subnetNames := sets.NewString()
|
|
for _, z := range c.Spec.Subnets {
|
|
subnetNames.Insert(z.Name)
|
|
}
|
|
etcdZones := subnetNames.List()
|
|
|
|
for _, etcdCluster := range EtcdClusters {
|
|
etcd := &api.EtcdClusterSpec{}
|
|
etcd.Name = etcdCluster
|
|
for _, zone := range etcdZones {
|
|
m := &api.EtcdMemberSpec{}
|
|
m.Name = zone
|
|
m.InstanceGroup = fi.String(zone)
|
|
etcd.Members = append(etcd.Members, m)
|
|
}
|
|
c.Spec.EtcdClusters = append(c.Spec.EtcdClusters, etcd)
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_Default_NoError(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
|
|
err := PerformAssignments(c)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
addEtcdClusters(c)
|
|
|
|
_, err = mockedPopulateClusterSpec(c)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
}
|
|
|
|
func mockedPopulateClusterSpec(c *api.Cluster) (*api.Cluster, error) {
|
|
vfs.Context.ResetMemfsContext(true)
|
|
|
|
assetBuilder := assets.NewAssetBuilder(nil)
|
|
basePath, err := vfs.Context.BuildVfsPath("memfs://tests")
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error building vfspath: %v", err)
|
|
}
|
|
clientset := vfsclientset.NewVFSClientset(basePath)
|
|
return PopulateClusterSpec(clientset, c, assetBuilder)
|
|
}
|
|
|
|
func TestPopulateCluster_Docker_Spec(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
c.Spec.Docker = &api.DockerConfig{
|
|
MTU: fi.Int32(5678),
|
|
InsecureRegistry: fi.String("myregistry.com:1234"),
|
|
RegistryMirrors: []string{"https://registry.example.com"},
|
|
LogOpt: []string{"env=FOO"},
|
|
}
|
|
|
|
err := PerformAssignments(c)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
addEtcdClusters(c)
|
|
|
|
full, err := mockedPopulateClusterSpec(c)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
|
|
if fi.Int32Value(full.Spec.Docker.MTU) != 5678 {
|
|
t.Fatalf("Unexpected Docker MTU: %v", full.Spec.Docker.MTU)
|
|
}
|
|
|
|
if fi.StringValue(full.Spec.Docker.InsecureRegistry) != "myregistry.com:1234" {
|
|
t.Fatalf("Unexpected Docker InsecureRegistry: %v", full.Spec.Docker.InsecureRegistry)
|
|
}
|
|
|
|
if strings.Join(full.Spec.Docker.RegistryMirrors, "!") != "https://registry.example.com" {
|
|
t.Fatalf("Unexpected Docker RegistryMirrors: %v", full.Spec.Docker.RegistryMirrors)
|
|
}
|
|
|
|
if strings.Join(full.Spec.Docker.LogOpt, "!") != "env=FOO" {
|
|
t.Fatalf("Unexpected Docker LogOpt: %v", full.Spec.Docker.LogOpt)
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_StorageDefault(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
err := PerformAssignments(c)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
addEtcdClusters(c)
|
|
|
|
full, err := mockedPopulateClusterSpec(c)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
|
|
if fi.StringValue(full.Spec.KubeAPIServer.StorageBackend) != "etcd2" {
|
|
t.Fatalf("Unexpected StorageBackend: %v", full.Spec.KubeAPIServer.StorageBackend)
|
|
}
|
|
}
|
|
|
|
func build(c *api.Cluster) (*api.Cluster, error) {
|
|
err := PerformAssignments(c)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
addEtcdClusters(c)
|
|
|
|
full, err := mockedPopulateClusterSpec(c)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
return full, nil
|
|
}
|
|
|
|
func TestPopulateCluster_Kubenet(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
|
|
full, err := build(c)
|
|
if err != nil {
|
|
t.Fatalf("error during build: %v", err)
|
