mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-11 21:12:07 +00:00
Merge pull request #120549 from pacoxu/kubeadm-etcd-manifests
kubeadm: fix diff order and add tests for new default value manifest
This commit is contained in:
commit
35199e42a4
@ -22,11 +22,13 @@ package etcd
|
||||
import (
|
||||
"fmt"
|
||||
"os"
|
||||
"path"
|
||||
"path/filepath"
|
||||
"reflect"
|
||||
"sort"
|
||||
"testing"
|
||||
|
||||
"github.com/google/go-cmp/cmp"
|
||||
"github.com/lithammer/dedent"
|
||||
|
||||
v1 "k8s.io/api/core/v1"
|
||||
@ -71,8 +73,9 @@ func TestCreateLocalEtcdStaticPodManifestFile(t *testing.T) {
|
||||
defer os.RemoveAll(tmpdir)
|
||||
|
||||
var tests = []struct {
|
||||
cfg *kubeadmapi.ClusterConfiguration
|
||||
expectedError bool
|
||||
cfg *kubeadmapi.ClusterConfiguration
|
||||
expectedError bool
|
||||
expectedManifest string
|
||||
}{
|
||||
{
|
||||
cfg: &kubeadmapi.ClusterConfiguration{
|
||||
@ -84,6 +87,89 @@ func TestCreateLocalEtcdStaticPodManifestFile(t *testing.T) {
|
||||
},
|
||||
},
|
||||
expectedError: false,
|
||||
expectedManifest: fmt.Sprintf(`apiVersion: v1
|
||||
kind: Pod
|
||||
metadata:
|
||||
annotations:
|
||||
kubeadm.kubernetes.io/etcd.advertise-client-urls: https://:2379
|
||||
creationTimestamp: null
|
||||
labels:
|
||||
component: etcd
|
||||
tier: control-plane
|
||||
name: etcd
|
||||
namespace: kube-system
|
||||
spec:
|
||||
containers:
|
||||
- command:
|
||||
- etcd
|
||||
- --advertise-client-urls=https://:2379
|
||||
- --cert-file=etcd/server.crt
|
||||
- --client-cert-auth=true
|
||||
- --data-dir=%s/etcd
|
||||
- --experimental-initial-corrupt-check=true
|
||||
- --experimental-watch-progress-notify-interval=5s
|
||||
- --initial-advertise-peer-urls=https://:2380
|
||||
- --initial-cluster==https://:2380
|
||||
- --key-file=etcd/server.key
|
||||
- --listen-client-urls=https://127.0.0.1:2379,https://:2379
|
||||
- --listen-metrics-urls=http://127.0.0.1:2381
|
||||
- --listen-peer-urls=https://:2380
|
||||
- --name=
|
||||
- --peer-cert-file=etcd/peer.crt
|
||||
- --peer-client-cert-auth=true
|
||||
- --peer-key-file=etcd/peer.key
|
||||
- --peer-trusted-ca-file=etcd/ca.crt
|
||||
- --snapshot-count=10000
|
||||
- --trusted-ca-file=etcd/ca.crt
|
||||
image: /etcd:%s
|
||||
imagePullPolicy: IfNotPresent
|
||||
livenessProbe:
|
||||
failureThreshold: 8
|
||||
httpGet:
|
||||
host: 127.0.0.1
|
||||
path: /health?exclude=NOSPACE&serializable=true
|
||||
port: 2381
|
||||
scheme: HTTP
|
||||
initialDelaySeconds: 10
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 15
|
||||
name: etcd
|
||||
resources:
|
||||
requests:
|
||||
cpu: 100m
|
||||
memory: 100Mi
|
||||
startupProbe:
|
||||
failureThreshold: 24
|
||||
httpGet:
|
||||
host: 127.0.0.1
|
||||
path: /health?serializable=false
|
||||
port: 2381
|
||||
scheme: HTTP
|
||||
initialDelaySeconds: 10
|
||||
periodSeconds: 10
|
||||
timeoutSeconds: 15
|
||||
volumeMounts:
|
||||
- mountPath: %s/etcd
|
||||
name: etcd-data
|
||||
- mountPath: /etcd
|
||||
name: etcd-certs
|
||||
hostNetwork: true
|
||||
priority: 2000001000
|
||||
priorityClassName: system-node-critical
|
||||
securityContext:
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
volumes:
|
||||
- hostPath:
|
||||
path: /etcd
|
||||
type: DirectoryOrCreate
|
||||
name: etcd-certs
|
||||
- hostPath:
|
||||
path: %s/etcd
|
||||
type: DirectoryOrCreate
|
||||
name: etcd-data
|
||||
status: {}
|
||||
