123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476 |
- /*
- Copyright 2018 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package options
- import (
- "fmt"
- "io/ioutil"
- "net/http"
- "net/http/httptest"
- "os"
- "path/filepath"
- "reflect"
- "strings"
- "testing"
- "time"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/runtime"
- "k8s.io/apimachinery/pkg/util/diff"
- apiserveroptions "k8s.io/apiserver/pkg/server/options"
- componentbaseconfig "k8s.io/component-base/config"
- kubeschedulerconfig "k8s.io/kubernetes/pkg/scheduler/apis/config"
- )
- func TestSchedulerOptions(t *testing.T) {
- // temp dir
- tmpDir, err := ioutil.TempDir("", "scheduler-options")
- if err != nil {
- t.Fatal(err)
- }
- defer os.RemoveAll(tmpDir)
- // record the username requests were made with
- username := ""
- // https server
- server := httptest.NewTLSServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
- username, _, _ = req.BasicAuth()
- if username == "" {
- username = "none, tls"
- }
- w.WriteHeader(200)
- w.Write([]byte(`ok`))
- }))
- defer server.Close()
- // http server
- insecureserver := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
- username, _, _ = req.BasicAuth()
- if username == "" {
- username = "none, http"
- }
- w.WriteHeader(200)
- w.Write([]byte(`ok`))
- }))
- defer insecureserver.Close()
- // config file and kubeconfig
- configFile := filepath.Join(tmpDir, "scheduler.yaml")
- configKubeconfig := filepath.Join(tmpDir, "config.kubeconfig")
- if err := ioutil.WriteFile(configFile, []byte(fmt.Sprintf(`
- apiVersion: kubescheduler.config.k8s.io/v1alpha1
- kind: KubeSchedulerConfiguration
- clientConnection:
- kubeconfig: "%s"
- leaderElection:
- leaderElect: true`, configKubeconfig)), os.FileMode(0600)); err != nil {
- t.Fatal(err)
- }
- if err := ioutil.WriteFile(configKubeconfig, []byte(fmt.Sprintf(`
- apiVersion: v1
- kind: Config
- clusters:
- - cluster:
- insecure-skip-tls-verify: true
- server: %s
- name: default
- contexts:
- - context:
- cluster: default
- user: default
- name: default
- current-context: default
- users:
- - name: default
- user:
- username: config
- `, server.URL)), os.FileMode(0600)); err != nil {
- t.Fatal(err)
- }
- oldconfigFile := filepath.Join(tmpDir, "scheduler_old.yaml")
- if err := ioutil.WriteFile(oldconfigFile, []byte(fmt.Sprintf(`
- apiVersion: componentconfig/v1alpha1
- kind: KubeSchedulerConfiguration
- clientConnection:
- kubeconfig: "%s"
- leaderElection:
- leaderElect: true`, configKubeconfig)), os.FileMode(0600)); err != nil {
- t.Fatal(err)
- }
- invalidconfigFile := filepath.Join(tmpDir, "scheduler_invalid.yaml")
- if err := ioutil.WriteFile(invalidconfigFile, []byte(fmt.Sprintf(`
- apiVersion: componentconfig/v1alpha2
- kind: KubeSchedulerConfiguration
- clientConnection:
- kubeconfig: "%s"
- leaderElection:
- leaderElect: true`, configKubeconfig)), os.FileMode(0600)); err != nil {
- t.Fatal(err)
- }
- // flag-specified kubeconfig
- flagKubeconfig := filepath.Join(tmpDir, "flag.kubeconfig")
- if err := ioutil.WriteFile(flagKubeconfig, []byte(fmt.Sprintf(`
- apiVersion: v1
- kind: Config
- clusters:
- - cluster:
- insecure-skip-tls-verify: true
- server: %s
- name: default
- contexts:
- - context:
- cluster: default
- user: default
- name: default
- current-context: default
- users:
- - name: default
- user:
- username: flag
- `, server.URL)), os.FileMode(0600)); err != nil {
