You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1091 lines
48 KiB
1091 lines
48 KiB
# Copyright 2015 Hewlett-Packard Development Company, L.P. |
|
# |
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may |
|
# not use this file except in compliance with the License. You may obtain |
|
# a copy of the License at |
|
# |
|
# http://www.apache.org/licenses/LICENSE-2.0 |
|
# |
|
# Unless required by applicable law or agreed to in writing, software |
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
|
# License for the specific language governing permissions and limitations |
|
# under the License. |
|
|
|
import mock |
|
from mock import patch |
|
|
|
import magnum.conf |
|
from magnum.drivers.k8s_coreos_v1 import driver as k8s_coreos_dr |
|
from magnum.drivers.k8s_fedora_atomic_v1 import driver as k8s_dr |
|
from magnum import objects |
|
from magnum.tests import base |
|
|
|
CONF = magnum.conf.CONF |
|
|
|
|
|
class TestClusterConductorWithK8s(base.TestCase): |
|
def setUp(self): |
|
super(TestClusterConductorWithK8s, self).setUp() |
|
self.cluster_template_dict = { |
|
'image_id': 'image_id', |
|
'flavor_id': 'flavor_id', |
|
'master_flavor_id': 'master_flavor_id', |
|
'keypair_id': 'keypair_id', |
|
'dns_nameserver': 'dns_nameserver', |
|
'external_network_id': 'external_network_id', |
|
'fixed_network': 'fixed_network', |
|
'fixed_subnet': 'fixed_subnet', |
|
'network_driver': 'network_driver', |
|
'volume_driver': 'volume_driver', |
|
'docker_volume_size': 20, |
|
'master_flavor_id': 'flavor_id', |
|
'docker_storage_driver': 'devicemapper', |
|
'cluster_distro': 'fedora-atomic', |
|
'coe': 'kubernetes', |
|
'token': None, |
|
'http_proxy': 'http_proxy', |
|
'https_proxy': 'https_proxy', |
|
'no_proxy': 'no_proxy', |
|
'labels': {'flannel_network_cidr': '10.101.0.0/16', |
|
'flannel_network_subnetlen': '26', |
|
'flannel_backend': 'vxlan', |
|
'system_pods_initial_delay': '15', |
|
'system_pods_timeout': '1', |
|
'admission_control_list': 'fake_list', |
|
'prometheus_monitoring': 'False', |
|
'grafana_admin_passwd': 'fake_pwd', |
|
'kube_dashboard_enabled': 'True', |
|
'influx_grafana_dashboard_enabled': 'True', |
|
'docker_volume_type': 'lvmdriver-1', |
|
'etcd_volume_size': 0, |
|
'availability_zone': 'az_1'}, |
|
'tls_disabled': False, |
|
'server_type': 'vm', |
|
'registry_enabled': False, |
|
'insecure_registry': '10.0.0.1:5000', |
|
'master_lb_enabled': False, |
|
'floating_ip_enabled': False, |
|
} |
|
self.cluster_dict = { |
|
'uuid': '5d12f6fd-a196-4bf0-ae4c-1f639a523a52', |
|
'cluster_template_id': 'xx-xx-xx-xx', |
|
'keypair': 'keypair_id', |
|
'name': 'cluster1', |
|
'stack_id': 'xx-xx-xx-xx', |
|
'api_address': '172.17.2.3', |
|
'node_addresses': ['172.17.2.4'], |
|
'node_count': 1, |
|
'master_count': 1, |
|
'discovery_url': 'https://discovery.etcd.io/test', |
|
'docker_volume_size': 20, |
|
'flavor_id': 'flavor_id', |
|
'master_addresses': ['172.17.2.18'], |
|
'ca_cert_ref': 'http://barbican/v1/containers/xx-xx-xx-xx', |
|
'magnum_cert_ref': 'http://barbican/v1/containers/xx-xx-xx-xx', |
|
'trustee_username': 'fake_trustee', |
|
'trustee_password': 'fake_trustee_password', |
|
'trustee_user_id': '7b489f04-b458-4541-8179-6a48a553e656', |
|
'trust_id': 'bd11efc5-d4e2-4dac-bbce-25e348ddf7de', |
|
'coe_version': 'fake-version', |
|
'labels': {'flannel_network_cidr': '10.101.0.0/16', |
|
'flannel_network_subnetlen': '26', |
|
'flannel_backend': 'vxlan', |
|
'system_pods_initial_delay': '15', |
|
'system_pods_timeout': '1', |
|
'admission_control_list': 'fake_list', |
|
'prometheus_monitoring': 'False', |
|
'grafana_admin_passwd': 'fake_pwd', |
|
'kube_dashboard_enabled': 'True', |
|
'docker_volume_type': 'lvmdriver-1', |
|
'availability_zone': 'az_1', |
|
'cert_manager_api': 'False', |
|
'ingress_controller': 'i-controller', |
|
'ingress_controller_role': 'i-controller-role', |
|
'kubelet_options': '--kubelet', |
|
'kubeapi_options': '--kubeapi', |
|
'kubecontroller_options': '--kubecontroller', |
|
'kubescheduler_options': '--kubescheduler', |
|
'kubeproxy_options': '--kubeproxy', |
|
'influx_grafana_dashboard_enabled': 'True'}, |
|
'master_flavor_id': 'master_flavor_id', |
|
'flavor_id': 'flavor_id', |
|
} |
|
self.context.user_name = 'fake_user' |
|
self.context.project_id = 'fake_tenant' |
|
osc_patcher = mock.patch('magnum.common.clients.OpenStackClients') |
|
self.mock_osc_class = osc_patcher.start() |
|
self.addCleanup(osc_patcher.stop) |
|
self.mock_osc = mock.MagicMock() |
|
self.mock_osc.url_for.return_value = 'http://192.168.10.10:5000/v3' |
|
self.mock_osc.magnum_url.return_value = 'http://127.0.0.1:9511/v1' |
|
self.mock_osc.cinder_region_name.return_value = 'RegionOne' |
|
self.mock_keystone = mock.MagicMock() |
|
self.mock_keystone.trustee_domain_id = 'trustee_domain_id' |
|
self.mock_osc.keystone.return_value = self.mock_keystone |
|
self.mock_osc_class.return_value = self.mock_osc |
|
|
|
octavia_patcher = mock.patch( |
|
