mirror of
				https://github.com/optim-enterprises-bv/kubernetes.git
				synced 2025-11-04 04:08:16 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			808 lines
		
	
	
		
			21 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			808 lines
		
	
	
		
			21 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
Copyright 2016 The Kubernetes Authors.
 | 
						|
 | 
						|
Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
you may not use this file except in compliance with the License.
 | 
						|
You may obtain a copy of the License at
 | 
						|
 | 
						|
    http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
Unless required by applicable law or agreed to in writing, software
 | 
						|
distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
See the License for the specific language governing permissions and
 | 
						|
limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package cloud
 | 
						|
 | 
						|
import (
 | 
						|
	"testing"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"github.com/golang/glog"
 | 
						|
 | 
						|
	"k8s.io/kubernetes/pkg/api/v1"
 | 
						|
	"k8s.io/kubernetes/pkg/client/clientset_generated/clientset/fake"
 | 
						|
 | 
						|
	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | 
						|
	"k8s.io/apimachinery/pkg/types"
 | 
						|
	"k8s.io/apimachinery/pkg/util/wait"
 | 
						|
	clientv1 "k8s.io/client-go/pkg/api/v1"
 | 
						|
	"k8s.io/client-go/tools/record"
 | 
						|
	"k8s.io/kubernetes/pkg/api"
 | 
						|
	informers "k8s.io/kubernetes/pkg/client/informers/informers_generated/externalversions"
 | 
						|
	"k8s.io/kubernetes/pkg/cloudprovider"
 | 
						|
	fakecloud "k8s.io/kubernetes/pkg/cloudprovider/providers/fake"
 | 
						|
	"k8s.io/kubernetes/pkg/controller"
 | 
						|
	"k8s.io/kubernetes/pkg/controller/node/testutil"
 | 
						|
	kubeletapis "k8s.io/kubernetes/pkg/kubelet/apis"
 | 
						|
	"k8s.io/kubernetes/plugin/pkg/scheduler/algorithm"
 | 
						|
)
 | 
						|
 | 
						|
// This test checks that the node is deleted when kubelet stops reporting
 | 
						|
// and cloud provider says node is gone
 | 
						|
func TestNodeDeleted(t *testing.T) {
 | 
						|
	pod0 := &v1.Pod{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Namespace: "default",
 | 
						|
			Name:      "pod0",
 | 
						|
		},
 | 
						|
		Spec: v1.PodSpec{
 | 
						|
			NodeName: "node0",
 | 
						|
		},
 | 
						|
		Status: v1.PodStatus{
 | 
						|
			Conditions: []v1.PodCondition{
 | 
						|
				{
 | 
						|
					Type:   v1.PodReady,
 | 
						|
					Status: v1.ConditionTrue,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	pod1 := &v1.Pod{
 | 
						|
		ObjectMeta: metav1.ObjectMeta{
 | 
						|
			Namespace: "default",
 | 
						|
			Name:      "pod1",
 | 
						|
		},
 | 
						|
		Spec: v1.PodSpec{
 | 
						|
			NodeName: "node0",
 | 
						|
		},
 | 
						|
		Status: v1.PodStatus{
 | 
						|
			Conditions: []v1.PodCondition{
 | 
						|
				{
 | 
						|
					Type:   v1.PodReady,
 | 
						|
					Status: v1.ConditionTrue,
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	fnh := &testutil.FakeNodeHandler{
 | 
						|
		Existing: []*v1.Node{
 | 
						|
			{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:              "node0",
 | 
						|
					CreationTimestamp: metav1.Date(2012, 1, 1, 0, 0, 0, 0, time.UTC),
 | 
						|
				},
 | 
						|
				Status: v1.NodeStatus{
 | 
						|
					Conditions: []v1.NodeCondition{
 | 
						|
						{
 | 
						|
							Type:               v1.NodeReady,
 | 
						|
							Status:             v1.ConditionUnknown,
 | 
						|
							LastHeartbeatTime:  metav1.Date(2015, 1, 1, 12, 0, 0, 0, time.UTC),
 | 
						|
							LastTransitionTime: metav1.Date(2015, 1, 1, 12, 0, 0, 0, time.UTC),
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Clientset:      fake.NewSimpleClientset(&v1.PodList{Items: []v1.Pod{*pod0, *pod1}}),