`, tmpdir, kubeadmconstants.DefaultEtcdVersion, tmpdir, tmpdir),
|
||||
},
|
||||
{
|
||||
cfg: &kubeadmapi.ClusterConfiguration{
|
||||
@ -115,6 +201,16 @@ func TestCreateLocalEtcdStaticPodManifestFile(t *testing.T) {
|
||||
// Assert expected files are there
|
||||
testutil.AssertFilesCount(t, manifestPath, 1)
|
||||
testutil.AssertFileExists(t, manifestPath, kubeadmconstants.Etcd+".yaml")
|
||||
manifestBytes, err := os.ReadFile(path.Join(manifestPath, kubeadmconstants.Etcd+".yaml"))
|
||||
if err != nil {
|
||||
t.Errorf("failed to load generated manifest file: %v", err)
|
||||
}
|
||||
if test.expectedManifest != string(manifestBytes) {
|
||||
t.Errorf(
|
||||
"File created by CreateLocalEtcdStaticPodManifestFile is not as expected. Diff: \n%s",
|
||||
cmp.Diff(string(manifestBytes), test.expectedManifest),
|
||||
)
|
||||
}
|
||||
} else {
|
||||
testutil.AssertError(t, err, "etcd static pod manifest cannot be generated for cluster using external etcd")
|
||||
}
|
||||
@ -165,6 +261,9 @@ func TestCreateLocalEtcdStaticPodManifestFileWithPatches(t *testing.T) {
|
||||
t.Errorf("Error executing ReadStaticPodFromDisk: %v", err)
|
||||
return
|
||||
}
|
||||
if pod.Spec.DNSPolicy != "" {
|
||||
t.Errorf("DNSPolicy should be empty but: %v", pod.Spec.DNSPolicy)
|
||||
}
|
||||
|
||||
if _, ok := pod.ObjectMeta.Annotations["patched"]; !ok {
|
||||
t.Errorf("Patches were not applied to %s", kubeadmconstants.Etcd)
|
||||
|
@ -214,13 +214,15 @@ func upgradeComponent(component string, certsRenewMgr *renewal.Manager, waiter a
|
||||
recoverManifests[component] = backupManifestPath
|
||||
|
||||
// Skip upgrade if current and new manifests are equal
|
||||
equal, err := staticpod.ManifestFilesAreEqual(currentManifestPath, newManifestPath)
|
||||
equal, diff, err := staticpod.ManifestFilesAreEqual(currentManifestPath, newManifestPath)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if equal {
|
||||
fmt.Printf("[upgrade/staticpods] Current and new manifests of %s are equal, skipping upgrade\n", component)
|
||||
return nil
|
||||
} else {
|
||||
klog.V(4).Infof("Pod manifest files diff:\n%s\n", diff)
|
||||
}
|
||||
|
||||
// if certificate renewal should be performed
|
||||
|
@ -54,23 +54,11 @@ func MarshalToYamlForCodecs(obj runtime.Object, gv schema.GroupVersion, codecs s
|
||||
return runtime.Encode(encoder, obj)
|
||||
}
|
||||
|
||||
// UnmarshalFromYaml unmarshals yaml into an object.
|
||||
func UnmarshalFromYaml(buffer []byte, gv schema.GroupVersion) (runtime.Object, error) {
|
||||
return UnmarshalFromYamlForCodecs(buffer, gv, clientsetscheme.Codecs)
|
||||
}
|
||||
|
||||
// UnmarshalFromYamlForCodecs unmarshals yaml into an object using the specified codec
|
||||
// TODO: Is specifying the gv really needed here?
|
||||
// TODO: Can we support json out of the box easily here?
|
||||
func UnmarshalFromYamlForCodecs(buffer []byte, gv schema.GroupVersion, codecs serializer.CodecFactory) (runtime.Object, error) {
|
||||
const mediaType = runtime.ContentTypeYAML
|
||||
info, ok := runtime.SerializerInfoForMediaType(codecs.SupportedMediaTypes(), mediaType)
|
||||
if !ok {
|
||||
return nil, errors.Errorf("unsupported media type %q", mediaType)
|
||||
}
|
||||
|
||||
decoder := codecs.DecoderToVersion(info.Serializer, gv)
|
||||
obj, err := runtime.Decode(decoder, buffer)
|
||||
// UniversalUnmarshal unmarshals YAML or JSON into a runtime.Object using the universal deserializer.
