2023-01-27 21:37:20 +00:00
|
|
|
// Copyright (c) Tailscale Inc & AUTHORS
|
|
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
2022-12-13 05:00:10 +00:00
|
|
|
|
2023-08-24 22:02:42 +00:00
|
|
|
//go:build !plan9
|
|
|
|
|
2022-12-13 05:00:10 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
2024-02-27 15:19:53 +00:00
|
|
|
"context"
|
2023-08-30 07:31:37 +00:00
|
|
|
"fmt"
|
2022-12-13 05:00:10 +00:00
|
|
|
"testing"
|
|
|
|
|
2024-02-27 15:19:53 +00:00
|
|
|
"github.com/google/go-cmp/cmp"
|
2022-12-13 23:37:35 +00:00
|
|
|
"go.uber.org/zap"
|
2022-12-13 05:00:10 +00:00
|
|
|
appsv1 "k8s.io/api/apps/v1"
|
|
|
|
corev1 "k8s.io/api/core/v1"
|
2024-02-27 15:19:53 +00:00
|
|
|
networkingv1 "k8s.io/api/networking/v1"
|
2022-12-13 05:00:10 +00:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
|
|
"k8s.io/apimachinery/pkg/types"
|
|
|
|
"sigs.k8s.io/controller-runtime/pkg/client/fake"
|
2024-02-27 15:19:53 +00:00
|
|
|
"sigs.k8s.io/controller-runtime/pkg/reconcile"
|
2024-02-13 05:27:54 +00:00
|
|
|
tsapi "tailscale.com/k8s-operator/apis/v1alpha1"
|
2024-04-19 15:49:46 +00:00
|
|
|
"tailscale.com/net/dns/resolvconffile"
|
2022-12-13 05:00:10 +00:00
|
|
|
"tailscale.com/types/ptr"
|
2024-04-19 15:49:46 +00:00
|
|
|
"tailscale.com/util/dnsname"
|
2024-02-13 05:27:54 +00:00
|
|
|
"tailscale.com/util/mak"
|
2022-12-13 05:00:10 +00:00
|
|
|
)
|
|
|
|
|
2022-12-13 06:19:16 +00:00
|
|
|
func TestLoadBalancerClass(t *testing.T) {
|
2022-12-13 05:00:10 +00:00
|
|
|
fc := fake.NewFakeClient()
|
|
|
|
ft := &fakeTSClient{}
|
2022-12-13 23:37:35 +00:00
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2022-12-13 05:00:10 +00:00
|
|
|
sr := &ServiceReconciler{
|
2023-08-23 15:20:14 +00:00
|
|
|
Client: fc,
|
|
|
|
ssr: &tailscaleSTSReconciler{
|
|
|
|
Client: fc,
|
|
|
|
tsClient: ft,
|
|
|
|
defaultTags: []string{"tag:k8s"},
|
|
|
|
operatorNamespace: "operator-ns",
|
|
|
|
proxyImage: "tailscale/tailscale",
|
|
|
|
},
|
|
|
|
logger: zl.Sugar(),
|
2022-12-13 05:00:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create a service that we should manage, and check that the initial round
|
|
|
|
// of objects looks right.
|
|
|
|
mustCreate(t, fc, &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
// The apiserver is supposed to set the UID, but the fake client
|
|
|
|
// doesn't. So, set it explicitly because other code later depends
|
|
|
|
// on it being set.
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeLoadBalancer,
|
|
|
|
LoadBalancerClass: ptr.To("tailscale"),
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
2022-12-14 00:04:35 +00:00
|
|
|
expectReconciled(t, sr, "default", "test")
|
2022-12-13 05:00:10 +00:00
|
|
|
|
2023-12-14 13:51:59 +00:00
|
|
|
fullName, shortName := findGenName(t, fc, "default", "test", "svc")
|
2024-01-09 14:13:22 +00:00
|
|
|
opts := configOpts{
|
|
|
|
stsName: shortName,
|
|
|
|
secretName: fullName,
|
|
|
|
namespace: "default",
|
|
|
|
parentType: "svc",
|
|
|
|
hostname: "default-test",
|
|
|
|
clusterTargetIP: "10.20.30.40",
|
|
|
|
}
|
2022-12-13 05:00:10 +00:00
|
|
|
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedSecret(t, opts), nil)
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName, "svc"), nil)
|
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, opts), removeHashAnnotation)
|
2022-12-13 05:44:55 +00:00
|
|
|
|
|
|
|
// Normally the Tailscale proxy pod would come up here and write its info
|
|
|
|
// into the secret. Simulate that, then verify reconcile again and verify
|
|
|
|
// that we get to the end.
|
|
|
|
mustUpdate(t, fc, "operator-ns", fullName, func(s *corev1.Secret) {
|
|
|
|
if s.Data == nil {
|
|
|
|
s.Data = map[string][]byte{}
|
|
|
|
}
|
|
|
|
s.Data["device_id"] = []byte("ts-id-1234")
|
|
|
|
s.Data["device_fqdn"] = []byte("tailscale.device.name.")
|
2023-08-08 23:03:08 +00:00
|
|
|
s.Data["device_ips"] = []byte(`["100.99.98.97", "2c0a:8083:94d4:2012:3165:34a5:3616:5fdf"]`)
|
2022-12-13 05:44:55 +00:00
|
|
|
})
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
want := &corev1.Service{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "Service",
|
|
|
|
APIVersion: "v1",
|
|
|
|
},
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2022-12-13 06:19:16 +00:00
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
Finalizers: []string{"tailscale.com/finalizer"},
|
|
|
|
UID: types.UID("1234-UID"),
|
2022-12-13 05:44:55 +00:00
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeLoadBalancer,
|
|
|
|
LoadBalancerClass: ptr.To("tailscale"),
|
|
|
|
},
|
|
|
|
Status: corev1.ServiceStatus{
|
|
|
|
LoadBalancer: corev1.LoadBalancerStatus{
|
|
|
|
Ingress: []corev1.LoadBalancerIngress{
|
|
|
|
{
|
|
|
|
Hostname: "tailscale.device.name",
|
|
|
|
},
|
2023-08-08 23:03:08 +00:00
|
|
|
{
|
|
|
|
IP: "100.99.98.97",
|
|
|
|
},
|
2022-12-13 05:44:55 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, want, nil)
|
2022-12-13 06:19:16 +00:00
|
|
|
|
|
|
|
// Turn the service back into a ClusterIP service, which should make the
|
|
|
|
// operator clean up.
|
|
|
|
mustUpdate(t, fc, "default", "test", func(s *corev1.Service) {
|
|
|
|
s.Spec.Type = corev1.ServiceTypeClusterIP
|
|
|
|
s.Spec.LoadBalancerClass = nil
|
2023-05-19 16:44:12 +00:00
|
|
|
})
|
|
|
|
mustUpdateStatus(t, fc, "default", "test", func(s *corev1.Service) {
|
2022-12-13 06:19:16 +00:00
|
|
|
// Fake client doesn't automatically delete the LoadBalancer status when
|
|
|
|
// changing away from the LoadBalancer type, we have to do
|
|
|
|
// controller-manager's work by hand.
|
|
|
|
s.Status = corev1.ServiceStatus{}
|
|
|
|
})
|
|
|
|
// synchronous StatefulSet deletion triggers a requeue. But, the StatefulSet
|
|
|
|
// didn't create any child resources since this is all faked, so the
|
|
|
|
// deletion goes through immediately.