'magnum.common.keystone.is_octavia_enabled' |
|
) |
|
self.mock_enable_octavia = octavia_patcher.start() |
|
self.mock_enable_octavia.return_value = False |
|
self.addCleanup(octavia_patcher.stop) |
|
|
|
@patch('requests.get') |
|
@patch('magnum.objects.ClusterTemplate.get_by_uuid') |
|
@patch('magnum.drivers.common.driver.Driver.get_driver') |
|
@patch('magnum.conductor.handlers.common.cert_manager' |
|
'.sign_node_certificate') |
|
@patch('magnum.common.x509.operations.generate_csr_and_key') |
|
def test_extract_template_definition( |
|
self, |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get): |
|
self._test_extract_template_definition( |
|
mock_generate_csr_and_key, mock_sign_node_certificate, |
|
mock_driver, mock_objects_cluster_template_get_by_uuid, mock_get) |
|
|
|
def _test_extract_template_definition( |
|
self, |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get, |
|
missing_attr=None): |
|
if missing_attr in self.cluster_template_dict: |
|
self.cluster_template_dict[missing_attr] = None |
|
elif missing_attr in self.cluster_dict: |
|
self.cluster_dict[missing_attr] = None |
|
cluster_template = objects.ClusterTemplate( |
|
self.context, **self.cluster_template_dict) |
|
mock_generate_csr_and_key.return_value = {'csr': 'csr', |
|
'private_key': 'private_key', |
|
'public_key': 'public_key'} |
|
mock_sign_node_certificate.return_value = 'signed_cert' |
|
mock_objects_cluster_template_get_by_uuid.return_value = \ |
|
cluster_template |
|
expected_result = str('{"action":"get","node":{"key":"test","value":' |
|
'"1","modifiedIndex":10,"createdIndex":10}}') |
|
mock_resp = mock.MagicMock() |
|
mock_resp.text = expected_result |
|
mock_resp.status_code = 200 |
|
mock_get.return_value = mock_resp |
|
cluster = objects.Cluster(self.context, **self.cluster_dict) |
|
mock_driver.return_value = k8s_dr.Driver() |
|
|
|
(template_path, |
|
definition, |
|
env_files) = mock_driver()._extract_template_definition(self.context, |
|
cluster) |
|
|
|
mapping = { |
|
'dns_nameserver': 'dns_nameserver', |
|
'image_id': 'server_image', |
|
'flavor_id': 'minion_flavor', |
|
'docker_volume_size': 'docker_volume_size', |
|
'docker_storage_driver': 'docker_storage_driver', |
|
'network_driver': 'network_driver', |
|
'volume_driver': 'volume_driver', |
|
'master_flavor_id': 'master_flavor', |
|
'apiserver_port': '', |
|
'node_count': 'number_of_minions', |
|
'master_count': 'number_of_masters', |
|
'discovery_url': 'discovery_url', |
|
'labels': {'flannel_network_cidr': '10.101.0.0/16', |
|
'flannel_network_subnetlen': '26', |
|
'flannel_backend': 'vxlan', |
|
'system_pods_initial_delay': '15', |
|
'system_pods_timeout': '1', |
|
'admission_control_list': 'fake_list', |
|
'prometheus_monitoring': 'False', |
|
'grafana_admin_passwd': 'fake_pwd', |
|
'kube_dashboard_enabled': 'True', |
|
'influx_grafana_dashboard_enabled': 'True', |
|
'docker_volume_type': 'lvmdriver-1', |
|
'etcd_volume_size': None, |
|
'availability_zone': 'az_1', |
|
'cert_manager_api': 'False', |
|
'ingress_controller': 'i-controller', |
|
'ingress_controller_role': 'i-controller-role', |
|
'kubelet_options': '--kubelet', |
|
'kubeapi_options': '--kubeapi', |
|
'kubecontroller_options': '--kubecontroller', |
|
'kubescheduler_options': '--kubescheduler', |
|
'kubeproxy_options': '--kubeproxy', |
|
}, |
|
'http_proxy': 'http_proxy', |
|
'https_proxy': 'https_proxy', |
|
'no_proxy': 'no_proxy', |
|
'cluster_uuid': self.cluster_dict['uuid'], |
|
'magnum_url': self.mock_osc.magnum_url.return_value, |
|
'tls_disabled': False, |
|
'insecure_registry': '10.0.0.1:5000', |
|
} |
|
expected = { |
|
'ssh_key_name': 'keypair_id', |
|
'external_network': 'external_network_id', |
|
'fixed_network': 'fixed_network', |
|
'fixed_subnet': 'fixed_subnet', |
|
'network_driver': 'network_driver', |
|
'volume_driver': 'volume_driver', |
|
'dns_nameserver': 'dns_nameserver', |
|
'server_image': 'image_id', |
|
'minion_flavor': 'flavor_id', |
|
'master_flavor': 'master_flavor_id', |
|
'number_of_minions': 1, |
|
'number_of_masters': 1, |
|
'docker_volume_size': 20, |
|
'docker_volume_type': 'lvmdriver-1', |
|
'docker_storage_driver': 'devicemapper', |
|
'discovery_url': 'https://discovery.etcd.io/test', |
|
'etcd_volume_size': None, |
|
'flannel_network_cidr': '10.101.0.0/16', |
|
'flannel_network_subnetlen': '26', |
|
'flannel_backend': 'vxlan', |
|
'system_pods_initial_delay': '15', |
|
'system_pods_timeout': '1', |
|
'admission_control_list': 'fake_list', |
|
'prometheus_monitoring': 'False', |
|
'grafana_admin_passwd': 'fake_pwd', |
|
'kube_dashboard_enabled': 'True', |
|
'influx_grafana_dashboard_enabled': 'True', |
|
'http_proxy': 'http_proxy', |
|
'https_proxy': 'https_proxy', |
|
'no_proxy': 'no_proxy', |
|
'username': 'fake_user', |
|
'cluster_uuid': self.cluster_dict['uuid'], |
|
'magnum_url': self.mock_osc.magnum_url.return_value, |
|
'region_name': self.mock_osc.cinder_region_name.return_value, |
|
'tls_disabled': False, |
|
'registry_enabled': False, |