|
||||
func UniversalUnmarshal(buffer []byte) (runtime.Object, error) {
|
||||
codecs := clientsetscheme.Codecs
|
||||
decoder := codecs.UniversalDeserializer()
|
||||
obj, _, err := decoder.Decode(buffer, nil, nil)
|
||||
if err != nil {
|
||||
return nil, errors.Wrapf(err, "failed to decode %s into runtime.Object", buffer)
|
||||
}
|
||||
|
@ -24,13 +24,9 @@ import (
|
||||
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/runtime"
|
||||
"k8s.io/apimachinery/pkg/runtime/schema"
|
||||
"k8s.io/apimachinery/pkg/runtime/serializer"
|
||||
|
||||
bootstraptokenv1 "k8s.io/kubernetes/cmd/kubeadm/app/apis/bootstraptoken/v1"
|
||||
kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm"
|
||||
kubeadmapiv1 "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm/v1beta3"
|
||||
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
||||
)
|
||||
|
||||
@ -84,7 +80,7 @@ func TestMarshalUnmarshalYaml(t *testing.T) {
|
||||
|
||||
t.Logf("\n%s", bytes)
|
||||
|
||||
obj2, err := UnmarshalFromYaml(bytes, corev1.SchemeGroupVersion)
|
||||
obj2, err := UniversalUnmarshal(bytes)
|
||||
if err != nil {
|
||||
t.Fatalf("unexpected error marshalling: %v", err)
|
||||
}
|
||||
@ -111,50 +107,48 @@ func TestMarshalUnmarshalYaml(t *testing.T) {
|
||||
}
|
||||
}
|
||||
|
||||
func TestMarshalUnmarshalToYamlForCodecs(t *testing.T) {
|
||||
cfg := &kubeadmapiv1.InitConfiguration{
|
||||
TypeMeta: metav1.TypeMeta{
|
||||
Kind: constants.InitConfigurationKind,
|
||||
APIVersion: kubeadmapiv1.SchemeGroupVersion.String(),
|
||||
},
|
||||
NodeRegistration: kubeadmapiv1.NodeRegistrationOptions{
|
||||
Name: "testNode",
|
||||
CRISocket: "unix:///var/run/cri.sock",
|
||||
},
|
||||
BootstrapTokens: []bootstraptokenv1.BootstrapToken{
|
||||
{
|
||||
Token: &bootstraptokenv1.BootstrapTokenString{ID: "abcdef", Secret: "abcdef0123456789"},
|
||||
},
|
||||
},
|
||||
// NOTE: Using MarshalToYamlForCodecs and UnmarshalFromYamlForCodecs for ClusterConfiguration fields here won't work
|
||||
// by design. This is because we have a `json:"-"` annotation in order to avoid struct duplication. See the comment
|
||||
// at the kubeadmapiv1.InitConfiguration definition.
