mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-05 02:09:56 +00:00
Refactor cloud route interface, to avoid assumption that routes are named
This commit is contained in:
parent
19e574c170
commit
a3b43a36fd
@ -119,6 +119,7 @@ type Instances interface {
|
|||||||
// Route is a representation of an advanced routing rule.
|
// Route is a representation of an advanced routing rule.
|
||||||
type Route struct {
|
type Route struct {
|
||||||
// Name is the name of the routing rule in the cloud-provider.
|
// Name is the name of the routing rule in the cloud-provider.
|
||||||
|
// It will be ignored in a Create (although nameHint may influence it)
|
||||||
Name string
|
Name string
|
||||||
// TargetInstance is the name of the instance as specified in routing rules
|
// TargetInstance is the name of the instance as specified in routing rules
|
||||||
// for the cloud-provider (in gce: the Instance Name).
|
// for the cloud-provider (in gce: the Instance Name).
|
||||||
@ -126,18 +127,19 @@ type Route struct {
|
|||||||
// Destination CIDR is the CIDR format IP range that this routing rule
|
// Destination CIDR is the CIDR format IP range that this routing rule
|
||||||
// applies to.
|
// applies to.
|
||||||
DestinationCIDR string
|
DestinationCIDR string
|
||||||
// Description is a free-form string. It can be useful for tagging Routes.
|
|
||||||
Description string
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Routes is an abstract, pluggable interface for advanced routing rules.
|
// Routes is an abstract, pluggable interface for advanced routing rules.
|
||||||
type Routes interface {
|
type Routes interface {
|
||||||
// List all routes that match the filter
|
// List all managed routes that belong to the specified clusterName
|
||||||
ListRoutes(filter string) ([]*Route, error)
|
ListRoutes(clusterName string) ([]*Route, error)
|
||||||
// Create the described route
|
// Create the described managed route
|
||||||
CreateRoute(route *Route) error
|
// route.Name will be ignored, although the cloud-provider may use nameHint
|
||||||
// Delete the specified route
|
// to create a more user-meaningful name.
|
||||||
DeleteRoute(name string) error
|
CreateRoute(clusterName string, nameHint string, route *Route) error
|
||||||
|
// Delete the specified managed route
|
||||||
|
// Route should be as returned by ListRoutes
|
||||||
|
DeleteRoute(clusterName string, route *Route) error
|
||||||
}
|
}
|
||||||
|
|
||||||
var InstanceNotFound = errors.New("instance not found")
|
var InstanceNotFound = errors.New("instance not found")
|
||||||
|
@ -58,11 +58,16 @@ type FakeCloud struct {
|
|||||||
ExternalIP net.IP
|
ExternalIP net.IP
|
||||||
Balancers []FakeBalancer
|
Balancers []FakeBalancer
|
||||||
UpdateCalls []FakeUpdateBalancerCall
|
UpdateCalls []FakeUpdateBalancerCall
|
||||||
RouteMap map[string]*cloudprovider.Route
|
RouteMap map[string]*FakeRoute
|
||||||
Lock sync.Mutex
|
Lock sync.Mutex
|
||||||
cloudprovider.Zone
|
cloudprovider.Zone
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type FakeRoute struct {
|
||||||
|
ClusterName string
|
||||||
|
Route cloudprovider.Route
|
||||||
|
}
|
||||||
|
|
||||||
func (f *FakeCloud) addCall(desc string) {
|
