2023-01-27 21:37:20 +00:00
// Copyright (c) Tailscale Inc & AUTHORS
// SPDX-License-Identifier: BSD-3-Clause
2022-12-13 05:00:10 +00:00
2023-08-24 22:02:42 +00:00
//go:build !plan9
2022-12-13 05:00:10 +00:00
package main
import (
2024-02-27 15:19:53 +00:00
"context"
2023-08-30 07:31:37 +00:00
"fmt"
2022-12-13 05:00:10 +00:00
"testing"
2024-06-18 18:01:40 +00:00
"time"
2022-12-13 05:00:10 +00:00
2024-02-27 15:19:53 +00:00
"github.com/google/go-cmp/cmp"
2022-12-13 23:37:35 +00:00
"go.uber.org/zap"
2022-12-13 05:00:10 +00:00
appsv1 "k8s.io/api/apps/v1"
corev1 "k8s.io/api/core/v1"
2024-02-27 15:19:53 +00:00
networkingv1 "k8s.io/api/networking/v1"
2022-12-13 05:00:10 +00:00
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/types"
2024-06-18 18:01:40 +00:00
"k8s.io/client-go/tools/record"
2022-12-13 05:00:10 +00:00
"sigs.k8s.io/controller-runtime/pkg/client/fake"
2024-02-27 15:19:53 +00:00
"sigs.k8s.io/controller-runtime/pkg/reconcile"
2024-02-13 05:27:54 +00:00
tsapi "tailscale.com/k8s-operator/apis/v1alpha1"
2024-09-08 19:57:29 +00:00
"tailscale.com/kube/kubetypes"
2024-04-19 15:49:46 +00:00
"tailscale.com/net/dns/resolvconffile"
2024-06-18 18:01:40 +00:00
"tailscale.com/tstest"
"tailscale.com/tstime"
2022-12-13 05:00:10 +00:00
"tailscale.com/types/ptr"
2024-04-19 15:49:46 +00:00
"tailscale.com/util/dnsname"
2024-02-13 05:27:54 +00:00
"tailscale.com/util/mak"
2022-12-13 05:00:10 +00:00
)
2022-12-13 06:19:16 +00:00
func TestLoadBalancerClass ( t * testing . T ) {
2022-12-13 05:00:10 +00:00
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
2022-12-13 23:37:35 +00:00
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
2024-06-18 18:01:40 +00:00
clock := tstest . NewClock ( tstest . ClockOpts { } )
2022-12-13 05:00:10 +00:00
sr := & ServiceReconciler {
2023-08-23 15:20:14 +00:00
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
} ,
2024-06-18 18:01:40 +00:00
logger : zl . Sugar ( ) ,
clock : clock ,
recorder : record . NewFakeRecorder ( 100 ) ,
2022-12-13 05:00:10 +00:00
}
2024-06-18 18:01:40 +00:00
// Create a service that we should manage, but start with a miconfiguration
// in the annotations.
2022-12-13 05:00:10 +00:00
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
// The apiserver is supposed to set the UID, but the fake client
// doesn't. So, set it explicitly because other code later depends
// on it being set.
UID : types . UID ( "1234-UID" ) ,
2024-06-18 18:01:40 +00:00
Annotations : map [ string ] string {
AnnotationTailnetTargetFQDN : "invalid.example.com" ,
} ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeLoadBalancer ,
LoadBalancerClass : ptr . To ( "tailscale" ) ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
// The expected value of .status.conditions[0].LastTransitionTime until the
// proxy becomes ready.
t0 := conditionTime ( clock )
// Should have an error about invalid config.
want := & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
AnnotationTailnetTargetFQDN : "invalid.example.com" ,
} ,
2022-12-13 05:00:10 +00:00
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeLoadBalancer ,
LoadBalancerClass : ptr . To ( "tailscale" ) ,
} ,
2024-06-18 18:01:40 +00:00
Status : corev1 . ServiceStatus {
Conditions : [ ] metav1 . Condition { {
Type : string ( tsapi . ProxyReady ) ,
Status : metav1 . ConditionFalse ,
LastTransitionTime : t0 ,
Reason : reasonProxyInvalid ,
Message : ` unable to provision proxy resources: invalid Service: invalid value of annotation tailscale.com/tailnet-fqdn: "invalid.example.com" does not appear to be a valid MagicDNS name ` ,
} } ,
} ,
}
expectEqual ( t , fc , want , nil )
// Delete the misconfiguration so the proxy starts getting created on the
// next reconcile.
mustUpdate ( t , fc , "default" , "test" , func ( s * corev1 . Service ) {
s . ObjectMeta . Annotations = nil
2022-12-13 05:00:10 +00:00
} )
2024-06-18 18:01:40 +00:00
clock . Advance ( time . Second )
2022-12-14 00:04:35 +00:00
expectReconciled ( t , sr , "default" , "test" )
2022-12-13 05:00:10 +00:00
2023-12-14 13:51:59 +00:00
fullName , shortName := findGenName ( t , fc , "default" , "test" , "svc" )
2024-01-09 14:13:22 +00:00
opts := configOpts {
stsName : shortName ,
secretName : fullName ,
namespace : "default" ,
parentType : "svc" ,
hostname : "default-test" ,
clusterTargetIP : "10.20.30.40" ,
2024-09-08 18:06:07 +00:00
app : kubetypes . AppIngressProxy ,
2024-01-09 14:13:22 +00:00
}
2022-12-13 05:00:10 +00:00
2024-06-07 18:56:42 +00:00
expectEqual ( t , fc , expectedSecret ( t , fc , opts ) , nil )
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
expectEqual ( t , fc , expectedSTS ( t , fc , opts ) , removeHashAnnotation )
2022-12-13 05:44:55 +00:00
2024-06-18 18:01:40 +00:00
want . Annotations = nil
want . ObjectMeta . Finalizers = [ ] string { "tailscale.com/finalizer" }
want . Status = corev1 . ServiceStatus {
Conditions : [ ] metav1 . Condition { {
Type : string ( tsapi . ProxyReady ) ,
Status : metav1 . ConditionFalse ,
LastTransitionTime : t0 , // Status is still false, no update to transition time
Reason : reasonProxyPending ,
Message : "no Tailscale hostname known yet, waiting for proxy pod to finish auth" ,
} } ,
}
expectEqual ( t , fc , want , nil )
2022-12-13 05:44:55 +00:00
// Normally the Tailscale proxy pod would come up here and write its info
// into the secret. Simulate that, then verify reconcile again and verify
// that we get to the end.
mustUpdate ( t , fc , "operator-ns" , fullName , func ( s * corev1 . Secret ) {
if s . Data == nil {
s . Data = map [ string ] [ ] byte { }
}
s . Data [ "device_id" ] = [ ] byte ( "ts-id-1234" )
s . Data [ "device_fqdn" ] = [ ] byte ( "tailscale.device.name." )
2023-08-08 23:03:08 +00:00
s . Data [ "device_ips" ] = [ ] byte ( ` ["100.99.98.97", "2c0a:8083:94d4:2012:3165:34a5:3616:5fdf"] ` )
2022-12-13 05:44:55 +00:00
} )
2024-06-18 18:01:40 +00:00
clock . Advance ( time . Second )
2022-12-13 05:44:55 +00:00
expectReconciled ( t , sr , "default" , "test" )
2024-06-18 18:01:40 +00:00
want . Status . Conditions = proxyCreatedCondition ( clock )
want . Status . LoadBalancer = corev1 . LoadBalancerStatus {
Ingress : [ ] corev1 . LoadBalancerIngress {
{
Hostname : "tailscale.device.name" ,
} ,
{
IP : "100.99.98.97" ,
2022-12-13 05:44:55 +00:00
} ,
} ,
}
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , want , nil )
2022-12-13 06:19:16 +00:00
// Turn the service back into a ClusterIP service, which should make the
// operator clean up.
mustUpdate ( t , fc , "default" , "test" , func ( s * corev1 . Service ) {
s . Spec . Type = corev1 . ServiceTypeClusterIP
s . Spec . LoadBalancerClass = nil
2023-05-19 16:44:12 +00:00
} )
mustUpdateStatus ( t , fc , "default" , "test" , func ( s * corev1 . Service ) {
2022-12-13 06:19:16 +00:00
// Fake client doesn't automatically delete the LoadBalancer status when
// changing away from the LoadBalancer type, we have to do
// controller-manager's work by hand.
s . Status = corev1 . ServiceStatus { }
} )
// synchronous StatefulSet deletion triggers a requeue. But, the StatefulSet
// didn't create any child resources since this is all faked, so the
// deletion goes through immediately.