- t.Fatal(err)
- }
- // plugin config
- pluginconfigFile := filepath.Join(tmpDir, "plugin.yaml")
- if err := ioutil.WriteFile(pluginconfigFile, []byte(fmt.Sprintf(`
- apiVersion: kubescheduler.config.k8s.io/v1alpha1
- kind: KubeSchedulerConfiguration
- clientConnection:
- kubeconfig: "%s"
- plugins:
- reserve:
- enabled:
- - name: foo
- - name: bar
- disabled:
- - name: baz
- preBind:
- enabled:
- - name: foo
- disabled:
- - name: baz
- pluginConfig:
- - name: foo
- `, configKubeconfig)), os.FileMode(0600)); err != nil {
- t.Fatal(err)
- }
- // Insulate this test from picking up in-cluster config when run inside a pod
- // We can't assume we have permissions to write to /var/run/secrets/... from a unit test to mock in-cluster config for testing
- originalHost := os.Getenv("KUBERNETES_SERVICE_HOST")
- if len(originalHost) > 0 {
- os.Setenv("KUBERNETES_SERVICE_HOST", "")
- defer os.Setenv("KUBERNETES_SERVICE_HOST", originalHost)
- }
- defaultSource := "DefaultProvider"
- defaultBindTimeoutSeconds := int64(600)
- testcases := []struct {
- name string
- options *Options
- expectedUsername string
- expectedError string
- expectedConfig kubeschedulerconfig.KubeSchedulerConfiguration
- }{
- {
- name: "config file",
- options: &Options{
- ConfigFile: configFile,
- ComponentConfig: func() kubeschedulerconfig.KubeSchedulerConfiguration {
- cfg, err := newDefaultComponentConfig()
- if err != nil {
- t.Fatal(err)
- }
- return *cfg
- }(),
- SecureServing: (&apiserveroptions.SecureServingOptions{
- ServerCert: apiserveroptions.GeneratableKeyCert{
- CertDirectory: "/a/b/c",
- PairName: "kube-scheduler",
- },
- HTTP2MaxStreamsPerConnection: 47,
- }).WithLoopback(),
- Authentication: &apiserveroptions.DelegatingAuthenticationOptions{
- CacheTTL: 10 * time.Second,
- ClientCert: apiserveroptions.ClientCertAuthenticationOptions{},
- RequestHeader: apiserveroptions.RequestHeaderAuthenticationOptions{
- UsernameHeaders: []string{"x-remote-user"},
- GroupHeaders: []string{"x-remote-group"},
- ExtraHeaderPrefixes: []string{"x-remote-extra-"},
- },
- RemoteKubeConfigFileOptional: true,
- },
- Authorization: &apiserveroptions.DelegatingAuthorizationOptions{
- AllowCacheTTL: 10 * time.Second,
- DenyCacheTTL: 10 * time.Second,
- RemoteKubeConfigFileOptional: true,
- AlwaysAllowPaths: []string{"/healthz"}, // note: this does not match /healthz/ or /healthz/*
- },
- },
- expectedUsername: "config",
- expectedConfig: kubeschedulerconfig.KubeSchedulerConfiguration{
- SchedulerName: "default-scheduler",
- AlgorithmSource: kubeschedulerconfig.SchedulerAlgorithmSource{Provider: &defaultSource},
- HardPodAffinitySymmetricWeight: 1,
- HealthzBindAddress: "0.0.0.0:10251",
- MetricsBindAddress: "0.0.0.0:10251",
- LeaderElection: kubeschedulerconfig.KubeSchedulerLeaderElectionConfiguration{
- LeaderElectionConfiguration: componentbaseconfig.LeaderElectionConfiguration{
- LeaderElect: true,
- LeaseDuration: metav1.Duration{Duration: 15 * time.Second},
- RenewDeadline: metav1.Duration{Duration: 10 * time.Second},
- RetryPeriod: metav1.Duration{Duration: 2 * time.Second},
- ResourceLock: "endpoints",
- },
- LockObjectNamespace: "kube-system",
- LockObjectName: "kube-scheduler",
- },
- ClientConnection: componentbaseconfig.ClientConnectionConfiguration{
- Kubeconfig: configKubeconfig,
- QPS: 50,
- Burst: 100,
- ContentType: "application/vnd.kubernetes.protobuf",
- },
