kops/upup/pkg/fi/cloudup/populatecluster_test.go

532 lines
14 KiB
Go

/*
Copyright 2016 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package cloudup
import (
"fmt"
"strings"
"testing"
"k8s.io/apimachinery/pkg/util/sets"
api "k8s.io/kops/pkg/apis/kops"
"k8s.io/kops/pkg/assets"
"k8s.io/kops/pkg/client/simple/vfsclientset"
"k8s.io/kops/upup/pkg/fi"
"k8s.io/kops/upup/pkg/fi/cloudup/awsup"
"k8s.io/kops/util/pkg/vfs"
)
func buildMinimalCluster() *api.Cluster {
awsup.InstallMockAWSCloud(MockAWSRegion, "abcd")
c := &api.Cluster{}
c.ObjectMeta.Name = "testcluster.test.com"
c.Spec.KubernetesVersion = "1.4.6"
c.Spec.Subnets = []api.ClusterSubnetSpec{
{Name: "subnet-us-mock-1a", Zone: "us-mock-1a", CIDR: "172.20.1.0/24"},
{Name: "subnet-us-mock-1b", Zone: "us-mock-1b", CIDR: "172.20.2.0/24"},
{Name: "subnet-us-mock-1c", Zone: "us-mock-1c", CIDR: "172.20.3.0/24"},
}
c.Spec.KubernetesAPIAccess = []string{"0.0.0.0/0"}
c.Spec.SSHAccess = []string{"0.0.0.0/0"}
// Default to public topology
c.Spec.Topology = &api.TopologySpec{
Masters: api.TopologyPublic,
Nodes: api.TopologyPublic,
}
c.Spec.NetworkCIDR = "172.20.0.0/16"
c.Spec.NonMasqueradeCIDR = "100.64.0.0/10"
c.Spec.CloudProvider = "aws"
c.Spec.ConfigBase = "s3://unittest-bucket/"
// Required to stop a call to cloud provider
// TODO: Mock cloudprovider
c.Spec.DNSZone = "test.com"
c.Spec.Networking = &api.NetworkingSpec{}
return c
}
func addEtcdClusters(c *api.Cluster) {
subnetNames := sets.NewString()
for _, z := range c.Spec.Subnets {
subnetNames.Insert(z.Name)
}
etcdZones := subnetNames.List()
for _, etcdCluster := range EtcdClusters {
etcd := &api.EtcdClusterSpec{}
etcd.Name = etcdCluster
for _, zone := range etcdZones {
m := &api.EtcdMemberSpec{}
m.Name = zone
m.InstanceGroup = fi.String(zone)
etcd.Members = append(etcd.Members, m)
}
c.Spec.EtcdClusters = append(c.Spec.EtcdClusters, etcd)
}
}
func TestPopulateCluster_Default_NoError(t *testing.T) {
c := buildMinimalCluster()
err := PerformAssignments(c)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
addEtcdClusters(c)
_, err = mockedPopulateClusterSpec(c)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
}
func mockedPopulateClusterSpec(c *api.Cluster) (*api.Cluster, error) {
vfs.Context.ResetMemfsContext(true)
assetBuilder := assets.NewAssetBuilder(nil)
basePath, err := vfs.Context.BuildVfsPath("memfs://tests")
if err != nil {
return nil, fmt.Errorf("error building vfspath: %v", err)
}
clientset := vfsclientset.NewVFSClientset(basePath)
return PopulateClusterSpec(clientset, c, assetBuilder)
}
func TestPopulateCluster_Docker_Spec(t *testing.T) {
c := buildMinimalCluster()
c.Spec.Docker = &api.DockerConfig{
MTU: fi.Int32(5678),
InsecureRegistry: fi.String("myregistry.com:1234"),
RegistryMirrors: []string{"https://registry.example.com"},
LogOpt: []string{"env=FOO"},
}
err := PerformAssignments(c)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
addEtcdClusters(c)
full, err := mockedPopulateClusterSpec(c)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if fi.Int32Value(full.Spec.Docker.MTU) != 5678 {
t.Fatalf("Unexpected Docker MTU: %v", full.Spec.Docker.MTU)
}
if fi.StringValue(full.Spec.Docker.InsecureRegistry) != "myregistry.com:1234" {
t.Fatalf("Unexpected Docker InsecureRegistry: %v", full.Spec.Docker.InsecureRegistry)
}
if strings.Join(full.Spec.Docker.RegistryMirrors, "!") != "https://registry.example.com" {
