mirror of https://github.com/tailscale/tailscale/
You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
170 lines
5.6 KiB
Go
170 lines
5.6 KiB
Go
2 months ago
|
// Copyright (c) Tailscale Inc & AUTHORS
|
||
|
// SPDX-License-Identifier: BSD-3-Clause
|
||
|
|
||
|
//go:build !plan9
|
||
|
|
||
|
package main
|
||
|
|
||
|
import (
|
||
|
"fmt"
|
||
|
"testing"
|
||
|
|
||
|
"github.com/AlekSi/pointer"
|
||
|
"go.uber.org/zap"
|
||
|
appsv1 "k8s.io/api/apps/v1"
|
||
|
corev1 "k8s.io/api/core/v1"
|
||
|
discoveryv1 "k8s.io/api/discovery/v1"
|
||
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||
|
"sigs.k8s.io/controller-runtime/pkg/client/fake"
|
||
|
tsoperator "tailscale.com/k8s-operator"
|
||
|
tsapi "tailscale.com/k8s-operator/apis/v1alpha1"
|
||
|
"tailscale.com/tstest"
|
||
|
"tailscale.com/tstime"
|
||
|
)
|
||
|
|
||
|
func TestEgressServiceReadiness(t *testing.T) {
|
||
|
// We need to pass a ProxyGroup object to WithStatusSubresource because of some quirks in how the fake client
|
||
|
// works. Without this code further down would not be able to update ProxyGroup status.
|
||
|
fc := fake.NewClientBuilder().
|
||
|
WithScheme(tsapi.GlobalScheme).
|
||
|
WithStatusSubresource(&tsapi.ProxyGroup{}).
|
||
|
Build()
|
||
|
zl, _ := zap.NewDevelopment()
|
||
|
cl := tstest.NewClock(tstest.ClockOpts{})
|
||
|
rec := &egressSvcsReadinessReconciler{
|
||
|
tsNamespace: "operator-ns",
|
||
|
Client: fc,
|
||
|
logger: zl.Sugar(),
|
||
|
clock: cl,
|
||
|
}
|
||
|
tailnetFQDN := "my-app.tailnetxyz.ts.net"
|
||
|
egressSvc := &corev1.Service{
|
||
|
ObjectMeta: metav1.ObjectMeta{
|
||
|
Name: "my-app",
|
||
|
Namespace: "dev",
|
||
|
Annotations: map[string]string{
|
||
|
AnnotationProxyGroup: "dev",
|
||
|
AnnotationTailnetTargetFQDN: tailnetFQDN,
|
||
|
},
|
||
|
},
|
||
|
}
|
||
|
fakeClusterIPSvc := &corev1.Service{ObjectMeta: metav1.ObjectMeta{Name: "my-app", Namespace: "operator-ns"}}
|
||
|
l := egressSvcEpsLabels(egressSvc, fakeClusterIPSvc)
|
||
|
eps := &discoveryv1.EndpointSlice{
|
||
|
ObjectMeta: metav1.ObjectMeta{
|
||
|
Name: "my-app",
|
||
|
Namespace: "operator-ns",
|
||
|
Labels: l,
|
||
|
},
|
||
|
AddressType: discoveryv1.AddressTypeIPv4,
|
||
|
}
|
||
|
pg := &tsapi.ProxyGroup{
|
||
|
ObjectMeta: metav1.ObjectMeta{
|
||
|
Name: "dev",
|
||
|
},
|
||
|
}
|
||
|
mustCreate(t, fc, egressSvc)
|
||
|
setClusterNotReady(egressSvc, cl, zl.Sugar())
|
||
|
t.Run("endpointslice_does_not_exist", func(t *testing.T) {
|
||
|
expectReconciled(t, rec, "dev", "my-app")
|
||
|
expectEqual(t, fc, egressSvc, nil) // not ready
|
||
|
})
|
||
|
t.Run("proxy_group_does_not_exist", func(t *testing.T) {
|
||
|
mustCreate(t, fc, eps)
|
||
|
expectReconciled(t, rec, "dev", "my-app")
|
||
|
expectEqual(t, fc, egressSvc, nil) // still not ready
|
||
|
})
|
||
|
t.Run("proxy_group_not_ready", func(t *testing.T) {
|
||
|
mustCreate(t, fc, pg)
|
||
|
expectReconciled(t, rec, "dev", "my-app")
|
||
|
expectEqual(t, fc, egressSvc, nil) // still not ready
|
||
|
})
|
||
|
t.Run("no_ready_replicas", func(t *testing.T) {
|
||
|
setPGReady(pg, cl, zl.Sugar())
|
||
|
mustUpdateStatus(t, fc, pg.Namespace, pg.Name, func(p *tsapi.ProxyGroup) {
|
||
|
p.Status = pg.Status
|
||
|
})
|
||
|
expectEqual(t, fc, pg, nil)
|
||
|
for i := range pgReplicas(pg) {
|
||
|
p := pod(pg, i)
|
||
|
mustCreate(t, fc, p)
|
||
|