- BindTimeoutSeconds: &defaultBindTimeoutSeconds,
- Plugins: nil,
- },
- },
- {
- name: "config file in componentconfig/v1alpha1",
- options: &Options{
- ConfigFile: oldconfigFile,
- ComponentConfig: func() kubeschedulerconfig.KubeSchedulerConfiguration {
- cfg, err := newDefaultComponentConfig()
- if err != nil {
- t.Fatal(err)
- }
- return *cfg
- }(),
- },
- expectedError: "no kind \"KubeSchedulerConfiguration\" is registered for version \"componentconfig/v1alpha1\"",
- },
- {
- name: "invalid config file in componentconfig/v1alpha2",
- options: &Options{ConfigFile: invalidconfigFile},
- expectedError: "no kind \"KubeSchedulerConfiguration\" is registered for version \"componentconfig/v1alpha2\"",
- },
- {
- name: "kubeconfig flag",
- options: &Options{
- ComponentConfig: func() kubeschedulerconfig.KubeSchedulerConfiguration {
- cfg, _ := newDefaultComponentConfig()
- cfg.ClientConnection.Kubeconfig = flagKubeconfig
- return *cfg
- }(),
- SecureServing: (&apiserveroptions.SecureServingOptions{
- ServerCert: apiserveroptions.GeneratableKeyCert{
- CertDirectory: "/a/b/c",
- PairName: "kube-scheduler",
- },
- HTTP2MaxStreamsPerConnection: 47,
- }).WithLoopback(),
- Authentication: &apiserveroptions.DelegatingAuthenticationOptions{
- CacheTTL: 10 * time.Second,
- ClientCert: apiserveroptions.ClientCertAuthenticationOptions{},
- RequestHeader: apiserveroptions.RequestHeaderAuthenticationOptions{
- UsernameHeaders: []string{"x-remote-user"},
- GroupHeaders: []string{"x-remote-group"},
- ExtraHeaderPrefixes: []string{"x-remote-extra-"},
- },
- RemoteKubeConfigFileOptional: true,
- },
- Authorization: &apiserveroptions.DelegatingAuthorizationOptions{
- AllowCacheTTL: 10 * time.Second,
- DenyCacheTTL: 10 * time.Second,
- RemoteKubeConfigFileOptional: true,
- AlwaysAllowPaths: []string{"/healthz"}, // note: this does not match /healthz/ or /healthz/*
- },
- },
- expectedUsername: "flag",
- expectedConfig: kubeschedulerconfig.KubeSchedulerConfiguration{
- SchedulerName: "default-scheduler",
- AlgorithmSource: kubeschedulerconfig.SchedulerAlgorithmSource{Provider: &defaultSource},
- HardPodAffinitySymmetricWeight: 1,
- HealthzBindAddress: "", // defaults empty when not running from config file
- MetricsBindAddress: "", // defaults empty when not running from config file
- LeaderElection: kubeschedulerconfig.KubeSchedulerLeaderElectionConfiguration{
- LeaderElectionConfiguration: componentbaseconfig.LeaderElectionConfiguration{
- LeaderElect: true,
- LeaseDuration: metav1.Duration{Duration: 15 * time.Second},
- RenewDeadline: metav1.Duration{Duration: 10 * time.Second},
- RetryPeriod: metav1.Duration{Duration: 2 * time.Second},
- ResourceLock: "endpoints",
- },
- LockObjectNamespace: "kube-system",
- LockObjectName: "kube-scheduler",
- },
- ClientConnection: componentbaseconfig.ClientConnectionConfiguration{
- Kubeconfig: flagKubeconfig,
- QPS: 50,
- Burst: 100,
- ContentType: "application/vnd.kubernetes.protobuf",
- },
- BindTimeoutSeconds: &defaultBindTimeoutSeconds,
- },
- },
- {
- name: "overridden master",
- options: &Options{
- Master: insecureserver.URL,
- SecureServing: (&apiserveroptions.SecureServingOptions{
- ServerCert: apiserveroptions.GeneratableKeyCert{
- CertDirectory: "/a/b/c",
- PairName: "kube-scheduler",
- },
- HTTP2MaxStreamsPerConnection: 47,
- }).WithLoopback(),
- Authentication: &apiserveroptions.DelegatingAuthenticationOptions{
- CacheTTL: 10 * time.Second,