func (f *FakeCloud) addCall(desc string) {
|
||||||
f.Calls = append(f.Calls, desc)
|
f.Calls = append(f.Calls, desc)
|
||||||
}
|
}
|
||||||
@ -198,35 +203,42 @@ func (f *FakeCloud) GetNodeResources(name string) (*api.NodeResources, error) {
|
|||||||
return f.NodeResources, f.Err
|
return f.NodeResources, f.Err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *FakeCloud) ListRoutes(filter string) ([]*cloudprovider.Route, error) {
|
func (f *FakeCloud) ListRoutes(clusterName string) ([]*cloudprovider.Route, error) {
|
||||||
f.Lock.Lock()
|
f.Lock.Lock()
|
||||||
defer f.Lock.Unlock()
|
defer f.Lock.Unlock()
|
||||||
f.addCall("list-routes")
|
f.addCall("list-routes")
|
||||||
var routes []*cloudprovider.Route
|
var routes []*cloudprovider.Route
|
||||||
for _, route := range f.RouteMap {
|
for _, fakeRoute := range f.RouteMap {
|
||||||
if match, _ := regexp.MatchString(filter, route.Name); match {
|
if clusterName == fakeRoute.ClusterName {
|
||||||
routes = append(routes, route)
|
routeCopy := fakeRoute.Route
|
||||||
|
routes = append(routes, &routeCopy)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return routes, f.Err
|
return routes, f.Err
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *FakeCloud) CreateRoute(route *cloudprovider.Route) error {
|
func (f *FakeCloud) CreateRoute(clusterName string, nameHint string, route *cloudprovider.Route) error {
|
||||||
f.Lock.Lock()
|
f.Lock.Lock()
|
||||||
defer f.Lock.Unlock()
|
defer f.Lock.Unlock()
|
||||||
f.addCall("create-route")
|
f.addCall("create-route")
|
||||||
if _, exists := f.RouteMap[route.Name]; exists {
|
name := clusterName + "-" + nameHint
|
||||||
f.Err = fmt.Errorf("route with name %q already exists")
|
if _, exists := f.RouteMap[name]; exists {
|
||||||
|
f.Err = fmt.Errorf("route %q already exists", name)
|
||||||
return f.Err
|
return f.Err
|
||||||
}
|
}
|
||||||
f.RouteMap[route.Name] = route
|
fakeRoute := FakeRoute{}
|
||||||
|
fakeRoute.Route = *route
|
||||||
|
fakeRoute.Route.Name = name
|
||||||
|
fakeRoute.ClusterName = clusterName
|
||||||
|
f.RouteMap[name] = &fakeRoute
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (f *FakeCloud) DeleteRoute(name string) error {
|
func (f *FakeCloud) DeleteRoute(clusterName string, route *cloudprovider.Route) error {
|
||||||
f.Lock.Lock()
|
f.Lock.Lock()
|
||||||
defer f.Lock.Unlock()
|
defer f.Lock.Unlock()
|
||||||
f.addCall("delete-route")
|
f.addCall("delete-route")
|
||||||
|
name := route.Name
|
||||||
if _, exists := f.RouteMap[name]; !exists {
|
if _, exists := f.RouteMap[name]; !exists {
|
||||||
f.Err = fmt.Errorf("no route found with name %q", name)
|
f.Err = fmt.Errorf("no route found with name %q", name)
|
||||||
return f.Err
|
return f.Err
|
||||||
|
@ -49,6 +49,8 @@ const (
|
|||||||
INTERNAL_IP_METADATA_URL = "http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip"
|
INTERNAL_IP_METADATA_URL = "http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
const k8sNodeRouteTag = "k8s-node-route"
|
||||||
|
|
||||||
// GCECloud is an implementation of Interface, TCPLoadBalancer and Instances for Google Compute Engine.
|
// GCECloud is an implementation of Interface, TCPLoadBalancer and Instances for Google Compute Engine.