2022-12-13 21:32:05 +00:00
expectReconciled ( t , sr , "default" , "test" )
2022-12-13 06:19:16 +00:00
expectMissing [ appsv1 . StatefulSet ] ( t , fc , "operator-ns" , shortName )
2022-12-13 21:32:05 +00:00
// The deletion triggers another reconcile, to finish the cleanup.
2022-12-13 06:19:16 +00:00
expectReconciled ( t , sr , "default" , "test" )
expectMissing [ appsv1 . StatefulSet ] ( t , fc , "operator-ns" , shortName )
expectMissing [ corev1 . Service ] ( t , fc , "operator-ns" , shortName )
expectMissing [ corev1 . Secret ] ( t , fc , "operator-ns" , fullName )
2024-06-18 18:01:40 +00:00
// Note that the Tailscale-specific condition status should be gone now.
2022-12-13 06:19:16 +00:00
want = & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
UID : types . UID ( "1234-UID" ) ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeClusterIP ,
} ,
}
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , want , nil )
2022-12-13 06:19:16 +00:00
}
2024-01-09 14:13:22 +00:00
2023-11-24 16:24:48 +00:00
func TestTailnetTargetFQDNAnnotation ( t * testing . T ) {
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
tailnetTargetFQDN := "foo.bar.ts.net."
2024-06-18 18:01:40 +00:00
clock := tstest . NewClock ( tstest . ClockOpts { } )
2023-11-24 16:24:48 +00:00
sr := & ServiceReconciler {
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
} ,
logger : zl . Sugar ( ) ,
2024-06-18 18:01:40 +00:00
clock : clock ,
2023-11-24 16:24:48 +00:00
}
// Create a service that we should manage, and check that the initial round
// of objects looks right.
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
// The apiserver is supposed to set the UID, but the fake client
// doesn't. So, set it explicitly because other code later depends
// on it being set.
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
AnnotationTailnetTargetFQDN : tailnetTargetFQDN ,
} ,
} ,
Spec : corev1 . ServiceSpec {
Type : corev1 . ServiceTypeClusterIP ,
Selector : map [ string ] string {
"foo" : "bar" ,
} ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
2023-12-14 13:51:59 +00:00
fullName , shortName := findGenName ( t , fc , "default" , "test" , "svc" )
2024-01-09 14:13:22 +00:00
o := configOpts {
stsName : shortName ,
2023-11-24 16:24:48 +00:00
secretName : fullName ,
2024-01-09 14:13:22 +00:00
namespace : "default" ,
parentType : "svc" ,
2023-11-24 16:24:48 +00:00
tailnetTargetFQDN : tailnetTargetFQDN ,
hostname : "default-test" ,
2024-09-08 18:06:07 +00:00
app : kubetypes . AppEgressProxy ,
2023-11-24 16:24:48 +00:00
}
2024-01-09 14:13:22 +00:00
2024-06-07 18:56:42 +00:00
expectEqual ( t , fc , expectedSecret ( t , fc , o ) , nil )
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , removeHashAnnotation )
2023-11-24 16:24:48 +00:00
want := & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
Finalizers : [ ] string { "tailscale.com/finalizer" } ,
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
AnnotationTailnetTargetFQDN : tailnetTargetFQDN ,
} ,
} ,
Spec : corev1 . ServiceSpec {
ExternalName : fmt . Sprintf ( "%s.operator-ns.svc.cluster.local" , shortName ) ,
Type : corev1 . ServiceTypeExternalName ,
Selector : nil ,
} ,
2024-06-18 18:01:40 +00:00
Status : corev1 . ServiceStatus {
Conditions : proxyCreatedCondition ( clock ) ,
} ,
2023-11-24 16:24:48 +00:00
}
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , want , nil )
2024-06-07 18:56:42 +00:00
expectEqual ( t , fc , expectedSecret ( t , fc , o ) , nil )
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , removeHashAnnotation )
2023-11-24 16:24:48 +00:00
// Change the tailscale-target-fqdn annotation which should update the
// StatefulSet
tailnetTargetFQDN = "bar.baz.ts.net"
mustUpdate ( t , fc , "default" , "test" , func ( s * corev1 . Service ) {
s . ObjectMeta . Annotations = map [ string ] string {
AnnotationTailnetTargetFQDN : tailnetTargetFQDN ,
}
} )
// Remove the tailscale-target-fqdn annotation which should make the
// operator clean up
mustUpdate ( t , fc , "default" , "test" , func ( s * corev1 . Service ) {
s . ObjectMeta . Annotations = map [ string ] string { }
} )
expectReconciled ( t , sr , "default" , "test" )
// // synchronous StatefulSet deletion triggers a requeue. But, the StatefulSet
// // didn't create any child resources since this is all faked, so the
// // deletion goes through immediately.
expectReconciled ( t , sr , "default" , "test" )
expectMissing [ appsv1 . StatefulSet ] ( t , fc , "operator-ns" , shortName )
// // The deletion triggers another reconcile, to finish the cleanup.
expectReconciled ( t , sr , "default" , "test" )
expectMissing [ appsv1 . StatefulSet ] ( t , fc , "operator-ns" , shortName )
expectMissing [ corev1 . Service ] ( t , fc , "operator-ns" , shortName )
expectMissing [ corev1 . Secret ] ( t , fc , "operator-ns" , fullName )
}
2024-01-09 14:13:22 +00:00
2023-08-30 07:31:37 +00:00
func TestTailnetTargetIPAnnotation ( t * testing . T ) {
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
tailnetTargetIP := "100.66.66.66"
2024-06-18 18:01:40 +00:00
clock := tstest . NewClock ( tstest . ClockOpts { } )
2023-08-30 07:31:37 +00:00
sr := & ServiceReconciler {
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
} ,
logger : zl . Sugar ( ) ,
2024-06-18 18:01:40 +00:00
clock : clock ,
2023-08-30 07:31:37 +00:00
}
// Create a service that we should manage, and check that the initial round
// of objects looks right.
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
// The apiserver is supposed to set the UID, but the fake client
// doesn't. So, set it explicitly because other code later depends
// on it being set.
