/* Copyright 2017 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package upgrade import ( "fmt" "reflect" "strings" "testing" "time" "github.com/pkg/errors" apps "k8s.io/api/apps/v1" v1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" versionutil "k8s.io/apimachinery/pkg/util/version" clientsetfake "k8s.io/client-go/kubernetes/fake" kubeadmapi "k8s.io/kubernetes/cmd/kubeadm/app/apis/kubeadm" "k8s.io/kubernetes/cmd/kubeadm/app/constants" etcdutil "k8s.io/kubernetes/cmd/kubeadm/app/util/etcd" ) type fakeVersionGetter struct { clusterVersion, kubeadmVersion, stableVersion, latestVersion, latestDevBranchVersion, stablePatchVersion, kubeletVersion string } var _ VersionGetter = &fakeVersionGetter{} // ClusterVersion gets a fake API server version func (f *fakeVersionGetter) ClusterVersion() (string, *versionutil.Version, error) { return f.clusterVersion, versionutil.MustParseSemantic(f.clusterVersion), nil } // KubeadmVersion gets a fake kubeadm version func (f *fakeVersionGetter) KubeadmVersion() (string, *versionutil.Version, error) { return f.kubeadmVersion, versionutil.MustParseSemantic(f.kubeadmVersion), nil } // VersionFromCILabel gets fake latest versions from CI func (f *fakeVersionGetter) VersionFromCILabel(ciVersionLabel, _ string) (string, *versionutil.Version, error) { if ciVersionLabel == "stable" { return f.stableVersion, versionutil.MustParseSemantic(f.stableVersion), nil } if ciVersionLabel == "latest" { return f.latestVersion, versionutil.MustParseSemantic(f.latestVersion), nil } if f.latestDevBranchVersion != "" && strings.HasPrefix(ciVersionLabel, "latest-") { return f.latestDevBranchVersion, versionutil.MustParseSemantic(f.latestDevBranchVersion), nil } return f.stablePatchVersion, versionutil.MustParseSemantic(f.stablePatchVersion), nil } // KubeletVersions gets the versions of the kubelets in the cluster func (f *fakeVersionGetter) KubeletVersions() (map[string]uint16, error) { return map[string]uint16{ f.kubeletVersion: 1, }, nil } const fakeCurrentEtcdVersion = "3.1.12" type fakeEtcdClient struct { TLS bool mismatchedVersions bool } func (f fakeEtcdClient) WaitForClusterAvailable(retries int, retryInterval time.Duration) (bool, error) { return true, nil } func (f fakeEtcdClient) CheckClusterHealth() error { return nil } func (f fakeEtcdClient) GetVersion() (string, error) { versions, _ := f.GetClusterVersions() if f.mismatchedVersions { return "", errors.Errorf("etcd cluster contains endpoints with mismatched versions: %v", versions) } return fakeCurrentEtcdVersion, nil } func (f fakeEtcdClient) GetClusterVersions() (map[string]string, error) { if f.mismatchedVersions { return map[string]string{ "foo": fakeCurrentEtcdVersion, "bar": "3.2.0", }, nil } return map[string]string{ "foo": fakeCurrentEtcdVersion, "bar": fakeCurrentEtcdVersion, }, nil } func (f fakeEtcdClient) Sync() error { return nil } func (f fakeEtcdClient) AddMember(name string, peerAddrs string) ([]etcdutil.Member, error) { return []etcdutil.Member{}, nil } func (f fakeEtcdClient) GetMemberID(peerURL string) (uint64, error) { return 0, nil } func (f fakeEtcdClient) RemoveMember(id uint64) ([]etcdutil.Member, error) { return []etcdutil.Member{}, nil } func getEtcdVersion(v *versionutil.Version) string { return constants.SupportedEtcdVersion[uint8(v.Minor())] } const fakeCurrentCoreDNSVersion = "1.0.6" const fakeCurrentKubeDNSVersion = "1.14.7" func TestGetAvailableUpgrades(t *testing.T) { // constansts for test cases // variables are in the form v{MAJOR}{MINOR}{PATCH}, where MINOR is a variable so test are automatically uptodate to the latest MinimumControlPlaneVersion/ // v1.X series, e.g. v1.14 v1X0 := constants.MinimumControlPlaneVersion.WithMinor(constants.MinimumControlPlaneVersion.Minor() - 1) v1X5 := v1X0.WithPatch(5) // v1.Y series, where Y = X+1, e.g. v1.15 v1Y0 := constants.MinimumControlPlaneVersion v1Y0alpha0 := v1Y0.WithPreRelease("alpha.0") v1Y0alpha1 := v1Y0.WithPreRelease("alpha.1") v1Y1 := v1Y0.WithPatch(1) v1Y2 := v1Y0.WithPatch(2) v1Y3 := v1Y0.WithPatch(3) v1Y5 := v1Y0.WithPatch(5) // v1.Z series, where Z = Y+1, e.g. v1.16 v1Z0 := constants.CurrentKubernetesVersion v1Z0alpha1 := v1Z0.WithPreRelease("alpha.1") v1Z0alpha2 := v1Z0.WithPreRelease("alpha.2") v1Z0beta1 := v1Z0.WithPreRelease("beta.1") v1Z0rc1 := v1Z0.WithPreRelease("rc.1") v1Z1 := v1Z0.WithPatch(1) etcdClient := fakeEtcdClient{} tests := []struct { name string vg VersionGetter expectedUpgrades []Upgrade allowExperimental, allowRCs bool errExpected bool etcdClient etcdutil.ClusterInterrogator beforeDNSType kubeadmapi.DNSAddOnType beforeDNSVersion string dnsType kubeadmapi.DNSAddOnType }{ { name: "no action needed, already up-to-date", vg: &fakeVersionGetter{ clusterVersion: v1Y0.String(), kubeletVersion: v1Y0.String(), kubeadmVersion: v1Y0.String(), stablePatchVersion: v1Y0.String(), stableVersion: v1Y0.String(), }, beforeDNSType: kubeadmapi.CoreDNS, beforeDNSVersion: fakeCurrentCoreDNSVersion, dnsType: kubeadmapi.CoreDNS, expectedUpgrades: []Upgrade{}, allowExperimental: false, errExpected: false, etcdClient: etcdClient, }, { name: "simple patch version upgrade", vg: &fakeVersionGetter{ clusterVersion: v1Y1.String(), kubeletVersion: v1Y1.String(), // the kubelet are on the same version as the control plane kubeadmVersion: v1Y2.String(), stablePatchVersion: v1Y3.String(), stableVersion: v1Y3.String(), }, beforeDNSType: kubeadmapi.CoreDNS, beforeDNSVersion: fakeCurrentCoreDNSVersion, dnsType: kubeadmapi.CoreDNS, expectedUpgrades: []Upgrade{ { Description: fmt.Sprintf("version in the v%d.%d series", v1Y0.Major(), v1Y0.Minor()), Before: ClusterState{ KubeVersion: v1Y1.String(), KubeletVersions: map[string]uint16{ v1Y1.String(): 1, }, KubeadmVersion: v1Y2.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: fakeCurrentCoreDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Y3.String(), KubeadmVersion: v1Y3.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: constants.CoreDNSVersion, EtcdVersion: getEtcdVersion(v1Y3), }, }, }, allowExperimental: false, errExpected: false, etcdClient: etcdClient, }, { name: "no version provided to offline version getter does not change behavior", vg: NewOfflineVersionGetter(&fakeVersionGetter{ clusterVersion: v1Y1.String(), kubeletVersion: v1Y1.String(), // the kubelet are on the same version as the control plane kubeadmVersion: v1Y2.String(), stablePatchVersion: v1Y3.String(), stableVersion: v1Y3.String(), }, ""), beforeDNSType: kubeadmapi.CoreDNS, beforeDNSVersion: fakeCurrentCoreDNSVersion, dnsType: kubeadmapi.CoreDNS, expectedUpgrades: []Upgrade{ { Description: fmt.Sprintf("version in the v%d.