mirror of
https://github.com/tailscale/tailscale.git
synced 2024-11-30 05:25:35 +00:00
98f4dd9857
cmd/k8s-operator,k8s-operator,kube: Add TSRecorder CRD + controller Deploys tsrecorder images to the operator's cluster. S3 storage is configured via environment variables from a k8s Secret. Currently only supports a single tsrecorder replica, but I've tried to take early steps towards supporting multiple replicas by e.g. having a separate secret for auth and state storage. Example CR: ```yaml apiVersion: tailscale.com/v1alpha1 kind: Recorder metadata: name: rec spec: enableUI: true ``` Updates #13298 Signed-off-by: Tom Proctor <tomhjp@users.noreply.github.com>
144 lines
4.7 KiB
Go
144 lines
4.7 KiB
Go
// Copyright (c) Tailscale Inc & AUTHORS
|
|
// SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
//go:build !plan9
|
|
|
|
package main
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/google/go-cmp/cmp"
|
|
corev1 "k8s.io/api/core/v1"
|
|
"k8s.io/apimachinery/pkg/api/resource"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
tsapi "tailscale.com/k8s-operator/apis/v1alpha1"
|
|
"tailscale.com/types/ptr"
|
|
)
|
|
|
|
func TestRecorderSpecs(t *testing.T) {
|
|
t.Run("ensure spec fields are passed through correctly", func(t *testing.T) {
|
|
tsr := &tsapi.Recorder{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: "test",
|
|
},
|
|
Spec: tsapi.RecorderSpec{
|
|
StatefulSet: tsapi.RecorderStatefulSet{
|
|
Labels: map[string]string{
|
|
"ss-label-key": "ss-label-value",
|
|
},
|
|
Annotations: map[string]string{
|
|
"ss-annotation-key": "ss-annotation-value",
|
|
},
|
|
Pod: tsapi.RecorderPod{
|
|
Labels: map[string]string{
|
|
"pod-label-key": "pod-label-value",
|
|
},
|
|
Annotations: map[string]string{
|
|
"pod-annotation-key": "pod-annotation-value",
|
|
},
|
|
Affinity: &corev1.Affinity{
|
|
PodAffinity: &corev1.PodAffinity{
|
|
RequiredDuringSchedulingIgnoredDuringExecution: []corev1.PodAffinityTerm{{
|
|
LabelSelector: &metav1.LabelSelector{
|
|
MatchLabels: map[string]string{
|
|
"match-label": "match-value",
|
|
},
|
|
}},
|
|
},
|
|
},
|
|
},
|
|
SecurityContext: &corev1.PodSecurityContext{
|
|
RunAsUser: ptr.To[int64](1000),
|
|
},
|
|
ImagePullSecrets: []corev1.LocalObjectReference{{
|
|
Name: "img-pull",
|
|
}},
|
|
NodeSelector: map[string]string{
|
|
"some-node": "selector",
|
|
},
|
|
Tolerations: []corev1.Toleration{{
|
|
Key: "key",
|
|
Value: "value",
|
|
TolerationSeconds: ptr.To[int64](60),
|
|
}},
|
|
Container: tsapi.RecorderContainer{
|
|
Env: []tsapi.Env{{
|
|
Name: "some_env",
|
|
Value: "env_value",
|
|
}},
|
|
Image: "custom-image",
|
|
ImagePullPolicy: corev1.PullAlways,
|
|
SecurityContext: &corev1.SecurityContext{
|
|
Capabilities: &corev1.Capabilities{
|
|
Add: []corev1.Capability{
|
|
"NET_ADMIN",
|
|
},
|
|
},
|
|
},
|
|
Resources: corev1.ResourceRequirements{
|
|
Limits: corev1.ResourceList{
|
|
corev1.ResourceCPU: resource.MustParse("100m"),
|
|
},
|
|
Requests: corev1.ResourceList{
|
|
corev1.ResourceCPU: resource.MustParse("50m"),
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
ss := tsrStatefulSet(tsr, tsNamespace)
|
|
|
|
// StatefulSet-level.
|
|
if diff := cmp.Diff(ss.Annotations, tsr.Spec.StatefulSet.Annotations); diff != "" {
|
|
t.Errorf("(-got +want):\n%s", diff)
|
|
}
|
|
if diff := cmp.Diff(ss.Spec.Template.Annotations, tsr.Spec.StatefulSet.Pod.Annotations); diff != "" {
|
|
t.Errorf("(-got +want):\n%s", diff)
|
|
}
|
|
|
|
// Pod-level.
|
|
if diff := cmp.Diff(ss.Labels, labels("recorder", "test", tsr.Spec.StatefulSet.Labels)); diff != "" {
|
|
t.Errorf("(-got +want):\n%s", diff)
|
|
}
|
|
if diff := cmp.Diff(ss.Spec.Template.Labels, labels("recorder", "test", tsr.Spec.StatefulSet.Pod.Labels)); diff != "" {
|
|
t.Errorf("(-got +want):\n%s", diff)
|
|
}
|
|
if diff := cmp.Diff(ss.Spec.Template.Spec.Affinity, tsr.Spec.StatefulSet.Pod.Affinity); diff != "" {
|
|
t.Errorf("(-got +want):\n%s", diff)
|
|
}
|
|
if diff := cmp.Diff(ss.Spec.Template.Spec.SecurityContext, tsr.Spec.StatefulSet.Pod.SecurityContext); diff != "" {
|
|
t.Errorf("(-got +want):\n%s", diff)
|
|
}
|
|
if diff := cmp.Diff(ss.Spec.Template.Spec.ImagePullSecrets, tsr.Spec.StatefulSet.Pod.ImagePullSecrets); diff != "" {
|
|
t.Errorf("(-got +want):\n%s", diff)
|
|
}
|
|
if diff := cmp.Diff(ss.Spec.Template.Spec.NodeSelector, tsr.Spec.StatefulSet.Pod.NodeSelector); diff != "" {
|
|
t.Errorf("(-got +want):\n%s", diff)
|
|
}
|
|
if diff := cmp.Diff(ss.Spec.Template.Spec.Tolerations, tsr.Spec.StatefulSet.Pod.Tolerations); diff != "" {
|
|
t.Errorf("(-got +want):\n%s", diff)
|
|
}
|
|
|
|
// Container-level.
|
|
if diff := cmp.Diff(ss.Spec.Template.Spec.Containers[0].Env, env(tsr)); diff != "" {
|
|
t.Errorf("(-got +want):\n%s", diff)
|
|
}
|
|
if diff := cmp.Diff(ss.Spec.Template.Spec.Containers[0].Image, tsr.Spec.StatefulSet.Pod.Container.Image); diff != "" {
|
|
t.Errorf("(-got +want):\n%s", diff)
|
|
}
|
|
if diff := cmp.Diff(ss.Spec.Template.Spec.Containers[0].ImagePullPolicy, tsr.Spec.StatefulSet.Pod.Container.ImagePullPolicy); diff != "" {
|
|
t.Errorf("(-got +want):\n%s", diff)
|
|
}
|
|
if diff := cmp.Diff(ss.Spec.Template.Spec.Containers[0].SecurityContext, tsr.Spec.StatefulSet.Pod.Container.SecurityContext); diff != "" {
|
|
t.Errorf("(-got +want):\n%s", diff)
|
|
}
|
|
if diff := cmp.Diff(ss.Spec.Template.Spec.Containers[0].Resources, tsr.Spec.StatefulSet.Pod.Container.Resources); diff != "" {
|
|
t.Errorf("(-got +want):\n%s", diff)
|
|
}
|
|
})
|
|
}
|