mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-23 19:56:01 +00:00
The unit test TestWriteKubeletConfigFiles fails on Windows because the file not found error message is different on Windows.
209 lines
6.5 KiB
Go
209 lines
6.5 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package upgrade
|
|
|
|
import (
|
|
"os"
|
|
"path/filepath"
|
|
"regexp"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm"
|
|
"k8s.io/kubernetes/cmd/kubeadm/app/componentconfigs"
|
|
"k8s.io/kubernetes/cmd/kubeadm/app/constants"
|
|
"k8s.io/kubernetes/cmd/kubeadm/app/preflight"
|
|
testutil "k8s.io/kubernetes/cmd/kubeadm/test"
|
|
)
|
|
|
|
func TestMoveFiles(t *testing.T) {
|
|
tmpdir := testutil.SetupTempDir(t)
|
|
defer os.RemoveAll(tmpdir)
|
|
os.Chmod(tmpdir, 0766)
|
|
|
|
certPath := filepath.Join(tmpdir, constants.APIServerCertName)
|
|
certFile, err := os.OpenFile(certPath, os.O_CREATE|os.O_TRUNC|os.O_WRONLY, 0666)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create cert file %s: %v", certPath, err)
|
|
}
|
|
certFile.Close()
|
|
|
|
keyPath := filepath.Join(tmpdir, constants.APIServerKeyName)
|
|
keyFile, err := os.OpenFile(keyPath, os.O_CREATE|os.O_TRUNC|os.O_WRONLY, 0666)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create key file %s: %v", keyPath, err)
|
|
}
|
|
keyFile.Close()
|
|
|
|
subDir := filepath.Join(tmpdir, "expired")
|
|
if err := os.Mkdir(subDir, 0766); err != nil {
|
|
t.Fatalf("Failed to create backup directory %s: %v", subDir, err)
|
|
}
|
|
|
|
filesToMove := map[string]string{
|
|
filepath.Join(tmpdir, constants.APIServerCertName): filepath.Join(subDir, constants.APIServerCertName),
|
|
filepath.Join(tmpdir, constants.APIServerKeyName): filepath.Join(subDir, constants.APIServerKeyName),
|
|
}
|
|
|
|
if err := moveFiles(filesToMove); err != nil {
|
|
t.Fatalf("Failed to move files %v: %v", filesToMove, err)
|
|
}
|
|
}
|
|
|
|
func TestRollbackFiles(t *testing.T) {
|
|
tmpdir := testutil.SetupTempDir(t)
|
|
defer os.RemoveAll(tmpdir)
|
|
os.Chmod(tmpdir, 0766)
|
|
|
|
subDir := filepath.Join(tmpdir, "expired")
|
|
if err := os.Mkdir(subDir, 0766); err != nil {
|
|
t.Fatalf("Failed to create backup directory %s: %v", subDir, err)
|
|
}
|
|
|
|
certPath := filepath.Join(subDir, constants.APIServerCertName)
|
|
certFile, err := os.OpenFile(certPath, os.O_CREATE|os.O_TRUNC|os.O_WRONLY, 0666)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create cert file %s: %v", certPath, err)
|
|
}
|
|
defer certFile.Close()
|
|
|
|
keyPath := filepath.Join(subDir, constants.APIServerKeyName)
|
|
keyFile, err := os.OpenFile(keyPath, os.O_CREATE|os.O_TRUNC|os.O_WRONLY, 0666)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create key file %s: %v", keyPath, err)
|
|
}
|
|
defer keyFile.Close()
|
|
|
|
filesToRollBack := map[string]string{
|
|
filepath.Join(subDir, constants.APIServerCertName): filepath.Join(tmpdir, constants.APIServerCertName),
|
|
filepath.Join(subDir, constants.APIServerKeyName): filepath.Join(tmpdir, constants.APIServerKeyName),
|
|
}
|
|
|
|
errString := "there are files need roll back"
|
|
originalErr := errors.New(errString)
|
|
err = rollbackFiles(filesToRollBack, originalErr)
|
|
if err == nil {
|
|
t.Fatalf("Expected error contains %q, got nil", errString)
|
|
}
|
|
if !strings.Contains(err.Error(), errString) {
|
|
t.Fatalf("Expected error contains %q, got %v", errString, err)
|
|
}
|
|
}
|
|
|
|
func TestWriteKubeletConfigFiles(t *testing.T) {
|
|
// exit early if the user doesn't have root permission as the test needs to create /etc/kubernetes directory
|
|
// while the permission should be granted to the user.