|
2022-12-13 21:32:05 +00:00
|
|
|
expectReconciled(t, sr, "default", "test")
|
2022-12-13 06:19:16 +00:00
|
|
|
expectMissing[appsv1.StatefulSet](t, fc, "operator-ns", shortName)
|
2022-12-13 21:32:05 +00:00
|
|
|
// The deletion triggers another reconcile, to finish the cleanup.
|
2022-12-13 06:19:16 +00:00
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
expectMissing[appsv1.StatefulSet](t, fc, "operator-ns", shortName)
|
|
|
|
expectMissing[corev1.Service](t, fc, "operator-ns", shortName)
|
|
|
|
expectMissing[corev1.Secret](t, fc, "operator-ns", fullName)
|
|
|
|
want = &corev1.Service{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "Service",
|
|
|
|
APIVersion: "v1",
|
|
|
|
},
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
},
|
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, want, nil)
|
2022-12-13 06:19:16 +00:00
|
|
|
}
|
2024-01-09 14:13:22 +00:00
|
|
|
|
2023-11-24 16:24:48 +00:00
|
|
|
func TestTailnetTargetFQDNAnnotation(t *testing.T) {
|
|
|
|
fc := fake.NewFakeClient()
|
|
|
|
ft := &fakeTSClient{}
|
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
tailnetTargetFQDN := "foo.bar.ts.net."
|
|
|
|
sr := &ServiceReconciler{
|
|
|
|
Client: fc,
|
|
|
|
ssr: &tailscaleSTSReconciler{
|
|
|
|
Client: fc,
|
|
|
|
tsClient: ft,
|
|
|
|
defaultTags: []string{"tag:k8s"},
|
|
|
|
operatorNamespace: "operator-ns",
|
|
|
|
proxyImage: "tailscale/tailscale",
|
|
|
|
},
|
|
|
|
logger: zl.Sugar(),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a service that we should manage, and check that the initial round
|
|
|
|
// of objects looks right.
|
|
|
|
mustCreate(t, fc, &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
// The apiserver is supposed to set the UID, but the fake client
|
|
|
|
// doesn't. So, set it explicitly because other code later depends
|
|
|
|
// on it being set.
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
Annotations: map[string]string{
|
|
|
|
AnnotationTailnetTargetFQDN: tailnetTargetFQDN,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
Selector: map[string]string{
|
|
|
|
"foo": "bar",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
2023-12-14 13:51:59 +00:00
|
|
|
fullName, shortName := findGenName(t, fc, "default", "test", "svc")
|
2024-01-09 14:13:22 +00:00
|
|
|
o := configOpts{
|
|
|
|
stsName: shortName,
|
2023-11-24 16:24:48 +00:00
|
|
|
secretName: fullName,
|
2024-01-09 14:13:22 +00:00
|
|
|
namespace: "default",
|
|
|
|
parentType: "svc",
|
2023-11-24 16:24:48 +00:00
|
|
|
tailnetTargetFQDN: tailnetTargetFQDN,
|
|
|
|
hostname: "default-test",
|
|
|
|
}
|
2024-01-09 14:13:22 +00:00
|
|
|
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedSecret(t, o), nil)
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName, "svc"), nil)
|
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), removeHashAnnotation)
|
2023-11-24 16:24:48 +00:00
|
|
|
want := &corev1.Service{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "Service",
|
|
|
|
APIVersion: "v1",
|
|
|
|
},
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
Finalizers: []string{"tailscale.com/finalizer"},
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
Annotations: map[string]string{
|
|
|
|
AnnotationTailnetTargetFQDN: tailnetTargetFQDN,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ExternalName: fmt.Sprintf("%s.operator-ns.svc.cluster.local", shortName),
|
|
|
|
Type: corev1.ServiceTypeExternalName,
|
|
|
|
Selector: nil,
|
|
|
|
},
|
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, want, nil)
|
|
|
|
expectEqual(t, fc, expectedSecret(t, o), nil)
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName, "svc"), nil)
|
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), removeHashAnnotation)
|
2023-11-24 16:24:48 +00:00
|
|
|
|
|
|
|
// Change the tailscale-target-fqdn annotation which should update the
|
|
|
|
// StatefulSet
|
|
|
|
tailnetTargetFQDN = "bar.baz.ts.net"
|
|
|
|
mustUpdate(t, fc, "default", "test", func(s *corev1.Service) {
|
|
|
|
s.ObjectMeta.Annotations = map[string]string{
|
|
|
|
AnnotationTailnetTargetFQDN: tailnetTargetFQDN,
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// Remove the tailscale-target-fqdn annotation which should make the
|
|
|
|
// operator clean up
|
|
|
|
mustUpdate(t, fc, "default", "test", func(s *corev1.Service) {
|
|
|
|
s.ObjectMeta.Annotations = map[string]string{}
|
|
|
|
})
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
|
|
|
// // synchronous StatefulSet deletion triggers a requeue. But, the StatefulSet
|
|
|
|
// // didn't create any child resources since this is all faked, so the
|
|
|
|
// // deletion goes through immediately.
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
expectMissing[appsv1.StatefulSet](t, fc, "operator-ns", shortName)
|
|
|
|
// // The deletion triggers another reconcile, to finish the cleanup.
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
expectMissing[appsv1.StatefulSet](t, fc, "operator-ns", shortName)
|
|
|
|
expectMissing[corev1.Service](t, fc, "operator-ns", shortName)
|
|
|
|
expectMissing[corev1.Secret](t, fc, "operator-ns", fullName)
|
|
|
|
}
|
2024-01-09 14:13:22 +00:00
|
|
|
|
2023-08-30 07:31:37 +00:00
|
|
|
func TestTailnetTargetIPAnnotation(t *testing.T) {
|
|
|
|
fc := fake.NewFakeClient()
|
|
|
|
ft := &fakeTSClient{}
|
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
tailnetTargetIP := "100.66.66.66"
|
|
|
|
sr := &ServiceReconciler{
|
|
|
|
Client: fc,
|
|
|
|
ssr: &tailscaleSTSReconciler{
|
|
|
|
Client: fc,
|
|
|
|
tsClient: ft,
|
|
|
|
defaultTags: []string{"tag:k8s"},
|
|
|
|
operatorNamespace: "operator-ns",
|
|
|
|
proxyImage: "tailscale/tailscale",
|
|
|
|
},
|
|
|
|
logger: zl.Sugar(),
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a service that we should manage, and check that the initial round
|
|
|
|
// of objects looks right.
|
|
|
|
mustCreate(t, fc, &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
// The apiserver is supposed to set the UID, but the fake client
|
|
|
|
// doesn't. So, set it explicitly because other code later depends
|
|
|
|
// on it being set.