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
AnnotationTailnetTargetIP : tailnetTargetIP ,
} ,
} ,
Spec : corev1 . ServiceSpec {
Type : corev1 . ServiceTypeClusterIP ,
Selector : map [ string ] string {
"foo" : "bar" ,
} ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
2023-12-14 13:51:59 +00:00
fullName , shortName := findGenName ( t , fc , "default" , "test" , "svc" )
2024-01-09 14:13:22 +00:00
o := configOpts {
stsName : shortName ,
2023-10-17 17:05:02 +00:00
secretName : fullName ,
2024-01-09 14:13:22 +00:00
namespace : "default" ,
parentType : "svc" ,
2023-10-17 17:05:02 +00:00
tailnetTargetIP : tailnetTargetIP ,
hostname : "default-test" ,
2024-09-08 18:06:07 +00:00
app : kubetypes . AppEgressProxy ,
2023-10-17 17:05:02 +00:00
}
2024-01-09 14:13:22 +00:00
2024-06-07 18:56:42 +00:00
expectEqual ( t , fc , expectedSecret ( t , fc , o ) , nil )
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , removeHashAnnotation )
2023-08-30 07:31:37 +00:00
want := & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
Finalizers : [ ] string { "tailscale.com/finalizer" } ,
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
AnnotationTailnetTargetIP : tailnetTargetIP ,
} ,
} ,
Spec : corev1 . ServiceSpec {
2023-09-20 19:58:28 +00:00
ExternalName : fmt . Sprintf ( "%s.operator-ns.svc.cluster.local" , shortName ) ,
2023-08-30 07:31:37 +00:00
Type : corev1 . ServiceTypeExternalName ,
Selector : nil ,
} ,
2024-06-18 18:01:40 +00:00
Status : corev1 . ServiceStatus {
Conditions : proxyCreatedCondition ( clock ) ,
} ,
2023-08-30 07:31:37 +00:00
}
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , want , nil )
2024-06-07 18:56:42 +00:00
expectEqual ( t , fc , expectedSecret ( t , fc , o ) , nil )
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , removeHashAnnotation )
2023-08-30 07:31:37 +00:00
// Change the tailscale-target-ip annotation which should update the
// StatefulSet
tailnetTargetIP = "100.77.77.77"
mustUpdate ( t , fc , "default" , "test" , func ( s * corev1 . Service ) {
s . ObjectMeta . Annotations = map [ string ] string {
AnnotationTailnetTargetIP : tailnetTargetIP ,
}
} )
// Remove the tailscale-target-ip annotation which should make the
// operator clean up
mustUpdate ( t , fc , "default" , "test" , func ( s * corev1 . Service ) {
s . ObjectMeta . Annotations = map [ string ] string { }
} )
expectReconciled ( t , sr , "default" , "test" )
// // synchronous StatefulSet deletion triggers a requeue. But, the StatefulSet
// // didn't create any child resources since this is all faked, so the
// // deletion goes through immediately.
expectReconciled ( t , sr , "default" , "test" )
expectMissing [ appsv1 . StatefulSet ] ( t , fc , "operator-ns" , shortName )
// // The deletion triggers another reconcile, to finish the cleanup.
expectReconciled ( t , sr , "default" , "test" )
expectMissing [ appsv1 . StatefulSet ] ( t , fc , "operator-ns" , shortName )
expectMissing [ corev1 . Service ] ( t , fc , "operator-ns" , shortName )
expectMissing [ corev1 . Secret ] ( t , fc , "operator-ns" , fullName )
2024-10-26 12:03:36 +00:00
}
func TestTailnetTargetIPAnnotation_IPCouldNotBeParsed ( t * testing . T ) {
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
clock := tstest . NewClock ( tstest . ClockOpts { } )
sr := & ServiceReconciler {
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
} ,
logger : zl . Sugar ( ) ,
clock : clock ,
recorder : record . NewFakeRecorder ( 100 ) ,
}
tailnetTargetIP := "invalid-ip"
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
AnnotationTailnetTargetIP : tailnetTargetIP ,
} ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeLoadBalancer ,
LoadBalancerClass : ptr . To ( "tailscale" ) ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
t0 := conditionTime ( clock )
want := & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
AnnotationTailnetTargetIP : tailnetTargetIP ,
} ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeLoadBalancer ,
LoadBalancerClass : ptr . To ( "tailscale" ) ,
} ,
Status : corev1 . ServiceStatus {
Conditions : [ ] metav1 . Condition { {
Type : string ( tsapi . ProxyReady ) ,
Status : metav1 . ConditionFalse ,
LastTransitionTime : t0 ,
Reason : reasonProxyInvalid ,
Message : ` unable to provision proxy resources: invalid Service: invalid value of annotation tailscale.com/tailnet-ip: "invalid-ip" could not be parsed as a valid IP Address, error: ParseAddr("invalid-ip"): unable to parse IP ` ,
} } ,
} ,
}
expectEqual ( t , fc , want , nil )
}
func TestTailnetTargetIPAnnotation_InvalidIP ( t * testing . T ) {
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
clock := tstest . NewClock ( tstest . ClockOpts { } )
sr := & ServiceReconciler {
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
} ,
logger : zl . Sugar ( ) ,
clock : clock ,
recorder : record . NewFakeRecorder ( 100 ) ,
}
tailnetTargetIP := "999.999.999.999"
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
AnnotationTailnetTargetIP : tailnetTargetIP ,
} ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeLoadBalancer ,
LoadBalancerClass : ptr . To ( "tailscale" ) ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
t0 := conditionTime ( clock )
want := & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
AnnotationTailnetTargetIP : tailnetTargetIP ,
} ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeLoadBalancer ,
LoadBalancerClass : ptr . To ( "tailscale" ) ,
} ,
Status : corev1 . ServiceStatus {
Conditions : [ ] metav1 . Condition { {
Type : string ( tsapi . ProxyReady ) ,
Status : metav1 . ConditionFalse ,
LastTransitionTime : t0 ,
Reason : reasonProxyInvalid ,
Message : ` unable to provision proxy resources: invalid Service: invalid value of annotation tailscale.com/tailnet-ip: "999.999.999.999" could not be parsed as a valid IP Address, error: ParseAddr("999.999.999.999"): IPv4 field has value >255 ` ,
} } ,
} ,
}
expectEqual ( t , fc , want , nil )
2023-08-30 07:31:37 +00:00
}
2022-12-13 06:19:16 +00:00
func TestAnnotations ( t * testing . T ) {
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
2022-12-13 23:37:35 +00:00
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
2024-06-18 18:01:40 +00:00
clock := tstest . NewClock ( tstest . ClockOpts { } )
2022-12-13 06:19:16 +00:00
sr := & ServiceReconciler {
2023-08-23 15:20:14 +00:00
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
} ,
logger : zl . Sugar ( ) ,
2024-06-18 18:01:40 +00:00
clock : clock ,
2022-12-13 06:19:16 +00:00
}
// Create a service that we should manage, and check that the initial round
// of objects looks right.
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
// The apiserver is supposed to set the UID, but the fake client
// doesn't. So, set it explicitly because other code later depends
// on it being set.
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
"tailscale.com/expose" : "true" ,
} ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeClusterIP ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
2023-12-14 13:51:59 +00:00
fullName , shortName := findGenName ( t , fc , "default" , "test" , "svc" )
2024-01-09 14:13:22 +00:00
o := configOpts {
stsName : shortName ,
secretName : fullName ,
namespace : "default" ,
parentType : "svc" ,
hostname : "default-test" ,
clusterTargetIP : "10.20.30.40" ,
2024-09-08 18:06:07 +00:00
app : kubetypes . AppIngressProxy ,
2024-01-09 14:13:22 +00:00
}
2022-12-13 06:19:16 +00:00
2024-06-07 18:56:42 +00:00
expectEqual ( t , fc , expectedSecret ( t , fc , o ) , nil )
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , removeHashAnnotation )
2022-12-13 06:19:16 +00:00
want := & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
Finalizers : [ ] string { "tailscale.com/finalizer" } ,
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
"tailscale.com/expose" : "true" ,
} ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeClusterIP ,
} ,
2024-06-18 18:01:40 +00:00
Status : corev1 . ServiceStatus {
Conditions : proxyCreatedCondition ( clock ) ,
} ,
2022-12-13 06:19:16 +00:00
}
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , want , nil )
2022-12-13 06:19:16 +00:00
// Turn the service back into a ClusterIP service, which should make the
// operator clean up.
mustUpdate ( t , fc , "default" , "test" , func ( s * corev1 . Service ) {
delete ( s . ObjectMeta . Annotations , "tailscale.com/expose" )
} )
// synchronous StatefulSet deletion triggers a requeue. But, the StatefulSet
// didn't create any child resources since this is all faked, so the
// deletion goes through immediately.