|
}
|
|
|
|
if full.Spec.Kubelet.NetworkPluginName != "kubenet" {
|
|
t.Fatalf("Unexpected NetworkPluginName: %v", full.Spec.Kubelet.NetworkPluginName)
|
|
}
|
|
|
|
if fi.BoolValue(full.Spec.Kubelet.ReconcileCIDR) != true {
|
|
t.Fatalf("Unexpected ReconcileCIDR: %v", full.Spec.Kubelet.ReconcileCIDR)
|
|
}
|
|
|
|
if fi.BoolValue(full.Spec.KubeControllerManager.ConfigureCloudRoutes) != true {
|
|
t.Fatalf("Unexpected ConfigureCloudRoutes: %v", full.Spec.KubeControllerManager.ConfigureCloudRoutes)
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_CNI(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
|
|
c.Spec.Kubelet = &api.KubeletConfigSpec{
|
|
ConfigureCBR0: fi.Bool(false),
|
|
NetworkPluginName: "cni",
|
|
NonMasqueradeCIDR: c.Spec.NonMasqueradeCIDR,
|
|
CloudProvider: c.Spec.CloudProvider,
|
|
}
|
|
|
|
full, err := build(c)
|
|
if err != nil {
|
|
t.Fatalf("error during build: %v", err)
|
|
}
|
|
|
|
if full.Spec.Kubelet.NetworkPluginName != "cni" {
|
|
t.Fatalf("Unexpected NetworkPluginName: %v", full.Spec.Kubelet.NetworkPluginName)
|
|
}
|
|
|
|
if fi.BoolValue(full.Spec.Kubelet.ReconcileCIDR) != true {
|
|
t.Fatalf("Unexpected ReconcileCIDR: %v", full.Spec.Kubelet.ReconcileCIDR)
|
|
}
|
|
|
|
if fi.BoolValue(full.Spec.Kubelet.ConfigureCBR0) != false {
|
|
t.Fatalf("Unexpected ConfigureCBR0: %v", full.Spec.Kubelet.ConfigureCBR0)
|
|
}
|
|
|
|
if fi.BoolValue(full.Spec.KubeControllerManager.ConfigureCloudRoutes) != true {
|
|
t.Fatalf("Unexpected ConfigureCloudRoutes: %v", full.Spec.KubeControllerManager.ConfigureCloudRoutes)
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_Custom_CIDR(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
c.Spec.NetworkCIDR = "172.20.2.0/24"
|
|
c.Spec.Subnets = []api.ClusterSubnetSpec{
|
|
{Name: "subnet-us-mock-1a", Zone: "us-mock-1a", CIDR: "172.20.2.0/27"},
|
|
{Name: "subnet-us-mock-1b", Zone: "us-mock-1b", CIDR: "172.20.2.32/27"},
|
|
{Name: "subnet-us-mock-1c", Zone: "us-mock-1c", CIDR: "172.20.2.64/27"},
|
|
}
|
|
|
|
err := PerformAssignments(c)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
addEtcdClusters(c)
|
|
|
|
full, err := mockedPopulateClusterSpec(c)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
if full.Spec.NetworkCIDR != "172.20.2.0/24" {
|
|
t.Fatalf("Unexpected NetworkCIDR: %v", full.Spec.NetworkCIDR)
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_IsolateMasters(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
c.Spec.IsolateMasters = fi.Bool(true)
|
|
|
|
err := PerformAssignments(c)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
addEtcdClusters(c)
|
|
|
|
full, err := mockedPopulateClusterSpec(c)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
if fi.BoolValue(full.Spec.MasterKubelet.EnableDebuggingHandlers) != false {
|
|
t.Fatalf("Unexpected EnableDebuggingHandlers: %v", fi.BoolValue(full.Spec.MasterKubelet.EnableDebuggingHandlers))
|
|
}
|
|
if fi.BoolValue(full.Spec.MasterKubelet.ReconcileCIDR) != false {
|
|
t.Fatalf("Unexpected ReconcileCIDR: %v", fi.BoolValue(full.Spec.MasterKubelet.ReconcileCIDR))
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_IsolateMastersFalse(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
// default: c.Spec.IsolateMasters = fi.Bool(false)
|
|
|
|
err := PerformAssignments(c)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
addEtcdClusters(c)
|
|
|
|