%d series", v1Y0.Major(), v1Y0.Minor()), Before: ClusterState{ KubeVersion: v1Y1.String(), KubeletVersions: map[string]uint16{ v1Y1.String(): 1, }, KubeadmVersion: v1Y2.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: fakeCurrentCoreDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Y3.String(), KubeadmVersion: v1Y3.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: constants.CoreDNSVersion, EtcdVersion: getEtcdVersion(v1Y3), }, }, }, allowExperimental: false, errExpected: false, etcdClient: etcdClient, }, { name: "minor version upgrade only", vg: &fakeVersionGetter{ clusterVersion: v1Y1.String(), kubeletVersion: v1Y1.String(), // the kubelet are on the same version as the control plane kubeadmVersion: v1Z0.String(), stablePatchVersion: v1Y1.String(), stableVersion: v1Z0.String(), }, beforeDNSType: kubeadmapi.CoreDNS, beforeDNSVersion: fakeCurrentCoreDNSVersion, dnsType: kubeadmapi.CoreDNS, expectedUpgrades: []Upgrade{ { Description: "stable version", Before: ClusterState{ KubeVersion: v1Y1.String(), KubeletVersions: map[string]uint16{ v1Y1.String(): 1, }, KubeadmVersion: v1Z0.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: fakeCurrentCoreDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Z0.String(), KubeadmVersion: v1Z0.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: constants.CoreDNSVersion, EtcdVersion: getEtcdVersion(v1Z0), }, }, }, allowExperimental: false, errExpected: false, etcdClient: etcdClient, }, { name: "both minor version upgrade and patch version upgrade available", vg: &fakeVersionGetter{ clusterVersion: v1Y3.String(), kubeletVersion: v1Y3.String(), // the kubelet are on the same version as the control plane kubeadmVersion: v1Y5.String(), stablePatchVersion: v1Y5.String(), stableVersion: v1Z1.String(), }, beforeDNSType: kubeadmapi.CoreDNS, beforeDNSVersion: fakeCurrentCoreDNSVersion, dnsType: kubeadmapi.CoreDNS, expectedUpgrades: []Upgrade{ { Description: fmt.Sprintf("version in the v%d.%d series", v1Y0.Major(), v1Y0.Minor()), Before: ClusterState{ KubeVersion: v1Y3.String(), KubeletVersions: map[string]uint16{ v1Y3.String(): 1, }, KubeadmVersion: v1Y5.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: fakeCurrentCoreDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Y5.String(), KubeadmVersion: v1Y5.String(), // Note: The kubeadm version mustn't be "downgraded" here DNSType: kubeadmapi.CoreDNS, DNSVersion: constants.CoreDNSVersion, EtcdVersion: getEtcdVersion(v1Y5), }, }, { Description: "stable version", Before: ClusterState{ KubeVersion: v1Y3.String(), KubeletVersions: map[string]uint16{ v1Y3.String(): 1, }, KubeadmVersion: v1Y5.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: fakeCurrentCoreDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Z1.String(), KubeadmVersion: v1Z1.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: constants.CoreDNSVersion, EtcdVersion: getEtcdVersion(v1Z1), }, }, }, allowExperimental: false, errExpected: false, etcdClient: etcdClient, }, { name: "allow experimental upgrades, but no upgrade available", vg: &fakeVersionGetter{ clusterVersion: v1Z0alpha2.String(), kubeletVersion: v1Y5.String(), kubeadmVersion: v1Y5.String(), stablePatchVersion: v1Y5.String(), stableVersion: v1Y5.String(), latestVersion: v1Z0alpha2.String(), }, beforeDNSType: kubeadmapi.CoreDNS, beforeDNSVersion: fakeCurrentCoreDNSVersion, dnsType: kubeadmapi.CoreDNS, expectedUpgrades: []Upgrade{}, allowExperimental: true, errExpected: false, etcdClient: etcdClient, }, { name: "upgrade to an unstable version should be supported", vg: &fakeVersionGetter{ clusterVersion: v1Y5.String(), kubeletVersion: v1Y5.String(), kubeadmVersion: v1Y5.String(), stablePatchVersion: v1Y5.String(), stableVersion: v1Y5.String(), latestVersion: v1Z0alpha2.String(), }, beforeDNSType: kubeadmapi.CoreDNS, beforeDNSVersion: fakeCurrentCoreDNSVersion, dnsType: kubeadmapi.CoreDNS, expectedUpgrades: []Upgrade{ { Description: "experimental version", Before: ClusterState{ KubeVersion: v1Y5.String(), KubeletVersions: map[string]uint16{ v1Y5.String(): 1, }, KubeadmVersion: v1Y5.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: fakeCurrentCoreDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Z0alpha2.String(), KubeadmVersion: v1Z0alpha2.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: constants.CoreDNSVersion, EtcdVersion: getEtcdVersion(v1Z0alpha2), }, }, }, allowExperimental: true, errExpected: false, etcdClient: etcdClient, }, { name: "upgrade from an unstable version to an unstable version should be supported", vg: &fakeVersionGetter{ clusterVersion: v1Z0alpha1.String(), kubeletVersion: v1Y5.String(), kubeadmVersion: v1Y5.String(), stablePatchVersion: v1Y5.String(), stableVersion: v1Y5.String(), latestVersion: v1Z0alpha2.String(), }, beforeDNSType: kubeadmapi.CoreDNS, beforeDNSVersion: fakeCurrentCoreDNSVersion, dnsType: kubeadmapi.CoreDNS, expectedUpgrades: []Upgrade{ { Description: "experimental version", Before: ClusterState{ KubeVersion: v1Z0alpha1.String(), KubeletVersions: map[string]uint16{ v1Y5.String(): 1, }, KubeadmVersion: v1Y5.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: fakeCurrentCoreDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Z0alpha2.String(), KubeadmVersion: v1Z0alpha2.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: constants.CoreDNSVersion, EtcdVersion: getEtcdVersion(v1Z0alpha2), }, }, }, allowExperimental: true, errExpected: false, etcdClient: etcdClient, }, { name: "v1.X.0-alpha.0 should be ignored", vg: &fakeVersionGetter{ clusterVersion: v1X5.String(), kubeletVersion: v1X5.String(), kubeadmVersion: v1X5.String(), stablePatchVersion: v1X5.String(), stableVersion: v1X5.String(), latestDevBranchVersion: v1Z0beta1.String(), latestVersion: v1Y0alpha0.String(), }, beforeDNSType: kubeadmapi.CoreDNS, beforeDNSVersion: fakeCurrentCoreDNSVersion, dnsType: kubeadmapi.CoreDNS, expectedUpgrades: []Upgrade{ { Description: "experimental version", Before: ClusterState{ KubeVersion: v1X5.String(), KubeletVersions: map[string]uint16{ v1X5.String(): 1, }, KubeadmVersion: v1X5.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: fakeCurrentCoreDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Z0beta1.String(), KubeadmVersion: v1Z0beta1.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: constants.CoreDNSVersion, EtcdVersion: getEtcdVersion(v1Z0beta1), }, }, }, allowExperimental: true, errExpected: false, etcdClient: etcdClient, }, { name: "upgrade to an RC version should be supported", vg: &fakeVersionGetter{ clusterVersion: v1X5.String(), kubeletVersion: v1X5.String(), kubeadmVersion: v1X5.String(), stablePatchVersion: v1X5.String(), stableVersion: v1X5.String(), latestDevBranchVersion: v1Z0rc1.String(), latestVersion: v1Y0alpha1.String(), }, beforeDNSType: kubeadmapi.CoreDNS, beforeDNSVersion: fakeCurrentCoreDNSVersion, dnsType: kubeadmapi.CoreDNS, expectedUpgrades: []Upgrade{ { Description: "release candidate version", Before: ClusterState{ KubeVersion: v1X5.String(), KubeletVersions: map[string]uint16{ v1X5.String(): 1, }, KubeadmVersion: v1X5.