2022-12-13 21:32:05 +00:00
expectReconciled ( t , sr , "default" , "test" )
2022-12-13 06:19:16 +00:00
expectMissing [ appsv1 . StatefulSet ] ( t , fc , "operator-ns" , shortName )
// Second time around, the rest of cleanup happens.
expectReconciled ( t , sr , "default" , "test" )
expectMissing [ appsv1 . StatefulSet ] ( t , fc , "operator-ns" , shortName )
expectMissing [ corev1 . Service ] ( t , fc , "operator-ns" , shortName )
expectMissing [ corev1 . Secret ] ( t , fc , "operator-ns" , fullName )
want = & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
UID : types . UID ( "1234-UID" ) ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeClusterIP ,
} ,
}
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , want , nil )
2022-12-13 06:19:16 +00:00
}
func TestAnnotationIntoLB ( t * testing . T ) {
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
2022-12-13 23:37:35 +00:00
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
2024-06-18 18:01:40 +00:00
clock := tstest . NewClock ( tstest . ClockOpts { } )
2022-12-13 06:19:16 +00:00
sr := & ServiceReconciler {
2023-08-23 15:20:14 +00:00
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
} ,
logger : zl . Sugar ( ) ,
2024-06-18 18:01:40 +00:00
clock : clock ,
2022-12-13 06:19:16 +00:00
}
// Create a service that we should manage, and check that the initial round
// of objects looks right.
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
// The apiserver is supposed to set the UID, but the fake client
// doesn't. So, set it explicitly because other code later depends
// on it being set.
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
"tailscale.com/expose" : "true" ,
} ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeClusterIP ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
2023-12-14 13:51:59 +00:00
fullName , shortName := findGenName ( t , fc , "default" , "test" , "svc" )
2024-01-09 14:13:22 +00:00
o := configOpts {
stsName : shortName ,
secretName : fullName ,
namespace : "default" ,
parentType : "svc" ,
hostname : "default-test" ,
clusterTargetIP : "10.20.30.40" ,
2024-09-08 18:06:07 +00:00
app : kubetypes . AppIngressProxy ,
2024-01-09 14:13:22 +00:00
}
2022-12-13 06:19:16 +00:00
2024-06-07 18:56:42 +00:00
expectEqual ( t , fc , expectedSecret ( t , fc , o ) , nil )
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , removeHashAnnotation )
2022-12-13 06:19:16 +00:00
// Normally the Tailscale proxy pod would come up here and write its info
// into the secret. Simulate that, since it would have normally happened at
// this point and the LoadBalancer is going to expect this.
mustUpdate ( t , fc , "operator-ns" , fullName , func ( s * corev1 . Secret ) {
if s . Data == nil {
s . Data = map [ string ] [ ] byte { }
}
s . Data [ "device_id" ] = [ ] byte ( "ts-id-1234" )
s . Data [ "device_fqdn" ] = [ ] byte ( "tailscale.device.name." )
2023-08-08 23:03:08 +00:00
s . Data [ "device_ips" ] = [ ] byte ( ` ["100.99.98.97", "2c0a:8083:94d4:2012:3165:34a5:3616:5fdf"] ` )
2022-12-13 06:19:16 +00:00
} )
expectReconciled ( t , sr , "default" , "test" )
want := & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
Finalizers : [ ] string { "tailscale.com/finalizer" } ,
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
"tailscale.com/expose" : "true" ,
} ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeClusterIP ,
} ,
2024-06-18 18:01:40 +00:00
Status : corev1 . ServiceStatus {
Conditions : proxyCreatedCondition ( clock ) ,
} ,
2022-12-13 06:19:16 +00:00
}
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , want , nil )
2022-12-13 06:19:16 +00:00
// Remove Tailscale's annotation, and at the same time convert the service
// into a tailscale LoadBalancer.
mustUpdate ( t , fc , "default" , "test" , func ( s * corev1 . Service ) {
delete ( s . ObjectMeta . Annotations , "tailscale.com/expose" )
s . Spec . Type = corev1 . ServiceTypeLoadBalancer
s . Spec . LoadBalancerClass = ptr . To ( "tailscale" )
} )
expectReconciled ( t , sr , "default" , "test" )
// None of the proxy machinery should have changed...
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , removeHashAnnotation )
2022-12-13 06:19:16 +00:00
// ... but the service should have a LoadBalancer status.
want = & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
Finalizers : [ ] string { "tailscale.com/finalizer" } ,
UID : types . UID ( "1234-UID" ) ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeLoadBalancer ,
LoadBalancerClass : ptr . To ( "tailscale" ) ,
} ,
Status : corev1 . ServiceStatus {
LoadBalancer : corev1 . LoadBalancerStatus {
Ingress : [ ] corev1 . LoadBalancerIngress {
{
Hostname : "tailscale.device.name" ,
} ,
2023-08-08 23:03:08 +00:00
{
IP : "100.99.98.97" ,
} ,
2022-12-13 06:19:16 +00:00
} ,
} ,
2024-06-18 18:01:40 +00:00
Conditions : proxyCreatedCondition ( clock ) ,
2022-12-13 06:19:16 +00:00
} ,
}
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , want , nil )
2022-12-13 06:19:16 +00:00
}
func TestLBIntoAnnotation ( t * testing . T ) {
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
2022-12-13 23:37:35 +00:00
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
2024-06-18 18:01:40 +00:00
clock := tstest . NewClock ( tstest . ClockOpts { } )
2022-12-13 06:19:16 +00:00
sr := & ServiceReconciler {
2023-08-23 15:20:14 +00:00
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
} ,
logger : zl . Sugar ( ) ,
2024-06-18 18:01:40 +00:00
clock : clock ,
2022-12-13 06:19:16 +00:00
}
// Create a service that we should manage, and check that the initial round
// of objects looks right.
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
// The apiserver is supposed to set the UID, but the fake client
// doesn't. So, set it explicitly because other code later depends
// on it being set.
UID : types . UID ( "1234-UID" ) ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeLoadBalancer ,
LoadBalancerClass : ptr . To ( "tailscale" ) ,
} ,
} )
2022-12-14 00:04:35 +00:00
expectReconciled ( t , sr , "default" , "test" )
2022-12-13 06:19:16 +00:00
2023-12-14 13:51:59 +00:00
fullName , shortName := findGenName ( t , fc , "default" , "test" , "svc" )
2024-01-09 14:13:22 +00:00
o := configOpts {
stsName : shortName ,
secretName : fullName ,
namespace : "default" ,
parentType : "svc" ,
hostname : "default-test" ,
clusterTargetIP : "10.20.30.40" ,
2024-09-08 18:06:07 +00:00
app : kubetypes . AppIngressProxy ,
2024-01-09 14:13:22 +00:00
}
2022-12-13 06:19:16 +00:00
2024-06-07 18:56:42 +00:00
expectEqual ( t , fc , expectedSecret ( t , fc , o ) , nil )
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , removeHashAnnotation )
2022-12-13 06:19:16 +00:00
// Normally the Tailscale proxy pod would come up here and write its info
// into the secret. Simulate that, then verify reconcile again and verify
// that we get to the end.
mustUpdate ( t , fc , "operator-ns" , fullName , func ( s * corev1 . Secret ) {
if s . Data == nil {
s . Data = map [ string ] [ ] byte { }
}
s . Data [ "device_id" ] = [ ] byte ( "ts-id-1234" )
s . Data [ "device_fqdn" ] = [ ] byte ( "tailscale.device.name." )
2023-08-08 23:03:08 +00:00
s . Data [ "device_ips" ] = [ ] byte ( ` ["100.99.98.97", "2c0a:8083:94d4:2012:3165:34a5:3616:5fdf"] ` )
2022-12-13 06:19:16 +00:00
} )
expectReconciled ( t , sr , "default" , "test" )
want := & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
Finalizers : [ ] string { "tailscale.com/finalizer" } ,
UID : types . UID ( "1234-UID" ) ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeLoadBalancer ,
LoadBalancerClass : ptr . To ( "tailscale" ) ,
} ,
Status : corev1 . ServiceStatus {
LoadBalancer : corev1 . LoadBalancerStatus {
Ingress : [ ] corev1 . LoadBalancerIngress {
{
Hostname : "tailscale.device.name" ,
} ,
2023-08-08 23:03:08 +00:00
{
IP : "100.99.98.97" ,
} ,
2022-12-13 06:19:16 +00:00
} ,
} ,
2024-06-18 18:01:40 +00:00
Conditions : proxyCreatedCondition ( clock ) ,
2022-12-13 06:19:16 +00:00
} ,
}
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , want , nil )
2022-12-13 06:19:16 +00:00
// Turn the service back into a ClusterIP service, but also add the
// tailscale annotation.
