265 lines
8.4 KiB
Go
265 lines
8.4 KiB
Go
/*
|
|
Copyright 2023 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package options
|
|
|
|
import (
|
|
"strings"
|
|
"testing"
|
|
|
|
kubeapiserveradmission "k8s.io/apiserver/pkg/admission"
|
|
genericoptions "k8s.io/apiserver/pkg/server/options"
|
|
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
|
"k8s.io/component-base/featuregate"
|
|
basemetrics "k8s.io/component-base/metrics"
|
|
"k8s.io/kubernetes/pkg/features"
|
|
|
|
peerreconcilers "k8s.io/apiserver/pkg/reconcilers"
|
|
featuregatetesting "k8s.io/component-base/featuregate/testing"
|
|
kubeoptions "k8s.io/kubernetes/pkg/kubeapiserver/options"
|
|
)
|
|
|
|
func TestValidateAPIPriorityAndFairness(t *testing.T) {
|
|
const conflict = "conflicts with --enable-priority-and-fairness=true and --feature-gates=APIPriorityAndFairness=true"
|
|
tests := []struct {
|
|
runtimeConfig string
|
|
errShouldContain string
|
|
}{
|
|
{
|
|
runtimeConfig: "api/all=false",
|
|
errShouldContain: conflict,
|
|
},
|
|
{
|
|
runtimeConfig: "api/beta=false",
|
|
errShouldContain: "",
|
|
},
|
|
{
|
|
runtimeConfig: "api/ga=false",
|
|
errShouldContain: conflict,
|
|
},
|
|
{
|
|
runtimeConfig: "api/ga=true",
|
|
errShouldContain: "",
|
|
},
|
|
{
|
|
runtimeConfig: "flowcontrol.apiserver.k8s.io/v1beta1=false",
|
|
errShouldContain: "",
|
|
},
|
|
{
|
|
runtimeConfig: "flowcontrol.apiserver.k8s.io/v1beta2=false",
|
|
errShouldContain: "",
|
|
},
|
|
{
|
|
runtimeConfig: "flowcontrol.apiserver.k8s.io/v1beta3=false",
|
|
errShouldContain: "",
|
|
},
|
|
{
|
|
runtimeConfig: "flowcontrol.apiserver.k8s.io/v1beta3=true",
|
|
errShouldContain: "",
|
|
},
|
|
{
|
|
runtimeConfig: "flowcontrol.apiserver.k8s.io/v1=true",
|
|
errShouldContain: "",
|
|
},
|
|
{
|
|
runtimeConfig: "flowcontrol.apiserver.k8s.io/v1=false",
|
|
errShouldContain: conflict,
|
|
},
|
|
{
|
|
runtimeConfig: "flowcontrol.apiserver.k8s.io/v1beta3=true,flowcontrol.apiserver.k8s.io/v1=false",
|
|
errShouldContain: conflict,
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(test.runtimeConfig, func(t *testing.T) {
|
|
options := &Options{
|
|
Features: &genericoptions.FeatureOptions{
|
|
EnablePriorityAndFairness: true,
|
|
},
|
|
APIEnablement: genericoptions.NewAPIEnablementOptions(),
|
|
}
|
|
options.APIEnablement.RuntimeConfig.Set(test.runtimeConfig)
|
|
|
|
var errMessageGot string
|
|
if errs := validateAPIPriorityAndFairness(options); len(errs) > 0 {
|
|
errMessageGot = errs[0].Error()
|
|
}
|
|
|
|
switch {
|
|
case len(test.errShouldContain) == 0:
|
|
if len(errMessageGot) > 0 {
|
|
t.Errorf("Expected no error, but got: %q", errMessageGot)
|
|
}
|
|
default:
|
|
if !strings.Contains(errMessageGot, test.errShouldContain) {
|
|
t.Errorf("Expected error message to contain: %q, but got: %q", test.errShouldContain, errMessageGot)
|
|
}
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestValidateUnknownVersionInteroperabilityProxy(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
featureEnabled bool
|
|
errShouldContain string
|
|
peerCAFile string
|
|
peerAdvertiseAddress peerreconcilers.PeerAdvertiseAddress
|
|
}{
|
|
{
|
|
name: "feature disabled but peerCAFile set",
|
|
featureEnabled: false,
|
|
peerCAFile: "foo",
|
|
errShouldContain: "--peer-ca-file requires UnknownVersionInteroperabilityProxy feature to be turned on",
|
|
},
|
|
{
|
|
name: "feature disabled but peerAdvertiseIP set",
|
|
featureEnabled: false,
|
|
peerAdvertiseAddress: peerreconcilers.PeerAdvertiseAddress{PeerAdvertiseIP: "1.2.3.4"},
|
|
errShouldContain: "--peer-advertise-ip requires UnknownVersionInteroperabilityProxy feature to be turned on",
|
|
},
|
|
{
|
|
name: "feature disabled but peerAdvertisePort set",
|
|
featureEnabled: false,
|
|
peerAdvertiseAddress: peerreconcilers.PeerAdvertiseAddress{PeerAdvertisePort: "1"},
|
|
errShouldContain: "--peer-advertise-port requires UnknownVersionInteroperabilityProxy feature to be turned on",
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(test.name, func(t *testing.T) {