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: fakeCurrentCoreDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Z0rc1.String(), KubeadmVersion: v1Z0rc1.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: constants.CoreDNSVersion, EtcdVersion: getEtcdVersion(v1Z0rc1), }, }, }, allowRCs: true, errExpected: false, etcdClient: etcdClient, }, { name: "it is possible (but very uncommon) that the latest version from the previous branch is an rc and the current latest version is alpha.0. In that case, show the RC", vg: &fakeVersionGetter{ clusterVersion: v1X5.String(), kubeletVersion: v1X5.String(), kubeadmVersion: v1X5.String(), stablePatchVersion: v1X5.String(), stableVersion: v1X5.String(), latestDevBranchVersion: v1Z0rc1.String(), latestVersion: v1Y0alpha0.String(), }, beforeDNSType: kubeadmapi.CoreDNS, beforeDNSVersion: fakeCurrentCoreDNSVersion, dnsType: kubeadmapi.CoreDNS, expectedUpgrades: []Upgrade{ { Description: "experimental version", // Note that this is considered an experimental version in this uncommon scenario Before: ClusterState{ KubeVersion: v1X5.String(), KubeletVersions: map[string]uint16{ v1X5.String(): 1, }, KubeadmVersion: v1X5.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: fakeCurrentCoreDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Z0rc1.String(), KubeadmVersion: v1Z0rc1.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: constants.CoreDNSVersion, EtcdVersion: getEtcdVersion(v1Z0rc1), }, }, }, allowExperimental: true, errExpected: false, etcdClient: etcdClient, }, { name: "upgrade to an RC version should be supported. There may also be an even newer unstable version.", vg: &fakeVersionGetter{ clusterVersion: v1X5.String(), kubeletVersion: v1X5.String(), kubeadmVersion: v1X5.String(), stablePatchVersion: v1X5.String(), stableVersion: v1X5.String(), latestDevBranchVersion: v1Z0rc1.String(), latestVersion: v1Y0alpha1.String(), }, beforeDNSType: kubeadmapi.CoreDNS, beforeDNSVersion: fakeCurrentCoreDNSVersion, dnsType: kubeadmapi.CoreDNS, expectedUpgrades: []Upgrade{ { Description: "release candidate version", Before: ClusterState{ KubeVersion: v1X5.String(), KubeletVersions: map[string]uint16{ v1X5.String(): 1, }, KubeadmVersion: v1X5.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: fakeCurrentCoreDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Z0rc1.String(), KubeadmVersion: v1Z0rc1.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: constants.CoreDNSVersion, EtcdVersion: getEtcdVersion(v1Z0rc1), }, }, { Description: "experimental version", Before: ClusterState{ KubeVersion: v1X5.String(), KubeletVersions: map[string]uint16{ v1X5.String(): 1, }, KubeadmVersion: v1X5.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: fakeCurrentCoreDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Y0alpha1.String(), KubeadmVersion: v1Y0alpha1.