full, err := mockedPopulateClusterSpec(c)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
if fi.BoolValue(full.Spec.MasterKubelet.EnableDebuggingHandlers) != true {
|
|
t.Fatalf("Unexpected EnableDebuggingHandlers: %v", fi.BoolValue(full.Spec.MasterKubelet.EnableDebuggingHandlers))
|
|
}
|
|
if fi.BoolValue(full.Spec.MasterKubelet.ReconcileCIDR) != true {
|
|
t.Fatalf("Unexpected ReconcileCIDR: %v", fi.BoolValue(full.Spec.MasterKubelet.ReconcileCIDR))
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_Name_Required(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
c.ObjectMeta.Name = ""
|
|
|
|
expectErrorFromPopulateCluster(t, c, "Name")
|
|
}
|
|
|
|
func TestPopulateCluster_Zone_Required(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
c.Spec.Subnets = nil
|
|
|
|
expectErrorFromPopulateCluster(t, c, "Subnet")
|
|
}
|
|
|
|
func TestPopulateCluster_NetworkCIDR_Required(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
c.Spec.NetworkCIDR = ""
|
|
|
|
expectErrorFromPopulateCluster(t, c, "NetworkCIDR")
|
|
}
|
|
|
|
func TestPopulateCluster_NonMasqueradeCIDR_Required(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
c.Spec.NonMasqueradeCIDR = ""
|
|
|
|
expectErrorFromPopulateCluster(t, c, "NonMasqueradeCIDR")
|
|
}
|
|
|
|
func TestPopulateCluster_CloudProvider_Required(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
c.Spec.CloudProvider = ""
|
|
|
|
expectErrorFromPopulateCluster(t, c, "CloudProvider")
|
|
}
|
|
|
|
func TestPopulateCluster_TopologyInvalidNil_Required(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
c.Spec.Topology.Masters = ""
|
|
c.Spec.Topology.Nodes = ""
|
|
expectErrorFromPopulateCluster(t, c, "Topology")
|
|
}
|
|
|
|
func TestPopulateCluster_TopologyInvalidValue_Required(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
c.Spec.Topology.Masters = "123"
|
|
c.Spec.Topology.Nodes = "abc"
|
|
expectErrorFromPopulateCluster(t, c, "Topology")
|
|
}
|
|
|
|
//func TestPopulateCluster_TopologyInvalidMatchingValues_Required(t *testing.T) {
|
|
// // We can't have a bastion with public masters / nodes
|
|
// c := buildMinimalCluster()
|
|
// c.Spec.Topology.Masters = api.TopologyPublic
|
|
// c.Spec.Topology.Nodes = api.TopologyPrivate
|
|
// expectErrorFromPopulateCluster(t, c, "Topology")
|
|
//}
|
|
|
|
func TestPopulateCluster_BastionInvalidMatchingValues_Required(t *testing.T) {
|
|
// We can't have a bastion with public masters / nodes
|
|
c := buildMinimalCluster()
|
|
addEtcdClusters(c)
|
|
c.Spec.Topology.Masters = api.TopologyPublic
|
|
c.Spec.Topology.Nodes = api.TopologyPublic
|
|
c.Spec.Topology.Bastion = &api.BastionSpec{}
|
|
expectErrorFromPopulateCluster(t, c, "Bastion")
|
|
}
|
|
|
|
func TestPopulateCluster_BastionIdleTimeoutInvalidNegative_Required(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
addEtcdClusters(c)
|
|
|
|
c.Spec.Topology.Masters = api.TopologyPrivate
|
|
c.Spec.Topology.Nodes = api.TopologyPrivate
|
|
c.Spec.Topology.Bastion = &api.BastionSpec{}
|
|
c.Spec.Topology.Bastion.IdleTimeoutSeconds = fi.Int64(-1)
|
|
expectErrorFromPopulateCluster(t, c, "Bastion")
|
|
}
|
|
|
|
func expectErrorFromPopulateCluster(t *testing.T, c *api.Cluster, message string) {
|
|
_, err := mockedPopulateClusterSpec(c)
|
|
if err == nil {
|
|
t.Fatalf("Expected error from PopulateCluster")
|
|
}
|
|
actualMessage := fmt.Sprintf("%v", err)
|
|
if !strings.Contains(actualMessage, message) {
|
|
t.Fatalf("Expected error %q, got %q", message, actualMessage)