|
||||
func TestUnmarshalJson(t *testing.T) {
|
||||
bytes := []byte(string(`{
|
||||
"apiVersion": "v1",
|
||||
"kind": "Pod",
|
||||
"metadata": {
|
||||
"name": "someName",
|
||||
"namespace": "testNamespace",
|
||||
"labels": {
|
||||
"test": "yes"
|
||||
}
|
||||
},
|
||||
"spec": {
|
||||
"restartPolicy": "Always"
|
||||
}
|
||||
}`))
|
||||
|
||||
kubeadmapiv1.SetDefaults_InitConfiguration(cfg)
|
||||
scheme := runtime.NewScheme()
|
||||
if err := kubeadmapiv1.AddToScheme(scheme); err != nil {
|
||||
t.Fatal(err)
|
||||
}
|
||||
codecs := serializer.NewCodecFactory(scheme)
|
||||
|
||||
bytes, err := MarshalToYamlForCodecs(cfg, kubeadmapiv1.SchemeGroupVersion, codecs)
|
||||
if err != nil {
|
||||
t.Fatalf("unexpected error marshalling InitConfiguration: %v", err)
|
||||
}
|
||||
t.Logf("\n%s", bytes)
|
||||
|
||||
obj, err := UnmarshalFromYamlForCodecs(bytes, kubeadmapiv1.SchemeGroupVersion, codecs)
|
||||
obj2, err := UniversalUnmarshal(bytes)
|
||||
if err != nil {
|
||||
t.Fatalf("unexpected error unmarshalling InitConfiguration: %v", err)
|
||||
t.Fatalf("unexpected error marshalling: %v", err)
|
||||
}
|
||||
|
||||
cfg2, ok := obj.(*kubeadmapiv1.InitConfiguration)
|
||||
if !ok || cfg2 == nil {
|
||||
t.Fatal("did not get InitConfiguration back")
|
||||
pod2, ok := obj2.(*corev1.Pod)
|
||||
if !ok {
|
||||
t.Fatal("did not get a Pod")
|
||||
}
|
||||
if !reflect.DeepEqual(*cfg, *cfg2) {
|
||||
t.Errorf("expected %v, got %v", *cfg, *cfg2)
|
||||
|
||||
if pod2.Name != "someName" {
|
||||
t.Errorf("expected someName, got %q", pod2.Name)
|
||||
}
|
||||
|
||||
if pod2.Namespace != "testNamespace" {
|
||||
t.Errorf("expected testNamespace, got %q", pod2.Namespace)
|
||||
}
|
||||
|
||||
if !reflect.DeepEqual(pod2.Labels, map[string]string{"test": "yes"}) {
|
||||
t.Errorf("expected [test:yes], got %v", pod2.Labels)
|
||||
}
|
||||
|
||||
if pod2.Spec.RestartPolicy != "Always" {
|
||||
t.Errorf("expected Always, got %q", pod2.Spec.RestartPolicy)
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -37,7 +37,6 @@ import (
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/util/dump"
|
||||
"k8s.io/apimachinery/pkg/util/intstr"
|
||||
"k8s.io/klog/v2"
|
||||
|
||||
kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm"
|
||||
kubeadmconstants "k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
||||
@ -190,9 +189,9 @@ func PatchStaticPod(pod *v1.Pod, patchesDir string, output io.Writer) (*v1.Pod,
|
||||
return pod, err
|
||||
}
|
||||
|
||||
obj, err := kubeadmutil.UnmarshalFromYaml(patchTarget.Data, v1.SchemeGroupVersion)
|
||||
obj, err := kubeadmutil.UniversalUnmarshal(patchTarget.Data)
|
||||
if err != nil {
|
||||
return pod, errors.Wrap(err, "failed to unmarshal patched manifest from YAML")
|
||||
return pod, errors.Wrap(err, "failed to unmarshal patched manifest")
|
||||
}
|
||||
|
||||
pod2, ok := obj.(*v1.Pod)
|
||||
@ -233,12 +232,15 @@ func ReadStaticPodFromDisk(manifestPath string) (*v1.Pod, error) {
|
||||
return &v1.Pod{}, errors.Wrapf(err, "failed to read manifest for %q", manifestPath)
|
||||
}
|
||||
|
||||
obj, err := kubeadmutil.UnmarshalFromYaml(buf, v1.SchemeGroupVersion)
|
||||
obj, err := kubeadmutil.UniversalUnmarshal(buf)
|
||||
if err != nil {
|
||||
return &v1.Pod{}, errors.Errorf("failed to unmarshal manifest for %q from YAML: %v", manifestPath, err)
|
||||
return &v1.Pod{}, errors.Errorf("failed to unmarshal manifest for %q: %v", manifestPath, err)
|
||||
}
|
||||
|
||||
pod := obj.(*v1.Pod)
|
||||
pod, ok := obj.(*v1.Pod)
|
||||
if !ok {
|
||||
return &v1.Pod{}, errors.Errorf("failed to parse Pod object defined in %q", manifestPath)
|
||||
}
|
||||
|
||||
return pod, nil
|
||||
}
|
||||
@ -354,14 +356,14 @@ func GetEtcdProbeEndpoint(cfg *kubeadmapi.Etcd, isIPv6 bool) (string, int32, v1.