 | 
						|
		DeleteWaitChan: make(chan struct{}),
 | 
						|
	}
 | 
						|
 | 
						|
	factory := informers.NewSharedInformerFactory(fnh, controller.NoResyncPeriodFunc())
 | 
						|
 | 
						|
	eventBroadcaster := record.NewBroadcaster()
 | 
						|
	cloudNodeController := &CloudNodeController{
 | 
						|
		kubeClient:                fnh,
 | 
						|
		nodeInformer:              factory.Core().V1().Nodes(),
 | 
						|
		cloud:                     &fakecloud.FakeCloud{Err: cloudprovider.InstanceNotFound},
 | 
						|
		nodeMonitorPeriod:         1 * time.Second,
 | 
						|
		recorder:                  eventBroadcaster.NewRecorder(api.Scheme, clientv1.EventSource{Component: "cloud-controller-manager"}),
 | 
						|
		nodeStatusUpdateFrequency: 1 * time.Second,
 | 
						|
	}
 | 
						|
	eventBroadcaster.StartLogging(glog.Infof)
 | 
						|
 | 
						|
	cloudNodeController.Run()
 | 
						|
 | 
						|
	select {
 | 
						|
	case <-fnh.DeleteWaitChan:
 | 
						|
	case <-time.After(wait.ForeverTestTimeout):
 | 
						|
		t.Errorf("Timed out waiting %v for node to be deleted", wait.ForeverTestTimeout)
 | 
						|
	}
 | 
						|
	if len(fnh.DeletedNodes) != 1 || fnh.DeletedNodes[0].Name != "node0" {
 | 
						|
		t.Errorf("Node was not deleted")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// This test checks that a node with the external cloud provider taint is cloudprovider initialized
 | 
						|
func TestNodeInitialized(t *testing.T) {
 | 
						|
	fnh := &testutil.FakeNodeHandler{
 | 
						|
		Existing: []*v1.Node{
 | 
						|
			{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:              "node0",
 | 
						|
					CreationTimestamp: metav1.Date(2012, 1, 1, 0, 0, 0, 0, time.UTC),
 | 
						|
				},
 | 
						|
				Status: v1.NodeStatus{
 | 
						|
					Conditions: []v1.NodeCondition{
 | 
						|
						{
 | 
						|
							Type:               v1.NodeReady,
 | 
						|
							Status:             v1.ConditionUnknown,
 | 
						|
							LastHeartbeatTime:  metav1.Date(2015, 1, 1, 12, 0, 0, 0, time.UTC),
 | 
						|
							LastTransitionTime: metav1.Date(2015, 1, 1, 12, 0, 0, 0, time.UTC),
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Taints: []v1.Taint{
 | 
						|
						{
 | 
						|
							Key:    algorithm.TaintExternalCloudProvider,
 | 
						|
							Value:  "true",
 | 
						|
							Effect: v1.TaintEffectNoSchedule,
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Clientset:      fake.NewSimpleClientset(&v1.PodList{}),
 | 
						|
		DeleteWaitChan: make(chan struct{}),
 | 
						|
	}
 | 
						|
 | 
						|
	factory := informers.NewSharedInformerFactory(fnh, controller.NoResyncPeriodFunc())
 | 
						|
 | 
						|
	fakeCloud := &fakecloud.FakeCloud{
 | 
						|
		InstanceTypes: map[types.NodeName]string{
 | 
						|
			types.NodeName("node0"): "t1.micro",
 | 
						|
		},
 | 
						|
		Addresses: []v1.NodeAddress{
 | 
						|
			{
 | 
						|
				Type:    v1.NodeHostName,
 | 
						|
				Address: "node0.cloud.internal",
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Type:    v1.NodeInternalIP,
 | 
						|
				Address: "10.0.0.1",
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Type:    v1.NodeExternalIP,
 | 
						|
				Address: "132.143.154.163",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Err: nil,
 | 
						|
	}
 | 
						|
 | 
						|
	eventBroadcaster := record.NewBroadcaster()
 | 
						|
	cloudNodeController := &CloudNodeController{
 | 
						|
		kubeClient:                fnh,
 | 
						|
		nodeInformer:              factory.Core().V1().Nodes(),
 | 
						|
		cloud:                     fakeCloud,
 | 
						|
		nodeMonitorPeriod:         1 * time.Second,
 | 
						|
		recorder:                  eventBroadcaster.NewRecorder(api.Scheme, clientv1.EventSource{Component: "cloud-controller-manager"}),
