mirror of
https://github.com/kubernetes-sigs/node-feature-discovery.git
synced 2024-12-14 11:57:51 +00:00
25e827a4c8
The feature gate is locked to true. That is, it is not possible to revert back to the gPRC-based communication which makes the gRPC API ready for removal.
242 lines
7.6 KiB
Go
242 lines
7.6 KiB
Go
/*
|
|
Copyright 2019-2021 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package nfdworker_test
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
"regexp"
|
|
"testing"
|
|
"time"
|
|
|
|
. "github.com/smartystreets/goconvey/convey"
|
|
"golang.org/x/net/context"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
fakeclient "k8s.io/client-go/kubernetes/fake"
|
|
"k8s.io/klog/v2"
|
|
|
|
fakenfdclient "sigs.k8s.io/node-feature-discovery/api/generated/clientset/versioned/fake"
|
|
"sigs.k8s.io/node-feature-discovery/api/nfd/v1alpha1"
|
|
nfdv1alpha1 "sigs.k8s.io/node-feature-discovery/api/nfd/v1alpha1"
|
|
"sigs.k8s.io/node-feature-discovery/pkg/features"
|
|
master "sigs.k8s.io/node-feature-discovery/pkg/nfd-master"
|
|
worker "sigs.k8s.io/node-feature-discovery/pkg/nfd-worker"
|
|
"sigs.k8s.io/node-feature-discovery/pkg/utils"
|
|
"sigs.k8s.io/node-feature-discovery/test/data"
|
|
)
|
|
|
|
type testContext struct {
|
|
master master.NfdMaster
|
|
errs chan error
|
|
}
|
|
|
|
func initializeFeatureGates() {
|
|
if err := features.NFDMutableFeatureGate.Add(features.DefaultNFDFeatureGates); err != nil {
|
|
klog.ErrorS(err, "failed to add default feature gates")
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
|
|
func setupTest(args *master.Args) testContext {
|
|
// Fixed port and no-publish, for convenience
|
|
publish := true
|
|
args.Overrides = master.ConfigOverrideArgs{
|
|
NoPublish: &publish,
|
|
LabelWhiteList: &utils.RegexpVal{Regexp: *regexp.MustCompile("")},
|
|
}
|
|
args.Port = 8192
|
|
// Add FeatureGates flag
|
|
initializeFeatureGates()
|
|
_ = features.NFDMutableFeatureGate.OverrideDefault(features.NodeFeatureAPI, false)
|
|
_ = features.NFDMutableFeatureGate.OverrideDefault(features.NodeFeatureGroupAPI, false)
|
|
m, err := master.NewNfdMaster(
|
|
master.WithArgs(args),
|
|
master.WithKubernetesClient(fakeclient.NewSimpleClientset()))
|
|
if err != nil {
|
|
fmt.Printf("Test setup failed: %v\n", err)
|
|
os.Exit(1)
|
|
}
|
|
ctx := testContext{master: m, errs: make(chan error)}
|
|
|
|
// Run nfd-master instance, intended to be used as the server counterpart
|
|
go func() {
|
|
ctx.errs <- ctx.master.Run()
|
|
close(ctx.errs)
|
|
}()
|
|
ready := ctx.master.WaitForReady(5 * time.Second)
|
|
if !ready {
|
|
fmt.Println("Test setup failed: timeout while waiting for nfd-master")
|
|
os.Exit(1)
|
|
}
|
|
|
|
return ctx
|
|
}
|
|
|
|
func teardownTest(ctx testContext) {
|
|
ctx.master.Stop()
|
|
for e := range ctx.errs {
|
|
if e != nil {
|
|
fmt.Printf("Error in test context: %v\n", e)
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestNewNfdWorker(t *testing.T) {
|
|
Convey("When initializing new NfdWorker instance", t, func() {
|
|
Convey("When one of -cert-file, -key-file or -ca-file is missing", func() {
|
|
_, err := worker.NewNfdWorker(worker.WithArgs(&worker.Args{CertFile: "crt", KeyFile: "key"}),
|
|
worker.WithKubernetesClient(fakeclient.NewSimpleClientset()))
|
|
_, err2 := worker.NewNfdWorker(worker.WithArgs(&worker.Args{KeyFile: "key", CaFile: "ca"}),
|
|
worker.WithKubernetesClient(fakeclient.NewSimpleClientset()))
|
|
_, err3 := worker.NewNfdWorker(worker.WithArgs(&worker.Args{CertFile: "crt", CaFile: "ca"}),
|
|
worker.WithKubernetesClient(fakeclient.NewSimpleClientset()))
|
|
Convey("An error should be returned", func() {
|
|
So(err, ShouldNotBeNil)
|
|
So(err2, ShouldNotBeNil)
|
|
So(err3, ShouldNotBeNil)
|
|
})
|
|
})
|
|
})
|
|
}
|
|
|
|
func TestRun(t *testing.T) {
|
|
