/* Copyright 2019 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package testsuites import ( "context" "flag" "fmt" "strings" "github.com/onsi/ginkgo" "github.com/onsi/gomega" v1 "k8s.io/api/core/v1" apierrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" clientset "k8s.io/client-go/kubernetes" "k8s.io/kubernetes/test/e2e/framework" e2epod "k8s.io/kubernetes/test/e2e/framework/pod" e2eskipper "k8s.io/kubernetes/test/e2e/framework/skipper" "k8s.io/kubernetes/test/e2e/framework/volume" "k8s.io/kubernetes/test/e2e/storage/testpatterns" storageutils "k8s.io/kubernetes/test/e2e/storage/utils" ) type ephemeralTestSuite struct { tsInfo TestSuiteInfo } var _ TestSuite = &ephemeralTestSuite{} // InitEphemeralTestSuite returns ephemeralTestSuite that implements TestSuite interface func InitEphemeralTestSuite() TestSuite { return &ephemeralTestSuite{ tsInfo: TestSuiteInfo{ Name: "ephemeral", TestPatterns: []testpatterns.TestPattern{ { Name: "inline ephemeral CSI volume", VolType: testpatterns.CSIInlineVolume, }, }, }, } } func (p *ephemeralTestSuite) GetTestSuiteInfo() TestSuiteInfo { return p.tsInfo } func (p *ephemeralTestSuite) SkipRedundantSuite(driver TestDriver, pattern testpatterns.TestPattern) { } func (p *ephemeralTestSuite) DefineTests(driver TestDriver, pattern testpatterns.TestPattern) { type local struct { config *PerTestConfig driverCleanup func() testCase *EphemeralTest } var ( dInfo = driver.GetDriverInfo() eDriver EphemeralTestDriver l local ) ginkgo.BeforeEach(func() { ok := false eDriver, ok = driver.(EphemeralTestDriver) if !ok { e2eskipper.Skipf("Driver %s doesn't support ephemeral inline volumes -- skipping", dInfo.Name) } }) // This intentionally comes after checking the preconditions because it // registers its own BeforeEach which creates the namespace. Beware that it // also registers an AfterEach which renders f unusable. Any code using // f must run inside an It or Context callback. f := framework.NewDefaultFramework("ephemeral") init := func() { l = local{} // Now do the more expensive test initialization. l.config, l.driverCleanup = driver.PrepareTest(f) l.testCase = &EphemeralTest{ Client: l.config.Framework.ClientSet, Namespace: f.Namespace.Name, DriverName: eDriver.GetCSIDriverName(l.config), Node: l.config.ClientNodeSelection, GetVolume: func(volumeNumber int) (map[string]string, bool, bool) { return eDriver.GetVolume(l.config, volumeNumber) }, } } cleanup := func() { err := tryFunc(l.driverCleanup) framework.ExpectNoError(err, "while cleaning up driver") l.driverCleanup = nil } ginkgo.It("should create read-only inline ephemeral volume", func() { init() defer cleanup() l.testCase.ReadOnly = true l.testCase.RunningPodCheck = func(pod *v1.Pod) interface{} { storageutils.VerifyExecInPodSucceed(f, pod, "mount | grep /mnt/test | grep ro,") return nil } l.testCase.TestEphemeral() }) ginkgo.It("should create read/write inline ephemeral volume", func() { init() defer cleanup() l.testCase.ReadOnly = false l.testCase.RunningPodCheck = func(pod *v1.Pod) interface{} { storageutils.VerifyExecInPodSucceed(f, pod, "mount | grep /mnt/test | grep rw,") return nil } l.testCase.TestEphemeral() }) ginkgo.It("should support two pods which share the same volume", func() { init() defer cleanup() // We test in read-only mode if that is all that the driver supports, // otherwise read/write. _, shared, readOnly := eDriver.GetVolume(l.config, 0) l.testCase.RunningPodCheck = func(pod *v1.Pod) interface{} { // Create