t.Fatalf("Unexpected Docker RegistryMirrors: %v", full.Spec.Docker.RegistryMirrors)
}
if strings.Join(full.Spec.Docker.LogOpt, "!") != "env=FOO" {
t.Fatalf("Unexpected Docker LogOpt: %v", full.Spec.Docker.LogOpt)
}
}
func TestPopulateCluster_StorageDefault(t *testing.T) {
c := buildMinimalCluster()
err := PerformAssignments(c)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
addEtcdClusters(c)
full, err := mockedPopulateClusterSpec(c)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if fi.StringValue(full.Spec.KubeAPIServer.StorageBackend) != "etcd2" {
t.Fatalf("Unexpected StorageBackend: %v", full.Spec.KubeAPIServer.StorageBackend)
}
}
func build(c *api.Cluster) (*api.Cluster, error) {
err := PerformAssignments(c)
if err != nil {
return nil, fmt.Errorf("error from PerformAssignments: %v", err)
}
addEtcdClusters(c)
full, err := mockedPopulateClusterSpec(c)
if err != nil {
return nil, fmt.Errorf("Unexpected error from PopulateCluster: %v", err)
}
return full, nil
}
func TestPopulateCluster_Kubenet(t *testing.T) {
c := buildMinimalCluster()
full, err := build(c)
if err != nil {
t.Fatalf("error during build: %v", err)
}
if full.Spec.Kubelet.NetworkPluginName != "kubenet" {
t.Fatalf("Unexpected NetworkPluginName: %v", full.Spec.Kubelet.NetworkPluginName)
}
if fi.BoolValue(full.Spec.Kubelet.ReconcileCIDR) != true {
t.Fatalf("Unexpected ReconcileCIDR: %v", full.Spec.Kubelet.ReconcileCIDR)
}
if fi.BoolValue(full.Spec.KubeControllerManager.ConfigureCloudRoutes) != true {
t.Fatalf("Unexpected ConfigureCloudRoutes: %v", full.Spec.KubeControllerManager.ConfigureCloudRoutes)
}
}
func TestPopulateCluster_CNI(t *testing.T) {
c := buildMinimalCluster()
c.Spec.Kubelet = &api.KubeletConfigSpec{
ConfigureCBR0: fi.Bool(false),
NetworkPluginName: "cni",
NonMasqueradeCIDR: c.Spec.NonMasqueradeCIDR,
CloudProvider: c.Spec.CloudProvider,
}
full, err := build(c)
if err != nil {
t.Fatalf("error during build: %v", err)
}
if full.Spec.Kubelet.NetworkPluginName != "cni" {
t.Fatalf("Unexpected NetworkPluginName: %v", full.Spec.Kubelet.NetworkPluginName)
}
if fi.BoolValue(full.Spec.Kubelet.ReconcileCIDR) != true {
t.Fatalf("Unexpected ReconcileCIDR: %v", full.Spec.Kubelet.ReconcileCIDR)
}
if fi.BoolValue(full.Spec.Kubelet.ConfigureCBR0) != false {
t.Fatalf("Unexpected ConfigureCBR0: %v", full.Spec.Kubelet.ConfigureCBR0)
}
if fi.BoolValue(full.Spec.KubeControllerManager.ConfigureCloudRoutes) != true {
t.Fatalf("Unexpected ConfigureCloudRoutes: %v", full.Spec.KubeControllerManager.ConfigureCloudRoutes)
}
}
func TestPopulateCluster_Custom_CIDR(t *testing.T) {
c := buildMinimalCluster()
c.Spec.NetworkCIDR = "172.20.2.0/24"
c.Spec.Subnets = []api.ClusterSubnetSpec{
{Name: "subnet-us-mock-1a", Zone: "us-mock-1a", CIDR: "172.20.2.0/27"},
{Name: "subnet-us-mock-1b", Zone: "us-mock-1b", CIDR: "172.20.2.32/27"},
{Name: "subnet-us-mock-1c", Zone: "us-mock-1c", CIDR: "172.20.2.64/27"},
}
err := PerformAssignments(c)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
addEtcdClusters(c)
full, err := mockedPopulateClusterSpec(c)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if full.Spec.NetworkCIDR != "172.20.2.0/24" {
t.Fatalf("Unexpected NetworkCIDR: %v", full.Spec.NetworkCIDR)
}
}
func TestPopulateCluster_IsolateMasters(t *testing.T) {
c := buildMinimalCluster()
c.Spec.IsolateMasters = fi.Bool(true)