|
||||||
type GCECloud struct {
|
type GCECloud struct {
|
||||||
service *compute.Service
|
service *compute.Service
|
||||||
@ -631,11 +633,19 @@ func getMetadataValue(metadata *compute.Metadata, key string) (string, bool) {
|
|||||||
return "", false
|
return "", false
|
||||||
}
|
}
|
||||||
|
|
||||||
func (gce *GCECloud) ListRoutes(filter string) ([]*cloudprovider.Route, error) {
|
func truncateClusterName(clusterName string) string {
|
||||||
listCall := gce.service.Routes.List(gce.projectID)
|
if len(clusterName) > 26 {
|
||||||
if len(filter) > 0 {
|
return clusterName[:26]
|
||||||
listCall = listCall.Filter("name eq " + filter)
|
|
||||||
}
|
}
|
||||||
|
return clusterName
|
||||||
|
}
|
||||||
|
|
||||||
|
func (gce *GCECloud) ListRoutes(clusterName string) ([]*cloudprovider.Route, error) {
|
||||||
|
listCall := gce.service.Routes.List(gce.projectID)
|
||||||
|
|
||||||
|
prefix := truncateClusterName(clusterName)
|
||||||
|
listCall = listCall.Filter("name eq " + prefix + "-.*")
|
||||||
|
|
||||||
res, err := listCall.Do()
|
res, err := listCall.Do()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@ -645,21 +655,32 @@ func (gce *GCECloud) ListRoutes(filter string) ([]*cloudprovider.Route, error) {
|
|||||||
if path.Base(r.Network) != gce.networkName {
|
if path.Base(r.Network) != gce.networkName {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
// Not managed if route description != "k8s-node-route"
|
||||||
|
if r.Description != k8sNodeRouteTag {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
// Not managed if route name doesn't start with <clusterName>
|
||||||
|
if !strings.HasPrefix(r.Name, prefix) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
target := path.Base(r.NextHopInstance)
|
target := path.Base(r.NextHopInstance)
|
||||||
routes = append(routes, &cloudprovider.Route{r.Name, target, r.DestRange, r.Description})
|
routes = append(routes, &cloudprovider.Route{r.Name, target, r.DestRange})
|
||||||
}
|
}
|
||||||
return routes, nil
|
return routes, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (gce *GCECloud) CreateRoute(route *cloudprovider.Route) error {
|
func (gce *GCECloud) CreateRoute(clusterName string, nameHint string, route *cloudprovider.Route) error {
|
||||||
|
routeName := truncateClusterName(clusterName) + "-" + nameHint
|
||||||
|
|
||||||
instanceName := canonicalizeInstanceName(route.TargetInstance)
|
instanceName := canonicalizeInstanceName(route.TargetInstance)
|
||||||
insertOp, err := gce.service.Routes.Insert(gce.projectID, &compute.Route{
|
insertOp, err := gce.service.Routes.Insert(gce.projectID, &compute.Route{
|
||||||
Name: route.Name,
|
Name: routeName,
|
||||||
DestRange: route.DestinationCIDR,
|
DestRange: route.DestinationCIDR,
|
||||||
NextHopInstance: fmt.Sprintf("zones/%s/instances/%s", gce.zone, instanceName),
|
NextHopInstance: fmt.Sprintf("zones/%s/instances/%s", gce.zone, instanceName),
|
||||||
Network: fmt.Sprintf("global/networks/%s", gce.networkName),
|
Network: fmt.Sprintf("global/networks/%s", gce.networkName),
|
||||||
Priority: 1000,
|
Priority: 1000,
|
||||||
Description: route.Description,
|
Description: k8sNodeRouteTag,
|
||||||
}).Do()
|
}).Do()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@ -667,9 +688,8 @@ func (gce *GCECloud) CreateRoute(route *cloudprovider.Route) error {
|
|||||||
return gce.waitForGlobalOp(insertOp)
|
return gce.waitForGlobalOp(insertOp)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (gce *GCECloud) DeleteRoute(name string) error {