nfdCli := fakenfdclient.NewSimpleClientset()
|
|
initializeFeatureGates()
|
|
Convey("When running nfd-worker", t, func() {
|
|
Convey("When publishing features from fake source", func() {
|
|
os.Setenv("NODE_NAME", "fake-node")
|
|
os.Setenv("KUBERNETES_NAMESPACE", "fake-ns")
|
|
args := &worker.Args{
|
|
Oneshot: true,
|
|
Overrides: worker.ConfigOverrideArgs{
|
|
FeatureSources: &utils.StringSliceVal{"fake"},
|
|
LabelSources: &utils.StringSliceVal{"fake"},
|
|
},
|
|
}
|
|
w, _ := worker.NewNfdWorker(
|
|
worker.WithArgs(args),
|
|
worker.WithKubernetesClient(fakeclient.NewSimpleClientset()),
|
|
worker.WithNFDClient(nfdCli),
|
|
)
|
|
err := w.Run()
|
|
Convey("No error should be returned", func() {
|
|
So(err, ShouldBeNil)
|
|
})
|
|
Convey("NodeFeture object should be created", func() {
|
|
nf, err := nfdCli.NfdV1alpha1().NodeFeatures("fake-ns").Get(context.TODO(), "fake-node", metav1.GetOptions{})
|
|
So(err, ShouldBeNil)
|
|
|
|
nfExpected := &nfdv1alpha1.NodeFeature{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "fake-node",
|
|
Namespace: "fake-ns",
|
|
Labels: map[string]string{
|
|
"nfd.node.kubernetes.io/node-name": "fake-node",
|
|
},
|
|
Annotations: map[string]string{
|
|
"nfd.node.kubernetes.io/worker.version": "undefined",
|
|
},
|
|
OwnerReferences: []metav1.OwnerReference{},
|
|
},
|
|
Spec: nfdv1alpha1.NodeFeatureSpec{
|
|
Labels: map[string]string{
|
|
"feature.node.kubernetes.io/fake-fakefeature1": "true",
|
|
"feature.node.kubernetes.io/fake-fakefeature2": "true",
|
|
"feature.node.kubernetes.io/fake-fakefeature3": "true",
|
|
},
|
|
Features: v1alpha1.Features{
|
|
Flags: map[string]v1alpha1.FlagFeatureSet{
|
|
"fake.flag": {
|
|
Elements: map[string]v1alpha1.Nil{
|
|
"flag_1": {},
|
|
"flag_2": {},
|
|
"flag_3": {}},
|
|
},
|
|
},
|
|
Attributes: map[string]v1alpha1.AttributeFeatureSet{
|
|
"fake.attribute": {
|
|
Elements: map[string]string{
|
|
"attr_1": "true",
|
|
"attr_2": "false",
|
|
"attr_3": "10",
|
|
},
|
|
},
|
|
},
|
|
Instances: map[string]v1alpha1.InstanceFeatureSet{
|
|
"fake.instance": {
|
|
Elements: []v1alpha1.InstanceFeature{
|
|
{Attributes: map[string]string{
|
|
"name": "instance_1",
|
|
"attr_1": "true",
|
|
"attr_2": "false",
|
|
"attr_3": "10",
|
|
"attr_4": "foobar",
|
|
}},
|
|
{Attributes: map[string]string{
|
|
"name": "instance_2",
|
|
"attr_1": "true",
|
|
"attr_2": "true",
|
|
"attr_3": "100",
|
|
}},
|
|
{Attributes: map[string]string{
|
|
"name": "instance_3",
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
So(nf, ShouldResemble, nfExpected)
|
|
})
|
|
})
|
|
})
|
|
}
|
|
|
|
// TODO: remove this test with the rest of the TLS code and docs.
|
|
// Also drop the certs from test/data/.
|
|
func TestRunTls(t *testing.T) {
|
|
t.Skip("gRPC cannot be enabled, NodeFeatureAPI GA")
|
|
masterArgs := &master.Args{
|
|
CaFile: data.FilePath("ca.crt"),
|
|
CertFile: data.FilePath("nfd-test-master.crt"),
|
|
KeyFile: data.FilePath("nfd-test-master.key"),
|
|
VerifyNodeName: false,
|
|
}
|
|
ctx := setupTest(masterArgs)
|
|
defer teardownTest(ctx)
|
|
Convey("When running nfd-worker against nfd-master with mutual TLS auth enabled", t, func() {
|
|
Convey("When publishing features from fake source", func() {
|
|
workerArgs := worker.Args{
|
|
CaFile: data.FilePath("ca.crt"),
|
|
CertFile: data.FilePath("nfd-test-worker.crt"),
|
|
KeyFile: data.FilePath("nfd-test-worker.key"),
|
|
Server: "localhost:8192",
|
|
ServerNameOverride: "nfd-test-master",
|
|
Oneshot: true,
|
|
Overrides: worker.ConfigOverrideArgs{LabelSources: &utils.StringSliceVal{"fake"}},
|
|
}
|
|
w, _ := worker.NewNfdWorker(worker.WithArgs(&workerArgs),
|
|
worker.WithKubernetesClient(fakeclient.NewSimpleClientset()))
|
|
err := w.Run()
|
|
Convey("No error should be returned", func() {
|
|
So(err, ShouldBeNil)
|
|
})
|
|
})
|
|
})
|
|
}
|