mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-10-01 01:36:09 -04:00
52ceced223
* Update image version * Introduce 'ValidK8sVersion' type. Ensures that consumers of the k8sVersion receive a valid version, without having to do their own validation. * Add testcase to check that kubeadm accepts the currently provided version.
125 lines
3.4 KiB
Go
125 lines
3.4 KiB
Go
package k8sapi
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
|
|
"github.com/edgelesssys/constellation/internal/versions"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"go.uber.org/goleak"
|
|
kubeadmUtil "k8s.io/kubernetes/cmd/kubeadm/app/util"
|
|
)
|
|
|
|
func TestMain(m *testing.M) {
|
|
goleak.VerifyTestMain(m)
|
|
}
|
|
|
|
func TestInitConfiguration(t *testing.T) {
|
|
coreOSConfig := CoreOSConfiguration{}
|
|
|
|
testCases := map[string]struct {
|
|
config KubeadmInitYAML
|
|
}{
|
|
"CoreOS init config can be created": {
|
|
config: coreOSConfig.InitConfiguration(true, versions.Latest),
|
|
},
|
|
"CoreOS init config with all fields can be created": {
|
|
config: func() KubeadmInitYAML {
|
|
c := coreOSConfig.InitConfiguration(true, versions.Latest)
|
|
c.SetAPIServerAdvertiseAddress("192.0.2.0")
|
|
c.SetNodeIP("192.0.2.0")
|
|
c.SetNodeName("node")
|
|
c.SetPodNetworkCIDR("10.244.0.0/16")
|
|
c.SetServiceCIDR("10.245.0.0/24")
|
|
c.SetProviderID("somecloudprovider://instance-id")
|
|
return c
|
|
}(),
|
|
},
|
|
}
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
config, err := tc.config.Marshal()
|
|
require.NoError(err)
|
|
tmp, err := tc.config.Unmarshal(config)
|
|
require.NoError(err)
|
|
// test on correct mashalling and unmarshalling
|
|
assert.Equal(tc.config.ClusterConfiguration, tmp.ClusterConfiguration)
|
|
assert.Equal(tc.config.InitConfiguration, tmp.InitConfiguration)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestInitConfigurationKubeadmCompatibility(t *testing.T) {
|
|
coreOSConfig := CoreOSConfiguration{}
|
|
|
|
testCases := map[string]struct {
|
|
config KubeadmInitYAML
|
|
expectedVersion string
|
|
wantErr bool
|
|
}{
|
|
"Kubeadm accepts version 'Latest'": {
|
|
config: coreOSConfig.InitConfiguration(true, versions.Latest),
|
|
expectedVersion: fmt.Sprintf("v%s", versions.VersionConfigs[versions.Latest].PatchVersion),
|
|
},
|
|
"Kubeadm receives incompatible version": {
|
|
config: coreOSConfig.InitConfiguration(true, "1.22"),
|
|
wantErr: true,
|
|
},
|
|
}
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
|
|
version, err := kubeadmUtil.KubernetesReleaseVersion(tc.config.ClusterConfiguration.KubernetesVersion)
|
|
if tc.wantErr {
|
|
assert.Error(err)
|
|
return
|
|
}
|
|
assert.Equal(tc.expectedVersion, version)
|
|
assert.NoError(err)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestJoinConfiguration(t *testing.T) {
|
|
coreOSConfig := CoreOSConfiguration{}
|
|
|
|
testCases := map[string]struct {
|
|
config KubeadmJoinYAML
|
|
}{
|
|
"CoreOS join config can be created": {
|
|
config: coreOSConfig.JoinConfiguration(true),
|
|
},
|
|
"CoreOS join config with all fields can be created": {
|
|
config: func() KubeadmJoinYAML {
|
|
c := coreOSConfig.JoinConfiguration(true)
|
|
c.SetAPIServerEndpoint("192.0.2.0:6443")
|
|
c.SetNodeIP("192.0.2.0")
|
|
c.SetNodeName("node")
|
|
c.SetToken("token")
|
|
c.AppendDiscoveryTokenCaCertHash("discovery-token-ca-cert-hash")
|
|
c.SetProviderID("somecloudprovider://instance-id")
|
|
c.SetControlPlane("192.0.2.0")
|
|
return c
|
|
}(),
|
|
},
|
|
}
|
|
for name, tc := range testCases {
|
|
t.Run(name, func(t *testing.T) {
|
|
assert := assert.New(t)
|
|
require := require.New(t)
|
|
|
|
config, err := tc.config.Marshal()
|
|
require.NoError(err)
|
|
tmp, err := tc.config.Unmarshal(config)
|
|
require.NoError(err)
|
|
// test on correct mashalling and unmarshalling
|
|
assert.Equal(tc.config.JoinConfiguration, tmp.JoinConfiguration)
|
|
})
|
|
}
|
|
}
|