kubernetes/cmd/kube-controller-manager/app/controllermanager_test.go

222 lines
8.2 KiB
Go

/*
Copyright 2023 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package app
import (
"context"
"regexp"
"strings"
"testing"
"github.com/google/go-cmp/cmp"
"k8s.io/apimachinery/pkg/util/sets"
utilfeature "k8s.io/apiserver/pkg/util/feature"
cpnames "k8s.io/cloud-provider/names"
"k8s.io/component-base/featuregate"
featuregatetesting "k8s.io/component-base/featuregate/testing"
controllermanagercontroller "k8s.io/controller-manager/controller"
"k8s.io/klog/v2/ktesting"
"k8s.io/kubernetes/cmd/kube-controller-manager/names"
"k8s.io/kubernetes/pkg/features"
)
func TestControllerNamesConsistency(t *testing.T) {
controllerNameRegexp := regexp.MustCompile("^[a-z]([-a-z]*[a-z])?$")
for _, name := range KnownControllers() {
if !controllerNameRegexp.MatchString(name) {
t.Errorf("name consistency check failed: controller %q must consist of lower case alphabetic characters or '-', and must start and end with an alphabetic character", name)
}
if !strings.HasSuffix(name, "-controller") {
t.Errorf("name consistency check failed: controller %q must have \"-controller\" suffix", name)
}
}
}
func TestControllerNamesDeclaration(t *testing.T) {
declaredControllers := sets.NewString(
names.ServiceAccountTokenController,
names.EndpointsController,
names.EndpointSliceController,
names.EndpointSliceMirroringController,
names.ReplicationControllerController,
names.PodGarbageCollectorController,
names.ResourceQuotaController,
names.NamespaceController,
names.ServiceAccountController,
names.GarbageCollectorController,
names.DaemonSetController,
names.JobController,
names.DeploymentController,
names.ReplicaSetController,
names.HorizontalPodAutoscalerController,
names.DisruptionController,
names.StatefulSetController,
names.CronJobController,
names.CertificateSigningRequestSigningController,
names.CertificateSigningRequestApprovingController,
names.CertificateSigningRequestCleanerController,
names.TTLController,
names.BootstrapSignerController,
names.TokenCleanerController,
names.NodeIpamController,
names.NodeLifecycleController,
names.TaintEvictionController,
cpnames.ServiceLBController,
cpnames.NodeRouteController,
cpnames.CloudNodeLifecycleController,
names.PersistentVolumeBinderController,
names.PersistentVolumeAttachDetachController,
names.PersistentVolumeExpanderController,
names.ClusterRoleAggregationController,
names.PersistentVolumeClaimProtectionController,
names.PersistentVolumeProtectionController,
names.TTLAfterFinishedController,
names.RootCACertificatePublisherController,
names.EphemeralVolumeController,
names.StorageVersionGarbageCollectorController,
names.ResourceClaimController,
names.LegacyServiceAccountTokenCleanerController,
names.ValidatingAdmissionPolicyStatusController,
names.ServiceCIDRController,
names.StorageVersionMigratorController,
)
for _, name := range KnownControllers() {
if !declaredControllers.Has(name) {
t.Errorf("name declaration check failed: controller name %q should be declared in \"controller_names.go\" and added to this test", name)
}
}
}
func TestNewControllerDescriptorsShouldNotPanic(t *testing.T) {
NewControllerDescriptors()
}
func TestNewControllerDescriptorsAlwaysReturnsDescriptorsForAllControllers(t *testing.T) {
featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, "AllAlpha", false)
featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, "AllBeta", false)
controllersWithoutFeatureGates := KnownControllers()
featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, "AllAlpha", true)
featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, "AllBeta", true)
controllersWithFeatureGates := KnownControllers()
if diff := cmp.Diff(controllersWithoutFeatureGates, controllersWithFeatureGates); diff != "" {
