mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-31 13:50:01 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			118 lines
		
	
	
		
			5.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			118 lines
		
	
	
		
			5.1 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // +build !providerless
 | |
| 
 | |
| /*
 | |
| Copyright 2018 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package nodeipam
 | |
| 
 | |
| import (
 | |
| 	"net"
 | |
| 	"os"
 | |
| 	"os/exec"
 | |
| 	"strings"
 | |
| 	"testing"
 | |
| 
 | |
| 	v1 "k8s.io/api/core/v1"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/client-go/informers"
 | |
| 	"k8s.io/client-go/kubernetes/fake"
 | |
| 	"k8s.io/kubernetes/pkg/controller"
 | |
| 	"k8s.io/kubernetes/pkg/controller/nodeipam/ipam"
 | |
| 	"k8s.io/kubernetes/pkg/controller/testutil"
 | |
| 	"k8s.io/legacy-cloud-providers/gce"
 | |
| 	netutils "k8s.io/utils/net"
 | |
| )
 | |
| 
 | |
| func newTestNodeIpamController(clusterCIDR []*net.IPNet, serviceCIDR *net.IPNet, secondaryServiceCIDR *net.IPNet, nodeCIDRMaskSizes []int, allocatorType ipam.CIDRAllocatorType) (*Controller, error) {
 | |
| 	clientSet := fake.NewSimpleClientset()
 | |
| 	fakeNodeHandler := &testutil.FakeNodeHandler{
 | |
| 		Existing: []*v1.Node{
 | |
| 			{ObjectMeta: metav1.ObjectMeta{Name: "node0"}},
 | |
| 		},
 | |
| 		Clientset: fake.NewSimpleClientset(),
 | |
| 	}
 | |
| 	fakeClient := &fake.Clientset{}
 | |
| 	fakeInformerFactory := informers.NewSharedInformerFactory(fakeClient, controller.NoResyncPeriodFunc())
 | |
| 	fakeNodeInformer := fakeInformerFactory.Core().V1().Nodes()
 | |
| 
 | |
| 	for _, node := range fakeNodeHandler.Existing {
 | |
| 		fakeNodeInformer.Informer().GetStore().Add(node)
 | |
| 	}
 | |
| 
 | |
| 	fakeGCE := gce.NewFakeGCECloud(gce.DefaultTestClusterValues())
 | |
| 	return NewNodeIpamController(
 | |
| 		fakeNodeInformer, fakeGCE, clientSet,
 | |
| 		clusterCIDR, serviceCIDR, secondaryServiceCIDR, nodeCIDRMaskSizes, allocatorType,
 | |
| 	)
 | |
| }
 | |
| 
 | |
| // TestNewNodeIpamControllerWithCIDRMasks tests if the controller can be
 | |
| // created with combinations of network CIDRs and masks.
 | |
| func TestNewNodeIpamControllerWithCIDRMasks(t *testing.T) {
 | |
| 	emptyServiceCIDR := ""
 | |
| 	for _, tc := range []struct {
 | |
| 		desc                 string
 | |
| 		clusterCIDR          string
 | |
| 		serviceCIDR          string
 | |
| 		secondaryServiceCIDR string
 | |
| 		maskSize             []int
 | |
| 		allocatorType        ipam.CIDRAllocatorType
 | |
| 		wantFatal            bool
 | |
| 	}{
 | |
| 		{"valid_range_allocator", "10.0.0.0/21", "10.1.0.0/21", emptyServiceCIDR, []int{24}, ipam.RangeAllocatorType, false},
 | |
| 
 | |
| 		{"valid_range_allocator_dualstack", "10.0.0.0/21,2000::/10", "10.1.0.0/21", emptyServiceCIDR, []int{24, 98}, ipam.RangeAllocatorType, false},