err := PerformAssignments(c)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
addEtcdClusters(c)
full, err := mockedPopulateClusterSpec(c)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if fi.BoolValue(full.Spec.MasterKubelet.EnableDebuggingHandlers) != false {
t.Fatalf("Unexpected EnableDebuggingHandlers: %v", fi.BoolValue(full.Spec.MasterKubelet.EnableDebuggingHandlers))
}
if fi.BoolValue(full.Spec.MasterKubelet.ReconcileCIDR) != false {
t.Fatalf("Unexpected ReconcileCIDR: %v", fi.BoolValue(full.Spec.MasterKubelet.ReconcileCIDR))
}
}
func TestPopulateCluster_IsolateMastersFalse(t *testing.T) {
c := buildMinimalCluster()
// default: c.Spec.IsolateMasters = fi.Bool(false)
err := PerformAssignments(c)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
addEtcdClusters(c)
full, err := mockedPopulateClusterSpec(c)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if fi.BoolValue(full.Spec.MasterKubelet.EnableDebuggingHandlers) != true {
t.Fatalf("Unexpected EnableDebuggingHandlers: %v", fi.BoolValue(full.Spec.MasterKubelet.EnableDebuggingHandlers))
}
if fi.BoolValue(full.Spec.MasterKubelet.ReconcileCIDR) != true {
t.Fatalf("Unexpected ReconcileCIDR: %v", fi.BoolValue(full.Spec.MasterKubelet.ReconcileCIDR))
}
}
func TestPopulateCluster_Name_Required(t *testing.T) {
c := buildMinimalCluster()
c.ObjectMeta.Name = ""
expectErrorFromPopulateCluster(t, c, "Name")
}
func TestPopulateCluster_Zone_Required(t *testing.T) {
c := buildMinimalCluster()
c.Spec.Subnets = nil
expectErrorFromPopulateCluster(t, c, "Subnet")
}
func TestPopulateCluster_NetworkCIDR_Required(t *testing.T) {
c := buildMinimalCluster()
c.Spec.NetworkCIDR = ""
expectErrorFromPopulateCluster(t, c, "NetworkCIDR")
}
func TestPopulateCluster_NonMasqueradeCIDR_Required(t *testing.T) {
c := buildMinimalCluster()
c.Spec.NonMasqueradeCIDR = ""
expectErrorFromPopulateCluster(t, c, "NonMasqueradeCIDR")
}
func TestPopulateCluster_CloudProvider_Required(t *testing.T) {
c := buildMinimalCluster()
c.Spec.CloudProvider = ""
expectErrorFromPopulateCluster(t, c, "CloudProvider")
}
func TestPopulateCluster_TopologyInvalidNil_Required(t *testing.T) {
c := buildMinimalCluster()
c.Spec.Topology.Masters = ""
c.Spec.Topology.Nodes = ""
expectErrorFromPopulateCluster(t, c, "Topology")
}
func TestPopulateCluster_TopologyInvalidValue_Required(t *testing.T) {
c := buildMinimalCluster()
c.Spec.Topology.Masters = "123"
c.Spec.Topology.Nodes = "abc"
expectErrorFromPopulateCluster(t, c, "Topology")
}
//func TestPopulateCluster_TopologyInvalidMatchingValues_Required(t *testing.T) {
// // We can't have a bastion with public masters / nodes
// c := buildMinimalCluster()
// c.Spec.Topology.Masters = api.TopologyPublic
// c.Spec.Topology.Nodes = api.TopologyPrivate
// expectErrorFromPopulateCluster(t, c, "Topology")
//}
func TestPopulateCluster_BastionInvalidMatchingValues_Required(t *testing.T) {
// We can't have a bastion with public masters / nodes
c := buildMinimalCluster()
addEtcdClusters(c)
c.Spec.Topology.Masters = api.TopologyPublic
c.Spec.Topology.Nodes = api.TopologyPublic
c.Spec.Topology.Bastion = &api.BastionSpec{}
expectErrorFromPopulateCluster(t, c, "Bastion")
}
func TestPopulateCluster_BastionIdleTimeoutInvalidNegative_Required(t *testing.T) {
c := buildMinimalCluster()
addEtcdClusters(c)
c.Spec.Topology.Masters = api.TopologyPrivate
c.Spec.Topology.Nodes = api.TopologyPrivate