|
func (gce *GCECloud) DeleteRoute(clusterName string, route *cloudprovider.Route) error {
|
||||||
instanceName := canonicalizeInstanceName(name)
|
deleteOp, err := gce.service.Routes.Delete(gce.projectID, route.Name).Do()
|
||||||
deleteOp, err := gce.service.Routes.Delete(gce.projectID, instanceName).Do()
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
@ -19,7 +19,6 @@ package routecontroller
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"net"
|
"net"
|
||||||
"strings"
|
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/GoogleCloudPlatform/kubernetes/pkg/api"
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/api"
|
||||||
@ -38,8 +37,6 @@ type RouteController struct {
|
|||||||
clusterCIDR *net.IPNet
|
clusterCIDR *net.IPNet
|
||||||
}
|
}
|
||||||
|
|
||||||
const k8sNodeRouteTag = "k8s-node-route"
|
|
||||||
|
|
||||||
func New(routes cloudprovider.Routes, kubeClient client.Interface, clusterName string, clusterCIDR *net.IPNet) *RouteController {
|
func New(routes cloudprovider.Routes, kubeClient client.Interface, clusterName string, clusterCIDR *net.IPNet) *RouteController {
|
||||||
return &RouteController{
|
return &RouteController{
|
||||||
routes: routes,
|
routes: routes,
|
||||||
@ -58,7 +55,7 @@ func (rc *RouteController) Run(syncPeriod time.Duration) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (rc *RouteController) reconcileNodeRoutes() error {
|
func (rc *RouteController) reconcileNodeRoutes() error {
|
||||||
routeList, err := rc.routes.ListRoutes(rc.truncatedClusterName() + "-.*")
|
routeList, err := rc.routes.ListRoutes(rc.clusterName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("error listing routes: %v", err)
|
return fmt.Errorf("error listing routes: %v", err)
|
||||||
}
|
}
|
||||||
@ -85,16 +82,15 @@ func (rc *RouteController) reconcile(nodes []api.Node, routes []*cloudprovider.R
|
|||||||
if r == nil || r.DestinationCIDR != node.Spec.PodCIDR {
|
if r == nil || r.DestinationCIDR != node.Spec.PodCIDR {
|
||||||
// If not, create the route.
|
// If not, create the route.
|
||||||
route := &cloudprovider.Route{
|
route := &cloudprovider.Route{
|
||||||
Name: rc.truncatedClusterName() + "-" + string(node.UID),
|
|
||||||
TargetInstance: node.Name,
|
TargetInstance: node.Name,
|
||||||
DestinationCIDR: node.Spec.PodCIDR,
|
DestinationCIDR: node.Spec.PodCIDR,
|
||||||
Description: k8sNodeRouteTag,
|
|
||||||
}
|
}
|
||||||
go func(route *cloudprovider.Route) {
|
nameHint := string(node.UID)
|
||||||
if err := rc.routes.CreateRoute(route); err != nil {
|
go func(nameHint string, route *cloudprovider.Route) {
|
||||||
glog.Errorf("Could not create route %s: %v", route.Name, err)
|
if err := rc.routes.CreateRoute(rc.clusterName, nameHint, route); err != nil {
|
||||||
|
glog.Errorf("Could not create route %s %s: %v", nameHint, route.DestinationCIDR, err)
|
||||||
}
|
}
|
||||||
}(route)
|
}(nameHint, route)
|
||||||
}
|
}
|
||||||
nodeCIDRs[node.Name] = node.Spec.PodCIDR
|
nodeCIDRs[node.Name] = node.Spec.PodCIDR
|
||||||
}
|
}
|
||||||
@ -103,24 +99,17 @@ func (rc *RouteController) reconcile(nodes []api.Node, routes []*cloudprovider.R
|
|||||||
// Check if this route applies to a node we know about & has correct CIDR.
|
// Check if this route applies to a node we know about & has correct CIDR.
|
||||||
if nodeCIDRs[route.TargetInstance] != route.DestinationCIDR {
|
if nodeCIDRs[route.TargetInstance] != route.DestinationCIDR {
|
||||||
// Delete the route.
|
// Delete the route.