|
||||
}
|
||||
|
||||
// ManifestFilesAreEqual compares 2 files. It returns true if their contents are equal, false otherwise
|
||||
func ManifestFilesAreEqual(path1, path2 string) (bool, error) {
|
||||
func ManifestFilesAreEqual(path1, path2 string) (bool, string, error) {
|
||||
pod1, err := ReadStaticPodFromDisk(path1)
|
||||
if err != nil {
|
||||
return false, err
|
||||
return false, "", err
|
||||
}
|
||||
pod2, err := ReadStaticPodFromDisk(path2)
|
||||
if err != nil {
|
||||
return false, err
|
||||
return false, "", err
|
||||
}
|
||||
|
||||
hasher := md5.New()
|
||||
@ -370,10 +372,9 @@ func ManifestFilesAreEqual(path1, path2 string) (bool, error) {
|
||||
DeepHashObject(hasher, pod2)
|
||||
hash2 := hasher.Sum(nil)[0:]
|
||||
if bytes.Equal(hash1, hash2) {
|
||||
return true, nil
|
||||
return true, "", nil
|
||||
}
|
||||
klog.V(4).Infof("Pod manifest files diff:\n%s\n", cmp.Diff(pod1, pod2))
|
||||
return false, nil
|
||||
return false, cmp.Diff(pod2, pod1), nil
|
||||
}
|
||||
|
||||
// getProbeAddress returns a valid probe address.
|
||||
|
@ -23,6 +23,7 @@ import (
|
||||
"reflect"
|
||||
"sort"
|
||||
"strconv"
|
||||
"strings"
|
||||
"testing"
|
||||
|
||||
v1 "k8s.io/api/core/v1"
|
||||
@ -652,6 +653,22 @@ spec:
|
||||
- image: gcr.io/google_containers/etcd-amd64:3.1.11
|
||||
status: {}
|
||||
`
|
||||
invalidWithDefaultFields = `
|
||||
apiVersion: v1
|
||||
kind: Pod
|
||||
metadata:
|
||||
labels:
|
||||
tier: control-plane
|
||||
component: etcd
|
||||
name: etcd
|
||||
namespace: kube-system
|
||||
spec:
|
||||
containers:
|
||||
- image: gcr.io/google_containers/etcd-amd64:3.1.11
|
||||
restartPolicy: "Always"
|
||||
status: {}
|
||||
`
|
||||
|
||||
validPod2 = `
|
||||
apiVersion: v1
|
||||
kind: Pod
|
||||
@ -729,6 +746,7 @@ func TestManifestFilesAreEqual(t *testing.T) {
|
||||
description string
|
||||
podYamls []string
|
||||
expectedResult bool
|
||||
expectedDiff string
|
||||
expectErr bool
|
||||
}{
|
||||
{
|
||||
@ -748,6 +766,18 @@ func TestManifestFilesAreEqual(t *testing.T) {
|
||||
podYamls: []string{validPod, validPod2},
|
||||
expectedResult: false,
|
||||
expectErr: false,
|
||||
expectedDiff: string(`
|
||||
- "2",
|
||||
+ "1",`),
|
||||
},
|
||||
{
|
||||
description: "manifests are not equal for adding new defaults",
|
||||
podYamls: []string{validPod, invalidWithDefaultFields},
|
||||
expectedResult: false,
|
||||
expectErr: false,
|
||||
expectedDiff: string(`
|
||||
- RestartPolicy: "Always",
|
||||
+ RestartPolicy: "",`),
|
||||
},
|
||||
{
|
||||
description: "first manifest doesn't exist",
|
||||
@ -780,7 +810,7 @@ func TestManifestFilesAreEqual(t *testing.T) {
|
||||
}
|
||||
|
||||
// compare them
|
||||
result, actualErr := ManifestFilesAreEqual(filepath.Join(tmpdir, "0.yaml"), filepath.Join(tmpdir, "1.yaml"))
|
||||
result, diff, actualErr := ManifestFilesAreEqual(filepath.Join(tmpdir, "0.yaml"), filepath.Join(tmpdir, "1.yaml"))
|
||||
if result != rt.expectedResult {
|
||||
t.Errorf(
|
||||
"ManifestFilesAreEqual failed\n%s\nexpected result: %t\nactual result: %t",
|
||||
@ -798,6 +828,14 @@ func TestManifestFilesAreEqual(t *testing.T) {
|
||||
actualErr,
|
||||
)
|
||||
}
|
||||
if !strings.Contains(diff, rt.expectedDiff) {
|
||||
t.Errorf(
|
||||
"ManifestFilesAreEqual diff doesn't expected\n%s\n\texpected diff: %s\nactual diff: %s",
|
||||
rt.description,
|
||||
rt.expectedDiff,
|
||||
diff,
|
||||
)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user