mustUpdate ( t , fc , "default" , "test" , func ( s * corev1 . Service ) {
s . ObjectMeta . Annotations = map [ string ] string {
"tailscale.com/expose" : "true" ,
}
s . Spec . Type = corev1 . ServiceTypeClusterIP
s . Spec . LoadBalancerClass = nil
2023-05-19 16:44:12 +00:00
} )
mustUpdateStatus ( t , fc , "default" , "test" , func ( s * corev1 . Service ) {
2022-12-13 06:19:16 +00:00
// Fake client doesn't automatically delete the LoadBalancer status when
// changing away from the LoadBalancer type, we have to do
// controller-manager's work by hand.
s . Status = corev1 . ServiceStatus { }
} )
expectReconciled ( t , sr , "default" , "test" )
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , removeHashAnnotation )
2022-12-13 06:19:16 +00:00
want = & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
Finalizers : [ ] string { "tailscale.com/finalizer" } ,
Annotations : map [ string ] string {
"tailscale.com/expose" : "true" ,
} ,
UID : types . UID ( "1234-UID" ) ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeClusterIP ,
} ,
2024-06-18 18:01:40 +00:00
Status : corev1 . ServiceStatus {
Conditions : proxyCreatedCondition ( clock ) ,
} ,
2022-12-13 06:19:16 +00:00
}
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , want , nil )
2022-12-13 05:44:55 +00:00
}
2023-01-25 18:16:59 +00:00
func TestCustomHostname ( t * testing . T ) {
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
2024-06-18 18:01:40 +00:00
clock := tstest . NewClock ( tstest . ClockOpts { } )
2023-01-25 18:16:59 +00:00
sr := & ServiceReconciler {
2023-08-23 15:20:14 +00:00
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
} ,
logger : zl . Sugar ( ) ,
2024-06-18 18:01:40 +00:00
clock : clock ,
2023-01-25 18:16:59 +00:00
}
// Create a service that we should manage, and check that the initial round
// of objects looks right.
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
// The apiserver is supposed to set the UID, but the fake client
// doesn't. So, set it explicitly because other code later depends
// on it being set.
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
"tailscale.com/expose" : "true" ,
"tailscale.com/hostname" : "reindeer-flotilla" ,
} ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeClusterIP ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
2023-12-14 13:51:59 +00:00
fullName , shortName := findGenName ( t , fc , "default" , "test" , "svc" )
2024-01-09 14:13:22 +00:00
o := configOpts {
stsName : shortName ,
secretName : fullName ,
namespace : "default" ,
parentType : "svc" ,
hostname : "reindeer-flotilla" ,
clusterTargetIP : "10.20.30.40" ,
2024-09-08 18:06:07 +00:00
app : kubetypes . AppIngressProxy ,
2024-01-09 14:13:22 +00:00
}
2023-01-25 18:16:59 +00:00
2024-06-07 18:56:42 +00:00
expectEqual ( t , fc , expectedSecret ( t , fc , o ) , nil )
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , removeHashAnnotation )
2023-01-25 18:16:59 +00:00
want := & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
Finalizers : [ ] string { "tailscale.com/finalizer" } ,
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
"tailscale.com/expose" : "true" ,
"tailscale.com/hostname" : "reindeer-flotilla" ,
} ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeClusterIP ,
} ,
2024-06-18 18:01:40 +00:00
Status : corev1 . ServiceStatus {
Conditions : proxyCreatedCondition ( clock ) ,
} ,
2023-01-25 18:16:59 +00:00
}
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , want , nil )
2023-01-25 18:16:59 +00:00
// Turn the service back into a ClusterIP service, which should make the
// operator clean up.
mustUpdate ( t , fc , "default" , "test" , func ( s * corev1 . Service ) {
delete ( s . ObjectMeta . Annotations , "tailscale.com/expose" )
} )
// synchronous StatefulSet deletion triggers a requeue. But, the StatefulSet
// didn't create any child resources since this is all faked, so the
// deletion goes through immediately.
expectReconciled ( t , sr , "default" , "test" )
expectMissing [ appsv1 . StatefulSet ] ( t , fc , "operator-ns" , shortName )
// Second time around, the rest of cleanup happens.
expectReconciled ( t , sr , "default" , "test" )
expectMissing [ appsv1 . StatefulSet ] ( t , fc , "operator-ns" , shortName )
expectMissing [ corev1 . Service ] ( t , fc , "operator-ns" , shortName )
expectMissing [ corev1 . Secret ] ( t , fc , "operator-ns" , fullName )
want = & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
"tailscale.com/hostname" : "reindeer-flotilla" ,
} ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeClusterIP ,
} ,
}
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , want , nil )
2023-01-25 18:16:59 +00:00
}
2023-05-17 10:54:27 +00:00
func TestCustomPriorityClassName ( t * testing . T ) {
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
2024-06-18 18:01:40 +00:00
clock := tstest . NewClock ( tstest . ClockOpts { } )
2023-05-17 10:54:27 +00:00
sr := & ServiceReconciler {
2023-08-23 15:20:14 +00:00
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
2023-10-17 17:05:02 +00:00
proxyPriorityClassName : "custom-priority-class-name" ,
2023-08-23 15:20:14 +00:00
} ,
logger : zl . Sugar ( ) ,
2024-06-18 18:01:40 +00:00
clock : clock ,
2023-05-17 10:54:27 +00:00
}
// Create a service that we should manage, and check that the initial round
// of objects looks right.
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
// The apiserver is supposed to set the UID, but the fake client
// doesn't. So, set it explicitly because other code later depends
// on it being set.
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
"tailscale.com/expose" : "true" ,
2023-10-17 17:05:02 +00:00
"tailscale.com/hostname" : "tailscale-critical" ,
2023-05-17 10:54:27 +00:00
} ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeClusterIP ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
2023-12-14 13:51:59 +00:00
fullName , shortName := findGenName ( t , fc , "default" , "test" , "svc" )
2024-01-09 14:13:22 +00:00
o := configOpts {
stsName : shortName ,
2023-10-17 17:05:02 +00:00
secretName : fullName ,
2024-01-09 14:13:22 +00:00
namespace : "default" ,
parentType : "svc" ,
2023-10-17 17:05:02 +00:00
hostname : "tailscale-critical" ,
priorityClassName : "custom-priority-class-name" ,
2024-01-09 14:13:22 +00:00
clusterTargetIP : "10.20.30.40" ,
2024-09-08 18:06:07 +00:00
app : kubetypes . AppIngressProxy ,
2023-10-17 17:05:02 +00:00
}
2023-05-17 10:54:27 +00:00
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , removeHashAnnotation )
2024-02-13 05:27:54 +00:00
}
func TestProxyClassForService ( t * testing . T ) {
// Setup
pc := & tsapi . ProxyClass {
ObjectMeta : metav1 . ObjectMeta { Name : "custom-metadata" } ,
2024-06-07 18:56:42 +00:00
Spec : tsapi . ProxyClassSpec {
TailscaleConfig : & tsapi . TailscaleConfig {
AcceptRoutes : true ,
} ,
StatefulSet : & tsapi . StatefulSet {
Labels : map [ string ] string { "foo" : "bar" } ,
Annotations : map [ string ] string { "bar.io/foo" : "some-val" } ,
Pod : & tsapi . Pod { Annotations : map [ string ] string { "foo.io/bar" : "some-val" } } } } ,
2024-02-13 05:27:54 +00:00
}
fc := fake . NewClientBuilder ( ) .
WithScheme ( tsapi . GlobalScheme ) .
WithObjects ( pc ) .
WithStatusSubresource ( pc ) .