 | 
						|
		nodeStatusUpdateFrequency: 1 * time.Second,
 | 
						|
	}
 | 
						|
	eventBroadcaster.StartLogging(glog.Infof)
 | 
						|
 | 
						|
	cloudNodeController.AddCloudNode(fnh.Existing[0])
 | 
						|
 | 
						|
	if len(fnh.UpdatedNodes) != 1 || fnh.UpdatedNodes[0].Name != "node0" {
 | 
						|
		t.Errorf("Node was not updated")
 | 
						|
	}
 | 
						|
 | 
						|
	if len(fnh.UpdatedNodes[0].Spec.Taints) != 0 {
 | 
						|
		t.Errorf("Node Taint was not removed after cloud init")
 | 
						|
	}
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
// This test checks that a node without the external cloud provider taint are NOT cloudprovider initialized
 | 
						|
func TestNodeIgnored(t *testing.T) {
 | 
						|
	fnh := &testutil.FakeNodeHandler{
 | 
						|
		Existing: []*v1.Node{
 | 
						|
			{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:              "node0",
 | 
						|
					CreationTimestamp: metav1.Date(2012, 1, 1, 0, 0, 0, 0, time.UTC),
 | 
						|
				},
 | 
						|
				Status: v1.NodeStatus{
 | 
						|
					Conditions: []v1.NodeCondition{
 | 
						|
						{
 | 
						|
							Type:               v1.NodeReady,
 | 
						|
							Status:             v1.ConditionUnknown,
 | 
						|
							LastHeartbeatTime:  metav1.Date(2015, 1, 1, 12, 0, 0, 0, time.UTC),
 | 
						|
							LastTransitionTime: metav1.Date(2015, 1, 1, 12, 0, 0, 0, time.UTC),
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Clientset:      fake.NewSimpleClientset(&v1.PodList{}),
 | 
						|
		DeleteWaitChan: make(chan struct{}),
 | 
						|
	}
 | 
						|
 | 
						|
	factory := informers.NewSharedInformerFactory(fnh, controller.NoResyncPeriodFunc())
 | 
						|
 | 
						|
	fakeCloud := &fakecloud.FakeCloud{
 | 
						|
		InstanceTypes: map[types.NodeName]string{
 | 
						|
			types.NodeName("node0"): "t1.micro",
 | 
						|
		},
 | 
						|
		Addresses: []v1.NodeAddress{
 | 
						|
			{
 | 
						|
				Type:    v1.NodeHostName,
 | 
						|
				Address: "node0.cloud.internal",
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Type:    v1.NodeInternalIP,
 | 
						|
				Address: "10.0.0.1",
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Type:    v1.NodeExternalIP,
 | 
						|
				Address: "132.143.154.163",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Err: nil,
 | 
						|
	}
 | 
						|
 | 
						|
	eventBroadcaster := record.NewBroadcaster()
 | 
						|
	cloudNodeController := &CloudNodeController{
 | 
						|
		kubeClient:        fnh,
 | 
						|
		nodeInformer:      factory.Core().V1().Nodes(),
 | 
						|
		cloud:             fakeCloud,
 | 
						|
		nodeMonitorPeriod: 5 * time.Second,
 | 
						|
		recorder:          eventBroadcaster.NewRecorder(api.Scheme, clientv1.EventSource{Component: "cloud-controller-manager"}),
 | 
						|
	}
 | 
						|
	eventBroadcaster.StartLogging(glog.Infof)
 | 
						|
 | 
						|
	cloudNodeController.AddCloudNode(fnh.Existing[0])
 | 
						|
 | 
						|
	if len(fnh.UpdatedNodes) != 0 {
 | 
						|
		t.Errorf("Node was wrongly updated")
 | 
						|
	}
 | 
						|
 | 
						|
}
 | 
						|
 | 
						|
// This test checks that a node with the external cloud provider taint is cloudprovider initialized and
 | 
						|
// the GCE route condition is added if cloudprovider is GCE
 | 
						|
func TestGCECondition(t *testing.T) {
 | 
						|
	fnh := &testutil.FakeNodeHandler{
 | 
						|
		Existing: []*v1.Node{
 | 
						|
			{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:              "node0",
 | 
						|
					CreationTimestamp: metav1.Date(2012, 1, 1, 0, 0, 0, 0, time.UTC),
 | 
						|
				},
 | 
						|
				Status: v1.NodeStatus{
 | 
						|
					Conditions: []v1.NodeCondition{
 | 
						|
						{
 | 
						|
							Type:               v1.NodeReady,
 | 
						|
							Status:             v1.ConditionUnknown,