|
'trustee_domain_id': self.mock_keystone.trustee_domain_id, |
|
'trustee_username': 'fake_trustee', |
|
'trustee_password': 'fake_trustee_password', |
|
'trustee_user_id': '7b489f04-b458-4541-8179-6a48a553e656', |
|
'trust_id': '', |
|
'auth_url': 'http://192.168.10.10:5000/v3', |
|
'insecure_registry_url': '10.0.0.1:5000', |
|
'kube_version': 'fake-version', |
|
'verify_ca': True, |
|
'openstack_ca': '', |
|
"nodes_affinity_policy": "soft-anti-affinity", |
|
'availability_zone': 'az_1', |
|
'cert_manager_api': 'False', |
|
'ingress_controller': 'i-controller', |
|
'ingress_controller_role': 'i-controller-role', |
|
'kubelet_options': '--kubelet', |
|
'kubeapi_options': '--kubeapi', |
|
'kubecontroller_options': '--kubecontroller', |
|
'kubescheduler_options': '--kubescheduler', |
|
'kubeproxy_options': '--kubeproxy', |
|
'octavia_enabled': False, |
|
'kube_service_account_key': 'public_key', |
|
'kube_service_account_private_key': 'private_key', |
|
} |
|
if missing_attr is not None: |
|
expected.pop(mapping[missing_attr], None) |
|
|
|
self.assertEqual(expected, definition) |
|
self.assertEqual( |
|
['../../common/templates/environments/no_private_network.yaml', |
|
'../../common/templates/environments/no_etcd_volume.yaml', |
|
'../../common/templates/environments/with_volume.yaml', |
|
'../../common/templates/environments/no_master_lb.yaml', |
|
'../../common/templates/environments/disable_floating_ip.yaml', |
|
], |
|
env_files) |
|
|
|
@patch('requests.get') |
|
@patch('magnum.objects.ClusterTemplate.get_by_uuid') |
|
@patch('magnum.drivers.common.driver.Driver.get_driver') |
|
@patch('magnum.conductor.handlers.common.cert_manager' |
|
'.sign_node_certificate') |
|
@patch('magnum.common.x509.operations.generate_csr_and_key') |
|
def test_extract_template_definition_with_registry( |
|
self, |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get): |
|
self.cluster_template_dict['registry_enabled'] = True |
|
cluster_template = objects.ClusterTemplate( |
|
self.context, **self.cluster_template_dict) |
|
mock_generate_csr_and_key.return_value = {'csr': 'csr', |
|
'private_key': 'private_key', |
|
'public_key': 'public_key'} |
|
mock_sign_node_certificate.return_value = 'signed_cert' |
|
mock_objects_cluster_template_get_by_uuid.return_value = \ |
|
cluster_template |
|
expected_result = str('{"action":"get","node":{"key":"test","value":' |
|
'"1","modifiedIndex":10,"createdIndex":10}}') |
|
mock_resp = mock.MagicMock() |
|
mock_resp.text = expected_result |
|
mock_get.return_value = mock_resp |
|
cluster = objects.Cluster(self.context, **self.cluster_dict) |
|
mock_driver.return_value = k8s_dr.Driver() |
|
|
|
CONF.set_override('swift_region', |
|
'RegionOne', |
|
group='docker_registry') |
|
|
|
CONF.set_override('cluster_user_trust', |
|
True, |
|
group='trust') |
|
|
|
(template_path, |
|
definition, |
|
env_files) = mock_driver()._extract_template_definition(self.context, |
|
cluster) |
|
|
|
expected = { |
|
'auth_url': 'http://192.168.10.10:5000/v3', |
|
'cluster_uuid': '5d12f6fd-a196-4bf0-ae4c-1f639a523a52', |
|
'discovery_url': 'https://discovery.etcd.io/test', |
|
'dns_nameserver': 'dns_nameserver', |
|
'docker_storage_driver': 'devicemapper', |
|
'docker_volume_size': 20, |
|
'docker_volume_type': 'lvmdriver-1', |
|
'etcd_volume_size': None, |
|
'external_network': 'external_network_id', |
|
'fixed_network': 'fixed_network', |
|
'fixed_subnet': 'fixed_subnet', |
|
'flannel_backend': 'vxlan', |
|
'flannel_network_cidr': '10.101.0.0/16', |
|
'flannel_network_subnetlen': '26', |
|
'system_pods_initial_delay': '15', |
|
'system_pods_timeout': '1', |
|
'admission_control_list': 'fake_list', |
|
'prometheus_monitoring': 'False', |
|
'grafana_admin_passwd': 'fake_pwd', |
|
'kube_dashboard_enabled': 'True', |
|
'influx_grafana_dashboard_enabled': 'True', |
|
'http_proxy': 'http_proxy', |
|
'https_proxy': 'https_proxy', |
|
'magnum_url': 'http://127.0.0.1:9511/v1', |
|
'master_flavor': 'master_flavor_id', |
|
'minion_flavor': 'flavor_id', |
|
'network_driver': 'network_driver', |
|
'no_proxy': 'no_proxy', |
|
'number_of_masters': 1, |
|
'number_of_minions': 1, |
|
'region_name': 'RegionOne', |
|
'registry_container': 'docker_registry', |
|
'registry_enabled': True, |
|
'server_image': 'image_id', |
|
'ssh_key_name': 'keypair_id', |
|
'swift_region': 'RegionOne', |
|
'tls_disabled': False, |
|
'trust_id': 'bd11efc5-d4e2-4dac-bbce-25e348ddf7de', |
|
'trustee_domain_id': self.mock_keystone.trustee_domain_id, |
|
'trustee_password': 'fake_trustee_password', |
|
'trustee_user_id': '7b489f04-b458-4541-8179-6a48a553e656', |
|
'trustee_username': 'fake_trustee', |
|
'username': 'fake_user', |
|
'volume_driver': 'volume_driver', |
|
'insecure_registry_url': '10.0.0.1:5000', |
|
'kube_version': 'fake-version', |
|
'verify_ca': True, |
|
'openstack_ca': '', |
|
"nodes_affinity_policy": "soft-anti-affinity", |
|
'availability_zone': 'az_1', |
|
'cert_manager_api': 'False', |
|