mustUpdateStatus(t, fc, p.Namespace, p.Name, func(existing *corev1.Pod) {
|
||
|
existing.Status.PodIPs = p.Status.PodIPs
|
||
|
})
|
||
|
}
|
||
|
expectReconciled(t, rec, "dev", "my-app")
|
||
|
setNotReady(egressSvc, cl, zl.Sugar(), pgReplicas(pg))
|
||
|
expectEqual(t, fc, egressSvc, nil) // still not ready
|
||
|
})
|
||
|
t.Run("one_ready_replica", func(t *testing.T) {
|
||
|
setEndpointForReplica(pg, 0, eps)
|
||
|
mustUpdate(t, fc, eps.Namespace, eps.Name, func(e *discoveryv1.EndpointSlice) {
|
||
|
e.Endpoints = eps.Endpoints
|
||
|
})
|
||
|
setReady(egressSvc, cl, zl.Sugar(), pgReplicas(pg), 1)
|
||
|
expectReconciled(t, rec, "dev", "my-app")
|
||
|
expectEqual(t, fc, egressSvc, nil) // partially ready
|
||
|
})
|
||
|
t.Run("all_replicas_ready", func(t *testing.T) {
|
||
|
for i := range pgReplicas(pg) {
|
||
|
setEndpointForReplica(pg, i, eps)
|
||
|
}
|
||
|
mustUpdate(t, fc, eps.Namespace, eps.Name, func(e *discoveryv1.EndpointSlice) {
|
||
|
e.Endpoints = eps.Endpoints
|
||
|
})
|
||
|
setReady(egressSvc, cl, zl.Sugar(), pgReplicas(pg), pgReplicas(pg))
|
||
|
expectReconciled(t, rec, "dev", "my-app")
|
||
|
expectEqual(t, fc, egressSvc, nil) // ready
|
||
|
})
|
||
|
}
|
||
|
|
||
|
func setClusterNotReady(svc *corev1.Service, cl tstime.Clock, l *zap.SugaredLogger) {
|
||
|
tsoperator.SetServiceCondition(svc, tsapi.EgressSvcReady, metav1.ConditionFalse, reasonClusterResourcesNotReady, reasonClusterResourcesNotReady, cl, l)
|
||
|
}
|
||
|
|
||
|
func setNotReady(svc *corev1.Service, cl tstime.Clock, l *zap.SugaredLogger, replicas int32) {
|
||
|
msg := fmt.Sprintf(msgReadyToRouteTemplate, 0, replicas)
|
||
|
tsoperator.SetServiceCondition(svc, tsapi.EgressSvcReady, metav1.ConditionFalse, reasonNotReady, msg, cl, l)
|
||
|
}
|
||
|
|
||
|
func setReady(svc *corev1.Service, cl tstime.Clock, l *zap.SugaredLogger, replicas, readyReplicas int32) {
|
||
|
reason := reasonPartiallyReady
|
||
|
if readyReplicas == replicas {
|
||
|
reason = reasonReady
|
||
|
}
|
||
|
msg := fmt.Sprintf(msgReadyToRouteTemplate, readyReplicas, replicas)
|
||
|
tsoperator.SetServiceCondition(svc, tsapi.EgressSvcReady, metav1.ConditionTrue, reason, msg, cl, l)
|
||
|
}
|
||
|
|
||
|
func setPGReady(pg *tsapi.ProxyGroup, cl tstime.Clock, l *zap.SugaredLogger) {
|
||
|
tsoperator.SetProxyGroupCondition(pg, tsapi.ProxyGroupReady, metav1.ConditionTrue, "foo", "foo", pg.Generation, cl, l)
|
||
|
}
|
||
|
|
||
|
func setEndpointForReplica(pg *tsapi.ProxyGroup, ordinal int32, eps *discoveryv1.EndpointSlice) {
|
||
|
p := pod(pg, ordinal)
|
||
|
eps.Endpoints = append(eps.Endpoints, discoveryv1.Endpoint{
|
||
|
Addresses: []string{p.Status.PodIPs[0].IP},
|
||
|
Conditions: discoveryv1.EndpointConditions{
|
||
|
Ready: pointer.ToBool(true),
|
||
|
Serving: pointer.ToBool(true),
|
||
|
Terminating: pointer.ToBool(false),
|
||
|
},
|
||
|
})
|
||
|
}
|
||
|
|
||
|
func pod(pg *tsapi.ProxyGroup, ordinal int32) *corev1.Pod {
|
||
|
l := pgLabels(pg.Name, nil)
|
||
|
l[appsv1.PodIndexLabel] = fmt.Sprintf("%d", ordinal)
|
||
|
ip := fmt.Sprintf("10.0.0.%d", ordinal)
|
||
|
return &corev1.Pod{
|
||
|
ObjectMeta: metav1.ObjectMeta{
|
||
|
Name: fmt.Sprintf("%s-%d", pg.Name, ordinal),
|
||
|
Namespace: "operator-ns",
|
||
|
Labels: l,
|
||
|
},
|
||
|
Status: corev1.PodStatus{
|
||
|
PodIPs: []corev1.PodIP{{IP: ip}},
|
||
|
},
|
||
|
}
|
||
|
}
|