mirror of
https://github.com/siderolabs/talos.git
synced 2025-10-30 16:01:12 +01:00
This implements pushing to and pulling from Kubernetes cluster discovery registry which is simply using extra Talos annotations on the Node resources. Note: cluster discovery is still disabled by default. This means that each Talos node is going to push data from its own local `Affiliate` structure to the `Node` resource, and also watches the other `Node`s to scrape data to build `Affiliate`s from each other cluster member. Further down the pipeline, `Affiliate` is converted to a cluster `Member` which is an easy way to see the cluster membership. In its current form, `talosctl get members` is mostly equivalent to `kubectl get nodes`, but as we add more registries, it will become more powerful. Signed-off-by: Andrey Smirnov <andrey.smirnov@talos-systems.com>
90 lines
2.5 KiB
Go
90 lines
2.5 KiB
Go
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
package cluster_test
|
|
|
|
import (
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/cosi-project/runtime/pkg/resource"
|
|
"github.com/stretchr/testify/suite"
|
|
"github.com/talos-systems/go-retry/retry"
|
|
|
|
clusterctrl "github.com/talos-systems/talos/internal/app/machined/pkg/controllers/cluster"
|
|
"github.com/talos-systems/talos/pkg/machinery/config/types/v1alpha1"
|
|
"github.com/talos-systems/talos/pkg/resources/cluster"
|
|
"github.com/talos-systems/talos/pkg/resources/config"
|
|
)
|
|
|
|
type ConfigSuite struct {
|
|
ClusterSuite
|
|
}
|
|
|
|
func (suite *ConfigSuite) TestReconcileConfig() {
|
|
suite.Require().NoError(suite.runtime.RegisterController(&clusterctrl.ConfigController{}))
|
|
|
|
suite.startRuntime()
|
|
|
|
cfg := config.NewMachineConfig(&v1alpha1.Config{
|
|
ConfigVersion: "v1alpha1",
|
|
ClusterConfig: &v1alpha1.ClusterConfig{
|
|
ClusterDiscoveryConfig: v1alpha1.ClusterDiscoveryConfig{
|
|
DiscoveryEnabled: true,
|
|
},
|
|
},
|
|
})
|
|
|
|
suite.Require().NoError(suite.state.Create(suite.ctx, cfg))
|
|
|
|
specMD := resource.NewMetadata(config.NamespaceName, cluster.ConfigType, cluster.ConfigID, resource.VersionUndefined)
|
|
|
|
suite.Assert().NoError(retry.Constant(3*time.Second, retry.WithUnits(100*time.Millisecond)).Retry(
|
|
suite.assertResource(
|
|
specMD,
|
|
func(res resource.Resource) error {
|
|
spec := res.(*cluster.Config).TypedSpec()
|
|
|
|
suite.Assert().True(spec.DiscoveryEnabled)
|
|
suite.Assert().True(spec.RegistryKubernetesEnabled)
|
|
|
|
return nil
|
|
},
|
|
),
|
|
))
|
|
}
|
|
|
|
func (suite *ConfigSuite) TestReconcileDisabled() {
|
|
suite.Require().NoError(suite.runtime.RegisterController(&clusterctrl.ConfigController{}))
|
|
|
|
suite.startRuntime()
|
|
|
|
cfg := config.NewMachineConfig(&v1alpha1.Config{
|
|
ConfigVersion: "v1alpha1",
|
|
MachineConfig: &v1alpha1.MachineConfig{},
|
|
ClusterConfig: &v1alpha1.ClusterConfig{},
|
|
})
|
|
|
|
suite.Require().NoError(suite.state.Create(suite.ctx, cfg))
|
|
|
|
specMD := resource.NewMetadata(config.NamespaceName, cluster.ConfigType, cluster.ConfigID, resource.VersionUndefined)
|
|
|
|
suite.Assert().NoError(retry.Constant(3*time.Second, retry.WithUnits(100*time.Millisecond)).Retry(
|
|
suite.assertResource(
|
|
specMD,
|
|
func(res resource.Resource) error {
|
|
spec := res.(*cluster.Config).TypedSpec()
|
|
|
|
suite.Assert().False(spec.DiscoveryEnabled)
|
|
suite.Assert().False(spec.RegistryKubernetesEnabled)
|
|
|
|
return nil
|
|
},
|
|
),
|
|
))
|
|
}
|
|
|
|
func TestConfigSuite(t *testing.T) {
|
|
suite.Run(t, new(ConfigSuite))
|
|
}
|