mirror of
https://github.com/siderolabs/talos.git
synced 2025-10-28 15:01:13 +01:00
This PR adds support for custom node taints. Refer to `nodeTaints` in the `configuration` for more information. Closes #7581 Signed-off-by: Dmitriy Matrenichev <dmitry.matrenichev@siderolabs.com>
172 lines
4.7 KiB
Go
172 lines
4.7 KiB
Go
// This Source Code Form is subject to the terms of the Mozilla Public
|
|
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
package container_test
|
|
|
|
import (
|
|
"net/url"
|
|
"testing"
|
|
|
|
"github.com/siderolabs/gen/xtesting/must"
|
|
"github.com/siderolabs/go-pointer"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/siderolabs/talos/pkg/machinery/config/config"
|
|
"github.com/siderolabs/talos/pkg/machinery/config/configloader"
|
|
"github.com/siderolabs/talos/pkg/machinery/config/container"
|
|
"github.com/siderolabs/talos/pkg/machinery/config/types/siderolink"
|
|
"github.com/siderolabs/talos/pkg/machinery/config/types/v1alpha1"
|
|
)
|
|
|
|
func TestNew(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
v1alpha1Cfg := &v1alpha1.Config{
|
|
MachineConfig: &v1alpha1.MachineConfig{
|
|
MachineFeatures: &v1alpha1.FeaturesConfig{
|
|
RBAC: pointer.To(true),
|
|
},
|
|
},
|
|
ClusterConfig: &v1alpha1.ClusterConfig{
|
|
ClusterSecret: "topsecret",
|
|
},
|
|
}
|
|
|
|
sideroLinkCfg := siderolink.NewConfigV1Alpha1()
|
|
sideroLinkCfg.APIUrlConfig.URL = must.Value(url.Parse("https://siderolink.api/join?jointoken=secret&user=alice"))(t)
|
|
|
|
cfg, err := container.New(v1alpha1Cfg, sideroLinkCfg)
|
|
require.NoError(t, err)
|
|
|
|
assert.False(t, cfg.Readonly())
|
|
assert.False(t, cfg.Debug())
|
|
assert.True(t, cfg.Machine().Features().RBACEnabled())
|
|
assert.Equal(t, "topsecret", cfg.Cluster().Secret())
|
|
assert.Equal(t, "https://siderolink.api/join?jointoken=secret&user=alice", cfg.SideroLink().APIUrl().String())
|
|
assert.Same(t, v1alpha1Cfg, cfg.RawV1Alpha1())
|
|
assert.Equal(t, []config.Document{v1alpha1Cfg, sideroLinkCfg}, cfg.Documents())
|
|
|
|
bytes, err := cfg.Bytes()
|
|
require.NoError(t, err)
|
|
|
|
cfgBack, err := configloader.NewFromBytes(bytes)
|
|
require.NoError(t, err)
|
|
|
|
assert.True(t, cfgBack.Readonly())
|
|
assert.NotEqual(t, v1alpha1Cfg, cfgBack.RawV1Alpha1())
|
|
|
|
cfgRedacted := cfg.RedactSecrets("REDACTED")
|
|
assert.Equal(t, "REDACTED", cfgRedacted.Cluster().Secret())
|
|
assert.Equal(t, "https://siderolink.api/join?jointoken=REDACTED&user=alice", cfgRedacted.SideroLink().APIUrl().String())
|
|
}
|
|
|
|
func TestNewDuplicate(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
v1alpha1Cfg1 := &v1alpha1.Config{}
|
|
v1alpha1Cfg2 := &v1alpha1.Config{}
|
|
|
|
siderolink1 := siderolink.NewConfigV1Alpha1()
|
|
siderolink2 := siderolink.NewConfigV1Alpha1()
|
|
|
|
_, err := container.New(v1alpha1Cfg1, siderolink1, v1alpha1Cfg2)
|
|
assert.EqualError(t, err, "duplicate v1alpha1.Config")
|
|
|
|
_, err = container.New(siderolink1, siderolink2)
|
|
assert.EqualError(t, err, "duplicate document: SideroLinkConfig/")
|
|
}
|
|
|
|
func TestValidate(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
sideroLinkCfg := siderolink.NewConfigV1Alpha1()
|
|
sideroLinkCfg.APIUrlConfig.URL = must.Value(url.Parse("https://siderolink.api/?jointoken=secret&user=alice"))(t)
|
|
|
|
invalidSideroLinkCfg := siderolink.NewConfigV1Alpha1()
|
|
|
|
v1alpha1Cfg := &v1alpha1.Config{
|
|
ClusterConfig: &v1alpha1.ClusterConfig{
|
|
ControlPlane: &v1alpha1.ControlPlaneConfig{
|
|
Endpoint: &v1alpha1.Endpoint{
|
|
URL: must.Value(url.Parse("https://localhost:6443"))(t),
|
|
},
|
|
},
|
|
},
|
|
MachineConfig: &v1alpha1.MachineConfig{
|
|
MachineType: "worker",
|
|
},
|
|
}
|
|
|
|
invalidV1alpha1Config := &v1alpha1.Config{}
|
|
|
|
for _, tt := range []struct {
|
|
name string
|
|
documents []config.Document
|
|
|
|
expectedError string
|
|
expecetedWarnings []string
|
|
}{
|
|
{
|
|
name: "empty",
|
|
},
|
|
{
|
|
name: "multi-doc",
|
|
documents: []config.Document{sideroLinkCfg, v1alpha1Cfg},
|
|
},
|
|
{
|
|
name: "only siderolink",
|
|
documents: []config.Document{sideroLinkCfg},
|
|
},
|
|
{
|
|
name: "only v1alpha1",
|
|
documents: []config.Document{v1alpha1Cfg},
|
|
},
|
|
{
|
|
name: "invalid siderolink",
|
|
documents: []config.Document{invalidSideroLinkCfg},
|
|
expectedError: "1 error occurred:\n\t* apiUrl is required\n\n",
|
|
},
|
|
{
|
|
name: "invalid v1alpha1",
|
|
documents: []config.Document{invalidV1alpha1Config},
|
|
expectedError: "1 error occurred:\n\t* machine instructions are required\n\n",
|
|
},
|
|
{
|
|
name: "invalid multi-doc",
|
|
documents: []config.Document{invalidSideroLinkCfg, invalidV1alpha1Config},
|
|
expectedError: "2 errors occurred:\n\t* machine instructions are required\n\t* apiUrl is required\n\n",
|
|
},
|
|
} {
|
|
tt := tt
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
ctr, err := container.New(tt.documents...)
|
|
require.NoError(t, err)
|
|
|
|
warnings, err := ctr.Validate(validationMode{})
|
|
|
|
if tt.expectedError == "" {
|
|
require.NoError(t, err)
|
|
} else {
|
|
require.EqualError(t, err, tt.expectedError)
|
|
}
|
|
|
|
require.Equal(t, tt.expecetedWarnings, warnings)
|
|
})
|
|
}
|
|
}
|
|
|
|
type validationMode struct{}
|
|
|
|
func (validationMode) String() string {
|
|
return ""
|
|
}
|
|
|
|
func (validationMode) RequiresInstall() bool {
|
|
return false
|
|
}
|