Build ( )
ft := & fakeTSClient { }
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
2024-06-18 18:01:40 +00:00
clock := tstest . NewClock ( tstest . ClockOpts { } )
2024-02-13 05:27:54 +00:00
sr := & ServiceReconciler {
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
} ,
logger : zl . Sugar ( ) ,
2024-06-18 18:01:40 +00:00
clock : clock ,
2024-02-13 05:27:54 +00:00
}
// 1. A new tailscale LoadBalancer Service is created without any
// ProxyClass. Resources get created for it as usual.
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
// The apiserver is supposed to set the UID, but the fake client
// doesn't. So, set it explicitly because other code later depends
// on it being set.
UID : types . UID ( "1234-UID" ) ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeLoadBalancer ,
LoadBalancerClass : ptr . To ( "tailscale" ) ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
fullName , shortName := findGenName ( t , fc , "default" , "test" , "svc" )
opts := configOpts {
stsName : shortName ,
secretName : fullName ,
namespace : "default" ,
parentType : "svc" ,
hostname : "default-test" ,
clusterTargetIP : "10.20.30.40" ,
2024-09-08 18:06:07 +00:00
app : kubetypes . AppIngressProxy ,
2024-02-13 05:27:54 +00:00
}
2024-06-07 18:56:42 +00:00
expectEqual ( t , fc , expectedSecret ( t , fc , opts ) , nil )
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
expectEqual ( t , fc , expectedSTS ( t , fc , opts ) , removeHashAnnotation )
2024-02-13 05:27:54 +00:00
// 2. The Service gets updated with tailscale.com/proxy-class label
// pointing at the 'custom-metadata' ProxyClass. The ProxyClass is not
// yet ready, so no changes are actually applied to the proxy resources.
mustUpdate ( t , fc , "default" , "test" , func ( svc * corev1 . Service ) {
mak . Set ( & svc . Labels , LabelProxyClass , "custom-metadata" )
} )
expectReconciled ( t , sr , "default" , "test" )
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedSTS ( t , fc , opts ) , removeHashAnnotation )
2024-06-07 18:56:42 +00:00
expectEqual ( t , fc , expectedSecret ( t , fc , opts ) , nil )
2024-02-13 05:27:54 +00:00
// 3. ProxyClass is set to Ready, the Service gets reconciled by the
// services-reconciler and the customization from the ProxyClass is
// applied to the proxy resources.
mustUpdateStatus ( t , fc , "" , "custom-metadata" , func ( pc * tsapi . ProxyClass ) {
pc . Status = tsapi . ProxyClassStatus {
2024-06-18 18:01:40 +00:00
Conditions : [ ] metav1 . Condition { {
2024-02-13 05:27:54 +00:00
Status : metav1 . ConditionTrue ,
2024-10-08 16:34:34 +00:00
Type : string ( tsapi . ProxyClassReady ) ,
2024-02-13 05:27:54 +00:00
ObservedGeneration : pc . Generation ,
} } }
} )
opts . proxyClass = pc . Name
expectReconciled ( t , sr , "default" , "test" )
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedSTS ( t , fc , opts ) , removeHashAnnotation )
2024-06-07 18:56:42 +00:00
expectEqual ( t , fc , expectedSecret ( t , fc , opts ) , removeAuthKeyIfExistsModifier ( t ) )
2024-02-13 05:27:54 +00:00
// 4. tailscale.com/proxy-class label is removed from the Service, the
// configuration from the ProxyClass is removed from the cluster
// resources.
mustUpdate ( t , fc , "default" , "test" , func ( svc * corev1 . Service ) {
delete ( svc . Labels , LabelProxyClass )
} )
opts . proxyClass = ""
expectReconciled ( t , sr , "default" , "test" )
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedSTS ( t , fc , opts ) , removeHashAnnotation )
2023-05-17 10:54:27 +00:00
}
2023-08-17 00:35:36 +00:00
func TestDefaultLoadBalancer ( t * testing . T ) {
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
2024-06-18 18:01:40 +00:00
clock := tstest . NewClock ( tstest . ClockOpts { } )
2023-08-17 00:35:36 +00:00
sr := & ServiceReconciler {
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
} ,
logger : zl . Sugar ( ) ,
2024-06-18 18:01:40 +00:00
clock : clock ,
2023-08-17 00:35:36 +00:00
isDefaultLoadBalancer : true ,
}
// Create a service that we should manage, and check that the initial round
// of objects looks right.
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
// The apiserver is supposed to set the UID, but the fake client
// doesn't. So, set it explicitly because other code later depends
// on it being set.
UID : types . UID ( "1234-UID" ) ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeLoadBalancer ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
2023-12-14 13:51:59 +00:00
fullName , shortName := findGenName ( t , fc , "default" , "test" , "svc" )
2023-08-17 00:35:36 +00:00
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
2024-01-09 14:13:22 +00:00
o := configOpts {
stsName : shortName ,
secretName : fullName ,
namespace : "default" ,
parentType : "svc" ,
hostname : "default-test" ,
clusterTargetIP : "10.20.30.40" ,
2024-09-08 18:06:07 +00:00
app : kubetypes . AppIngressProxy ,
2023-10-17 17:05:02 +00:00
}
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , removeHashAnnotation )
2023-10-17 17:05:02 +00:00
}
func TestProxyFirewallMode ( t * testing . T ) {
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
2024-06-18 18:01:40 +00:00
clock := tstest . NewClock ( tstest . ClockOpts { } )
2023-10-17 17:05:02 +00:00
sr := & ServiceReconciler {
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
tsFirewallMode : "nftables" ,
} ,
logger : zl . Sugar ( ) ,
2024-06-18 18:01:40 +00:00
clock : clock ,
2023-10-17 17:05:02 +00:00
isDefaultLoadBalancer : true ,
}
// Create a service that we should manage, and check that the initial round
// of objects looks right.
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
// The apiserver is supposed to set the UID, but the fake client
// doesn't. So, set it explicitly because other code later depends
// on it being set.
UID : types . UID ( "1234-UID" ) ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeLoadBalancer ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
2023-12-14 13:51:59 +00:00
fullName , shortName := findGenName ( t , fc , "default" , "test" , "svc" )
2024-01-09 14:13:22 +00:00
o := configOpts {
stsName : shortName ,
secretName : fullName ,
namespace : "default" ,
parentType : "svc" ,
hostname : "default-test" ,
firewallMode : "nftables" ,
clusterTargetIP : "10.20.30.40" ,
2024-09-08 18:06:07 +00:00
app : kubetypes . AppIngressProxy ,
2023-10-17 17:05:02 +00:00
}
2024-03-19 14:54:17 +00:00
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , removeHashAnnotation )
}
2023-10-17 17:05:02 +00:00
2024-03-19 14:54:17 +00:00
func TestTailscaledConfigfileHash ( t * testing . T ) {
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
2024-06-18 18:01:40 +00:00
clock := tstest . NewClock ( tstest . ClockOpts { } )
2024-03-19 14:54:17 +00:00
sr := & ServiceReconciler {
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
} ,
logger : zl . Sugar ( ) ,
2024-06-18 18:01:40 +00:00
clock : clock ,
2024-03-19 14:54:17 +00:00
isDefaultLoadBalancer : true ,
}
// Create a service that we should manage, and check that the initial round
// of objects looks right.
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
// The apiserver is supposed to set the UID, but the fake client
// doesn't. So, set it explicitly because other code later depends
// on it being set.