|
||||||
go func(routeName string) {
|
go func(route *cloudprovider.Route) {
|
||||||
if err := rc.routes.DeleteRoute(routeName); err != nil {
|
if err := rc.routes.DeleteRoute(rc.clusterName, route); err != nil {
|
||||||
glog.Errorf("Could not delete route %s: %v", routeName, err)
|
glog.Errorf("Could not delete route %s %s: %v", route.Name, route.DestinationCIDR, err)
|
||||||
}
|
}
|
||||||
}(route.Name)
|
}(route)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (rc *RouteController) truncatedClusterName() string {
|
|
||||||
if len(rc.clusterName) > 26 {
|
|
||||||
return rc.clusterName[:26]
|
|
||||||
}
|
|
||||||
return rc.clusterName
|
|
||||||
}
|
|
||||||
|
|
||||||
func (rc *RouteController) isResponsibleForRoute(route *cloudprovider.Route) bool {
|
func (rc *RouteController) isResponsibleForRoute(route *cloudprovider.Route) bool {
|
||||||
_, cidr, err := net.ParseCIDR(route.DestinationCIDR)
|
_, cidr, err := net.ParseCIDR(route.DestinationCIDR)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -135,13 +124,5 @@ func (rc *RouteController) isResponsibleForRoute(route *cloudprovider.Route) boo
|
|||||||
if !rc.clusterCIDR.Contains(cidr.IP) || !rc.clusterCIDR.Contains(lastIP) {
|
if !rc.clusterCIDR.Contains(cidr.IP) || !rc.clusterCIDR.Contains(lastIP) {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
// Not responsible if route name doesn't start with <clusterName>
|
|
||||||
if !strings.HasPrefix(route.Name, rc.clusterName) {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
// Not responsible if route description != "k8s-node-route"
|
|
||||||
if route.Description != k8sNodeRouteTag {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
@ -33,27 +33,20 @@ func TestIsResponsibleForRoute(t *testing.T) {
|
|||||||
clusterCIDR string
|
clusterCIDR string
|
||||||
routeName string
|
routeName string
|
||||||
routeCIDR string
|
routeCIDR string
|
||||||
routeDescription string
|
|
||||||
expectedResponsible bool
|
expectedResponsible bool
|
||||||
}{
|
}{
|
||||||
// Routes that belong to this cluster
|
// Routes that belong to this cluster
|
||||||
{"10.244.0.0/16", myClusterRoute, "10.244.0.0/24", "k8s-node-route", true},
|
{"10.244.0.0/16", myClusterRoute, "10.244.0.0/24", true},
|
||||||
{"10.244.0.0/16", myClusterRoute, "10.244.10.0/24", "k8s-node-route", true},
|
{"10.244.0.0/16", myClusterRoute, "10.244.10.0/24", true},
|
||||||
{"10.244.0.0/16", myClusterRoute, "10.244.255.0/24", "k8s-node-route", true},
|
{"10.244.0.0/16", myClusterRoute, "10.244.255.0/24", true},
|
||||||
{"10.244.0.0/14", myClusterRoute, "10.244.0.0/24", "k8s-node-route", true},
|
{"10.244.0.0/14", myClusterRoute, "10.244.0.0/24", true},
|
||||||
{"10.244.0.0/14", myClusterRoute, "10.247.255.0/24", "k8s-node-route", true},
|
{"10.244.0.0/14", myClusterRoute, "10.247.255.0/24", true},
|
||||||
// Routes inside our cidr, but not named how we would have named them