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
Annotations: map[string]string{
|
|
|
|
AnnotationTailnetTargetIP: tailnetTargetIP,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
Selector: map[string]string{
|
|
|
|
"foo": "bar",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
2023-12-14 13:51:59 +00:00
|
|
|
fullName, shortName := findGenName(t, fc, "default", "test", "svc")
|
2024-01-09 14:13:22 +00:00
|
|
|
o := configOpts{
|
|
|
|
stsName: shortName,
|
2023-10-17 17:05:02 +00:00
|
|
|
secretName: fullName,
|
2024-01-09 14:13:22 +00:00
|
|
|
namespace: "default",
|
|
|
|
parentType: "svc",
|
2023-10-17 17:05:02 +00:00
|
|
|
tailnetTargetIP: tailnetTargetIP,
|
|
|
|
hostname: "default-test",
|
|
|
|
}
|
2024-01-09 14:13:22 +00:00
|
|
|
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedSecret(t, o), nil)
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName, "svc"), nil)
|
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), removeHashAnnotation)
|
2023-08-30 07:31:37 +00:00
|
|
|
want := &corev1.Service{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "Service",
|
|
|
|
APIVersion: "v1",
|
|
|
|
},
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
Finalizers: []string{"tailscale.com/finalizer"},
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
Annotations: map[string]string{
|
|
|
|
AnnotationTailnetTargetIP: tailnetTargetIP,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
2023-09-20 19:58:28 +00:00
|
|
|
ExternalName: fmt.Sprintf("%s.operator-ns.svc.cluster.local", shortName),
|
2023-08-30 07:31:37 +00:00
|
|
|
Type: corev1.ServiceTypeExternalName,
|
|
|
|
Selector: nil,
|
|
|
|
},
|
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, want, nil)
|
|
|
|
expectEqual(t, fc, expectedSecret(t, o), nil)
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName, "svc"), nil)
|
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), removeHashAnnotation)
|
2023-08-30 07:31:37 +00:00
|
|
|
|
|
|
|
// Change the tailscale-target-ip annotation which should update the
|
|
|
|
// StatefulSet
|
|
|
|
tailnetTargetIP = "100.77.77.77"
|
|
|
|
mustUpdate(t, fc, "default", "test", func(s *corev1.Service) {
|
|
|
|
s.ObjectMeta.Annotations = map[string]string{
|
|
|
|
AnnotationTailnetTargetIP: tailnetTargetIP,
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// Remove the tailscale-target-ip annotation which should make the
|
|
|
|
// operator clean up
|
|
|
|
mustUpdate(t, fc, "default", "test", func(s *corev1.Service) {
|
|
|
|
s.ObjectMeta.Annotations = map[string]string{}
|
|
|
|
})
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
|
|
|
// // synchronous StatefulSet deletion triggers a requeue. But, the StatefulSet
|
|
|
|
// // didn't create any child resources since this is all faked, so the
|
|
|
|
// // deletion goes through immediately.
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
expectMissing[appsv1.StatefulSet](t, fc, "operator-ns", shortName)
|
|
|
|
// // The deletion triggers another reconcile, to finish the cleanup.
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
expectMissing[appsv1.StatefulSet](t, fc, "operator-ns", shortName)
|
|
|
|
expectMissing[corev1.Service](t, fc, "operator-ns", shortName)
|
|
|
|
expectMissing[corev1.Secret](t, fc, "operator-ns", fullName)
|
|
|
|
}
|
2022-12-13 06:19:16 +00:00
|
|
|
|
|
|
|
func TestAnnotations(t *testing.T) {
|
|
|
|
fc := fake.NewFakeClient()
|
|
|
|
ft := &fakeTSClient{}
|
2022-12-13 23:37:35 +00:00
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2022-12-13 06:19:16 +00:00
|
|
|
sr := &ServiceReconciler{
|
2023-08-23 15:20:14 +00:00
|
|
|
Client: fc,
|
|
|
|
ssr: &tailscaleSTSReconciler{
|
|
|
|
Client: fc,
|
|
|
|
tsClient: ft,
|
|
|
|
defaultTags: []string{"tag:k8s"},
|
|
|
|
operatorNamespace: "operator-ns",
|
|
|
|
proxyImage: "tailscale/tailscale",
|
|
|
|
},
|
|
|
|
logger: zl.Sugar(),
|
2022-12-13 06:19:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create a service that we should manage, and check that the initial round
|
|
|
|
// of objects looks right.
|
|
|
|
mustCreate(t, fc, &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
// The apiserver is supposed to set the UID, but the fake client
|
|
|
|
// doesn't. So, set it explicitly because other code later depends
|
|
|
|
// on it being set.
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
Annotations: map[string]string{
|
|
|
|
"tailscale.com/expose": "true",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
2023-12-14 13:51:59 +00:00
|
|
|
fullName, shortName := findGenName(t, fc, "default", "test", "svc")
|
2024-01-09 14:13:22 +00:00
|
|
|
o := configOpts{
|
|
|
|
stsName: shortName,
|
|
|
|
secretName: fullName,
|
|
|
|
namespace: "default",
|
|
|
|
parentType: "svc",
|
|
|
|
hostname: "default-test",
|
|
|
|
clusterTargetIP: "10.20.30.40",
|
|
|
|
}
|
2022-12-13 06:19:16 +00:00
|
|
|
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedSecret(t, o), nil)
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName, "svc"), nil)
|
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), removeHashAnnotation)
|
2022-12-13 06:19:16 +00:00
|
|
|
want := &corev1.Service{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "Service",
|
|
|
|
APIVersion: "v1",
|
|
|
|
},
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
Finalizers: []string{"tailscale.com/finalizer"},
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
Annotations: map[string]string{
|
|
|
|
"tailscale.com/expose": "true",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
},
|
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, want, nil)
|
2022-12-13 06:19:16 +00:00
|
|
|
|
|
|
|
// Turn the service back into a ClusterIP service, which should make the
|
|
|
|
// operator clean up.
|
|
|
|
mustUpdate(t, fc, "default", "test", func(s *corev1.Service) {
|
|
|
|
delete(s.ObjectMeta.Annotations, "tailscale.com/expose")
|
|
|
|
})
|
|
|
|
// synchronous StatefulSet deletion triggers a requeue. But, the StatefulSet
|
|
|
|
// didn't create any child resources since this is all faked, so the
|
|
|
|
// deletion goes through immediately.
|
2022-12-13 21:32:05 +00:00
|
|
|
expectReconciled(t, sr, "default", "test")
|
2022-12-13 06:19:16 +00:00
|
|
|
expectMissing[appsv1.StatefulSet](t, fc, "operator-ns", shortName)
|
|
|
|
// Second time around, the rest of cleanup happens.
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
expectMissing[appsv1.StatefulSet](t, fc, "operator-ns", shortName)
|
|
|
|
expectMissing[corev1.Service](t, fc, "operator-ns", shortName)
|
|
|
|
expectMissing[corev1.Secret](t, fc, "operator-ns", fullName)
|
|
|
|
want = &corev1.Service{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "Service",
|
|
|
|
APIVersion: "v1",
|
|
|
|
},
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
},
|
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, want, nil)
|
2022-12-13 06:19:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestAnnotationIntoLB(t *testing.T) {
|
|
|
|
fc := fake.NewFakeClient()
|
|
|
|
ft := &fakeTSClient{}
|
2022-12-13 23:37:35 +00:00
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2022-12-13 06:19:16 +00:00
|
|
|
sr := &ServiceReconciler{
|
2023-08-23 15:20:14 +00:00
|
|
|
Client: fc,
|
|
|
|
ssr: &tailscaleSTSReconciler{
|
|
|
|
Client: fc,
|
|
|
|
tsClient: ft,
|
|
|
|
defaultTags: []string{"tag:k8s"},
|
|
|
|
operatorNamespace: "operator-ns",
|
|
|
|
proxyImage: "tailscale/tailscale",
|
|
|
|
},
|
|
|
|
logger: zl.Sugar(),
|
2022-12-13 06:19:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create a service that we should manage, and check that the initial round
|
|
|
|
// of objects looks right.
|
|
|
|
mustCreate(t, fc, &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
// The apiserver is supposed to set the UID, but the fake client
|
|
|
|
// doesn't. So, set it explicitly because other code later depends
|
|
|
|
// on it being set.