|
|
isPrivileged := preflight.IsPrivilegedUserCheck{}
|
|
if _, err := isPrivileged.Check(); err != nil {
|
|
return
|
|
}
|
|
testCases := []struct {
|
|
name string
|
|
dryrun bool
|
|
patchesDir string
|
|
errPattern string
|
|
cfg *kubeadmapi.InitConfiguration
|
|
}{
|
|
// Be careful that if the dryrun is set to false and the test is run on a live cluster, the kubelet config file might be overwritten.
|
|
// However, you should be able to find the original config file in /etc/kubernetes/tmp/kubeadm-kubelet-configxxx folder.
|
|
// The test haven't clean up the temporary file created under /etc/kubernetes/tmp/ as that could be accidentally delete other files in
|
|
// that folder as well which might be unexpected.
|
|
{
|
|
name: "write kubelet config file successfully",
|
|
dryrun: true,
|
|
cfg: &kubeadmapi.InitConfiguration{
|
|
ClusterConfiguration: kubeadmapi.ClusterConfiguration{
|
|
ComponentConfigs: kubeadmapi.ComponentConfigMap{
|
|
componentconfigs.KubeletGroup: &componentConfig{},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "aggregate errs: no kubelet config file and cannot read config file",
|
|
dryrun: true,
|
|
errPattern: missingKubeletConfig,
|
|
cfg: &kubeadmapi.InitConfiguration{},
|
|
},
|
|
{
|
|
name: "only one err: patch dir does not exist",
|
|
dryrun: true,
|
|
patchesDir: "Bogus",
|
|
errPattern: "could not list patch files for path \"Bogus\"",
|
|
cfg: &kubeadmapi.InitConfiguration{
|
|
ClusterConfiguration: kubeadmapi.ClusterConfiguration{
|
|
ComponentConfigs: kubeadmapi.ComponentConfigMap{
|
|
componentconfigs.KubeletGroup: &componentConfig{},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
for _, tc := range testCases {
|
|
err := WriteKubeletConfigFiles(tc.cfg, tc.patchesDir, tc.dryrun, os.Stdout)
|
|
if err != nil && tc.errPattern != "" {
|
|
if match, _ := regexp.MatchString(tc.errPattern, err.Error()); !match {
|
|
t.Fatalf("Expected error contains %q, got %v", tc.errPattern, err.Error())
|
|
}
|
|
}
|
|
if err == nil && len(tc.errPattern) != 0 {
|
|
t.Fatalf("WriteKubeletConfigFiles didn't return error expected %s", tc.errPattern)
|
|
}
|
|
}
|
|
}
|
|
|
|
// Just some stub code, the code could be enriched when necessary.
|
|
type componentConfig struct {
|
|
userSupplied bool
|
|
}
|
|
|
|
func (cc *componentConfig) DeepCopy() kubeadmapi.ComponentConfig {
|
|
result := &componentConfig{}
|
|
return result
|
|
}
|
|
|
|
func (cc *componentConfig) Marshal() ([]byte, error) {
|
|
return nil, nil
|
|
}
|
|
|
|
func (cc *componentConfig) Unmarshal(docmap kubeadmapi.DocumentMap) error {
|
|
return nil
|
|
}
|
|
|
|
func (cc *componentConfig) Get() interface{} {
|
|
return &cc
|
|
}
|
|
|
|
func (cc *componentConfig) Set(cfg interface{}) {
|
|
}
|
|
|
|
func (cc *componentConfig) Default(_ *kubeadmapi.ClusterConfiguration, _ *kubeadmapi.APIEndpoint, _ *kubeadmapi.NodeRegistrationOptions) {
|
|
}
|
|
|
|
func (cc *componentConfig) Mutate() error {
|
|
return nil
|
|
}
|
|
|
|
func (cc *componentConfig) IsUserSupplied() bool {
|
|
return false
|
|
}
|
|
func (cc *componentConfig) SetUserSupplied(userSupplied bool) {
|
|
cc.userSupplied = userSupplied
|
|
}
|