|
|
||||||
{"10.244.0.0/16", "background-cluster-route", "10.244.0.0/16", "k8s-node-route", false},
|
|
||||||
{"10.244.0.0/16", "special-single-route", "10.244.12.34/32", "k8s-node-route", false},
|
|
||||||
// Routes inside our cidr, but not tagged how we would have tagged them in the description
|
|
||||||
{"10.244.0.0/16", "my-awesome-cluster-background", "10.244.0.0/16", "", false},
|
|
||||||
{"10.244.0.0/16", "my-awesome-cluster-single-route", "10.244.12.34/32", "this is a route", false},
|
|
||||||
// Routes that match our naming/tagging scheme, but are outside our cidr
|
// Routes that match our naming/tagging scheme, but are outside our cidr
|
||||||
{"10.244.0.0/16", myClusterRoute, "10.224.0.0/24", "k8s-node-route", false},
|
{"10.244.0.0/16", myClusterRoute, "10.224.0.0/24", false},
|
||||||
{"10.244.0.0/16", myClusterRoute, "10.0.10.0/24", "k8s-node-route", false},
|
{"10.244.0.0/16", myClusterRoute, "10.0.10.0/24", false},
|
||||||
{"10.244.0.0/16", myClusterRoute, "10.255.255.0/24", "k8s-node-route", false},
|
{"10.244.0.0/16", myClusterRoute, "10.255.255.0/24", false},
|
||||||
{"10.244.0.0/14", myClusterRoute, "10.248.0.0/24", "k8s-node-route", false},
|
{"10.244.0.0/14", myClusterRoute, "10.248.0.0/24", false},
|
||||||
{"10.244.0.0/14", myClusterRoute, "10.243.255.0/24", "k8s-node-route", false},
|
{"10.244.0.0/14", myClusterRoute, "10.243.255.0/24", false},
|
||||||
}
|
}
|
||||||
for i, testCase := range testCases {
|
for i, testCase := range testCases {
|
||||||
_, cidr, err := net.ParseCIDR(testCase.clusterCIDR)
|
_, cidr, err := net.ParseCIDR(testCase.clusterCIDR)
|
||||||
@ -65,7 +58,6 @@ func TestIsResponsibleForRoute(t *testing.T) {
|
|||||||
Name: testCase.routeName,
|
Name: testCase.routeName,
|
||||||
TargetInstance: "doesnt-matter-for-this-test",
|
TargetInstance: "doesnt-matter-for-this-test",
|
||||||
DestinationCIDR: testCase.routeCIDR,
|
DestinationCIDR: testCase.routeCIDR,
|
||||||
Description: testCase.routeDescription,
|
|
||||||
}
|
}
|
||||||
if resp := rc.isResponsibleForRoute(route); resp != testCase.expectedResponsible {
|
if resp := rc.isResponsibleForRoute(route); resp != testCase.expectedResponsible {
|
||||||
t.Errorf("%d. isResponsibleForRoute() = %t; want %t", i, resp, testCase.expectedResponsible)
|
t.Errorf("%d. isResponsibleForRoute() = %t; want %t", i, resp, testCase.expectedResponsible)
|
||||||
@ -87,12 +79,12 @@ func TestReconcile(t *testing.T) {
|
|||||||
{ObjectMeta: api.ObjectMeta{Name: "node-2", UID: "02"}, Spec: api.NodeSpec{PodCIDR: "10.120.1.0/24"}},
|
{ObjectMeta: api.ObjectMeta{Name: "node-2", UID: "02"}, Spec: api.NodeSpec{PodCIDR: "10.120.1.0/24"}},
|
||||||
},
|
},
|
||||||
initialRoutes: []*cloudprovider.Route{
|
initialRoutes: []*cloudprovider.Route{
|
||||||
{cluster + "-01", "node-1", "10.120.0.0/24", "k8s-node-route"},
|
{cluster + "-01", "node-1", "10.120.0.0/24"},
|
||||||