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
Annotations: map[string]string{
|
|
|
|
"tailscale.com/expose": "true",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
2023-12-14 13:51:59 +00:00
|
|
|
fullName, shortName := findGenName(t, fc, "default", "test", "svc")
|
2024-01-09 14:13:22 +00:00
|
|
|
o := configOpts{
|
|
|
|
stsName: shortName,
|
|
|
|
secretName: fullName,
|
|
|
|
namespace: "default",
|
|
|
|
parentType: "svc",
|
|
|
|
hostname: "default-test",
|
|
|
|
clusterTargetIP: "10.20.30.40",
|
|
|
|
}
|
2022-12-13 06:19:16 +00:00
|
|
|
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedSecret(t, o), nil)
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName, "svc"), nil)
|
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), removeHashAnnotation)
|
2022-12-13 06:19:16 +00:00
|
|
|
|
|
|
|
// Normally the Tailscale proxy pod would come up here and write its info
|
|
|
|
// into the secret. Simulate that, since it would have normally happened at
|
|
|
|
// this point and the LoadBalancer is going to expect this.
|
|
|
|
mustUpdate(t, fc, "operator-ns", fullName, func(s *corev1.Secret) {
|
|
|
|
if s.Data == nil {
|
|
|
|
s.Data = map[string][]byte{}
|
|
|
|
}
|
|
|
|
s.Data["device_id"] = []byte("ts-id-1234")
|
|
|
|
s.Data["device_fqdn"] = []byte("tailscale.device.name.")
|
2023-08-08 23:03:08 +00:00
|
|
|
s.Data["device_ips"] = []byte(`["100.99.98.97", "2c0a:8083:94d4:2012:3165:34a5:3616:5fdf"]`)
|
2022-12-13 06:19:16 +00:00
|
|
|
})
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
want := &corev1.Service{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "Service",
|
|
|
|
APIVersion: "v1",
|
|
|
|
},
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
Finalizers: []string{"tailscale.com/finalizer"},
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
Annotations: map[string]string{
|
|
|
|
"tailscale.com/expose": "true",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
},
|
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, want, nil)
|
2022-12-13 06:19:16 +00:00
|
|
|
|
|
|
|
// Remove Tailscale's annotation, and at the same time convert the service
|
|
|
|
// into a tailscale LoadBalancer.
|
|
|
|
mustUpdate(t, fc, "default", "test", func(s *corev1.Service) {
|
|
|
|
delete(s.ObjectMeta.Annotations, "tailscale.com/expose")
|
|
|
|
s.Spec.Type = corev1.ServiceTypeLoadBalancer
|
|
|
|
s.Spec.LoadBalancerClass = ptr.To("tailscale")
|
|
|
|
})
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
// None of the proxy machinery should have changed...
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName, "svc"), nil)
|
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), removeHashAnnotation)
|
2022-12-13 06:19:16 +00:00
|
|
|
// ... but the service should have a LoadBalancer status.
|
|
|
|
|
|
|
|
want = &corev1.Service{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "Service",
|
|
|
|
APIVersion: "v1",
|
|
|
|
},
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
Finalizers: []string{"tailscale.com/finalizer"},
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeLoadBalancer,
|
|
|
|
LoadBalancerClass: ptr.To("tailscale"),
|
|
|
|
},
|
|
|
|
Status: corev1.ServiceStatus{
|
|
|
|
LoadBalancer: corev1.LoadBalancerStatus{
|
|
|
|
Ingress: []corev1.LoadBalancerIngress{
|
|
|
|
{
|
|
|
|
Hostname: "tailscale.device.name",
|
|
|
|
},
|
2023-08-08 23:03:08 +00:00
|
|
|
{
|
|
|
|
IP: "100.99.98.97",
|
|
|
|
},
|
2022-12-13 06:19:16 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, want, nil)
|
2022-12-13 06:19:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestLBIntoAnnotation(t *testing.T) {
|
|
|
|
fc := fake.NewFakeClient()
|
|
|
|
ft := &fakeTSClient{}
|
2022-12-13 23:37:35 +00:00
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2022-12-13 06:19:16 +00:00
|
|
|
sr := &ServiceReconciler{
|
2023-08-23 15:20:14 +00:00
|
|
|
Client: fc,
|
|
|
|
ssr: &tailscaleSTSReconciler{
|
|
|
|
Client: fc,
|
|
|
|
tsClient: ft,
|
|
|
|
defaultTags: []string{"tag:k8s"},
|
|
|
|
operatorNamespace: "operator-ns",
|
|
|
|
proxyImage: "tailscale/tailscale",
|
|
|
|
},
|
|
|
|
logger: zl.Sugar(),
|
2022-12-13 06:19:16 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create a service that we should manage, and check that the initial round
|
|
|
|
// of objects looks right.
|
|
|
|
mustCreate(t, fc, &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
// The apiserver is supposed to set the UID, but the fake client
|
|
|
|
// doesn't. So, set it explicitly because other code later depends
|
|
|
|
// on it being set.
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeLoadBalancer,
|
|
|
|
LoadBalancerClass: ptr.To("tailscale"),
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
2022-12-14 00:04:35 +00:00
|
|
|
expectReconciled(t, sr, "default", "test")
|
2022-12-13 06:19:16 +00:00
|
|
|
|
2023-12-14 13:51:59 +00:00
|
|
|
fullName, shortName := findGenName(t, fc, "default", "test", "svc")
|
2024-01-09 14:13:22 +00:00
|
|
|
o := configOpts{
|
|
|
|
stsName: shortName,
|
|
|
|
secretName: fullName,
|
|
|
|
namespace: "default",
|
|
|
|
parentType: "svc",
|
|
|
|
hostname: "default-test",
|
|
|
|
clusterTargetIP: "10.20.30.40",
|
|
|
|
}
|
2022-12-13 06:19:16 +00:00
|
|
|
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedSecret(t, o), nil)
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName, "svc"), nil)
|
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), removeHashAnnotation)
|
2022-12-13 06:19:16 +00:00
|
|
|
|
|
|
|
// Normally the Tailscale proxy pod would come up here and write its info
|
|
|
|
// into the secret. Simulate that, then verify reconcile again and verify
|
|
|
|
// that we get to the end.
|
|
|
|
mustUpdate(t, fc, "operator-ns", fullName, func(s *corev1.Secret) {
|
|
|
|
if s.Data == nil {
|
|
|
|
s.Data = map[string][]byte{}
|
|
|
|
}
|
|
|
|
s.Data["device_id"] = []byte("ts-id-1234")
|
|
|
|
s.Data["device_fqdn"] = []byte("tailscale.device.name.")
|
2023-08-08 23:03:08 +00:00
|
|
|
s.Data["device_ips"] = []byte(`["100.99.98.97", "2c0a:8083:94d4:2012:3165:34a5:3616:5fdf"]`)
|
2022-12-13 06:19:16 +00:00
|
|
|
})
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
want := &corev1.Service{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "Service",
|
|
|
|
APIVersion: "v1",
|
|
|
|
},
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
Finalizers: []string{"tailscale.com/finalizer"},
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeLoadBalancer,
|
|
|
|
LoadBalancerClass: ptr.To("tailscale"),
|
|
|
|
},
|
|
|
|
Status: corev1.ServiceStatus{
|
|
|
|
LoadBalancer: corev1.LoadBalancerStatus{
|
|
|
|
Ingress: []corev1.LoadBalancerIngress{
|
|
|
|
{
|
|
|
|
Hostname: "tailscale.device.name",
|
|
|
|
},
|
2023-08-08 23:03:08 +00:00
|
|
|
{
|
|
|
|
IP: "100.99.98.97",
|
|
|
|
},
|
2022-12-13 06:19:16 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, want, nil)
|
2022-12-13 06:19:16 +00:00
|
|
|
|
|
|
|
// Turn the service back into a ClusterIP service, but also add the
|
|
|
|
// tailscale annotation.