another pod with the same inline volume attributes. pod2 := StartInPodWithInlineVolume(f.ClientSet, f.Namespace.Name, "inline-volume-tester2", "sleep 100000", []v1.CSIVolumeSource{*pod.Spec.Volumes[0].CSI}, readOnly, l.testCase.Node) framework.ExpectNoError(e2epod.WaitForPodRunningInNamespaceSlow(f.ClientSet, pod2.Name, pod2.Namespace), "waiting for second pod with inline volume") // If (and only if) we were able to mount // read/write and volume data is not shared // between pods, then we can check whether // data written in one pod is really not // visible in the other. if !readOnly && !shared { ginkgo.By("writing data in one pod and checking for it in the second") storageutils.VerifyExecInPodSucceed(f, pod, "touch /mnt/test-0/hello-world") storageutils.VerifyExecInPodSucceed(f, pod2, "[ ! -f /mnt/test-0/hello-world ]") } defer StopPod(f.ClientSet, pod2) return nil } l.testCase.TestEphemeral() }) var numInlineVolumes = flag.Int("storage.ephemeral."+strings.Replace(driver.GetDriverInfo().Name, ".", "-", -1)+".numInlineVolumes", 2, "number of ephemeral inline volumes per pod") ginkgo.It("should support multiple inline ephemeral volumes", func() { init() defer cleanup() l.testCase.NumInlineVolumes = *numInlineVolumes gomega.Expect(*numInlineVolumes).To(gomega.BeNumerically(">", 0), "positive number of inline volumes") l.testCase.TestEphemeral() }) } // EphemeralTest represents parameters to be used by tests for inline volumes. // Not all parameters are used by all tests. type EphemeralTest struct { Client clientset.Interface Namespace string DriverName string Node e2epod.NodeSelection // GetVolume returns the volume attributes for a // certain inline ephemeral volume, enumerated starting with // #0. Some tests might require more than one volume. They can // all be the same or different, depending what the driver supports // and/or wants to test. // // For each volume, the test driver can specify the // attributes, whether two pods using those attributes will // end up sharing the same backend storage (i.e. changes made // in one pod will be visible in the other), and whether // the volume can be mounted read/write or only read-only. GetVolume func(volumeNumber int) (attributes map[string]string, shared bool, readOnly bool) // RunningPodCheck is invoked while a pod using an inline volume is running. // It can execute additional checks on the pod and its volume(s). Any data // returned by it is passed to StoppedPodCheck. RunningPodCheck func(pod *v1.Pod) interface{} // StoppedPodCheck is invoked after ensuring that the pod is gone. // It is passed the data gather by RunningPodCheck or nil if that // isn't defined and then can do additional checks on the node, // like for example verifying that the ephemeral volume was really // removed. How to do such a check is driver-specific and not // covered by the generic storage test suite. StoppedPodCheck func(nodeName string, runningPodData interface{}) // NumInlineVolumes sets the number of ephemeral inline volumes per pod. // Unset (= zero) is the same as one. NumInlineVolumes int // ReadOnly limits mounting to read-only. ReadOnly bool } // TestEphemeral tests pod creation with one ephemeral volume. func (t EphemeralTest) TestEphemeral() { client := t.Client gomega.Expect(client).NotTo(gomega.BeNil(), "EphemeralTest.Client is required") gomega.Expect(t.GetVolume).NotTo(gomega.BeNil(), "EphemeralTest.GetVolume is