'ingress_controller': 'i-controller', |
|
'ingress_controller_role': 'i-controller-role', |
|
'kubelet_options': '--kubelet', |
|
'kubeapi_options': '--kubeapi', |
|
'kubecontroller_options': '--kubecontroller', |
|
'kubescheduler_options': '--kubescheduler', |
|
'kubeproxy_options': '--kubeproxy', |
|
'octavia_enabled': False, |
|
'kube_service_account_key': 'public_key', |
|
'kube_service_account_private_key': 'private_key', |
|
} |
|
|
|
self.assertEqual(expected, definition) |
|
self.assertEqual( |
|
['../../common/templates/environments/no_private_network.yaml', |
|
'../../common/templates/environments/no_etcd_volume.yaml', |
|
'../../common/templates/environments/with_volume.yaml', |
|
'../../common/templates/environments/no_master_lb.yaml', |
|
'../../common/templates/environments/disable_floating_ip.yaml', |
|
], |
|
env_files) |
|
|
|
@patch('requests.get') |
|
@patch('magnum.objects.ClusterTemplate.get_by_uuid') |
|
@patch('magnum.drivers.common.driver.Driver.get_driver') |
|
@patch('magnum.conductor.handlers.common.cert_manager' |
|
'.sign_node_certificate') |
|
@patch('magnum.common.x509.operations.generate_csr_and_key') |
|
def test_extract_template_definition_only_required( |
|
self, |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get): |
|
|
|
not_required = ['image_id', 'flavor_id', 'dns_nameserver', |
|
'docker_volume_size', 'fixed_network', 'http_proxy', |
|
'https_proxy', 'no_proxy', 'network_driver', |
|
'master_flavor_id', 'docker_storage_driver', |
|
'volume_driver', 'fixed_subnet'] |
|
for key in not_required: |
|
self.cluster_template_dict[key] = None |
|
self.cluster_dict['discovery_url'] = 'https://discovery.etcd.io/test' |
|
|
|
cluster_template = objects.ClusterTemplate( |
|
self.context, **self.cluster_template_dict) |
|
mock_generate_csr_and_key.return_value = {'csr': 'csr', |
|
'private_key': 'private_key', |
|
'public_key': 'public_key'} |
|
mock_sign_node_certificate.return_value = 'signed_cert' |
|
mock_objects_cluster_template_get_by_uuid.return_value = \ |
|
cluster_template |
|
expected_result = str('{"action":"get","node":{"key":"test","value":' |
|
'"1","modifiedIndex":10,"createdIndex":10}}') |
|
mock_resp = mock.MagicMock() |
|
mock_resp.text = expected_result |
|
mock_get.return_value = mock_resp |
|
mock_driver.return_value = k8s_dr.Driver() |
|
cluster = objects.Cluster(self.context, **self.cluster_dict) |
|
|
|
(template_path, |
|
definition, |
|
env_files) = mock_driver()._extract_template_definition(self.context, |
|
cluster) |
|
|
|
expected = { |
|
'auth_url': 'http://192.168.10.10:5000/v3', |
|
'cluster_uuid': '5d12f6fd-a196-4bf0-ae4c-1f639a523a52', |
|
'discovery_url': 'https://discovery.etcd.io/test', |
|
'docker_volume_size': 20, |
|
'master_flavor': 'master_flavor_id', |
|
'minion_flavor': 'flavor_id', |
|
'external_network': 'external_network_id', |
|
'flannel_backend': 'vxlan', |
|
'flannel_network_cidr': '10.101.0.0/16', |
|
'flannel_network_subnetlen': '26', |
|
'system_pods_initial_delay': '15', |
|
'system_pods_timeout': '1', |
|
'admission_control_list': 'fake_list', |
|
'prometheus_monitoring': 'False', |
|
'grafana_admin_passwd': 'fake_pwd', |
|
'kube_dashboard_enabled': 'True', |
|
'influx_grafana_dashboard_enabled': 'True', |
|
'docker_volume_type': 'lvmdriver-1', |
|
'etcd_volume_size': None, |
|
'insecure_registry_url': '10.0.0.1:5000', |
|
'kube_version': 'fake-version', |
|
'magnum_url': 'http://127.0.0.1:9511/v1', |
|
'number_of_masters': 1, |
|
'number_of_minions': 1, |
|
'region_name': 'RegionOne', |
|
'registry_enabled': False, |
|
'ssh_key_name': 'keypair_id', |
|
'tls_disabled': False, |
|
'trust_id': '', |
|
'trustee_domain_id': 'trustee_domain_id', |
|
'trustee_password': 'fake_trustee_password', |
|
'trustee_user_id': '7b489f04-b458-4541-8179-6a48a553e656', |
|
'trustee_username': 'fake_trustee', |
|
'username': 'fake_user', |
|
'verify_ca': True, |
|
'openstack_ca': '', |
|
"nodes_affinity_policy": "soft-anti-affinity", |
|
'availability_zone': 'az_1', |
|
'cert_manager_api': 'False', |
|
'ingress_controller': 'i-controller', |
|
'ingress_controller_role': 'i-controller-role', |
|
'kubelet_options': '--kubelet', |
|
'kubeapi_options': '--kubeapi', |
|
'kubecontroller_options': '--kubecontroller', |
|
'kubescheduler_options': '--kubescheduler', |
|
'kubeproxy_options': '--kubeproxy', |
|
'octavia_enabled': False, |
|
'kube_service_account_key': 'public_key', |
|
'kube_service_account_private_key': 'private_key', |
|
} |
|
self.assertEqual(expected, definition) |
|
self.assertEqual( |
|
['../../common/templates/environments/with_private_network.yaml', |
|
'../../common/templates/environments/no_etcd_volume.yaml', |
|
'../../common/templates/environments/with_volume.yaml', |
|
'../../common/templates/environments/no_master_lb.yaml', |
|
'../../common/templates/environments/disable_floating_ip.yaml', |
|
], |
|
env_files) |
|
|
|
@patch('requests.get') |
|
@patch('magnum.objects.ClusterTemplate.get_by_uuid') |
|