 | 
						|
							LastHeartbeatTime:  metav1.Date(2015, 1, 1, 12, 0, 0, 0, time.UTC),
 | 
						|
							LastTransitionTime: metav1.Date(2015, 1, 1, 12, 0, 0, 0, time.UTC),
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Taints: []v1.Taint{
 | 
						|
						{
 | 
						|
							Key:    algorithm.TaintExternalCloudProvider,
 | 
						|
							Value:  "true",
 | 
						|
							Effect: v1.TaintEffectNoSchedule,
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Clientset:      fake.NewSimpleClientset(&v1.PodList{}),
 | 
						|
		DeleteWaitChan: make(chan struct{}),
 | 
						|
	}
 | 
						|
 | 
						|
	factory := informers.NewSharedInformerFactory(fnh, controller.NoResyncPeriodFunc())
 | 
						|
 | 
						|
	fakeCloud := &fakecloud.FakeCloud{
 | 
						|
		InstanceTypes: map[types.NodeName]string{
 | 
						|
			types.NodeName("node0"): "t1.micro",
 | 
						|
		},
 | 
						|
		Addresses: []v1.NodeAddress{
 | 
						|
			{
 | 
						|
				Type:    v1.NodeHostName,
 | 
						|
				Address: "node0.cloud.internal",
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Type:    v1.NodeInternalIP,
 | 
						|
				Address: "10.0.0.1",
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Type:    v1.NodeExternalIP,
 | 
						|
				Address: "132.143.154.163",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Provider: "gce",
 | 
						|
		Err:      nil,
 | 
						|
	}
 | 
						|
 | 
						|
	eventBroadcaster := record.NewBroadcaster()
 | 
						|
	cloudNodeController := &CloudNodeController{
 | 
						|
		kubeClient:        fnh,
 | 
						|
		nodeInformer:      factory.Core().V1().Nodes(),
 | 
						|
		cloud:             fakeCloud,
 | 
						|
		nodeMonitorPeriod: 1 * time.Second,
 | 
						|
		recorder:          eventBroadcaster.NewRecorder(api.Scheme, clientv1.EventSource{Component: "cloud-controller-manager"}),
 | 
						|
	}
 | 
						|
	eventBroadcaster.StartLogging(glog.Infof)
 | 
						|
 | 
						|
	cloudNodeController.AddCloudNode(fnh.Existing[0])
 | 
						|
 | 
						|
	if len(fnh.UpdatedNodes) != 1 && fnh.UpdatedNodes[0].Name != "node0" {
 | 
						|
		t.Errorf("Node was not updated")
 | 
						|
	}
 | 
						|
 | 
						|
	if len(fnh.UpdatedNodes[0].Status.Conditions) != 2 {
 | 
						|
		t.Errorf("No new conditions were added for GCE")
 | 
						|
	}
 | 
						|
 | 
						|
	conditionAdded := false
 | 
						|
	for _, cond := range fnh.UpdatedNodes[0].Status.Conditions {
 | 
						|
		if cond.Status == "True" && cond.Type == "NetworkUnavailable" && cond.Reason == "NoRouteCreated" {
 | 
						|
			conditionAdded = true
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if !conditionAdded {
 | 
						|
		t.Errorf("Network Route Condition for GCE not added by external cloud intializer")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// This test checks that a node with the external cloud provider taint is cloudprovider initialized and
 | 
						|
// and that zone labels are added correctly
 | 
						|
func TestZoneInitialized(t *testing.T) {
 | 
						|
	fnh := &testutil.FakeNodeHandler{
 | 
						|
		Existing: []*v1.Node{
 | 
						|
			{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:              "node0",
 | 
						|
					CreationTimestamp: metav1.Date(2012, 1, 1, 0, 0, 0, 0, time.UTC),
 | 
						|
					Labels:            map[string]string{},
 | 
						|
				},
 | 
						|
				Status: v1.NodeStatus{
 | 
						|
					Conditions: []v1.NodeCondition{
 | 
						|
						{
 | 
						|
							Type:               v1.NodeReady,
 | 
						|
							Status:             v1.ConditionUnknown,
 | 
						|
							LastHeartbeatTime:  metav1.Date(2015, 1, 1, 12, 0, 0, 0, time.UTC),
 | 
						|
							LastTransitionTime: metav1.Date(2015, 1, 1, 12, 0, 0, 0, time.UTC),
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Taints: []v1.Taint{
 | 
						|
						{
 | 
