|
|
@ -66,7 +66,7 @@ func TestLoadBalancerClass(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
|
|
expectEqual(t, fc, expectedSecret(fullName))
|
|
|
|
expectEqual(t, fc, expectedSecret(fullName))
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName))
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName))
|
|
|
|
expectEqual(t, fc, expectedSTS(shortName, fullName))
|
|
|
|
expectEqual(t, fc, expectedSTS(shortName, fullName, "default-test"))
|
|
|
|
|
|
|
|
|
|
|
|
// Normally the Tailscale proxy pod would come up here and write its info
|
|
|
|
// Normally the Tailscale proxy pod would come up here and write its info
|
|
|
|
// into the secret. Simulate that, then verify reconcile again and verify
|
|
|
|
// into the secret. Simulate that, then verify reconcile again and verify
|
|
|
@ -187,7 +187,7 @@ func TestAnnotations(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
|
|
expectEqual(t, fc, expectedSecret(fullName))
|
|
|
|
expectEqual(t, fc, expectedSecret(fullName))
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName))
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName))
|
|
|
|
expectEqual(t, fc, expectedSTS(shortName, fullName))
|
|
|
|
expectEqual(t, fc, expectedSTS(shortName, fullName, "default-test"))
|
|
|
|
want := &corev1.Service{
|
|
|
|
want := &corev1.Service{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "Service",
|
|
|
|
Kind: "Service",
|
|
|
@ -284,7 +284,7 @@ func TestAnnotationIntoLB(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
|
|
expectEqual(t, fc, expectedSecret(fullName))
|
|
|
|
expectEqual(t, fc, expectedSecret(fullName))
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName))
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName))
|
|
|
|
expectEqual(t, fc, expectedSTS(shortName, fullName))
|
|
|
|
expectEqual(t, fc, expectedSTS(shortName, fullName, "default-test"))
|
|
|
|
|
|
|
|
|
|
|
|
// Normally the Tailscale proxy pod would come up here and write its info
|
|
|
|
// Normally the Tailscale proxy pod would come up here and write its info
|
|
|
|
// into the secret. Simulate that, since it would have normally happened at
|
|
|
|
// into the secret. Simulate that, since it would have normally happened at
|
|
|
@ -328,7 +328,7 @@ func TestAnnotationIntoLB(t *testing.T) {
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
// None of the proxy machinery should have changed...
|
|
|
|
// None of the proxy machinery should have changed...
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName))
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName))
|
|
|
|
expectEqual(t, fc, expectedSTS(shortName, fullName))
|
|
|
|
expectEqual(t, fc, expectedSTS(shortName, fullName, "default-test"))
|
|
|
|
// ... but the service should have a LoadBalancer status.
|
|
|
|
// ... but the service should have a LoadBalancer status.
|
|
|
|
|
|
|
|
|
|
|
|
want = &corev1.Service{
|
|
|
|
want = &corev1.Service{
|
|
|
@ -400,7 +400,7 @@ func TestLBIntoAnnotation(t *testing.T) {
|
|
|
|
|
|
|
|
|
|
|
|
expectEqual(t, fc, expectedSecret(fullName))
|
|
|
|
expectEqual(t, fc, expectedSecret(fullName))
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName))
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName))
|
|
|
|
expectEqual(t, fc, expectedSTS(shortName, fullName))
|
|
|
|
expectEqual(t, fc, expectedSTS(shortName, fullName, "default-test"))
|
|
|
|
|
|
|
|
|
|
|
|
// Normally the Tailscale proxy pod would come up here and write its info
|
|
|
|
// Normally the Tailscale proxy pod would come up here and write its info
|
|
|
|
// into the secret. Simulate that, then verify reconcile again and verify
|
|
|
|
// into the secret. Simulate that, then verify reconcile again and verify
|
|
|
@ -457,7 +457,7 @@ func TestLBIntoAnnotation(t *testing.T) {
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
|
|
|
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName))
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName))
|
|
|
|
expectEqual(t, fc, expectedSTS(shortName, fullName))
|
|
|
|
expectEqual(t, fc, expectedSTS(shortName, fullName, "default-test"))
|
|
|
|
|
|
|
|
|
|
|
|
want = &corev1.Service{
|
|
|
|
want = &corev1.Service{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
@ -481,6 +481,108 @@ func TestLBIntoAnnotation(t *testing.T) {
|
|
|
|
expectEqual(t, fc, want)
|
|
|
|
expectEqual(t, fc, want)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
func TestCustomHostname(t *testing.T) {
|
|
|
|
|
|
|
|
fc := fake.NewFakeClient()
|
|
|
|
|
|
|
|
ft := &fakeTSClient{}
|
|
|
|
|
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
|
|
t.Fatal(err)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
sr := &ServiceReconciler{
|
|
|
|
|
|
|
|
Client: fc,
|
|
|
|
|
|
|
|
tsClient: ft,
|
|
|
|
|
|
|
|
defaultTags: []string{"tag:k8s"},
|
|
|
|
|
|
|
|
operatorNamespace: "operator-ns",
|
|
|
|
|
|
|
|
proxyImage: "tailscale/tailscale",
|
|
|
|
|
|
|
|
logger: zl.Sugar(),
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Create a service that we should manage, and check that the initial round
|
|
|
|
|
|
|
|
// of objects looks right.
|
|
|
|
|
|
|
|
mustCreate(t, fc, &corev1.Service{
|
|
|
|
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
|
|
|
|
Name: "test",
|
|
|
|
|
|
|
|
Namespace: "default",
|
|
|
|
|
|
|
|
// The apiserver is supposed to set the UID, but the fake client
|
|
|
|
|
|
|
|
// doesn't. So, set it explicitly because other code later depends
|
|
|
|
|
|
|
|
// on it being set.