|
|
|
|
mustUpdate(t, fc, "default", "test", func(s *corev1.Service) {
|
|
|
|
s.ObjectMeta.Annotations = map[string]string{
|
|
|
|
"tailscale.com/expose": "true",
|
|
|
|
}
|
|
|
|
s.Spec.Type = corev1.ServiceTypeClusterIP
|
|
|
|
s.Spec.LoadBalancerClass = nil
|
2023-05-19 16:44:12 +00:00
|
|
|
})
|
|
|
|
mustUpdateStatus(t, fc, "default", "test", func(s *corev1.Service) {
|
2022-12-13 06:19:16 +00:00
|
|
|
// Fake client doesn't automatically delete the LoadBalancer status when
|
|
|
|
// changing away from the LoadBalancer type, we have to do
|
|
|
|
// controller-manager's work by hand.
|
|
|
|
s.Status = corev1.ServiceStatus{}
|
|
|
|
})
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName, "svc"), nil)
|
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), removeHashAnnotation)
|
2022-12-13 06:19:16 +00:00
|
|
|
|
|
|
|
want = &corev1.Service{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "Service",
|
|
|
|
APIVersion: "v1",
|
|
|
|
},
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
Finalizers: []string{"tailscale.com/finalizer"},
|
|
|
|
Annotations: map[string]string{
|
|
|
|
"tailscale.com/expose": "true",
|
|
|
|
},
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
},
|
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, want, nil)
|
2022-12-13 05:44:55 +00:00
|
|
|
}
|
|
|
|
|
2023-01-25 18:16:59 +00:00
|
|
|
func TestCustomHostname(t *testing.T) {
|
|
|
|
fc := fake.NewFakeClient()
|
|
|
|
ft := &fakeTSClient{}
|
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
sr := &ServiceReconciler{
|
2023-08-23 15:20:14 +00:00
|
|
|
Client: fc,
|
|
|
|
ssr: &tailscaleSTSReconciler{
|
|
|
|
Client: fc,
|
|
|
|
tsClient: ft,
|
|
|
|
defaultTags: []string{"tag:k8s"},
|
|
|
|
operatorNamespace: "operator-ns",
|
|
|
|
proxyImage: "tailscale/tailscale",
|
|
|
|
},
|
|
|
|
logger: zl.Sugar(),
|
2023-01-25 18:16:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create a service that we should manage, and check that the initial round
|
|
|
|
// of objects looks right.
|
|
|
|
mustCreate(t, fc, &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
// The apiserver is supposed to set the UID, but the fake client
|
|
|
|
// doesn't. So, set it explicitly because other code later depends
|
|
|
|
// on it being set.
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
Annotations: map[string]string{
|
|
|
|
"tailscale.com/expose": "true",
|
|
|
|
"tailscale.com/hostname": "reindeer-flotilla",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
2023-12-14 13:51:59 +00:00
|
|
|
fullName, shortName := findGenName(t, fc, "default", "test", "svc")
|
2024-01-09 14:13:22 +00:00
|
|
|
o := configOpts{
|
|
|
|
stsName: shortName,
|
|
|
|
secretName: fullName,
|
|
|
|
namespace: "default",
|
|
|
|
parentType: "svc",
|
|
|
|
hostname: "reindeer-flotilla",
|
|
|
|
clusterTargetIP: "10.20.30.40",
|
|
|
|
}
|
2023-01-25 18:16:59 +00:00
|
|
|
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedSecret(t, o), nil)
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName, "svc"), nil)
|
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), removeHashAnnotation)
|
2023-01-25 18:16:59 +00:00
|
|
|
want := &corev1.Service{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "Service",
|
|
|
|
APIVersion: "v1",
|
|
|
|
},
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
Finalizers: []string{"tailscale.com/finalizer"},
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
Annotations: map[string]string{
|
|
|
|
"tailscale.com/expose": "true",
|
|
|
|
"tailscale.com/hostname": "reindeer-flotilla",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
},
|
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, want, nil)
|
2023-01-25 18:16:59 +00:00
|
|
|
|
|
|
|
// Turn the service back into a ClusterIP service, which should make the
|
|
|
|
// operator clean up.
|
|
|
|
mustUpdate(t, fc, "default", "test", func(s *corev1.Service) {
|
|
|
|
delete(s.ObjectMeta.Annotations, "tailscale.com/expose")
|
|
|
|
})
|
|
|
|
// synchronous StatefulSet deletion triggers a requeue. But, the StatefulSet
|
|
|
|
// didn't create any child resources since this is all faked, so the
|
|
|
|
// deletion goes through immediately.
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
expectMissing[appsv1.StatefulSet](t, fc, "operator-ns", shortName)
|
|
|
|
// Second time around, the rest of cleanup happens.
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
expectMissing[appsv1.StatefulSet](t, fc, "operator-ns", shortName)
|
|
|
|
expectMissing[corev1.Service](t, fc, "operator-ns", shortName)
|
|
|
|
expectMissing[corev1.Secret](t, fc, "operator-ns", fullName)
|
|
|
|
want = &corev1.Service{
|
|
|
|
TypeMeta: metav1.TypeMeta{
|
|
|
|
Kind: "Service",
|
|
|
|
APIVersion: "v1",
|
|
|
|
},
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
Annotations: map[string]string{
|
|
|
|
"tailscale.com/hostname": "reindeer-flotilla",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
},
|
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, want, nil)
|
2023-01-25 18:16:59 +00:00
|
|
|
}
|
|
|
|
|
2023-05-17 10:54:27 +00:00
|
|
|
func TestCustomPriorityClassName(t *testing.T) {
|
|
|
|
fc := fake.NewFakeClient()
|
|
|
|
ft := &fakeTSClient{}
|
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
sr := &ServiceReconciler{
|
2023-08-23 15:20:14 +00:00
|
|
|
Client: fc,
|
|
|
|
ssr: &tailscaleSTSReconciler{
|
|
|
|
Client: fc,
|
|
|
|
tsClient: ft,
|
|
|
|
defaultTags: []string{"tag:k8s"},
|
|
|
|
operatorNamespace: "operator-ns",
|
|
|
|
proxyImage: "tailscale/tailscale",
|
2023-10-17 17:05:02 +00:00
|
|
|
proxyPriorityClassName: "custom-priority-class-name",
|
2023-08-23 15:20:14 +00:00
|
|
|
},
|
|
|
|
logger: zl.Sugar(),
|
2023-05-17 10:54:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Create a service that we should manage, and check that the initial round
|
|
|
|
// of objects looks right.
|
|
|
|
mustCreate(t, fc, &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
// The apiserver is supposed to set the UID, but the fake client
|
|
|
|
// doesn't. So, set it explicitly because other code later depends
|
|
|
|
// on it being set.