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_APIServerCount(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
|
|
full, err := build(c)
|
|
if err != nil {
|
|
t.Fatalf("error during build: %v", err)
|
|
}
|
|
|
|
if fi.Int32Value(full.Spec.KubeAPIServer.APIServerCount) != 3 {
|
|
t.Fatalf("Unexpected APIServerCount: %v", fi.Int32Value(full.Spec.KubeAPIServer.APIServerCount))
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_AnonymousAuth(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
c.Spec.KubernetesVersion = "1.5.0"
|
|
|
|
err := PerformAssignments(c)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
addEtcdClusters(c)
|
|
|
|
full, err := mockedPopulateClusterSpec(c)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
|
|
if full.Spec.KubeAPIServer.AnonymousAuth == nil {
|
|
t.Fatalf("AnonymousAuth not specified")
|
|
}
|
|
|
|
if fi.BoolValue(full.Spec.KubeAPIServer.AnonymousAuth) != false {
|
|
t.Fatalf("Unexpected AnonymousAuth: %v", fi.BoolValue(full.Spec.KubeAPIServer.AnonymousAuth))
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_AnonymousAuth_14(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
c.Spec.KubernetesVersion = "1.4.0"
|
|
|
|
err := PerformAssignments(c)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
addEtcdClusters(c)
|
|
|
|
full, err := mockedPopulateClusterSpec(c)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
|
|
if full.Spec.KubeAPIServer.AnonymousAuth != nil {
|
|
t.Fatalf("AnonymousAuth is not supported in 1.4")
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_DockerVersion(t *testing.T) {
|
|
grid := []struct {
|
|
KubernetesVersion string
|
|
DockerVersion string
|
|
}{
|
|
{
|
|
KubernetesVersion: "1.4.6",
|
|
DockerVersion: "1.11.2",
|
|
},
|
|
{
|
|
KubernetesVersion: "1.5.1",
|
|
DockerVersion: "1.12.3",
|
|
},
|
|
}
|
|
|
|
for _, test := range grid {
|
|
c := buildMinimalCluster()
|
|
c.Spec.KubernetesVersion = test.KubernetesVersion
|
|
|
|
full, err := build(c)
|
|
if err != nil {
|
|
t.Fatalf("error during build: %v", err)
|
|
}
|
|
|
|
if fi.StringValue(full.Spec.Docker.Version) != test.DockerVersion {
|
|
t.Fatalf("Unexpected DockerVersion: %v", fi.StringValue(full.Spec.Docker.Version))
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestPopulateCluster_KubeController_High_Enough_Version(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
c.Spec.KubernetesVersion = "v1.5.2"
|
|
|
|
err := PerformAssignments(c)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
addEtcdClusters(c)
|
|
|
|
full, err := mockedPopulateClusterSpec(c)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
|
|
if full.Spec.KubeControllerManager.AttachDetachReconcileSyncPeriod == nil {
|
|
t.Fatalf("AttachDetachReconcileSyncPeriod not set correctly")
|
|
}
|
|
|
|
}
|
|
|
|
func TestPopulateCluster_KubeController_Fail(t *testing.T) {
|
|
c := buildMinimalCluster()
|
|
c.Spec.KubernetesVersion = "1.4.7"
|
|
|
|
err := PerformAssignments(c)
|
|
if err != nil {
|
|
t.Fatalf("error from PerformAssignments: %v", err)
|
|
}
|
|
|
|
addEtcdClusters(c)
|
|
|
|
full, err := mockedPopulateClusterSpec(c)
|
|
if err != nil {
|
|
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
|
|
}
|
|
|
|
if full.Spec.KubeControllerManager.AttachDetachReconcileSyncPeriod != nil {
|
|
t.Fatalf("AttachDetachReconcileSyncPeriodh is not supported in 1.4.7")
|
|
}
|
|
}
|