|
|
|
|
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
|
|
|
|
Annotations: map[string]string{
|
|
|
|
|
|
|
|
"tailscale.com/expose": "true",
|
|
|
|
|
|
|
|
"tailscale.com/hostname": "reindeer-flotilla",
|
|
|
|
|
|
|
|
},
|
|
|
|
|
|
|
|
},
|
|
|
|
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
|
|
|
|
},
|
|
|
|
|
|
|
|
})
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fullName, shortName := findGenName(t, fc, "default", "test")
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
expectEqual(t, fc, expectedSecret(fullName))
|
|
|
|
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName))
|
|
|
|
|
|
|
|
expectEqual(t, fc, expectedSTS(shortName, fullName, "reindeer-flotilla"))
|
|
|
|
|
|
|
|
want := &corev1.Service{
|
|
|
|
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
|
|
|
|
Kind: "Service",
|
|
|
|
|
|
|
|
APIVersion: "v1",
|
|
|
|
|
|
|
|
},
|
|
|
|
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
|
|
|
|
Name: "test",
|
|
|
|
|
|
|
|
Namespace: "default",
|
|
|
|
|
|
|
|
Finalizers: []string{"tailscale.com/finalizer"},
|
|
|
|
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
|
|
|
|
Annotations: map[string]string{
|
|
|
|
|
|
|
|
"tailscale.com/expose": "true",
|
|
|
|
|
|
|
|
"tailscale.com/hostname": "reindeer-flotilla",
|
|
|
|
|
|
|
|
},
|
|
|
|
|
|
|
|
},
|
|
|
|
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
|
|
|
|
},
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
expectEqual(t, fc, want)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
// Turn the service back into a ClusterIP service, which should make the
|
|
|
|
|
|
|
|
// operator clean up.
|
|
|
|
|
|
|
|
mustUpdate(t, fc, "default", "test", func(s *corev1.Service) {
|
|
|
|
|
|
|
|
delete(s.ObjectMeta.Annotations, "tailscale.com/expose")
|
|
|
|
|
|
|
|
})
|
|
|
|
|
|
|
|
// synchronous StatefulSet deletion triggers a requeue. But, the StatefulSet
|
|
|
|
|
|
|
|
// didn't create any child resources since this is all faked, so the
|
|
|
|
|
|
|
|
// deletion goes through immediately.
|
|
|
|
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
|
|
|
expectMissing[appsv1.StatefulSet](t, fc, "operator-ns", shortName)
|
|
|
|
|
|
|
|
// Second time around, the rest of cleanup happens.
|
|
|
|
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
|
|
|
expectMissing[appsv1.StatefulSet](t, fc, "operator-ns", shortName)
|
|
|
|
|
|
|
|
expectMissing[corev1.Service](t, fc, "operator-ns", shortName)
|
|
|
|
|
|
|
|
expectMissing[corev1.Secret](t, fc, "operator-ns", fullName)
|
|
|
|
|
|
|
|
want = &corev1.Service{
|
|
|
|
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
|
|
|
|
Kind: "Service",
|
|
|
|
|
|
|
|
APIVersion: "v1",
|
|
|
|
|
|
|
|
},
|
|
|
|
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
|
|
|
|
Name: "test",
|
|
|
|
|
|
|
|
Namespace: "default",
|
|
|
|
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
|
|
|
|
Annotations: map[string]string{
|
|
|
|
|
|
|
|
"tailscale.com/hostname": "reindeer-flotilla",
|
|
|
|
|
|
|
|
},
|
|
|
|
|
|
|
|
},
|
|
|
|
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
|
|
|
|
},
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
expectEqual(t, fc, want)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func expectedSecret(name string) *corev1.Secret {
|
|
|
|
func expectedSecret(name string) *corev1.Secret {
|
|
|
|
return &corev1.Secret{
|
|
|
|
return &corev1.Secret{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
@ -529,7 +631,7 @@ func expectedHeadlessService(name string) *corev1.Service {
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func expectedSTS(stsName, secretName string) *appsv1.StatefulSet {
|
|
|
|
func expectedSTS(stsName, secretName, hostname string) *appsv1.StatefulSet {
|
|
|
|
return &appsv1.StatefulSet{
|
|
|
|
return &appsv1.StatefulSet{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "StatefulSet",
|
|
|
|
Kind: "StatefulSet",
|
|
|
@ -578,6 +680,7 @@ func expectedSTS(stsName, secretName string) *appsv1.StatefulSet {
|
|
|
|
{Name: "TS_AUTH_ONCE", Value: "true"},
|
|
|
|
{Name: "TS_AUTH_ONCE", Value: "true"},
|
|
|
|
{Name: "TS_DEST_IP", Value: "10.20.30.40"},
|
|
|
|
{Name: "TS_DEST_IP", Value: "10.20.30.40"},
|
|
|
|
{Name: "TS_KUBE_SECRET", Value: secretName},
|
|
|
|
{Name: "TS_KUBE_SECRET", Value: secretName},
|
|
|
|
|
|
|
|
{Name: "TS_HOSTNAME", Value: hostname},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
SecurityContext: &corev1.SecurityContext{
|
|
|
|
SecurityContext: &corev1.SecurityContext{
|
|
|
|
Capabilities: &corev1.Capabilities{
|
|
|
|
Capabilities: &corev1.Capabilities{
|
|
|
|