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
Annotations: map[string]string{
|
|
|
|
"tailscale.com/expose": "true",
|
2023-10-17 17:05:02 +00:00
|
|
|
"tailscale.com/hostname": "tailscale-critical",
|
2023-05-17 10:54:27 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeClusterIP,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
2023-12-14 13:51:59 +00:00
|
|
|
fullName, shortName := findGenName(t, fc, "default", "test", "svc")
|
2024-01-09 14:13:22 +00:00
|
|
|
o := configOpts{
|
|
|
|
stsName: shortName,
|
2023-10-17 17:05:02 +00:00
|
|
|
secretName: fullName,
|
2024-01-09 14:13:22 +00:00
|
|
|
namespace: "default",
|
|
|
|
parentType: "svc",
|
2023-10-17 17:05:02 +00:00
|
|
|
hostname: "tailscale-critical",
|
|
|
|
priorityClassName: "custom-priority-class-name",
|
2024-01-09 14:13:22 +00:00
|
|
|
clusterTargetIP: "10.20.30.40",
|
2023-10-17 17:05:02 +00:00
|
|
|
}
|
2023-05-17 10:54:27 +00:00
|
|
|
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), removeHashAnnotation)
|
2024-02-13 05:27:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestProxyClassForService(t *testing.T) {
|
|
|
|
// Setup
|
|
|
|
pc := &tsapi.ProxyClass{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{Name: "custom-metadata"},
|
|
|
|
Spec: tsapi.ProxyClassSpec{StatefulSet: &tsapi.StatefulSet{
|
|
|
|
Labels: map[string]string{"foo": "bar"},
|
|
|
|
Annotations: map[string]string{"bar.io/foo": "some-val"},
|
|
|
|
Pod: &tsapi.Pod{Annotations: map[string]string{"foo.io/bar": "some-val"}}}},
|
|
|
|
}
|
|
|
|
fc := fake.NewClientBuilder().
|
|
|
|
WithScheme(tsapi.GlobalScheme).
|
|
|
|
WithObjects(pc).
|
|
|
|
WithStatusSubresource(pc).
|
|
|
|
Build()
|
|
|
|
ft := &fakeTSClient{}
|
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
sr := &ServiceReconciler{
|
|
|
|
Client: fc,
|
|
|
|
ssr: &tailscaleSTSReconciler{
|
|
|
|
Client: fc,
|
|
|
|
tsClient: ft,
|
|
|
|
defaultTags: []string{"tag:k8s"},
|
|
|
|
operatorNamespace: "operator-ns",
|
|
|
|
proxyImage: "tailscale/tailscale",
|
|
|
|
},
|
|
|
|
logger: zl.Sugar(),
|
|
|
|
}
|
|
|
|
|
|
|
|
// 1. A new tailscale LoadBalancer Service is created without any
|
|
|
|
// ProxyClass. Resources get created for it as usual.
|
|
|
|
mustCreate(t, fc, &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
// The apiserver is supposed to set the UID, but the fake client
|
|
|
|
// doesn't. So, set it explicitly because other code later depends
|
|
|
|
// on it being set.
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeLoadBalancer,
|
|
|
|
LoadBalancerClass: ptr.To("tailscale"),
|
|
|
|
},
|
|
|
|
})
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
fullName, shortName := findGenName(t, fc, "default", "test", "svc")
|
|
|
|
opts := configOpts{
|
|
|
|
stsName: shortName,
|
|
|
|
secretName: fullName,
|
|
|
|
namespace: "default",
|
|
|
|
parentType: "svc",
|
|
|
|
hostname: "default-test",
|
|
|
|
clusterTargetIP: "10.20.30.40",
|
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedSecret(t, opts), nil)
|
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName, "svc"), nil)
|
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, opts), removeHashAnnotation)
|
2024-02-13 05:27:54 +00:00
|
|
|
|
|
|
|
// 2. The Service gets updated with tailscale.com/proxy-class label
|
|
|
|
// pointing at the 'custom-metadata' ProxyClass. The ProxyClass is not
|
|
|
|
// yet ready, so no changes are actually applied to the proxy resources.
|
|
|
|
mustUpdate(t, fc, "default", "test", func(svc *corev1.Service) {
|
|
|
|
mak.Set(&svc.Labels, LabelProxyClass, "custom-metadata")
|
|
|
|
})
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, opts), removeHashAnnotation)
|
2024-02-13 05:27:54 +00:00
|
|
|
|
|
|
|
// 3. ProxyClass is set to Ready, the Service gets reconciled by the
|
|
|
|
// services-reconciler and the customization from the ProxyClass is
|
|
|
|
// applied to the proxy resources.
|
|
|
|
mustUpdateStatus(t, fc, "", "custom-metadata", func(pc *tsapi.ProxyClass) {
|
|
|
|
pc.Status = tsapi.ProxyClassStatus{
|
|
|
|
Conditions: []tsapi.ConnectorCondition{{
|
|
|
|
Status: metav1.ConditionTrue,
|
|
|
|
Type: tsapi.ProxyClassready,
|
|
|
|
ObservedGeneration: pc.Generation,
|
|
|
|
}}}
|
|
|
|
})
|
|
|
|
opts.proxyClass = pc.Name
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, opts), removeHashAnnotation)
|
2024-02-13 05:27:54 +00:00
|
|
|
|
|
|
|
// 4. tailscale.com/proxy-class label is removed from the Service, the
|
|
|
|
// configuration from the ProxyClass is removed from the cluster
|
|
|
|
// resources.
|
|
|
|
mustUpdate(t, fc, "default", "test", func(svc *corev1.Service) {
|
|
|
|
delete(svc.Labels, LabelProxyClass)
|
|
|
|
})
|
|
|
|
opts.proxyClass = ""
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, opts), removeHashAnnotation)
|
2023-05-17 10:54:27 +00:00
|
|
|
}
|
|
|
|
|
2023-08-17 00:35:36 +00:00
|
|
|
func TestDefaultLoadBalancer(t *testing.T) {
|
|
|
|
fc := fake.NewFakeClient()
|
|
|
|
ft := &fakeTSClient{}
|
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
sr := &ServiceReconciler{
|
|
|
|
Client: fc,
|
|
|
|
ssr: &tailscaleSTSReconciler{
|
|
|
|
Client: fc,
|
|
|
|
tsClient: ft,
|
|
|
|
defaultTags: []string{"tag:k8s"},
|
|
|
|
operatorNamespace: "operator-ns",
|
|
|
|
proxyImage: "tailscale/tailscale",
|
|
|
|
},
|
|
|
|
logger: zl.Sugar(),
|
|
|
|
isDefaultLoadBalancer: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a service that we should manage, and check that the initial round
|
|
|
|
// of objects looks right.
|
|
|
|
mustCreate(t, fc, &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
// The apiserver is supposed to set the UID, but the fake client
|
|
|
|
// doesn't. So, set it explicitly because other code later depends
|
|
|
|
// on it being set.
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeLoadBalancer,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
2023-12-14 13:51:59 +00:00
|
|
|
fullName, shortName := findGenName(t, fc, "default", "test", "svc")
|
2023-08-17 00:35:36 +00:00
|
|
|
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedHeadlessService(shortName, "svc"), nil)
|
2024-01-09 14:13:22 +00:00
|
|
|
o := configOpts{
|
|
|
|
stsName: shortName,
|
|
|
|
secretName: fullName,
|
|
|
|
namespace: "default",
|
|
|
|
parentType: "svc",
|
|
|
|
hostname: "default-test",
|
|
|
|
clusterTargetIP: "10.20.30.40",
|
2023-10-17 17:05:02 +00:00
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), removeHashAnnotation)
|
|
|
|
|
2023-10-17 17:05:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestProxyFirewallMode(t *testing.T) {
|
|
|
|
fc := fake.NewFakeClient()
|
|
|
|
ft := &fakeTSClient{}
|
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
sr := &ServiceReconciler{
|
|
|
|
Client: fc,
|
|
|
|
ssr: &tailscaleSTSReconciler{
|
|
|
|
Client: fc,
|
|
|
|
tsClient: ft,
|
|
|
|
defaultTags: []string{"tag:k8s"},
|
|
|
|
operatorNamespace: "operator-ns",
|
|
|
|
proxyImage: "tailscale/tailscale",
|
|
|
|
tsFirewallMode: "nftables",
|
|
|
|
},
|
|
|
|
logger: zl.Sugar(),
|
|
|
|
isDefaultLoadBalancer: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a service that we should manage, and check that the initial round
|
|
|
|
// of objects looks right.
|
|
|
|
mustCreate(t, fc, &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
// The apiserver is supposed to set the UID, but the fake client
|
|
|
|
// doesn't. So, set it explicitly because other code later depends
|
|
|
|
// on it being set.