						|
							Key:    algorithm.TaintExternalCloudProvider,
 | 
						|
							Value:  "true",
 | 
						|
							Effect: v1.TaintEffectNoSchedule,
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Clientset:      fake.NewSimpleClientset(&v1.PodList{}),
 | 
						|
		DeleteWaitChan: make(chan struct{}),
 | 
						|
	}
 | 
						|
 | 
						|
	factory := informers.NewSharedInformerFactory(fnh, controller.NoResyncPeriodFunc())
 | 
						|
 | 
						|
	fakeCloud := &fakecloud.FakeCloud{
 | 
						|
		InstanceTypes: map[types.NodeName]string{
 | 
						|
			types.NodeName("node0"): "t1.micro",
 | 
						|
		},
 | 
						|
		Addresses: []v1.NodeAddress{
 | 
						|
			{
 | 
						|
				Type:    v1.NodeHostName,
 | 
						|
				Address: "node0.cloud.internal",
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Type:    v1.NodeInternalIP,
 | 
						|
				Address: "10.0.0.1",
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Type:    v1.NodeExternalIP,
 | 
						|
				Address: "132.143.154.163",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Provider: "aws",
 | 
						|
		Zone: cloudprovider.Zone{
 | 
						|
			FailureDomain: "us-west-1a",
 | 
						|
			Region:        "us-west",
 | 
						|
		},
 | 
						|
		Err: nil,
 | 
						|
	}
 | 
						|
 | 
						|
	eventBroadcaster := record.NewBroadcaster()
 | 
						|
	cloudNodeController := &CloudNodeController{
 | 
						|
		kubeClient:        fnh,
 | 
						|
		nodeInformer:      factory.Core().V1().Nodes(),
 | 
						|
		cloud:             fakeCloud,
 | 
						|
		nodeMonitorPeriod: 5 * time.Second,
 | 
						|
		recorder:          eventBroadcaster.NewRecorder(api.Scheme, clientv1.EventSource{Component: "cloud-controller-manager"}),
 | 
						|
	}
 | 
						|
	eventBroadcaster.StartLogging(glog.Infof)
 | 
						|
 | 
						|
	cloudNodeController.AddCloudNode(fnh.Existing[0])
 | 
						|
 | 
						|
	if len(fnh.UpdatedNodes) != 1 && fnh.UpdatedNodes[0].Name != "node0" {
 | 
						|
		t.Errorf("Node was not updated")
 | 
						|
	}
 | 
						|
 | 
						|
	if len(fnh.UpdatedNodes[0].ObjectMeta.Labels) != 2 {
 | 
						|
		t.Errorf("Node label for Region and Zone were not set")
 | 
						|
	}
 | 
						|
 | 
						|
	if fnh.UpdatedNodes[0].ObjectMeta.Labels[kubeletapis.LabelZoneRegion] != "us-west" {
 | 
						|
		t.Errorf("Node Region not correctly updated")
 | 
						|
	}
 | 
						|
 | 
						|
	if fnh.UpdatedNodes[0].ObjectMeta.Labels[kubeletapis.LabelZoneFailureDomain] != "us-west-1a" {
 | 
						|
		t.Errorf("Node FailureDomain not correctly updated")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// This test checks that a node with the external cloud provider taint is cloudprovider initialized and
 | 
						|
// and nodeAddresses are updated from the cloudprovider
 | 
						|
func TestNodeAddresses(t *testing.T) {
 | 
						|
	fnh := &testutil.FakeNodeHandler{
 | 
						|
		Existing: []*v1.Node{
 | 
						|
			{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:              "node0",
 | 
						|
					CreationTimestamp: metav1.Date(2012, 1, 1, 0, 0, 0, 0, time.UTC),
 | 
						|
					Labels:            map[string]string{},
 | 
						|
				},
 | 
						|
				Status: v1.NodeStatus{
 | 
						|
					Conditions: []v1.NodeCondition{
 | 
						|
						{
 | 
						|
							Type:               v1.NodeReady,
 | 
						|
							Status:             v1.ConditionUnknown,
 | 
						|
							LastHeartbeatTime:  metav1.Date(2015, 1, 1, 12, 0, 0, 0, time.UTC),
 | 
						|
							LastTransitionTime: metav1.Date(2015, 1, 1, 12, 0, 0, 0, time.UTC),
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Taints: []v1.Taint{
 | 
						|
						{
 | 
						|
							Key:    "ImproveCoverageTaint",
 | 
						|
							Value:  "true",
 | 
						|
							Effect: v1.TaintEffectNoSchedule,
 | 
						|
						},
 | 
						|
						{
 | 
						|
