mirror of
				https://github.com/siderolabs/talos.git
				synced 2025-11-04 02:11:12 +01:00 
			
		
		
		
	`config.Container` implements a multi-doc container which implements both `Container` interface (encoding, validation, etc.), and `Conifg` interface (accessing parts of the config). Refactor `generate` and `bundle` packages to support multi-doc, and provide backwards compatibility. Implement a first (mostly example) machine config document for SideroLink API URL. Many places don't properly support multi-doc yet (e.g. config patches). Signed-off-by: Andrey Smirnov <andrey.smirnov@talos-systems.com>
		
			
				
	
	
		
			125 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			125 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// This Source Code Form is subject to the terms of the Mozilla Public
 | 
						|
// License, v. 2.0. If a copy of the MPL was not distributed with this
 | 
						|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
 | 
						|
 | 
						|
//go:build integration_api
 | 
						|
 | 
						|
package api
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"net/url"
 | 
						|
	"testing"
 | 
						|
	"time"
 | 
						|
 | 
						|
	corev1 "k8s.io/api/core/v1"
 | 
						|
 | 
						|
	"github.com/siderolabs/talos/internal/integration/base"
 | 
						|
	machineapi "github.com/siderolabs/talos/pkg/machinery/api/machine"
 | 
						|
	"github.com/siderolabs/talos/pkg/machinery/client"
 | 
						|
	"github.com/siderolabs/talos/pkg/machinery/config/container"
 | 
						|
	"github.com/siderolabs/talos/pkg/machinery/config/machine"
 | 
						|
)
 | 
						|
 | 
						|
// UpdateEndpointSuite verifies UpdateEndpoint API.
 | 
						|
type UpdateEndpointSuite struct {
 | 
						|
	base.K8sSuite
 | 
						|
 | 
						|
	ctx       context.Context //nolint:containedctx
 | 
						|
	ctxCancel context.CancelFunc
 | 
						|
}
 | 
						|
 | 
						|
// SuiteName ...
 | 
						|
func (suite *UpdateEndpointSuite) SuiteName() string {
 | 
						|
	return "api.UpdateEndpointSuite"
 | 
						|
}
 | 
						|
 | 
						|
// SetupTest ...
 | 
						|
func (suite *UpdateEndpointSuite) SetupTest() {
 | 
						|
	// make sure API calls have timeout
 | 
						|
	suite.ctx, suite.ctxCancel = context.WithTimeout(context.Background(), 10*time.Minute)
 | 
						|
}
 | 
						|
 | 
						|
// TearDownTest ...
 | 
						|
func (suite *UpdateEndpointSuite) TearDownTest() {
 | 
						|
	if suite.ctxCancel != nil {
 | 
						|
		suite.ctxCancel()
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// TestUpdateControlPlaneEndpoint updates a control plane endpoint to have an invalid URL,
 | 
						|
// then asserts that the node is reported by kube-apiserver as NotReady.
 | 
						|
// It reverts the change at the end of the test and asserts that the node is reported again as Ready.
 | 
						|
func (suite *UpdateEndpointSuite) TestUpdateControlPlaneEndpoint() {
 | 
						|
	if testing.Short() {
 | 
						|
		suite.T().Skip("skipping in short mode")
 | 
						|
	}
 | 
						|
 | 
						|
	nodeInternalIP := suite.RandomDiscoveredNodeInternalIP(machine.TypeWorker)
 | 
						|
 | 
						|
	node, err := suite.GetK8sNodeByInternalIP(suite.ctx, nodeInternalIP)
 | 
						|
	suite.Require().NoError(err)
 | 
						|
 | 
						|
	suite.T().Logf("updating control plane endpoint to an invalid URL on node %q (IP %q)", node.Name, nodeInternalIP)
 | 
						|
 | 
						|
	oldURL := suite.updateEndpointURL(nodeInternalIP, "https://127.0.0.1:40443")
 | 
						|
 | 
						|
	nodeReady := func(status corev1.ConditionStatus) bool {
 | 
						|
		return status == corev1.ConditionTrue
 | 
						|
	}
 | 
						|
 | 
						|
	nodeNotReady := func(status corev1.ConditionStatus) bool {
 | 
						|
		return status != corev1.ConditionTrue
 | 
						|
	}
 | 
						|
 | 
						|
	defer func() {
 | 
						|
		suite.T().Logf("reverting control plane endpoint on node %q (IP %q)", node.Name, nodeInternalIP)
 | 
						|
 | 
						|
		// revert the endpoint URL back to the original one
 | 
						|
		suite.updateEndpointURL(nodeInternalIP, oldURL)
 | 
						|
 | 
						|
		suite.T().Logf("waiting for node %q to be ready once again", node.Name)
 | 
						|
 | 
						|
		// expect node status to be Ready again
 | 
						|
		suite.Assert().NoError(suite.WaitForK8sNodeReadinessStatus(suite.ctx, node.Name, nodeReady))
 | 
						|
	}()
 | 
						|
 | 
						|
	suite.T().Logf("waiting for node %q to be not ready", node.Name)
 | 
						|
 | 
						|
	// expect node status to become NotReady
 | 
						|
	suite.Assert().NoError(suite.WaitForK8sNodeReadinessStatus(suite.ctx, node.Name, nodeNotReady))
 | 
						|
}
 | 
						|
 | 
						|
func (suite *UpdateEndpointSuite) updateEndpointURL(nodeIP string, newURL string) (oldURL string) {
 | 
						|
	nodeCtx := client.WithNodes(suite.ctx, nodeIP)
 | 
						|
 | 
						|
	nodeConfig, err := suite.ReadConfigFromNode(nodeCtx)
 | 
						|
	suite.Require().NoError(err)
 | 
						|
 | 
						|
	nodeConfigRaw := nodeConfig.RawV1Alpha1()
 | 
						|
	suite.Require().NotNil(nodeConfigRaw, "node config is not of type v1alpha1.Config")
 | 
						|
 | 
						|
	newEndpointURL, err := url.Parse(newURL)
 | 
						|
	suite.Require().NoError(err)
 | 
						|
 | 
						|
	endpoint := nodeConfigRaw.ClusterConfig.ControlPlane.Endpoint
 | 
						|
	oldURL = endpoint.URL.String()
 | 
						|
	endpoint.URL = newEndpointURL
 | 
						|
 | 
						|
	bytes, err := container.NewV1Alpha1(nodeConfigRaw).Bytes()
 | 
						|
	suite.Require().NoError(err)
 | 
						|
 | 
						|
	_, err = suite.Client.ApplyConfiguration(nodeCtx, &machineapi.ApplyConfigurationRequest{
 | 
						|
		Data: bytes,
 | 
						|
		Mode: machineapi.ApplyConfigurationRequest_NO_REBOOT,
 | 
						|
	})
 | 
						|
 | 
						|
	suite.Require().NoError(err)
 | 
						|
 | 
						|
	return
 | 
						|
}
 | 
						|
 | 
						|
func init() {
 | 
						|
	allSuites = append(allSuites, new(UpdateEndpointSuite))
 | 
						|
}
 |