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeLoadBalancer,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
2023-12-14 13:51:59 +00:00
|
|
|
fullName, shortName := findGenName(t, fc, "default", "test", "svc")
|
2024-01-09 14:13:22 +00:00
|
|
|
o := configOpts{
|
|
|
|
stsName: shortName,
|
|
|
|
secretName: fullName,
|
|
|
|
namespace: "default",
|
|
|
|
parentType: "svc",
|
|
|
|
hostname: "default-test",
|
|
|
|
firewallMode: "nftables",
|
|
|
|
clusterTargetIP: "10.20.30.40",
|
2023-10-17 17:05:02 +00:00
|
|
|
}
|
2024-03-19 14:54:17 +00:00
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), removeHashAnnotation)
|
|
|
|
}
|
2023-10-17 17:05:02 +00:00
|
|
|
|
2024-03-19 14:54:17 +00:00
|
|
|
func TestTailscaledConfigfileHash(t *testing.T) {
|
|
|
|
fc := fake.NewFakeClient()
|
|
|
|
ft := &fakeTSClient{}
|
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
sr := &ServiceReconciler{
|
|
|
|
Client: fc,
|
|
|
|
ssr: &tailscaleSTSReconciler{
|
|
|
|
Client: fc,
|
|
|
|
tsClient: ft,
|
|
|
|
defaultTags: []string{"tag:k8s"},
|
|
|
|
operatorNamespace: "operator-ns",
|
|
|
|
proxyImage: "tailscale/tailscale",
|
|
|
|
},
|
|
|
|
logger: zl.Sugar(),
|
|
|
|
isDefaultLoadBalancer: true,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a service that we should manage, and check that the initial round
|
|
|
|
// of objects looks right.
|
|
|
|
mustCreate(t, fc, &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "test",
|
|
|
|
Namespace: "default",
|
|
|
|
// The apiserver is supposed to set the UID, but the fake client
|
|
|
|
// doesn't. So, set it explicitly because other code later depends
|
|
|
|
// on it being set.
|
|
|
|
UID: types.UID("1234-UID"),
|
|
|
|
},
|
|
|
|
Spec: corev1.ServiceSpec{
|
|
|
|
ClusterIP: "10.20.30.40",
|
|
|
|
Type: corev1.ServiceTypeLoadBalancer,
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
|
|
|
|
fullName, shortName := findGenName(t, fc, "default", "test", "svc")
|
|
|
|
o := configOpts{
|
|
|
|
stsName: shortName,
|
|
|
|
secretName: fullName,
|
|
|
|
namespace: "default",
|
|
|
|
parentType: "svc",
|
|
|
|
hostname: "default-test",
|
|
|
|
clusterTargetIP: "10.20.30.40",
|
|
|
|
confFileHash: "705e5ffd0bd5326237efdf542c850a65a54101284d5daa30775420fcc64d89c1",
|
|
|
|
}
|
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), nil)
|
|
|
|
|
|
|
|
// 2. Hostname gets changed, configfile is updated and a new hash value
|
|
|
|
// is produced.
|
|
|
|
mustUpdate(t, fc, "default", "test", func(svc *corev1.Service) {
|
|
|
|
mak.Set(&svc.Annotations, AnnotationHostname, "another-test")
|
|
|
|
})
|
|
|
|
o.hostname = "another-test"
|
|
|
|
o.confFileHash = "1a087f887825d2b75d3673c7c2b0131f8ec1f0b1cb761d33e236dd28350dfe23"
|
|
|
|
expectReconciled(t, sr, "default", "test")
|
|
|
|
expectEqual(t, fc, expectedSTS(t, fc, o), nil)
|
2023-08-17 00:35:36 +00:00
|
|
|
}
|
2024-04-08 20:31:52 +00:00
|
|
|
|
2023-11-24 16:24:48 +00:00
|
|
|
func Test_isMagicDNSName(t *testing.T) {
|
|
|
|
tests := []struct {
|
|
|
|
in string
|
|
|
|
want bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
in: "foo.tail4567.ts.net",
|
|
|
|
want: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
in: "foo.tail4567.ts.net.",
|
|
|
|
want: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
in: "foo.tail4567",
|
|
|
|
want: false,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.in, func(t *testing.T) {
|
|
|
|
if got := isMagicDNSName(tt.in); got != tt.want {
|
|
|
|
t.Errorf("isMagicDNSName(%q) = %v, want %v", tt.in, got, tt.want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2024-02-27 15:19:53 +00:00
|
|
|
|
|
|
|
func Test_serviceHandlerForIngress(t *testing.T) {
|
|
|
|
fc := fake.NewFakeClient()
|
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 1. An event on a headless Service for a tailscale Ingress results in
|
|
|
|
// the Ingress being reconciled.
|
|
|
|
mustCreate(t, fc, &networkingv1.Ingress{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "ing-1",
|
|
|
|
Namespace: "ns-1",
|
|
|
|
},
|
|
|
|
Spec: networkingv1.IngressSpec{IngressClassName: ptr.To(tailscaleIngressClassName)},
|
|
|
|
})
|
|
|
|
svc1 := &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "headless-1",
|
|
|
|
Namespace: "tailscale",
|
|
|
|
Labels: map[string]string{
|
|
|
|
LabelManaged: "true",
|
|
|
|
LabelParentName: "ing-1",
|
|
|
|
LabelParentNamespace: "ns-1",
|
|
|
|
LabelParentType: "ingress",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
mustCreate(t, fc, svc1)
|
|
|
|
wantReqs := []reconcile.Request{{NamespacedName: types.NamespacedName{Namespace: "ns-1", Name: "ing-1"}}}
|
|
|
|
gotReqs := serviceHandlerForIngress(fc, zl.Sugar())(context.Background(), svc1)
|
|
|
|
if diff := cmp.Diff(gotReqs, wantReqs); diff != "" {
|
|
|
|
t.Fatalf("unexpected reconcile requests (-got +want):\n%s", diff)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 2. An event on a Service that is the default backend for a tailscale
|
|
|
|
// Ingress results in the Ingress being reconciled.
