chore: drop UpdateEndpointSuite
drop `UpdateEndpointSuite` suite since KubePrism is enabled by default starting Talos 1.6 and the test never passes since K8s node is always ready since it can connect to api server over KubePrism. Signed-off-by: Noel Georgi <git@frezbo.dev>
This commit is contained in:
parent
ef7be16c80
commit
69d8054c9e
@ -1,124 +0,0 @@
|
||||
// This Source Code Form is subject to the terms of the Mozilla Public
|
||||
// License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
// file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||
|
||||
//go:build integration_api
|
||||
|
||||
package api
|
||||
|
||||
import (
|
||||
"context"
|
||||
"net/url"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
corev1 "k8s.io/api/core/v1"
|
||||
|
||||
"github.com/siderolabs/talos/internal/integration/base"
|
||||
machineapi "github.com/siderolabs/talos/pkg/machinery/api/machine"
|
||||
"github.com/siderolabs/talos/pkg/machinery/client"
|
||||
"github.com/siderolabs/talos/pkg/machinery/config/container"
|
||||
"github.com/siderolabs/talos/pkg/machinery/config/machine"
|
||||
)
|
||||
|
||||
// UpdateEndpointSuite verifies UpdateEndpoint API.
|
||||
type UpdateEndpointSuite struct {
|
||||
base.K8sSuite
|
||||
|
||||
ctx context.Context //nolint:containedctx
|
||||
ctxCancel context.CancelFunc
|
||||
}
|
||||
|
||||
// SuiteName ...
|
||||
func (suite *UpdateEndpointSuite) SuiteName() string {
|
||||
return "api.UpdateEndpointSuite"
|
||||
}
|
||||
|
||||
// SetupTest ...
|
||||
func (suite *UpdateEndpointSuite) SetupTest() {
|
||||
// make sure API calls have timeout
|
||||
suite.ctx, suite.ctxCancel = context.WithTimeout(context.Background(), 10*time.Minute)
|
||||
}
|
||||
|
||||
// TearDownTest ...
|
||||
func (suite *UpdateEndpointSuite) TearDownTest() {
|
||||
if suite.ctxCancel != nil {
|
||||
suite.ctxCancel()
|
||||
}
|
||||
}
|
||||
|
||||
// TestUpdateControlPlaneEndpoint updates a control plane endpoint to have an invalid URL,
|
||||
// then asserts that the node is reported by kube-apiserver as NotReady.
|
||||
// It reverts the change at the end of the test and asserts that the node is reported again as Ready.
|
||||
func (suite *UpdateEndpointSuite) TestUpdateControlPlaneEndpoint() {
|
||||
if testing.Short() {
|
||||
suite.T().Skip("skipping in short mode")
|
||||
}
|
||||
|
||||
nodeInternalIP := suite.RandomDiscoveredNodeInternalIP(machine.TypeWorker)
|
||||
|
||||
node, err := suite.GetK8sNodeByInternalIP(suite.ctx, nodeInternalIP)
|
||||
suite.Require().NoError(err)
|
||||
|
||||
suite.T().Logf("updating control plane endpoint to an invalid URL on node %q (IP %q)", node.Name, nodeInternalIP)
|
||||
|
||||
oldURL := suite.updateEndpointURL(nodeInternalIP, "https://127.0.0.1:40443")
|
||||
|
||||
nodeReady := func(status corev1.ConditionStatus) bool {
|
||||
return status == corev1.ConditionTrue
|
||||
}
|
||||
|
||||
nodeNotReady := func(status corev1.ConditionStatus) bool {
|
||||
return status != corev1.ConditionTrue
|
||||
}
|
||||
|
||||
defer func() {
|
||||
suite.T().Logf("reverting control plane endpoint on node %q (IP %q)", node.Name, nodeInternalIP)
|
||||
|
||||
// revert the endpoint URL back to the original one
|
||||
suite.updateEndpointURL(nodeInternalIP, oldURL)
|
||||
|
||||
suite.T().Logf("waiting for node %q to be ready once again", node.Name)
|
||||
|
||||
// expect node status to be Ready again
|
||||
suite.Assert().NoError(suite.WaitForK8sNodeReadinessStatus(suite.ctx, node.Name, nodeReady))
|
||||
}()
|
||||
|
||||
suite.T().Logf("waiting for node %q to be not ready", node.Name)
|
||||
|
||||
// expect node status to become NotReady
|
||||
suite.Assert().NoError(suite.WaitForK8sNodeReadinessStatus(suite.ctx, node.Name, nodeNotReady))
|
||||
}
|
||||
|
||||
func (suite *UpdateEndpointSuite) updateEndpointURL(nodeIP string, newURL string) (oldURL string) {
|
||||
nodeCtx := client.WithNodes(suite.ctx, nodeIP)
|
||||
|
||||
nodeConfig, err := suite.ReadConfigFromNode(nodeCtx)
|
||||
suite.Require().NoError(err)
|
||||
|
||||
nodeConfigRaw := nodeConfig.RawV1Alpha1()
|
||||
suite.Require().NotNil(nodeConfigRaw, "node config is not of type v1alpha1.Config")
|
||||
|
||||
newEndpointURL, err := url.Parse(newURL)
|
||||
suite.Require().NoError(err)
|
||||
|
||||
endpoint := nodeConfigRaw.ClusterConfig.ControlPlane.Endpoint
|
||||
oldURL = endpoint.URL.String()
|
||||
endpoint.URL = newEndpointURL
|
||||
|
||||
bytes, err := container.NewV1Alpha1(nodeConfigRaw).Bytes()
|
||||
suite.Require().NoError(err)
|
||||
|
||||
_, err = suite.Client.ApplyConfiguration(nodeCtx, &machineapi.ApplyConfigurationRequest{
|
||||
Data: bytes,
|
||||
Mode: machineapi.ApplyConfigurationRequest_NO_REBOOT,
|
||||
})
|
||||
|
||||
suite.Require().NoError(err)
|
||||
|
||||
return
|
||||
}
|
||||
|
||||
func init() {
|
||||
allSuites = append(allSuites, new(UpdateEndpointSuite))
|
||||
}
|
Loading…
Reference in New Issue
Block a user