{cluster + "-02", "node-2", "10.120.1.0/24", "k8s-node-route"},
|
{cluster + "-02", "node-2", "10.120.1.0/24"},
|
||||||
},
|
},
|
||||||
expectedRoutes: []*cloudprovider.Route{
|
expectedRoutes: []*cloudprovider.Route{
|
||||||
{cluster + "-01", "node-1", "10.120.0.0/24", "k8s-node-route"},
|
{cluster + "-01", "node-1", "10.120.0.0/24"},
|
||||||
{cluster + "-02", "node-2", "10.120.1.0/24", "k8s-node-route"},
|
{cluster + "-02", "node-2", "10.120.1.0/24"},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
// 2 nodes, one route already there
|
// 2 nodes, one route already there
|
||||||
@ -102,11 +94,11 @@ func TestReconcile(t *testing.T) {
|
|||||||
{ObjectMeta: api.ObjectMeta{Name: "node-2", UID: "02"}, Spec: api.NodeSpec{PodCIDR: "10.120.1.0/24"}},
|
{ObjectMeta: api.ObjectMeta{Name: "node-2", UID: "02"}, Spec: api.NodeSpec{PodCIDR: "10.120.1.0/24"}},
|
||||||
},
|
},
|
||||||
initialRoutes: []*cloudprovider.Route{
|
initialRoutes: []*cloudprovider.Route{
|
||||||
{cluster + "-01", "node-1", "10.120.0.0/24", "k8s-node-route"},
|
{cluster + "-01", "node-1", "10.120.0.0/24"},
|
||||||
},
|
},
|
||||||
expectedRoutes: []*cloudprovider.Route{
|
expectedRoutes: []*cloudprovider.Route{
|
||||||
{cluster + "-01", "node-1", "10.120.0.0/24", "k8s-node-route"},
|
{cluster + "-01", "node-1", "10.120.0.0/24"},
|
||||||
{cluster + "-02", "node-2", "10.120.1.0/24", "k8s-node-route"},
|
{cluster + "-02", "node-2", "10.120.1.0/24"},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
// 2 nodes, no routes yet
|
// 2 nodes, no routes yet
|
||||||
@ -117,8 +109,8 @@ func TestReconcile(t *testing.T) {
|
|||||||
},
|
},
|
||||||
initialRoutes: []*cloudprovider.Route{},
|
initialRoutes: []*cloudprovider.Route{},
|
||||||
expectedRoutes: []*cloudprovider.Route{
|
expectedRoutes: []*cloudprovider.Route{
|
||||||
{cluster + "-01", "node-1", "10.120.0.0/24", "k8s-node-route"},
|
{cluster + "-01", "node-1", "10.120.0.0/24"},
|
||||||
{cluster + "-02", "node-2", "10.120.1.0/24", "k8s-node-route"},
|
{cluster + "-02", "node-2", "10.120.1.0/24"},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
// 2 nodes, a few too many routes
|
// 2 nodes, a few too many routes
|
||||||
@ -128,14 +120,14 @@ func TestReconcile(t *testing.T) {
|
|||||||
{ObjectMeta: api.ObjectMeta{Name: "node-2", UID: "02"}, Spec: api.NodeSpec{PodCIDR: "10.120.1.0/24"}},
|
{ObjectMeta: api.ObjectMeta{Name: "node-2", UID: "02"}, Spec: api.NodeSpec{PodCIDR: "10.120.1.0/24"}},
|
||||||
},
|
},
|
||||||
initialRoutes: []*cloudprovider.Route{
|
initialRoutes: []*cloudprovider.Route{
|
||||||
{cluster + "-01", "node-1", "10.120.0.0/24", "k8s-node-route"},
|
{cluster + "-01", "node-1", "10.120.0.0/24"},
|
||||||
{cluster + "-02", "node-2", "10.120.1.0/24", "k8s-node-route"},
|
{cluster + "-02", "node-2", "10.120.1.0/24"},
|
||||||
{cluster + "-03", "node-3", "10.120.2.0/24", "k8s-node-route"},
|