|
|
options := &Options{
|
|
PeerCAFile: test.peerCAFile,
|
|
PeerAdvertiseAddress: test.peerAdvertiseAddress,
|
|
}
|
|
if test.featureEnabled {
|
|
defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.UnknownVersionInteroperabilityProxy, true)()
|
|
}
|
|
var errMessageGot string
|
|
if errs := validateUnknownVersionInteroperabilityProxyFlags(options); len(errs) > 0 {
|
|
errMessageGot = errs[0].Error()
|
|
}
|
|
if !strings.Contains(errMessageGot, test.errShouldContain) {
|
|
t.Errorf("Expected error message to contain: %q, but got: %q", test.errShouldContain, errMessageGot)
|
|
}
|
|
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestValidateUnknownVersionInteroperabilityProxyFeature(t *testing.T) {
|
|
const conflict = "UnknownVersionInteroperabilityProxy feature requires StorageVersionAPI feature flag to be enabled"
|
|
tests := []struct {
|
|
name string
|
|
featuresEnabled []featuregate.Feature
|
|
}{
|
|
{
|
|
name: "enabled: UnknownVersionInteroperabilityProxy, disabled: StorageVersionAPI",
|
|
featuresEnabled: []featuregate.Feature{features.UnknownVersionInteroperabilityProxy},
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(test.name, func(t *testing.T) {
|
|
for _, feature := range test.featuresEnabled {
|
|
defer featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, feature, true)()
|
|
}
|
|
var errMessageGot string
|
|
if errs := validateUnknownVersionInteroperabilityProxyFeature(); len(errs) > 0 {
|
|
errMessageGot = errs[0].Error()
|
|
}
|
|
if !strings.Contains(errMessageGot, conflict) {
|
|
t.Errorf("Expected error message to contain: %q, but got: %q", conflict, errMessageGot)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestValidateOptions(t *testing.T) {
|
|
testCases := []struct {
|
|
name string
|
|
options *Options
|
|
expectErrors bool
|
|
}{
|
|
{
|
|
name: "validate master count equal 0",
|
|
expectErrors: true,
|
|
options: &Options{
|
|
GenericServerRunOptions: &genericoptions.ServerRunOptions{},
|
|
Etcd: &genericoptions.EtcdOptions{},
|
|
SecureServing: &genericoptions.SecureServingOptionsWithLoopback{},
|
|
Audit: &genericoptions.AuditOptions{},
|
|
Admission: &kubeoptions.AdmissionOptions{
|
|
GenericAdmission: &genericoptions.AdmissionOptions{
|
|
EnablePlugins: []string{"foo"},
|
|
Plugins: kubeapiserveradmission.NewPlugins(),
|
|
},
|
|
PluginNames: []string{"foo"},
|
|
},
|
|
Authentication: &kubeoptions.BuiltInAuthenticationOptions{
|
|
APIAudiences: []string{"bar"},
|
|
ServiceAccounts: &kubeoptions.ServiceAccountAuthenticationOptions{
|
|
Issuers: []string{"baz"},
|
|
},
|
|
},
|
|
APIEnablement: genericoptions.NewAPIEnablementOptions(),
|
|
Metrics: &basemetrics.Options{},
|
|
ServiceAccountSigningKeyFile: "",
|
|
Features: &genericoptions.FeatureOptions{},
|
|
},
|
|
},
|
|
{
|
|
name: "validate token request enable not attempted",
|
|
expectErrors: true,
|
|
options: &Options{
|
|
GenericServerRunOptions: &genericoptions.ServerRunOptions{},
|
|
Etcd: &genericoptions.EtcdOptions{},
|
|
SecureServing: &genericoptions.SecureServingOptionsWithLoopback{},
|
|
Audit: &genericoptions.AuditOptions{},
|
|
Admission: &kubeoptions.AdmissionOptions{
|
|
GenericAdmission: &genericoptions.AdmissionOptions{
|
|
EnablePlugins: []string{""},
|
|
Plugins: kubeapiserveradmission.NewPlugins(),
|
|
},
|
|
PluginNames: []string{""},
|
|
},
|
|
Authentication: &kubeoptions.BuiltInAuthenticationOptions{
|
|
ServiceAccounts: &kubeoptions.ServiceAccountAuthenticationOptions{},
|
|
},
|
|
APIEnablement: genericoptions.NewAPIEnablementOptions(),
|
|
Metrics: &basemetrics.Options{},
|
|
ServiceAccountSigningKeyFile: "",
|
|
Features: &genericoptions.FeatureOptions{},
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
errs := tc.options.Validate()
|
|
if len(errs) > 0 && !tc.expectErrors {
|
|
t.Errorf("expected no errors, errors found %+v", errs)
|
|
}
|
|
|
|
if len(errs) == 0 && tc.expectErrors {
|
|
t.Errorf("expected errors, no errors found")
|
|
}
|
|
})
|
|
}
|
|
}
|