 | |
| 		{"valid_range_allocator_dualstack_dualstackservice", "10.0.0.0/21,2000::/10", "10.1.0.0/21", "3000::/10", []int{24, 98}, ipam.RangeAllocatorType, false},
 | |
| 
 | |
| 		{"valid_cloud_allocator", "10.0.0.0/21", "10.1.0.0/21", emptyServiceCIDR, []int{24}, ipam.CloudAllocatorType, false},
 | |
| 		{"valid_ipam_from_cluster", "10.0.0.0/21", "10.1.0.0/21", emptyServiceCIDR, []int{24}, ipam.IPAMFromClusterAllocatorType, false},
 | |
| 		{"valid_ipam_from_cloud", "10.0.0.0/21", "10.1.0.0/21", emptyServiceCIDR, []int{24}, ipam.IPAMFromCloudAllocatorType, false},
 | |
| 		{"valid_skip_cluster_CIDR_validation_for_cloud_allocator", "invalid", "10.1.0.0/21", emptyServiceCIDR, []int{24}, ipam.CloudAllocatorType, false},
 | |
| 		{"invalid_cluster_CIDR", "invalid", "10.1.0.0/21", emptyServiceCIDR, []int{24}, ipam.IPAMFromClusterAllocatorType, true},
 | |
| 		{"valid_CIDR_smaller_than_mask_cloud_allocator", "10.0.0.0/26", "10.1.0.0/21", emptyServiceCIDR, []int{24}, ipam.CloudAllocatorType, false},
 | |
| 		{"invalid_CIDR_smaller_than_mask_other_allocators", "10.0.0.0/26", "10.1.0.0/21", emptyServiceCIDR, []int{24}, ipam.IPAMFromCloudAllocatorType, true},
 | |
| 		{"invalid_serviceCIDR_contains_clusterCIDR", "10.0.0.0/23", "10.0.0.0/21", emptyServiceCIDR, []int{24}, ipam.IPAMFromClusterAllocatorType, true},
 | |
| 		{"invalid_CIDR_mask_size", "10.0.0.0/24,2000::/64", "10.1.0.0/21", emptyServiceCIDR, []int{24, 48}, ipam.IPAMFromClusterAllocatorType, true},
 | |
| 	} {
 | |
| 		t.Run(tc.desc, func(t *testing.T) {
 | |
| 			clusterCidrs, _ := netutils.ParseCIDRs(strings.Split(tc.clusterCIDR, ","))
 | |
| 			_, serviceCIDRIpNet, _ := net.ParseCIDR(tc.serviceCIDR)
 | |
| 			_, secondaryServiceCIDRIpNet, _ := net.ParseCIDR(tc.secondaryServiceCIDR)
 | |
| 
 | |
| 			if os.Getenv("EXIT_ON_FATAL") == "1" {
 | |
| 				// This is the subprocess which runs the actual code.
 | |
| 				newTestNodeIpamController(clusterCidrs, serviceCIDRIpNet, secondaryServiceCIDRIpNet, tc.maskSize, tc.allocatorType)
 | |
| 				return
 | |
| 			}
 | |
| 			// This is the host process that monitors the exit code of the subprocess.
 | |
| 			cmd := exec.Command(os.Args[0], "-test.run=TestNewNodeIpamControllerWithCIDRMasks/"+tc.desc)
 | |
| 			cmd.Env = append(os.Environ(), "EXIT_ON_FATAL=1")
 | |
| 			err := cmd.Run()
 | |
| 			var gotFatal bool
 | |
| 			if err != nil {
 | |
| 				exitErr, ok := err.(*exec.ExitError)
 | |
| 				if !ok {
 | |
| 					t.Fatalf("Failed to run subprocess: %v", err)
 | |
| 				}
 | |
| 				gotFatal = !exitErr.Success()
 | |
| 			}
 | |
| 			if gotFatal != tc.wantFatal {
 | |
| 				t.Errorf("newTestNodeIpamController(%v, %v, %v, %v) : gotFatal = %t ; wantFatal = %t", clusterCidrs, serviceCIDRIpNet, tc.maskSize, tc.allocatorType, gotFatal, tc.wantFatal)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 |