@patch('magnum.drivers.common.driver.Driver.get_driver') |
|
def test_extract_template_definition_coreos_with_disovery( |
|
self, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get): |
|
self.cluster_template_dict['cluster_distro'] = 'coreos' |
|
cluster_template = objects.ClusterTemplate( |
|
self.context, **self.cluster_template_dict) |
|
mock_objects_cluster_template_get_by_uuid.return_value = \ |
|
cluster_template |
|
expected_result = str('{"action":"get","node":{"key":"test","value":' |
|
'"1","modifiedIndex":10,"createdIndex":10}}') |
|
mock_resp = mock.MagicMock() |
|
mock_resp.text = expected_result |
|
mock_resp.status_code = 200 |
|
mock_get.return_value = mock_resp |
|
cluster = objects.Cluster(self.context, **self.cluster_dict) |
|
mock_driver.return_value = k8s_coreos_dr.Driver() |
|
|
|
(template_path, |
|
definition, |
|
env_files) = mock_driver()._extract_template_definition(self.context, |
|
cluster) |
|
|
|
expected = { |
|
'ssh_key_name': 'keypair_id', |
|
'external_network': 'external_network_id', |
|
'fixed_network': 'fixed_network', |
|
'fixed_subnet': 'fixed_subnet', |
|
'dns_nameserver': 'dns_nameserver', |
|
'server_image': 'image_id', |
|
'minion_flavor': 'flavor_id', |
|
'master_flavor': 'master_flavor_id', |
|
'number_of_minions': 1, |
|
'number_of_masters': 1, |
|
'network_driver': 'network_driver', |
|
'volume_driver': 'volume_driver', |
|
'discovery_url': 'https://discovery.etcd.io/test', |
|
'etcd_volume_size': None, |
|
'http_proxy': 'http_proxy', |
|
'https_proxy': 'https_proxy', |
|
'no_proxy': 'no_proxy', |
|
'flannel_network_cidr': '10.101.0.0/16', |
|
'flannel_network_subnetlen': '26', |
|
'flannel_backend': 'vxlan', |
|
'system_pods_initial_delay': '15', |
|
'system_pods_timeout': '1', |
|
'admission_control_list': 'fake_list', |
|
'prometheus_monitoring': 'False', |
|
'grafana_admin_passwd': 'fake_pwd', |
|
'kube_dashboard_enabled': 'True', |
|
'influx_grafana_dashboard_enabled': 'True', |
|
'tls_disabled': False, |
|
'registry_enabled': False, |
|
'trustee_domain_id': self.mock_keystone.trustee_domain_id, |
|
'trustee_username': 'fake_trustee', |
|
'trustee_password': 'fake_trustee_password', |
|
'trustee_user_id': '7b489f04-b458-4541-8179-6a48a553e656', |
|
'trust_id': '', |
|
'auth_url': 'http://192.168.10.10:5000/v3', |
|
'cluster_uuid': self.cluster_dict['uuid'], |
|
'magnum_url': self.mock_osc.magnum_url.return_value, |
|
'insecure_registry_url': '10.0.0.1:5000', |
|
'kube_version': 'fake-version', |
|
'verify_ca': True, |
|
'openstack_ca': '', |
|
'cert_manager_api': 'False', |
|
'ingress_controller': 'i-controller', |
|
'ingress_controller_role': 'i-controller-role', |
|
'kubelet_options': '--kubelet', |
|
'kubeapi_options': '--kubeapi', |
|
'kubecontroller_options': '--kubecontroller', |
|
'kubescheduler_options': '--kubescheduler', |
|
'kubeproxy_options': '--kubeproxy', |
|
'octavia_enabled': False, |
|
} |
|
self.assertEqual(expected, definition) |
|
self.assertEqual( |
|
['../../common/templates/environments/no_private_network.yaml', |
|
'../../common/templates/environments/no_master_lb.yaml', |
|
'../../common/templates/environments/disable_floating_ip.yaml'], |
|
env_files) |
|
|
|
@patch('requests.get') |
|
@patch('magnum.objects.ClusterTemplate.get_by_uuid') |
|
@patch('magnum.drivers.common.driver.Driver.get_driver') |
|
def test_extract_template_definition_coreos_no_discoveryurl( |
|
self, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
reqget): |
|
self.cluster_template_dict['cluster_distro'] = 'coreos' |
|
self.cluster_dict['discovery_url'] = None |
|
mock_req = mock.MagicMock(text='http://tokentest/h1/h2/h3', |
|
status_code=200) |
|
reqget.return_value = mock_req |
|
cluster_template = objects.ClusterTemplate( |
|
self.context, **self.cluster_template_dict) |
|
mock_objects_cluster_template_get_by_uuid.return_value = \ |
|
cluster_template |
|
cluster = objects.Cluster(self.context, **self.cluster_dict) |
|
mock_driver.return_value = k8s_coreos_dr.Driver() |
|
|
|
(template_path, |
|
definition, |
|
env_files) = mock_driver()._extract_template_definition(self.context, |
|
cluster) |
|
|
|
expected = { |
|
'ssh_key_name': 'keypair_id', |
|
'external_network': 'external_network_id', |
|
'fixed_network': 'fixed_network', |
|
'fixed_subnet': 'fixed_subnet', |
|
'dns_nameserver': 'dns_nameserver', |
|
'server_image': 'image_id', |
|
'minion_flavor': 'flavor_id', |
|
'master_flavor': 'master_flavor_id', |
|
'number_of_minions': 1, |
|
'number_of_masters': 1, |
|
'network_driver': 'network_driver', |
|
'volume_driver': 'volume_driver', |
|
'discovery_url': 'http://tokentest/h1/h2/h3', |
|
'etcd_volume_size': None, |
|
'http_proxy': 'http_proxy', |
|
'https_proxy': 'https_proxy', |
|
'no_proxy': 'no_proxy', |
|
'flannel_network_cidr': '10.101.0.0/16', |
|
'flannel_network_subnetlen': '26', |
|
'flannel_backend': 'vxlan', |
|
'system_pods_initial_delay': '15', |
|
'system_pods_timeout': '1', |
|
'admission_control_list': 'fake_list', |