							Key:    algorithm.TaintExternalCloudProvider,
 | 
						|
							Value:  "true",
 | 
						|
							Effect: v1.TaintEffectNoSchedule,
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Clientset:      fake.NewSimpleClientset(&v1.PodList{}),
 | 
						|
		DeleteWaitChan: make(chan struct{}),
 | 
						|
	}
 | 
						|
 | 
						|
	factory := informers.NewSharedInformerFactory(fnh, controller.NoResyncPeriodFunc())
 | 
						|
 | 
						|
	fakeCloud := &fakecloud.FakeCloud{
 | 
						|
		InstanceTypes: map[types.NodeName]string{},
 | 
						|
		Addresses: []v1.NodeAddress{
 | 
						|
			{
 | 
						|
				Type:    v1.NodeHostName,
 | 
						|
				Address: "node0.cloud.internal",
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Type:    v1.NodeInternalIP,
 | 
						|
				Address: "10.0.0.1",
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Type:    v1.NodeExternalIP,
 | 
						|
				Address: "132.143.154.163",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Provider: "aws",
 | 
						|
		Zone: cloudprovider.Zone{
 | 
						|
			FailureDomain: "us-west-1a",
 | 
						|
			Region:        "us-west",
 | 
						|
		},
 | 
						|
		Err: nil,
 | 
						|
	}
 | 
						|
 | 
						|
	eventBroadcaster := record.NewBroadcaster()
 | 
						|
	cloudNodeController := &CloudNodeController{
 | 
						|
		kubeClient:                fnh,
 | 
						|
		nodeInformer:              factory.Core().V1().Nodes(),
 | 
						|
		cloud:                     fakeCloud,
 | 
						|
		nodeMonitorPeriod:         5 * time.Second,
 | 
						|
		nodeStatusUpdateFrequency: 1 * time.Second,
 | 
						|
		recorder:                  eventBroadcaster.NewRecorder(api.Scheme, clientv1.EventSource{Component: "cloud-controller-manager"}),
 | 
						|
	}
 | 
						|
	eventBroadcaster.StartLogging(glog.Infof)
 | 
						|
 | 
						|
	cloudNodeController.AddCloudNode(fnh.Existing[0])
 | 
						|
 | 
						|
	if len(fnh.UpdatedNodes) != 1 && fnh.UpdatedNodes[0].Name != "node0" {
 | 
						|
		t.Errorf("Node was not updated")
 | 
						|
	}
 | 
						|
 | 
						|
	if len(fnh.UpdatedNodes[0].Status.Addresses) != 3 {
 | 
						|
		t.Errorf("Node status not updated")
 | 
						|
	}
 | 
						|
 | 
						|
	fakeCloud.Addresses = []v1.NodeAddress{
 | 
						|
		{
 | 
						|
			Type:    v1.NodeHostName,
 | 
						|
			Address: "node0.cloud.internal",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Type:    v1.NodeInternalIP,
 | 
						|
			Address: "10.0.0.1",
 | 
						|
		},
 | 
						|
	}
 | 
						|
 | 
						|
	cloudNodeController.Run()
 | 
						|
 | 
						|
	<-time.After(2 * time.Second)
 | 
						|
 | 
						|
	updatedNodes := fnh.GetUpdatedNodesCopy()
 | 
						|
 | 
						|
	if len(updatedNodes[0].Status.Addresses) != 2 {
 | 
						|
		t.Errorf("Node Addresses not correctly updated")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// This test checks that a node with the external cloud provider taint is cloudprovider initialized and
 | 
						|
// and the provided node ip is validated with the cloudprovider and nodeAddresses are updated from the cloudprovider
 | 
						|
func TestNodeProvidedIPAddresses(t *testing.T) {
 | 
						|
	fnh := &testutil.FakeNodeHandler{
 | 
						|
		Existing: []*v1.Node{
 | 
						|
			{
 | 
						|
				ObjectMeta: metav1.ObjectMeta{
 | 
						|
					Name:              "node0",
 | 
						|
					CreationTimestamp: metav1.Date(2012, 1, 1, 0, 0, 0, 0, time.UTC),
 | 
						|
					Labels:            map[string]string{},
 | 
						|
					Annotations: map[string]string{
 | 
						|
						kubeletapis.AnnotationProvidedIPAddr: "10.0.0.1",
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Status: v1.NodeStatus{
 | 
						|
					Conditions: []v1.NodeCondition{
 | 
						|
						{
 | 
						|
							Type:               v1.NodeReady,
 | 
						|
							Status:             v1.ConditionUnknown,
 | 
						|