- RequestHeader: apiserveroptions.RequestHeaderAuthenticationOptions{
- UsernameHeaders: []string{"x-remote-user"},
- GroupHeaders: []string{"x-remote-group"},
- ExtraHeaderPrefixes: []string{"x-remote-extra-"},
- },
- RemoteKubeConfigFileOptional: true,
- },
- Authorization: &apiserveroptions.DelegatingAuthorizationOptions{
- AllowCacheTTL: 10 * time.Second,
- DenyCacheTTL: 10 * time.Second,
- RemoteKubeConfigFileOptional: true,
- AlwaysAllowPaths: []string{"/healthz"}, // note: this does not match /healthz/ or /healthz/*
- },
- },
- expectedUsername: "none, http",
- },
- {
- name: "plugin config",
- options: &Options{
- ConfigFile: pluginconfigFile,
- },
- expectedUsername: "config",
- expectedConfig: kubeschedulerconfig.KubeSchedulerConfiguration{
- SchedulerName: "default-scheduler",
- AlgorithmSource: kubeschedulerconfig.SchedulerAlgorithmSource{Provider: &defaultSource},
- HardPodAffinitySymmetricWeight: 1,
- HealthzBindAddress: "0.0.0.0:10251",
- MetricsBindAddress: "0.0.0.0:10251",
- LeaderElection: kubeschedulerconfig.KubeSchedulerLeaderElectionConfiguration{
- LeaderElectionConfiguration: componentbaseconfig.LeaderElectionConfiguration{
- LeaderElect: true,
- LeaseDuration: metav1.Duration{Duration: 15 * time.Second},
- RenewDeadline: metav1.Duration{Duration: 10 * time.Second},
- RetryPeriod: metav1.Duration{Duration: 2 * time.Second},
- ResourceLock: "endpoints",
- },
- LockObjectNamespace: "kube-system",
- LockObjectName: "kube-scheduler",
- },
- ClientConnection: componentbaseconfig.ClientConnectionConfiguration{
- Kubeconfig: configKubeconfig,
- QPS: 50,
- Burst: 100,
- ContentType: "application/vnd.kubernetes.protobuf",
- },
- BindTimeoutSeconds: &defaultBindTimeoutSeconds,
- Plugins: &kubeschedulerconfig.Plugins{
- Reserve: &kubeschedulerconfig.PluginSet{
- Enabled: []kubeschedulerconfig.Plugin{
- {
- Name: "foo",
- },
- {
- Name: "bar",
- },
- },
- Disabled: []kubeschedulerconfig.Plugin{
- {
- Name: "baz",
- },
- },
- },
- PreBind: &kubeschedulerconfig.PluginSet{
- Enabled: []kubeschedulerconfig.Plugin{
- {
- Name: "foo",
- },
- },
- Disabled: []kubeschedulerconfig.Plugin{
- {
- Name: "baz",
- },
- },
- },
- },
- PluginConfig: []kubeschedulerconfig.PluginConfig{
- {
- Name: "foo",
- Args: runtime.Unknown{},
- },
- },
- },
- },
- {
- name: "no config",
- options: &Options{},
- expectedError: "no configuration has been provided",
- },
- }
- for _, tc := range testcases {
- t.Run(tc.name, func(t *testing.T) {
- // create the config
- config, err := tc.options.Config()
- // handle errors
- if err != nil {
- if tc.expectedError == "" {
- t.Error(err)
- } else if !strings.Contains(err.Error(), tc.expectedError) {
- t.Errorf("expected %q, got %q", tc.expectedError, err.Error())
- }
- return
- }
- if !reflect.DeepEqual(config.ComponentConfig, tc.expectedConfig) {
- t.Errorf("config.diff:\n%s", diff.ObjectReflectDiff(tc.expectedConfig, config.ComponentConfig))
- }
- // ensure we have a client
- if config.Client == nil {
- t.Error("unexpected nil client")
- return
- }
- // test the client talks to the endpoint we expect with the credentials we expect
- username = ""
- _, err = config.Client.Discovery().RESTClient().Get().AbsPath("/").DoRaw()
- if err != nil {
- t.Error(err)
- return
- }
- if username != tc.expectedUsername {
- t.Errorf("expected server call with user %s, got %s", tc.expectedUsername, username)
- }
- })
- }
- }
|