|
'prometheus_monitoring': 'False', |
|
'grafana_admin_passwd': 'fake_pwd', |
|
'kube_dashboard_enabled': 'True', |
|
'influx_grafana_dashboard_enabled': 'True', |
|
'tls_disabled': False, |
|
'registry_enabled': False, |
|
'trustee_domain_id': self.mock_keystone.trustee_domain_id, |
|
'trustee_username': 'fake_trustee', |
|
'trustee_password': 'fake_trustee_password', |
|
'trustee_user_id': '7b489f04-b458-4541-8179-6a48a553e656', |
|
'trust_id': '', |
|
'auth_url': 'http://192.168.10.10:5000/v3', |
|
'cluster_uuid': self.cluster_dict['uuid'], |
|
'magnum_url': self.mock_osc.magnum_url.return_value, |
|
'insecure_registry_url': '10.0.0.1:5000', |
|
'kube_version': 'fake-version', |
|
'verify_ca': True, |
|
'openstack_ca': '', |
|
'cert_manager_api': 'False', |
|
'ingress_controller': 'i-controller', |
|
'ingress_controller_role': 'i-controller-role', |
|
'kubelet_options': '--kubelet', |
|
'kubeapi_options': '--kubeapi', |
|
'kubecontroller_options': '--kubecontroller', |
|
'kubescheduler_options': '--kubescheduler', |
|
'kubeproxy_options': '--kubeproxy', |
|
'octavia_enabled': False, |
|
} |
|
self.assertEqual(expected, definition) |
|
self.assertEqual( |
|
['../../common/templates/environments/no_private_network.yaml', |
|
'../../common/templates/environments/no_master_lb.yaml', |
|
'../../common/templates/environments/disable_floating_ip.yaml'], |
|
env_files) |
|
|
|
@patch('requests.get') |
|
@patch('magnum.objects.ClusterTemplate.get_by_uuid') |
|
@patch('magnum.drivers.common.driver.Driver.get_driver') |
|
@patch('magnum.conductor.handlers.common.cert_manager' |
|
'.sign_node_certificate') |
|
@patch('magnum.common.x509.operations.generate_csr_and_key') |
|
def test_extract_template_definition_without_dns( |
|
self, |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get): |
|
mock_driver.return_value = k8s_dr.Driver() |
|
self._test_extract_template_definition( |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get, |
|
missing_attr='dns_nameserver') |
|
|
|
@patch('requests.get') |
|
@patch('magnum.objects.ClusterTemplate.get_by_uuid') |
|
@patch('magnum.drivers.common.driver.Driver.get_driver') |
|
@patch('magnum.conductor.handlers.common.cert_manager' |
|
'.sign_node_certificate') |
|
@patch('magnum.common.x509.operations.generate_csr_and_key') |
|
def test_extract_template_definition_without_server_image( |
|
self, |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get): |
|
mock_driver.return_value = k8s_dr.Driver() |
|
self._test_extract_template_definition( |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get, |
|
missing_attr='image_id') |
|
|
|
@patch('requests.get') |
|
@patch('magnum.objects.ClusterTemplate.get_by_uuid') |
|
@patch('magnum.drivers.common.driver.Driver.get_driver') |
|
@patch('magnum.conductor.handlers.common.cert_manager' |
|
'.sign_node_certificate') |
|
@patch('magnum.common.x509.operations.generate_csr_and_key') |
|
def test_extract_template_definition_without_docker_storage_driver( |
|
self, |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get): |
|
mock_driver.return_value = k8s_dr.Driver() |
|
self._test_extract_template_definition( |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get, |
|
missing_attr='docker_storage_driver') |
|
|
|
@patch('requests.get') |
|
@patch('magnum.objects.ClusterTemplate.get_by_uuid') |
|
@patch('magnum.drivers.common.driver.Driver.get_driver') |
|
@patch('magnum.conductor.handlers.common.cert_manager' |
|
'.sign_node_certificate') |
|
@patch('magnum.common.x509.operations.generate_csr_and_key') |
|
def test_extract_template_definition_without_apiserver_port( |
|
self, |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get): |
|
mock_driver.return_value = k8s_dr.Driver() |
|
self._test_extract_template_definition( |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get, |
|
missing_attr='apiserver_port') |
|
|
|
@patch('requests.get') |
|
@patch('magnum.objects.ClusterTemplate.get_by_uuid') |
|
@patch('magnum.drivers.common.driver.Driver.get_driver') |
|
@patch('magnum.conductor.handlers.common.cert_manager' |
|
'.sign_node_certificate') |
|
@patch('magnum.common.x509.operations.generate_csr_and_key') |
|
def test_extract_template_definition_without_node_count( |
|
self, |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get): |
|
mock_driver.return_value = k8s_dr.Driver() |
|
self._test_extract_template_definition( |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get, |
|
missing_attr='node_count') |
|
|
|
@patch('requests.get') |
|
@patch('magnum.objects.ClusterTemplate.get_by_uuid') |
|
@patch('magnum.drivers.common.driver.Driver.get_driver') |
|
@patch('magnum.conductor.handlers.common.cert_manager' |
|
'.sign_node_certificate') |
|
@patch('magnum.common.x509.operations.generate_csr_and_key') |
|
def test_extract_template_definition_without_master_count( |
|
self, |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get): |
|
mock_driver.return_value = k8s_dr.Driver() |