UID : types . UID ( "1234-UID" ) ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeLoadBalancer ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
fullName , shortName := findGenName ( t , fc , "default" , "test" , "svc" )
o := configOpts {
stsName : shortName ,
secretName : fullName ,
namespace : "default" ,
parentType : "svc" ,
hostname : "default-test" ,
clusterTargetIP : "10.20.30.40" ,
2024-05-10 15:32:37 +00:00
confFileHash : "e09bededa0379920141cbd0b0dbdf9b8b66545877f9e8397423f5ce3e1ba439e" ,
2024-09-08 18:06:07 +00:00
app : kubetypes . AppIngressProxy ,
2024-03-19 14:54:17 +00:00
}
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , nil )
// 2. Hostname gets changed, configfile is updated and a new hash value
// is produced.
mustUpdate ( t , fc , "default" , "test" , func ( svc * corev1 . Service ) {
mak . Set ( & svc . Annotations , AnnotationHostname , "another-test" )
} )
o . hostname = "another-test"
2024-05-10 15:32:37 +00:00
o . confFileHash = "5d754cf55463135ee34aa9821f2fd8483b53eb0570c3740c84a086304f427684"
2024-03-19 14:54:17 +00:00
expectReconciled ( t , sr , "default" , "test" )
expectEqual ( t , fc , expectedSTS ( t , fc , o ) , nil )
2023-08-17 00:35:36 +00:00
}
2023-11-24 16:24:48 +00:00
func Test_isMagicDNSName ( t * testing . T ) {
tests := [ ] struct {
in string
want bool
} {
{
in : "foo.tail4567.ts.net" ,
want : true ,
} ,
{
in : "foo.tail4567.ts.net." ,
want : true ,
} ,
{
in : "foo.tail4567" ,
want : false ,
} ,
}
for _ , tt := range tests {
t . Run ( tt . in , func ( t * testing . T ) {
if got := isMagicDNSName ( tt . in ) ; got != tt . want {
t . Errorf ( "isMagicDNSName(%q) = %v, want %v" , tt . in , got , tt . want )
}
} )
}
}
2024-02-27 15:19:53 +00:00
func Test_serviceHandlerForIngress ( t * testing . T ) {
fc := fake . NewFakeClient ( )
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
// 1. An event on a headless Service for a tailscale Ingress results in
// the Ingress being reconciled.
mustCreate ( t , fc , & networkingv1 . Ingress {
ObjectMeta : metav1 . ObjectMeta {
Name : "ing-1" ,
Namespace : "ns-1" ,
} ,
Spec : networkingv1 . IngressSpec { IngressClassName : ptr . To ( tailscaleIngressClassName ) } ,
} )
svc1 := & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "headless-1" ,
Namespace : "tailscale" ,
Labels : map [ string ] string {
LabelManaged : "true" ,
LabelParentName : "ing-1" ,
LabelParentNamespace : "ns-1" ,
LabelParentType : "ingress" ,
} ,
} ,
}
mustCreate ( t , fc , svc1 )
wantReqs := [ ] reconcile . Request { { NamespacedName : types . NamespacedName { Namespace : "ns-1" , Name : "ing-1" } } }
gotReqs := serviceHandlerForIngress ( fc , zl . Sugar ( ) ) ( context . Background ( ) , svc1 )
if diff := cmp . Diff ( gotReqs , wantReqs ) ; diff != "" {
t . Fatalf ( "unexpected reconcile requests (-got +want):\n%s" , diff )
}
// 2. An event on a Service that is the default backend for a tailscale
// Ingress results in the Ingress being reconciled.
mustCreate ( t , fc , & networkingv1 . Ingress {
ObjectMeta : metav1 . ObjectMeta {
Name : "ing-2" ,
Namespace : "ns-2" ,
} ,
Spec : networkingv1 . IngressSpec {
DefaultBackend : & networkingv1 . IngressBackend {
Service : & networkingv1 . IngressServiceBackend { Name : "def-backend" } ,
} ,
IngressClassName : ptr . To ( tailscaleIngressClassName ) ,
} ,
} )
backendSvc := & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "def-backend" ,
Namespace : "ns-2" ,
} ,
}
mustCreate ( t , fc , backendSvc )
wantReqs = [ ] reconcile . Request { { NamespacedName : types . NamespacedName { Namespace : "ns-2" , Name : "ing-2" } } }
gotReqs = serviceHandlerForIngress ( fc , zl . Sugar ( ) ) ( context . Background ( ) , backendSvc )
if diff := cmp . Diff ( gotReqs , wantReqs ) ; diff != "" {
t . Fatalf ( "unexpected reconcile requests (-got +want):\n%s" , diff )
}
// 3. An event on a Service that is one of the non-default backends for
// a tailscale Ingress results in the Ingress being reconciled.
mustCreate ( t , fc , & networkingv1 . Ingress {
ObjectMeta : metav1 . ObjectMeta {
Name : "ing-3" ,
Namespace : "ns-3" ,
} ,
Spec : networkingv1 . IngressSpec {
IngressClassName : ptr . To ( tailscaleIngressClassName ) ,
Rules : [ ] networkingv1 . IngressRule { { IngressRuleValue : networkingv1 . IngressRuleValue { HTTP : & networkingv1 . HTTPIngressRuleValue {
Paths : [ ] networkingv1 . HTTPIngressPath {
{ Backend : networkingv1 . IngressBackend { Service : & networkingv1 . IngressServiceBackend { Name : "backend" } } } } ,
} } } } ,
} ,
} )
backendSvc2 := & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "backend" ,
Namespace : "ns-3" ,
} ,
}
mustCreate ( t , fc , backendSvc2 )
wantReqs = [ ] reconcile . Request { { NamespacedName : types . NamespacedName { Namespace : "ns-3" , Name : "ing-3" } } }
gotReqs = serviceHandlerForIngress ( fc , zl . Sugar ( ) ) ( context . Background ( ) , backendSvc2 )
if diff := cmp . Diff ( gotReqs , wantReqs ) ; diff != "" {
t . Fatalf ( "unexpected reconcile requests (-got +want):\n%s" , diff )
}
// 4. An event on a Service that is a backend for an Ingress that is not
// tailscale Ingress does not result in an Ingress reconcile.
mustCreate ( t , fc , & networkingv1 . Ingress {
ObjectMeta : metav1 . ObjectMeta {
Name : "ing-4" ,
Namespace : "ns-4" ,
} ,
Spec : networkingv1 . IngressSpec {
Rules : [ ] networkingv1 . IngressRule { { IngressRuleValue : networkingv1 . IngressRuleValue { HTTP : & networkingv1 . HTTPIngressRuleValue {
Paths : [ ] networkingv1 . HTTPIngressPath {
{ Backend : networkingv1 . IngressBackend { Service : & networkingv1 . IngressServiceBackend { Name : "non-ts-backend" } } } } ,
} } } } ,
} ,
} )
nonTSBackend := & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "non-ts-backend" ,
Namespace : "ns-4" ,
} ,
}
mustCreate ( t , fc , nonTSBackend )
gotReqs = serviceHandlerForIngress ( fc , zl . Sugar ( ) ) ( context . Background ( ) , nonTSBackend )
if len ( gotReqs ) > 0 {
t . Errorf ( "unexpected reconcile request for a Service that does not belong to a Tailscale Ingress: %#+v\n" , gotReqs )
}
// 5. An event on a Service not related to any Ingress does not result
// in an Ingress reconcile.