c.Spec.Topology.Bastion = &api.BastionSpec{}
c.Spec.Topology.Bastion.IdleTimeoutSeconds = fi.Int64(-1)
expectErrorFromPopulateCluster(t, c, "Bastion")
}
func expectErrorFromPopulateCluster(t *testing.T, c *api.Cluster, message string) {
_, err := mockedPopulateClusterSpec(c)
if err == nil {
t.Fatalf("Expected error from PopulateCluster")
}
actualMessage := fmt.Sprintf("%v", err)
if !strings.Contains(actualMessage, message) {
t.Fatalf("Expected error %q, got %q", message, actualMessage)
}
}
func TestPopulateCluster_APIServerCount(t *testing.T) {
c := buildMinimalCluster()
full, err := build(c)
if err != nil {
t.Fatalf("error during build: %v", err)
}
if fi.Int32Value(full.Spec.KubeAPIServer.APIServerCount) != 3 {
t.Fatalf("Unexpected APIServerCount: %v", fi.Int32Value(full.Spec.KubeAPIServer.APIServerCount))
}
}
func TestPopulateCluster_AnonymousAuth(t *testing.T) {
c := buildMinimalCluster()
c.Spec.KubernetesVersion = "1.5.0"
err := PerformAssignments(c)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
addEtcdClusters(c)
full, err := mockedPopulateClusterSpec(c)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if full.Spec.KubeAPIServer.AnonymousAuth == nil {
t.Fatalf("AnonymousAuth not specified")
}
if fi.BoolValue(full.Spec.KubeAPIServer.AnonymousAuth) != false {
t.Fatalf("Unexpected AnonymousAuth: %v", fi.BoolValue(full.Spec.KubeAPIServer.AnonymousAuth))
}
}
func TestPopulateCluster_AnonymousAuth_14(t *testing.T) {
c := buildMinimalCluster()
c.Spec.KubernetesVersion = "1.4.0"
err := PerformAssignments(c)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
addEtcdClusters(c)
full, err := mockedPopulateClusterSpec(c)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if full.Spec.KubeAPIServer.AnonymousAuth != nil {
t.Fatalf("AnonymousAuth is not supported in 1.4")
}
}
func TestPopulateCluster_DockerVersion(t *testing.T) {
grid := []struct {
KubernetesVersion string
DockerVersion string
}{
{
KubernetesVersion: "1.4.6",
DockerVersion: "1.11.2",
},
{
KubernetesVersion: "1.5.1",
DockerVersion: "1.12.3",
},
}
for _, test := range grid {
c := buildMinimalCluster()
c.Spec.KubernetesVersion = test.KubernetesVersion
full, err := build(c)
if err != nil {
t.Fatalf("error during build: %v", err)
}
if fi.StringValue(full.Spec.Docker.Version) != test.DockerVersion {
t.Fatalf("Unexpected DockerVersion: %v", fi.StringValue(full.Spec.Docker.Version))
}
}
}
func TestPopulateCluster_KubeController_High_Enough_Version(t *testing.T) {
c := buildMinimalCluster()
c.Spec.KubernetesVersion = "v1.5.2"
err := PerformAssignments(c)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
addEtcdClusters(c)
full, err := mockedPopulateClusterSpec(c)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if full.Spec.KubeControllerManager.AttachDetachReconcileSyncPeriod == nil {
t.Fatalf("AttachDetachReconcileSyncPeriod not set correctly")
}
}
func TestPopulateCluster_KubeController_Fail(t *testing.T) {
c := buildMinimalCluster()
c.Spec.KubernetesVersion = "1.4.7"
err := PerformAssignments(c)
if err != nil {
t.Fatalf("error from PerformAssignments: %v", err)
}
addEtcdClusters(c)
full, err := mockedPopulateClusterSpec(c)
if err != nil {
t.Fatalf("Unexpected error from PopulateCluster: %v", err)
}
if full.Spec.KubeControllerManager.AttachDetachReconcileSyncPeriod != nil {
t.Fatalf("AttachDetachReconcileSyncPeriodh is not supported in 1.4.7")
}
}