t.Errorf("unexpected controllers after enabling feature gates, NewControllerDescriptors should always return all controller descriptors. Controllers should define required feature gates in ControllerDescriptor.requiredFeatureGates. Diff of returned controllers:\n%s", diff)
}
}
func TestFeatureGatedControllersShouldNotDefineAliases(t *testing.T) {
featureGateRegex := regexp.MustCompile("^([a-zA-Z0-9]+)")
alphaFeatures := sets.NewString()
for _, featureText := range utilfeature.DefaultFeatureGate.KnownFeatures() {
// we have to parse this from KnownFeatures, because usage of mutable FeatureGate is not allowed in unit tests
feature := featureGateRegex.FindString(featureText)
if strings.Contains(featureText, string(featuregate.Alpha)) && feature != "AllAlpha" {
alphaFeatures.Insert(feature)
}
}
for name, controller := range NewControllerDescriptors() {
if len(controller.GetAliases()) == 0 {
continue
}
requiredFeatureGates := controller.GetRequiredFeatureGates()
if len(requiredFeatureGates) == 0 {
continue
}
// DO NOT ADD any new controllers here. one controller is an exception, because it was added before this test was introduced
if name == names.ResourceClaimController {
continue
}
areAllRequiredFeaturesAlpha := true
for _, feature := range requiredFeatureGates {
if !alphaFeatures.Has(string(feature)) {
areAllRequiredFeaturesAlpha = false
break
}
}
if areAllRequiredFeaturesAlpha {
t.Errorf("alias check failed: controller name %q should not be aliased as it is still guarded by alpha feature gates (%v) and thus should have only a canonical name", name, requiredFeatureGates)
}
}
}
// TestTaintEvictionControllerGating ensures that it is possible to run taint-manager as a separated controller
// only when the SeparateTaintEvictionController feature is enabled
func TestTaintEvictionControllerGating(t *testing.T) {
tests := []struct {
name string
enableFeatureGate bool
expectInitFuncCall bool
}{
{
name: "standalone taint-eviction-controller should run when SeparateTaintEvictionController feature gate is enabled",
enableFeatureGate: true,
expectInitFuncCall: true,
},
{
name: "standalone taint-eviction-controller should not run when SeparateTaintEvictionController feature gate is not enabled",
enableFeatureGate: false,
expectInitFuncCall: false,
},
}
for _, test := range tests {
t.Run(test.name, func(t *testing.T) {
featuregatetesting.SetFeatureGateDuringTest(t, utilfeature.DefaultFeatureGate, features.SeparateTaintEvictionController, test.enableFeatureGate)
_, ctx := ktesting.NewTestContext(t)
ctx, cancel := context.WithCancel(ctx)
defer cancel()
controllerCtx := ControllerContext{}
controllerCtx.ComponentConfig.Generic.Controllers = []string{names.TaintEvictionController}
initFuncCalled := false
taintEvictionControllerDescriptor := NewControllerDescriptors()[names.TaintEvictionController]
taintEvictionControllerDescriptor.initFunc = func(ctx context.Context, controllerContext ControllerContext, controllerName string) (controller controllermanagercontroller.Interface, enabled bool, err error) {
initFuncCalled = true
return nil, true, nil
}
healthCheck, err := StartController(ctx, controllerCtx, taintEvictionControllerDescriptor, nil)
if err != nil {
t.Errorf("starting a TaintEvictionController controller should not return an error")
}
if test.expectInitFuncCall != initFuncCalled {
t.Errorf("TaintEvictionController init call check failed: expected=%v, got=%v", test.expectInitFuncCall, initFuncCalled)
}
hasHealthCheck := healthCheck != nil
expectHealthCheck := test.expectInitFuncCall
if expectHealthCheck != hasHealthCheck {
t.Errorf("TaintEvictionController healthCheck check failed: expected=%v, got=%v", expectHealthCheck, hasHealthCheck)
}
})
}
}