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: constants.CoreDNSVersion, EtcdVersion: getEtcdVersion(v1Y0alpha1), }, }, }, allowRCs: true, allowExperimental: true, errExpected: false, etcdClient: etcdClient, }, { name: "Upgrades with external etcd with mismatched versions should not be allowed.", vg: &fakeVersionGetter{ clusterVersion: v1Y3.String(), kubeletVersion: v1Y3.String(), kubeadmVersion: v1Y3.String(), stablePatchVersion: v1Y3.String(), stableVersion: v1Y3.String(), }, allowRCs: false, allowExperimental: false, etcdClient: fakeEtcdClient{mismatchedVersions: true}, expectedUpgrades: []Upgrade{}, errExpected: true, }, { name: "offline version getter", vg: NewOfflineVersionGetter(&fakeVersionGetter{ clusterVersion: v1Y1.String(), kubeletVersion: v1Y0.String(), kubeadmVersion: v1Y1.String(), }, v1Z1.String()), etcdClient: etcdClient, beforeDNSType: kubeadmapi.CoreDNS, beforeDNSVersion: fakeCurrentCoreDNSVersion, dnsType: kubeadmapi.CoreDNS, expectedUpgrades: []Upgrade{ { Description: fmt.Sprintf("version in the v%d.%d series", v1Y0.Major(), v1Y0.Minor()), Before: ClusterState{ KubeVersion: v1Y1.String(), KubeletVersions: map[string]uint16{ v1Y0.String(): 1, }, KubeadmVersion: v1Y1.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: fakeCurrentCoreDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Z1.String(), KubeadmVersion: v1Z1.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: constants.CoreDNSVersion, EtcdVersion: getEtcdVersion(v1Z1), }, }, }, }, { name: "kubedns to coredns", vg: &fakeVersionGetter{ clusterVersion: v1Y2.String(), kubeletVersion: v1Y2.String(), // the kubelet are on the same version as the control plane kubeadmVersion: v1Z0.String(), stablePatchVersion: v1Z0.String(), stableVersion: v1Z0.String(), }, etcdClient: etcdClient, beforeDNSType: kubeadmapi.KubeDNS, beforeDNSVersion: fakeCurrentKubeDNSVersion, dnsType: kubeadmapi.CoreDNS, expectedUpgrades: []Upgrade{ { Description: fmt.Sprintf("version in the v%d.%d series", v1Y0.Major(), v1Y0.Minor()), Before: ClusterState{ KubeVersion: v1Y2.String(), KubeletVersions: map[string]uint16{ v1Y2.String(): 1, }, KubeadmVersion: v1Z0.String(), DNSType: kubeadmapi.KubeDNS, DNSVersion: fakeCurrentKubeDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Z0.String(), KubeadmVersion: v1Z0.String(), DNSType: kubeadmapi.CoreDNS, DNSVersion: constants.CoreDNSVersion, EtcdVersion: getEtcdVersion(v1Z0), }, }, }, }, { name: "keep coredns", vg: &fakeVersionGetter{ clusterVersion: v1Y2.String(), kubeletVersion: v1Y2.String(), // the kubelet are on the same version as the control plane kubeadmVersion: v1Z0.String(), stablePatchVersion: v1Z0.String(), stableVersion: v1Z0.String(), }, etcdClient: etcdClient, beforeDNSType: kubeadmapi.KubeDNS, beforeDNSVersion: fakeCurrentKubeDNSVersion, dnsType: kubeadmapi.KubeDNS, expectedUpgrades: []Upgrade{ { Description: fmt.Sprintf("version in the v%d.%d series", v1Y0.Major(), v1Y0.Minor()), Before: ClusterState{ KubeVersion: v1Y2.String(), KubeletVersions: map[string]uint16{ v1Y2.String(): 1, }, KubeadmVersion: v1Z0.String(), DNSType: kubeadmapi.KubeDNS, DNSVersion: fakeCurrentKubeDNSVersion, EtcdVersion: fakeCurrentEtcdVersion, }, After: ClusterState{ KubeVersion: v1Z0.String(), KubeadmVersion: v1Z0.String(), DNSType: kubeadmapi.KubeDNS, DNSVersion: constants.KubeDNSVersion, EtcdVersion: getEtcdVersion(v1Z0), }, }, }, }, } // Instantiating a fake etcd cluster for being able to get etcd version for a