|
self._test_extract_template_definition( |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
mock_get, |
|
missing_attr='master_count') |
|
|
|
@patch('requests.get') |
|
@patch('magnum.objects.ClusterTemplate.get_by_uuid') |
|
@patch('magnum.drivers.common.driver.Driver.get_driver') |
|
@patch('magnum.conductor.handlers.common.cert_manager' |
|
'.sign_node_certificate') |
|
@patch('magnum.common.x509.operations.generate_csr_and_key') |
|
def test_extract_template_definition_without_discovery_url( |
|
self, |
|
mock_generate_csr_and_key, |
|
mock_sign_node_certificate, |
|
mock_driver, |
|
mock_objects_cluster_template_get_by_uuid, |
|
reqget): |
|
cluster_template = objects.ClusterTemplate( |
|
self.context, **self.cluster_template_dict) |
|
mock_generate_csr_and_key.return_value = {'csr': 'csr', |
|
'private_key': 'private_key', |
|
'public_key': 'public_key'} |
|
mock_sign_node_certificate.return_value = 'signed_cert' |
|
mock_objects_cluster_template_get_by_uuid.return_value = \ |
|
cluster_template |
|
cluster_dict = self.cluster_dict |
|
cluster_dict['discovery_url'] = None |
|
cluster = objects.Cluster(self.context, **cluster_dict) |
|
mock_driver.return_value = k8s_dr.Driver() |
|
|
|
CONF.set_override('etcd_discovery_service_endpoint_format', |
|
'http://etcd/test?size=%(size)d', |
|
group='cluster') |
|
mock_req = mock.MagicMock(text='https://address/token', |
|
status_code=200) |
|
reqget.return_value = mock_req |
|
|
|
(template_path, |
|
definition, |
|
env_files) = mock_driver()._extract_template_definition(self.context, |
|
cluster) |
|
|
|
expected = { |
|
'ssh_key_name': 'keypair_id', |
|
'external_network': 'external_network_id', |
|
'fixed_network': 'fixed_network', |
|
'fixed_subnet': 'fixed_subnet', |
|
'dns_nameserver': 'dns_nameserver', |
|
'server_image': 'image_id', |
|
'master_flavor': 'master_flavor_id', |
|
'minion_flavor': 'flavor_id', |
|
'number_of_minions': 1, |
|
'number_of_masters': 1, |
|
'network_driver': 'network_driver', |
|
'volume_driver': 'volume_driver', |
|
'docker_volume_size': 20, |
|
'docker_volume_type': 'lvmdriver-1', |
|
'docker_storage_driver': 'devicemapper', |
|
'discovery_url': 'https://address/token', |
|
'etcd_volume_size': None, |
|
'http_proxy': 'http_proxy', |
|
'https_proxy': 'https_proxy', |
|
'no_proxy': 'no_proxy', |
|
'flannel_network_cidr': '10.101.0.0/16', |
|
'flannel_network_subnetlen': '26', |
|
'flannel_backend': 'vxlan', |
|
'system_pods_initial_delay': '15', |
|
'system_pods_timeout': '1', |
|
'admission_control_list': 'fake_list', |
|
'prometheus_monitoring': 'False', |
|
'grafana_admin_passwd': 'fake_pwd', |
|
'kube_dashboard_enabled': 'True', |
|
'influx_grafana_dashboard_enabled': 'True', |
|
'username': 'fake_user', |
|
'cluster_uuid': self.cluster_dict['uuid'], |
|
'magnum_url': self.mock_osc.magnum_url.return_value, |
|
'region_name': self.mock_osc.cinder_region_name.return_value, |
|
'tls_disabled': False, |
|
'registry_enabled': False, |
|
'trustee_domain_id': self.mock_keystone.trustee_domain_id, |
|
'trustee_username': 'fake_trustee', |
|
'trustee_password': 'fake_trustee_password', |
|
'trustee_user_id': '7b489f04-b458-4541-8179-6a48a553e656', |
|
'trust_id': '', |
|
'auth_url': 'http://192.168.10.10:5000/v3', |
|
'insecure_registry_url': '10.0.0.1:5000', |
|
'kube_version': 'fake-version', |
|
'verify_ca': True, |
|
'openstack_ca': '', |
|
"nodes_affinity_policy": "soft-anti-affinity", |
|
'availability_zone': 'az_1', |
|
'cert_manager_api': 'False', |
|
'ingress_controller': 'i-controller', |
|
'ingress_controller_role': 'i-controller-role', |
|
'kubelet_options': '--kubelet', |
|
'kubeapi_options': '--kubeapi', |
|
'kubecontroller_options': '--kubecontroller', |
|
'kubescheduler_options': '--kubescheduler', |
|
'kubeproxy_options': '--kubeproxy', |
|
'octavia_enabled': False, |
|
'kube_service_account_key': 'public_key', |
|
'kube_service_account_private_key': 'private_key', |
|
} |
|
self.assertEqual(expected, definition) |
|
self.assertEqual( |
|
['../../common/templates/environments/no_private_network.yaml', |
|
'../../common/templates/environments/no_etcd_volume.yaml', |
|
'../../common/templates/environments/with_volume.yaml', |
|
'../../common/templates/environments/no_master_lb.yaml', |
|
'../../common/templates/environments/disable_floating_ip.yaml', |
|
], |
|
env_files) |
|
reqget.assert_called_once_with('http://etcd/test?size=1') |
|
|
|
@patch('magnum.common.short_id.generate_id') |
|
@patch('heatclient.common.template_utils.get_template_contents') |
|
@patch('magnum.drivers.k8s_fedora_atomic_v1.driver.Driver.' |
|
'_extract_template_definition') |
|
@patch('magnum.common.clients.OpenStackClients') |
|
def test_create_stack(self, |
|
mock_osc, |
|
mock_extract_template_definition, |
|
mock_get_template_contents, |
|
mock_generate_id): |
|
|
|
mock_generate_id.return_value = 'xx-xx-xx-xx' |
|
expected_stack_name = 'expected-stack-name-xx-xx-xx-xx' |
|
expected_template_contents = 'template_contents' |