							LastHeartbeatTime:  metav1.Date(2015, 1, 1, 12, 0, 0, 0, time.UTC),
 | 
						|
							LastTransitionTime: metav1.Date(2015, 1, 1, 12, 0, 0, 0, time.UTC),
 | 
						|
						},
 | 
						|
					},
 | 
						|
					Addresses: []v1.NodeAddress{
 | 
						|
						{
 | 
						|
							Type:    v1.NodeHostName,
 | 
						|
							Address: "node0.cloud.internal",
 | 
						|
						},
 | 
						|
					},
 | 
						|
				},
 | 
						|
				Spec: v1.NodeSpec{
 | 
						|
					Taints: []v1.Taint{
 | 
						|
						{
 | 
						|
							Key:    "ImproveCoverageTaint",
 | 
						|
							Value:  "true",
 | 
						|
							Effect: v1.TaintEffectNoSchedule,
 | 
						|
						},
 | 
						|
						{
 | 
						|
							Key:    algorithm.TaintExternalCloudProvider,
 | 
						|
							Value:  "true",
 | 
						|
							Effect: v1.TaintEffectNoSchedule,
 | 
						|
						},
 | 
						|
					},
 | 
						|
					ProviderID: "node0.aws.12345",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Clientset:      fake.NewSimpleClientset(&v1.PodList{}),
 | 
						|
		DeleteWaitChan: make(chan struct{}),
 | 
						|
	}
 | 
						|
 | 
						|
	factory := informers.NewSharedInformerFactory(fnh, controller.NoResyncPeriodFunc())
 | 
						|
 | 
						|
	fakeCloud := &fakecloud.FakeCloud{
 | 
						|
		InstanceTypes: map[types.NodeName]string{
 | 
						|
			types.NodeName("node0"):           "t1.micro",
 | 
						|
			types.NodeName("node0.aws.12345"): "t2.macro",
 | 
						|
		},
 | 
						|
		Addresses: []v1.NodeAddress{
 | 
						|
			{
 | 
						|
				Type:    v1.NodeInternalIP,
 | 
						|
				Address: "10.0.0.1",
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Type:    v1.NodeExternalIP,
 | 
						|
				Address: "132.143.154.163",
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Provider: "aws",
 | 
						|
		Zone: cloudprovider.Zone{
 | 
						|
			FailureDomain: "us-west-1a",
 | 
						|
			Region:        "us-west",
 | 
						|
		},
 | 
						|
		Err: nil,
 | 
						|
	}
 | 
						|
 | 
						|
	eventBroadcaster := record.NewBroadcaster()
 | 
						|
	cloudNodeController := &CloudNodeController{
 | 
						|
		kubeClient:                fnh,
 | 
						|
		nodeInformer:              factory.Core().V1().Nodes(),
 | 
						|
		cloud:                     fakeCloud,
 | 
						|
		nodeMonitorPeriod:         5 * time.Second,
 | 
						|
		nodeStatusUpdateFrequency: 1 * time.Second,
 | 
						|
		recorder:                  eventBroadcaster.NewRecorder(api.Scheme, clientv1.EventSource{Component: "cloud-controller-manager"}),
 | 
						|
	}
 | 
						|
	eventBroadcaster.StartLogging(glog.Infof)
 | 
						|
 | 
						|
	cloudNodeController.AddCloudNode(fnh.Existing[0])
 | 
						|
 | 
						|
	if len(fnh.UpdatedNodes) != 1 && fnh.UpdatedNodes[0].Name != "node0" {
 | 
						|
		t.Errorf("Node was not updated")
 | 
						|
	}
 | 
						|
 | 
						|
	if len(fnh.UpdatedNodes[0].Status.Addresses) != 1 {
 | 
						|
		t.Errorf("Node status unexpectedly updated")
 | 
						|
	}
 | 
						|
 | 
						|
	cloudNodeController.Run()
 | 
						|
 | 
						|
	<-time.After(2 * time.Second)
 | 
						|
 | 
						|
	updatedNodes := fnh.GetUpdatedNodesCopy()
 | 
						|
 | 
						|
	if len(updatedNodes[0].Status.Addresses) != 1 || updatedNodes[0].Status.Addresses[0].Address != "10.0.0.1" {
 | 
						|
		t.Errorf("Node Addresses not correctly updated")
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// Tests that node address changes are detected correctly
 | 
						|
func TestNodeAddressesChangeDetected(t *testing.T) {
 | 
						|
	addressSet1 := []v1.NodeAddress{
 | 
						|
		{
 | 
						|
			Type:    v1.NodeInternalIP,
 | 
						|
			Address: "10.0.0.1",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Type:    v1.NodeExternalIP,
 | 
						|
			Address: "132.143.154.163",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	addressSet2 := []v1.NodeAddress{