corresponding // Kubernetes release. for _, rt := range tests { t.Run(rt.name, func(t *testing.T) { dnsName := constants.CoreDNSDeploymentName if rt.beforeDNSType == kubeadmapi.KubeDNS { dnsName = constants.KubeDNSDeploymentName } client := clientsetfake.NewSimpleClientset(&apps.Deployment{ TypeMeta: metav1.TypeMeta{ Kind: "Deployment", APIVersion: "apps/v1", }, ObjectMeta: metav1.ObjectMeta{ Name: dnsName, Namespace: "kube-system", Labels: map[string]string{ "k8s-app": "kube-dns", }, }, Spec: apps.DeploymentSpec{ Template: v1.PodTemplateSpec{ Spec: v1.PodSpec{ Containers: []v1.Container{ { Image: "test:" + rt.beforeDNSVersion, }, }, }, }, }, }) actualUpgrades, actualErr := GetAvailableUpgrades(rt.vg, rt.allowExperimental, rt.allowRCs, rt.etcdClient, rt.dnsType, client) if !reflect.DeepEqual(actualUpgrades, rt.expectedUpgrades) { t.Errorf("failed TestGetAvailableUpgrades\n\texpected upgrades: %v\n\tgot: %v", rt.expectedUpgrades, actualUpgrades) } if (actualErr != nil) != rt.errExpected { fmt.Printf("Hello error") t.Errorf("failed TestGetAvailableUpgrades\n\texpected error: %t\n\tgot error: %t", rt.errExpected, (actualErr != nil)) } if !reflect.DeepEqual(actualUpgrades, rt.expectedUpgrades) { t.Errorf("failed TestGetAvailableUpgrades\n\texpected upgrades: %v\n\tgot: %v", rt.expectedUpgrades, actualUpgrades) } }) } } func TestKubeletUpgrade(t *testing.T) { tests := []struct { name string before map[string]uint16 after string expected bool }{ { name: "upgrade from v1.10.1 to v1.10.3 is available", before: map[string]uint16{ "v1.10.1": 1, }, after: "v1.10.3", expected: true, }, { name: "upgrade from v1.10.1 and v1.10.3/100 to v1.10.3 is available", before: map[string]uint16{ "v1.10.1": 1, "v1.10.3": 100, }, after: "v1.10.3", expected: true, }, { name: "upgrade from v1.10.3 to v1.10.3 is not available", before: map[string]uint16{ "v1.10.3": 1, }, after: "v1.10.3", expected: false, }, { name: "upgrade from v1.10.3/100 to v1.10.3 is not available", before: map[string]uint16{ "v1.10.3": 100, }, after: "v1.10.3", expected: false, }, { name: "upgrade is not available if we don't know anything about the earlier state", before: map[string]uint16{}, after: "v1.10.3", expected: false, }, } for _, rt := range tests { t.Run(rt.name, func(t *testing.T) { upgrade := Upgrade{ Before: ClusterState{ KubeletVersions: rt.before, }, After: ClusterState{ KubeVersion: rt.after, }, } actual := upgrade.CanUpgradeKubelets() if actual != rt.expected { t.Errorf("failed TestKubeletUpgrade\n\texpected: %t\n\tgot: %t\n\ttest object: %v", rt.expected, actual, upgrade) } }) } } func TestGetBranchFromVersion(t *testing.T) { testCases := []struct { version string expectedVersion string }{ { version: "v1.9.5", expectedVersion: "1.9", }, { version: "v1.9.0-alpha.2", expectedVersion: "1.9", }, { version: "v1.9.0-beta.0", expectedVersion: "1.9", }, { version: "v1.9.0-rc.1", expectedVersion: "1.9", }, { version: "v1.11.0-alpha.0", expectedVersion: "1.11", }, { version: "v1.11.0-beta.1", expectedVersion: "1.11", }, { version: "v1.11.0-rc.0", expectedVersion: "1.11", }, { version: "1.12.5", expectedVersion: "1.12", }, } for _, tc := range testCases { t.Run(tc.version, func(t *testing.T) { v := getBranchFromVersion(tc.version) if v != tc.expectedVersion { t.Errorf("expected version %s, got %s", tc.expectedVersion, v) } }) } }