|
|
|
|
mustCreate(t, fc, &networkingv1.Ingress{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "ing-2",
|
|
|
|
Namespace: "ns-2",
|
|
|
|
},
|
|
|
|
Spec: networkingv1.IngressSpec{
|
|
|
|
DefaultBackend: &networkingv1.IngressBackend{
|
|
|
|
Service: &networkingv1.IngressServiceBackend{Name: "def-backend"},
|
|
|
|
},
|
|
|
|
IngressClassName: ptr.To(tailscaleIngressClassName),
|
|
|
|
},
|
|
|
|
})
|
|
|
|
backendSvc := &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "def-backend",
|
|
|
|
Namespace: "ns-2",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
mustCreate(t, fc, backendSvc)
|
|
|
|
wantReqs = []reconcile.Request{{NamespacedName: types.NamespacedName{Namespace: "ns-2", Name: "ing-2"}}}
|
|
|
|
gotReqs = serviceHandlerForIngress(fc, zl.Sugar())(context.Background(), backendSvc)
|
|
|
|
if diff := cmp.Diff(gotReqs, wantReqs); diff != "" {
|
|
|
|
t.Fatalf("unexpected reconcile requests (-got +want):\n%s", diff)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 3. An event on a Service that is one of the non-default backends for
|
|
|
|
// a tailscale Ingress results in the Ingress being reconciled.
|
|
|
|
mustCreate(t, fc, &networkingv1.Ingress{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "ing-3",
|
|
|
|
Namespace: "ns-3",
|
|
|
|
},
|
|
|
|
Spec: networkingv1.IngressSpec{
|
|
|
|
IngressClassName: ptr.To(tailscaleIngressClassName),
|
|
|
|
Rules: []networkingv1.IngressRule{{IngressRuleValue: networkingv1.IngressRuleValue{HTTP: &networkingv1.HTTPIngressRuleValue{
|
|
|
|
Paths: []networkingv1.HTTPIngressPath{
|
|
|
|
{Backend: networkingv1.IngressBackend{Service: &networkingv1.IngressServiceBackend{Name: "backend"}}}},
|
|
|
|
}}}},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
backendSvc2 := &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "backend",
|
|
|
|
Namespace: "ns-3",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
mustCreate(t, fc, backendSvc2)
|
|
|
|
wantReqs = []reconcile.Request{{NamespacedName: types.NamespacedName{Namespace: "ns-3", Name: "ing-3"}}}
|
|
|
|
gotReqs = serviceHandlerForIngress(fc, zl.Sugar())(context.Background(), backendSvc2)
|
|
|
|
if diff := cmp.Diff(gotReqs, wantReqs); diff != "" {
|
|
|
|
t.Fatalf("unexpected reconcile requests (-got +want):\n%s", diff)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 4. An event on a Service that is a backend for an Ingress that is not
|
|
|
|
// tailscale Ingress does not result in an Ingress reconcile.
|
|
|
|
mustCreate(t, fc, &networkingv1.Ingress{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "ing-4",
|
|
|
|
Namespace: "ns-4",
|
|
|
|
},
|
|
|
|
Spec: networkingv1.IngressSpec{
|
|
|
|
Rules: []networkingv1.IngressRule{{IngressRuleValue: networkingv1.IngressRuleValue{HTTP: &networkingv1.HTTPIngressRuleValue{
|
|
|
|
Paths: []networkingv1.HTTPIngressPath{
|
|
|
|
{Backend: networkingv1.IngressBackend{Service: &networkingv1.IngressServiceBackend{Name: "non-ts-backend"}}}},
|
|
|
|
}}}},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
nonTSBackend := &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "non-ts-backend",
|
|
|
|
Namespace: "ns-4",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
mustCreate(t, fc, nonTSBackend)
|
|
|
|
gotReqs = serviceHandlerForIngress(fc, zl.Sugar())(context.Background(), nonTSBackend)
|
|
|
|
if len(gotReqs) > 0 {
|
|
|
|
t.Errorf("unexpected reconcile request for a Service that does not belong to a Tailscale Ingress: %#+v\n", gotReqs)
|
|
|
|
}
|
|
|
|
|
|
|
|
// 5. An event on a Service not related to any Ingress does not result
|
|
|
|
// in an Ingress reconcile.
|
|
|
|
someSvc := &corev1.Service{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
|
|
Name: "some-svc",
|
|
|
|
Namespace: "ns-4",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
mustCreate(t, fc, someSvc)
|
|
|
|
gotReqs = serviceHandlerForIngress(fc, zl.Sugar())(context.Background(), someSvc)
|
|
|
|
if len(gotReqs) > 0 {
|
|
|
|
t.Errorf("unexpected reconcile request for a Service that does not belong to any Ingress: %#+v\n", gotReqs)
|
|
|
|
}
|
|
|
|
}
|
2024-04-19 15:49:46 +00:00
|
|
|
|
|
|
|
func Test_clusterDomainFromResolverConf(t *testing.T) {
|
|
|
|
zl, err := zap.NewDevelopment()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
conf *resolvconffile.Config
|
|
|
|
namespace string
|
|
|
|
want string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "success- custom domain",
|
|
|
|
conf: &resolvconffile.Config{
|
|
|
|
SearchDomains: []dnsname.FQDN{toFQDN(t, "foo.svc.department.org.io"), toFQDN(t, "svc.department.org.io"), toFQDN(t, "department.org.io")},
|
|
|
|
},
|
|
|
|
namespace: "foo",
|
|
|
|
want: "department.org.io",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "success- default domain",
|
|
|
|
conf: &resolvconffile.Config{
|
|
|
|
SearchDomains: []dnsname.FQDN{toFQDN(t, "foo.svc.cluster.local."), toFQDN(t, "svc.cluster.local."), toFQDN(t, "cluster.local.")},
|
|
|
|
},
|
|
|
|
namespace: "foo",
|
|
|
|
want: "cluster.local",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "only two search domains found",
|
|
|
|
conf: &resolvconffile.Config{
|
|
|
|
SearchDomains: []dnsname.FQDN{toFQDN(t, "svc.department.org.io"), toFQDN(t, "department.org.io")},
|
|
|
|
},
|
|
|
|
namespace: "foo",
|
|
|
|
want: "cluster.local",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "first search domain does not match the expected structure",
|
|
|
|
conf: &resolvconffile.Config{
|
|
|
|
SearchDomains: []dnsname.FQDN{toFQDN(t, "foo.bar.department.org.io"), toFQDN(t, "svc.department.org.io"), toFQDN(t, "some.other.fqdn")},
|
|
|
|
},
|
|
|
|
namespace: "foo",
|
|
|
|
want: "cluster.local",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "second search domain does not match the expected structure",
|
|
|
|
conf: &resolvconffile.Config{
|
|
|
|
SearchDomains: []dnsname.FQDN{toFQDN(t, "foo.svc.department.org.io"), toFQDN(t, "foo.department.org.io"), toFQDN(t, "some.other.fqdn")},
|
|
|
|
},
|
|
|
|
namespace: "foo",
|
|
|
|
want: "cluster.local",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "third search domain does not match the expected structure",
|
|
|
|
conf: &resolvconffile.Config{
|
|
|
|
SearchDomains: []dnsname.FQDN{toFQDN(t, "foo.svc.department.org.io"), toFQDN(t, "svc.department.org.io"), toFQDN(t, "some.other.fqdn")},
|
|
|
|
},
|
|
|
|
namespace: "foo",
|
|
|
|
want: "cluster.local",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
if got := clusterDomainFromResolverConf(tt.conf, tt.namespace, zl.Sugar()); got != tt.want {
|
|
|
|
t.Errorf("clusterDomainFromResolverConf() = %v, want %v", got, tt.want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func toFQDN(t *testing.T, s string) dnsname.FQDN {
|
|
|
|
t.Helper()
|
|
|
|
fqdn, err := dnsname.ToFQDN(s)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("error coverting %q to dnsname.FQDN: %v", s, err)
|
|
|
|
}
|
|
|
|
return fqdn
|
|
|
|
}
|