|
dummy_cluster_name = 'expected_stack_name' |
|
expected_timeout = 15 |
|
|
|
mock_tpl_files = {} |
|
mock_get_template_contents.return_value = [ |
|
mock_tpl_files, expected_template_contents] |
|
mock_extract_template_definition.return_value = ('template/path', |
|
{}, []) |
|
mock_heat_client = mock.MagicMock() |
|
mock_osc.return_value.heat.return_value = mock_heat_client |
|
mock_cluster = mock.MagicMock() |
|
mock_cluster.name = dummy_cluster_name |
|
|
|
k8s_dr.Driver().create_cluster(self.context, mock_cluster, |
|
expected_timeout) |
|
|
|
expected_args = { |
|
'stack_name': expected_stack_name, |
|
'parameters': {}, |
|
'template': expected_template_contents, |
|
'files': {}, |
|
'environment_files': [], |
|
'timeout_mins': expected_timeout |
|
} |
|
mock_heat_client.stacks.create.assert_called_once_with(**expected_args) |
|
|
|
@patch('magnum.common.short_id.generate_id') |
|
@patch('heatclient.common.template_utils.get_template_contents') |
|
@patch('magnum.drivers.k8s_fedora_atomic_v1.driver.Driver.' |
|
'_extract_template_definition') |
|
@patch('magnum.common.clients.OpenStackClients') |
|
def test_create_stack_no_timeout_specified( |
|
self, |
|
mock_osc, |
|
mock_extract_template_definition, |
|
mock_get_template_contents, |
|
mock_generate_id): |
|
|
|
mock_generate_id.return_value = 'xx-xx-xx-xx' |
|
expected_stack_name = 'expected-stack-name-xx-xx-xx-xx' |
|
expected_template_contents = 'template_contents' |
|
dummy_cluster_name = 'expected_stack_name' |
|
expected_timeout = CONF.cluster_heat.create_timeout |
|
|
|
mock_tpl_files = {} |
|
mock_get_template_contents.return_value = [ |
|
mock_tpl_files, expected_template_contents] |
|
mock_extract_template_definition.return_value = ('template/path', |
|
{}, []) |
|
mock_heat_client = mock.MagicMock() |
|
mock_osc.return_value.heat.return_value = mock_heat_client |
|
mock_cluster = mock.MagicMock() |
|
mock_cluster.name = dummy_cluster_name |
|
|
|
k8s_dr.Driver().create_cluster(self.context, mock_cluster, None) |
|
|
|
expected_args = { |
|
'stack_name': expected_stack_name, |
|
'parameters': {}, |
|
'template': expected_template_contents, |
|
'files': {}, |
|
'environment_files': [], |
|
'timeout_mins': expected_timeout |
|
} |
|
mock_heat_client.stacks.create.assert_called_once_with(**expected_args) |
|
|
|
@patch('magnum.common.short_id.generate_id') |
|
@patch('heatclient.common.template_utils.get_template_contents') |
|
@patch('magnum.drivers.k8s_fedora_atomic_v1.driver.Driver.' |
|
'_extract_template_definition') |
|
@patch('magnum.common.clients.OpenStackClients') |
|
def test_create_stack_timeout_is_zero( |
|
self, |
|
mock_osc, |
|
mock_extract_template_definition, |
|
mock_get_template_contents, |
|
mock_generate_id): |
|
|
|
mock_generate_id.return_value = 'xx-xx-xx-xx' |
|
expected_stack_name = 'expected-stack-name-xx-xx-xx-xx' |
|
expected_template_contents = 'template_contents' |
|
dummy_cluster_name = 'expected_stack_name' |
|
cluster_timeout = 0 |
|
expected_timeout = CONF.cluster_heat.create_timeout |
|
|
|
mock_tpl_files = {} |
|
mock_get_template_contents.return_value = [ |
|
mock_tpl_files, expected_template_contents] |
|
mock_extract_template_definition.return_value = ('template/path', |
|
{}, []) |
|
mock_heat_client = mock.MagicMock() |
|
mock_osc.return_value.heat.return_value = mock_heat_client |
|
mock_cluster = mock.MagicMock() |
|
mock_cluster.name = dummy_cluster_name |
|
|
|
k8s_dr.Driver().create_cluster(self.context, mock_cluster, |
|
cluster_timeout) |
|
|
|
expected_args = { |
|
'stack_name': expected_stack_name, |
|
'parameters': {}, |
|
'template': expected_template_contents, |
|
'files': {}, |
|
'environment_files': [], |
|
'timeout_mins': expected_timeout |
|
} |
|
mock_heat_client.stacks.create.assert_called_once_with(**expected_args) |
|
|
|
@patch('heatclient.common.template_utils.get_template_contents') |
|
@patch('magnum.drivers.k8s_fedora_atomic_v1.driver.Driver.' |
|
'_extract_template_definition') |
|
@patch('magnum.common.clients.OpenStackClients') |
|
def test_update_stack(self, |
|
mock_osc, |
|
mock_extract_template_definition, |
|
mock_get_template_contents): |
|
|
|
mock_stack_id = 'xx-xx-xx-xx' |
|
expected_template_contents = 'template_contents' |
|
|
|
mock_tpl_files = {} |
|
mock_get_template_contents.return_value = [ |
|
mock_tpl_files, expected_template_contents] |
|
mock_extract_template_definition.return_value = ('template/path', |
|
{}, []) |
|
mock_heat_client = mock.MagicMock() |
|
mock_osc.return_value.heat.return_value = mock_heat_client |
|
mock_cluster = mock.MagicMock() |
|
mock_cluster.stack_id = mock_stack_id |
|
|
|
k8s_dr.Driver().update_cluster({}, mock_cluster) |
|
|
|
expected_args = { |
|
'parameters': {}, |
|
'template': expected_template_contents, |
|
'files': {}, |
|
'environment_files': [], |
|
'disable_rollback': True |
|
} |
|
mock_heat_client.stacks.update.assert_called_once_with(mock_stack_id, |
|
**expected_args)
|
|
|