 | 
						|
		{
 | 
						|
			Type:    v1.NodeInternalIP,
 | 
						|
			Address: "10.0.0.1",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Type:    v1.NodeExternalIP,
 | 
						|
			Address: "132.143.154.163",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	if nodeAddressesChangeDetected(addressSet1, addressSet2) {
 | 
						|
		t.Errorf("Node address changes are not detected correctly")
 | 
						|
	}
 | 
						|
 | 
						|
	addressSet1 = []v1.NodeAddress{
 | 
						|
		{
 | 
						|
			Type:    v1.NodeInternalIP,
 | 
						|
			Address: "10.0.0.1",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Type:    v1.NodeExternalIP,
 | 
						|
			Address: "132.143.154.164",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	addressSet2 = []v1.NodeAddress{
 | 
						|
		{
 | 
						|
			Type:    v1.NodeInternalIP,
 | 
						|
			Address: "10.0.0.1",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Type:    v1.NodeExternalIP,
 | 
						|
			Address: "132.143.154.163",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	if !nodeAddressesChangeDetected(addressSet1, addressSet2) {
 | 
						|
		t.Errorf("Node address changes are not detected correctly")
 | 
						|
	}
 | 
						|
 | 
						|
	addressSet1 = []v1.NodeAddress{
 | 
						|
		{
 | 
						|
			Type:    v1.NodeInternalIP,
 | 
						|
			Address: "10.0.0.1",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Type:    v1.NodeExternalIP,
 | 
						|
			Address: "132.143.154.164",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Type:    v1.NodeHostName,
 | 
						|
			Address: "hostname.zone.region.aws.test",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	addressSet2 = []v1.NodeAddress{
 | 
						|
		{
 | 
						|
			Type:    v1.NodeInternalIP,
 | 
						|
			Address: "10.0.0.1",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Type:    v1.NodeExternalIP,
 | 
						|
			Address: "132.143.154.164",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	if !nodeAddressesChangeDetected(addressSet1, addressSet2) {
 | 
						|
		t.Errorf("Node address changes are not detected correctly")
 | 
						|
	}
 | 
						|
 | 
						|
	addressSet1 = []v1.NodeAddress{
 | 
						|
		{
 | 
						|
			Type:    v1.NodeInternalIP,
 | 
						|
			Address: "10.0.0.1",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Type:    v1.NodeExternalIP,
 | 
						|
			Address: "132.143.154.164",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	addressSet2 = []v1.NodeAddress{
 | 
						|
		{
 | 
						|
			Type:    v1.NodeInternalIP,
 | 
						|
			Address: "10.0.0.1",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Type:    v1.NodeExternalIP,
 | 
						|
			Address: "132.143.154.164",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Type:    v1.NodeHostName,
 | 
						|
			Address: "hostname.zone.region.aws.test",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	if !nodeAddressesChangeDetected(addressSet1, addressSet2) {
 | 
						|
		t.Errorf("Node address changes are not detected correctly")
 | 
						|
	}
 | 
						|
 | 
						|
	addressSet1 = []v1.NodeAddress{
 | 
						|
		{
 | 
						|
			Type:    v1.NodeExternalIP,
 | 
						|
			Address: "10.0.0.1",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Type:    v1.NodeInternalIP,
 | 
						|
			Address: "132.143.154.163",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	addressSet2 = []v1.NodeAddress{
 | 
						|
		{
 | 
						|
			Type:    v1.NodeInternalIP,
 | 
						|
			Address: "10.0.0.1",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			Type:    v1.NodeExternalIP,
 | 
						|
			Address: "132.143.154.163",
 | 
						|
		},
 | 
						|
	}
 | 
						|
	if !nodeAddressesChangeDetected(addressSet1, addressSet2) {
 | 
						|
		t.Errorf("Node address changes are not detected correctly")
 | 
						|
	}
 | 
						|
}
 |