{cluster + "-03", "node-3", "10.120.2.0/24"},
|
||||||
{cluster + "-04", "node-4", "10.120.3.0/24", "k8s-node-route"},
|
{cluster + "-04", "node-4", "10.120.3.0/24"},
|
||||||
},
|
},
|
||||||
expectedRoutes: []*cloudprovider.Route{
|
expectedRoutes: []*cloudprovider.Route{
|
||||||
{cluster + "-01", "node-1", "10.120.0.0/24", "k8s-node-route"},
|
{cluster + "-01", "node-1", "10.120.0.0/24"},
|
||||||
{cluster + "-02", "node-2", "10.120.1.0/24", "k8s-node-route"},
|
{cluster + "-02", "node-2", "10.120.1.0/24"},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
// 2 nodes, 2 routes, but only 1 is right
|
// 2 nodes, 2 routes, but only 1 is right
|
||||||
@ -145,19 +137,22 @@ func TestReconcile(t *testing.T) {
|
|||||||
{ObjectMeta: api.ObjectMeta{Name: "node-2", UID: "02"}, Spec: api.NodeSpec{PodCIDR: "10.120.1.0/24"}},
|
{ObjectMeta: api.ObjectMeta{Name: "node-2", UID: "02"}, Spec: api.NodeSpec{PodCIDR: "10.120.1.0/24"}},
|
||||||
},
|
},
|
||||||
initialRoutes: []*cloudprovider.Route{
|
initialRoutes: []*cloudprovider.Route{
|
||||||
{cluster + "-01", "node-1", "10.120.0.0/24", "k8s-node-route"},
|
{cluster + "-01", "node-1", "10.120.0.0/24"},
|
||||||
{cluster + "-03", "node-3", "10.120.2.0/24", "k8s-node-route"},
|
{cluster + "-03", "node-3", "10.120.2.0/24"},
|
||||||
},
|
},
|
||||||
expectedRoutes: []*cloudprovider.Route{
|
expectedRoutes: []*cloudprovider.Route{
|
||||||
{cluster + "-01", "node-1", "10.120.0.0/24", "k8s-node-route"},
|
{cluster + "-01", "node-1", "10.120.0.0/24"},
|
||||||
{cluster + "-02", "node-2", "10.120.1.0/24", "k8s-node-route"},
|
{cluster + "-02", "node-2", "10.120.1.0/24"},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
for i, testCase := range testCases {
|
for i, testCase := range testCases {
|
||||||
cloud := &fake_cloud.FakeCloud{RouteMap: make(map[string]*cloudprovider.Route)}
|
cloud := &fake_cloud.FakeCloud{RouteMap: make(map[string]*fake_cloud.FakeRoute)}
|
||||||
for _, route := range testCase.initialRoutes {
|
for _, route := range testCase.initialRoutes {
|
||||||
cloud.RouteMap[route.Name] = route
|
fakeRoute := &fake_cloud.FakeRoute{}
|
||||||
|
fakeRoute.ClusterName = cluster
|
||||||
|
fakeRoute.Route = *route
|
||||||
|
cloud.RouteMap[route.Name] = fakeRoute
|
||||||
}
|
}
|
||||||
routes, ok := cloud.Routes()
|
routes, ok := cloud.Routes()
|
||||||
if !ok {
|
if !ok {
|
||||||
@ -177,7 +172,7 @@ func TestReconcile(t *testing.T) {
|
|||||||
for {
|
for {
|
||||||
select {
|
select {
|
||||||
case <-tick.C:
|
case <-tick.C:
|
||||||
if finalRoutes, err = routes.ListRoutes(""); err == nil && routeListEqual(finalRoutes, testCase.expectedRoutes) {
|
if finalRoutes, err = routes.ListRoutes(cluster); err == nil && routeListEqual(finalRoutes, testCase.expectedRoutes) {
|
||||||
break poll
|
break poll
|
||||||
}
|
}
|
||||||
case <-timeoutChan:
|
case <-timeoutChan:
|
||||||
|
Loading…
Reference in New Issue
Block a user