someSvc := & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "some-svc" ,
Namespace : "ns-4" ,
} ,
}
mustCreate ( t , fc , someSvc )
gotReqs = serviceHandlerForIngress ( fc , zl . Sugar ( ) ) ( context . Background ( ) , someSvc )
if len ( gotReqs ) > 0 {
t . Errorf ( "unexpected reconcile request for a Service that does not belong to any Ingress: %#+v\n" , gotReqs )
}
}
2024-04-19 15:49:46 +00:00
func Test_clusterDomainFromResolverConf ( t * testing . T ) {
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
tests := [ ] struct {
name string
conf * resolvconffile . Config
namespace string
want string
} {
{
name : "success- custom domain" ,
conf : & resolvconffile . Config {
SearchDomains : [ ] dnsname . FQDN { toFQDN ( t , "foo.svc.department.org.io" ) , toFQDN ( t , "svc.department.org.io" ) , toFQDN ( t , "department.org.io" ) } ,
} ,
namespace : "foo" ,
want : "department.org.io" ,
} ,
{
name : "success- default domain" ,
conf : & resolvconffile . Config {
SearchDomains : [ ] dnsname . FQDN { toFQDN ( t , "foo.svc.cluster.local." ) , toFQDN ( t , "svc.cluster.local." ) , toFQDN ( t , "cluster.local." ) } ,
} ,
namespace : "foo" ,
want : "cluster.local" ,
} ,
{
name : "only two search domains found" ,
conf : & resolvconffile . Config {
SearchDomains : [ ] dnsname . FQDN { toFQDN ( t , "svc.department.org.io" ) , toFQDN ( t , "department.org.io" ) } ,
} ,
namespace : "foo" ,
want : "cluster.local" ,
} ,
{
name : "first search domain does not match the expected structure" ,
conf : & resolvconffile . Config {
SearchDomains : [ ] dnsname . FQDN { toFQDN ( t , "foo.bar.department.org.io" ) , toFQDN ( t , "svc.department.org.io" ) , toFQDN ( t , "some.other.fqdn" ) } ,
} ,
namespace : "foo" ,
want : "cluster.local" ,
} ,
{
name : "second search domain does not match the expected structure" ,
conf : & resolvconffile . Config {
SearchDomains : [ ] dnsname . FQDN { toFQDN ( t , "foo.svc.department.org.io" ) , toFQDN ( t , "foo.department.org.io" ) , toFQDN ( t , "some.other.fqdn" ) } ,
} ,
namespace : "foo" ,
want : "cluster.local" ,
} ,
{
name : "third search domain does not match the expected structure" ,
conf : & resolvconffile . Config {
SearchDomains : [ ] dnsname . FQDN { toFQDN ( t , "foo.svc.department.org.io" ) , toFQDN ( t , "svc.department.org.io" ) , toFQDN ( t , "some.other.fqdn" ) } ,
} ,
namespace : "foo" ,
want : "cluster.local" ,
} ,
}
for _ , tt := range tests {
t . Run ( tt . name , func ( t * testing . T ) {
if got := clusterDomainFromResolverConf ( tt . conf , tt . namespace , zl . Sugar ( ) ) ; got != tt . want {
t . Errorf ( "clusterDomainFromResolverConf() = %v, want %v" , got , tt . want )
}
} )
}
}
2024-09-27 16:47:27 +00:00
func Test_authKeyRemoval ( t * testing . T ) {
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
// 1. A new Service that should be exposed via Tailscale gets created, a Secret with a config that contains auth
// key is generated.
clock := tstest . NewClock ( tstest . ClockOpts { } )
sr := & ServiceReconciler {
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
} ,
logger : zl . Sugar ( ) ,
clock : clock ,
}
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
UID : types . UID ( "1234-UID" ) ,
} ,
Spec : corev1 . ServiceSpec {
ClusterIP : "10.20.30.40" ,
Type : corev1 . ServiceTypeLoadBalancer ,
LoadBalancerClass : ptr . To ( "tailscale" ) ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
fullName , shortName := findGenName ( t , fc , "default" , "test" , "svc" )
opts := configOpts {
stsName : shortName ,
secretName : fullName ,
namespace : "default" ,
parentType : "svc" ,
hostname : "default-test" ,
clusterTargetIP : "10.20.30.40" ,
app : kubetypes . AppIngressProxy ,
}
expectEqual ( t , fc , expectedSecret ( t , fc , opts ) , nil )
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
expectEqual ( t , fc , expectedSTS ( t , fc , opts ) , removeHashAnnotation )
// 2. Apply update to the Secret that imitates the proxy setting device_id.
s := expectedSecret ( t , fc , opts )
mustUpdate ( t , fc , s . Namespace , s . Name , func ( s * corev1 . Secret ) {
mak . Set ( & s . Data , "device_id" , [ ] byte ( "dkkdi4CNTRL" ) )
} )
// 3. Config should no longer contain auth key
expectReconciled ( t , sr , "default" , "test" )
opts . shouldRemoveAuthKey = true
opts . secretExtraData = map [ string ] [ ] byte { "device_id" : [ ] byte ( "dkkdi4CNTRL" ) }
expectEqual ( t , fc , expectedSecret ( t , fc , opts ) , nil )
}
2024-04-19 15:49:46 +00:00
2024-04-23 16:30:00 +00:00
func Test_externalNameService ( t * testing . T ) {
fc := fake . NewFakeClient ( )
ft := & fakeTSClient { }
zl , err := zap . NewDevelopment ( )
if err != nil {
t . Fatal ( err )
}
// 1. A External name Service that should be exposed via Tailscale gets
// created.
2024-06-18 18:01:40 +00:00
clock := tstest . NewClock ( tstest . ClockOpts { } )
2024-04-23 16:30:00 +00:00
sr := & ServiceReconciler {
Client : fc ,
ssr : & tailscaleSTSReconciler {
Client : fc ,
tsClient : ft ,
defaultTags : [ ] string { "tag:k8s" } ,
operatorNamespace : "operator-ns" ,
proxyImage : "tailscale/tailscale" ,
} ,
logger : zl . Sugar ( ) ,
2024-06-18 18:01:40 +00:00
clock : clock ,
2024-04-23 16:30:00 +00:00
}
// 1. Create an ExternalName Service that we should manage, and check that the initial round
// of objects looks right.
mustCreate ( t , fc , & corev1 . Service {
ObjectMeta : metav1 . ObjectMeta {
Name : "test" ,
Namespace : "default" ,
// The apiserver is supposed to set the UID, but the fake client
// doesn't. So, set it explicitly because other code later depends
// on it being set.
UID : types . UID ( "1234-UID" ) ,
Annotations : map [ string ] string {
AnnotationExpose : "true" ,
} ,
} ,
Spec : corev1 . ServiceSpec {
Type : corev1 . ServiceTypeExternalName ,
ExternalName : "foo.com" ,
} ,
} )
expectReconciled ( t , sr , "default" , "test" )
fullName , shortName := findGenName ( t , fc , "default" , "test" , "svc" )
opts := configOpts {
stsName : shortName ,
secretName : fullName ,
namespace : "default" ,
parentType : "svc" ,
hostname : "default-test" ,
clusterTargetDNS : "foo.com" ,
2024-09-08 18:06:07 +00:00
app : kubetypes . AppIngressProxy ,
2024-04-23 16:30:00 +00:00
}
2024-06-07 18:56:42 +00:00
expectEqual ( t , fc , expectedSecret ( t , fc , opts ) , nil )
2024-04-23 16:30:00 +00:00
expectEqual ( t , fc , expectedHeadlessService ( shortName , "svc" ) , nil )
expectEqual ( t , fc , expectedSTS ( t , fc , opts ) , removeHashAnnotation )
// 2. Change the ExternalName and verify that changes get propagated.
mustUpdate ( t , sr , "default" , "test" , func ( s * corev1 . Service ) {
s . Spec . ExternalName = "bar.com"
} )
expectReconciled ( t , sr , "default" , "test" )
opts . clusterTargetDNS = "bar.com"
expectEqual ( t , fc , expectedSTS ( t , fc , opts ) , removeHashAnnotation )
}
2024-04-19 15:49:46 +00:00
func toFQDN ( t * testing . T , s string ) dnsname . FQDN {
t . Helper ( )
fqdn , err := dnsname . ToFQDN ( s )
if err != nil {
t . Fatalf ( "error coverting %q to dnsname.FQDN: %v" , s , err )
}
return fqdn
}
2024-06-18 18:01:40 +00:00
func proxyCreatedCondition ( clock tstime . Clock ) [ ] metav1 . Condition {
return [ ] metav1 . Condition { {
Type : string ( tsapi . ProxyReady ) ,
Status : metav1 . ConditionTrue ,
ObservedGeneration : 0 ,
LastTransitionTime : conditionTime ( clock ) ,
Reason : reasonProxyCreated ,
Message : reasonProxyCreated ,
} }
}
func conditionTime ( clock tstime . Clock ) metav1 . Time {
return metav1 . NewTime ( clock . Now ( ) . Truncate ( time . Second ) )
}