required") gomega.Expect(t.DriverName).NotTo(gomega.BeEmpty(), "EphemeralTest.DriverName is required") ginkgo.By(fmt.Sprintf("checking the requested inline volume exists in the pod running on node %+v", t.Node)) command := "mount | grep /mnt/test && sleep 10000" var csiVolumes []v1.CSIVolumeSource numVolumes := t.NumInlineVolumes if numVolumes == 0 { numVolumes = 1 } for i := 0; i < numVolumes; i++ { attributes, _, readOnly := t.GetVolume(i) csi := v1.CSIVolumeSource{ Driver: t.DriverName, VolumeAttributes: attributes, } if readOnly && !t.ReadOnly { e2eskipper.Skipf("inline ephemeral volume #%d is read-only, but the test needs a read/write volume", i) } csiVolumes = append(csiVolumes, csi) } pod := StartInPodWithInlineVolume(client, t.Namespace, "inline-volume-tester", command, csiVolumes, t.ReadOnly, t.Node) defer func() { // pod might be nil now. StopPod(client, pod) }() framework.ExpectNoError(e2epod.WaitForPodRunningInNamespaceSlow(client, pod.Name, pod.Namespace), "waiting for pod with inline volume") runningPod, err := client.CoreV1().Pods(pod.Namespace).Get(context.TODO(), pod.Name, metav1.GetOptions{}) framework.ExpectNoError(err, "get pod") actualNodeName := runningPod.Spec.NodeName // Run the checker of the running pod. var runningPodData interface{} if t.RunningPodCheck != nil { runningPodData = t.RunningPodCheck(pod) } StopPod(client, pod) pod = nil // Don't stop twice. if t.StoppedPodCheck != nil { t.StoppedPodCheck(actualNodeName, runningPodData) } } // StartInPodWithInlineVolume starts a command in a pod with given volume(s) mounted to /mnt/test- directory. // The caller is responsible for checking the pod and deleting it. func StartInPodWithInlineVolume(c clientset.Interface, ns, podName, command string, csiVolumes []v1.CSIVolumeSource, readOnly bool, node e2epod.NodeSelection) *v1.Pod { pod := &v1.Pod{ TypeMeta: metav1.TypeMeta{ Kind: "Pod", APIVersion: "v1", }, ObjectMeta: metav1.ObjectMeta{ GenerateName: podName + "-", Labels: map[string]string{ "app": podName, }, }, Spec: v1.PodSpec{ Containers: []v1.Container{ { Name: "csi-volume-tester", Image: volume.GetTestImage(framework.BusyBoxImage), Command: volume.GenerateScriptCmd(command), }, }, RestartPolicy: v1.RestartPolicyNever, }, } e2epod.SetNodeSelection(pod, node) for i, csiVolume := range csiVolumes { name := fmt.Sprintf("my-volume-%d", i) pod.Spec.Containers[0].VolumeMounts = append(pod.Spec.Containers[0].VolumeMounts, v1.VolumeMount{ Name: name, MountPath: fmt.Sprintf("/mnt/test-%d", i), ReadOnly: readOnly, }) pod.Spec.Volumes = append(pod.Spec.Volumes, v1.Volume{ Name: name, VolumeSource: v1.VolumeSource{ CSI: &csiVolume, }, }) } pod, err := c.CoreV1().Pods(ns).Create(context.TODO(), pod, metav1.CreateOptions{}) framework.ExpectNoError(err, "failed to create pod") return pod } // CSIInlineVolumesEnabled checks whether the running cluster has the CSIInlineVolumes feature gate enabled. // It does that by trying to create a pod that uses that feature. func CSIInlineVolumesEnabled(c clientset.Interface, ns string) (bool, error) { pod := &v1.Pod{ TypeMeta: metav1.TypeMeta{ Kind: "Pod", APIVersion: "v1", }, ObjectMeta: metav1.ObjectMeta{ GenerateName: "csi-inline-volume-", }, Spec: v1.PodSpec{ Containers: []v1.Container{ { Name: "csi-volume-tester", Image: "no-such-registry/no-such-image", VolumeMounts: []v1.VolumeMount{ { Name: "my-volume", MountPath: "/mnt/test", }, }, }, }, RestartPolicy: v1.RestartPolicyNever, Volumes: []v1.Volume{ { Name: "my-volume", VolumeSource: v1.VolumeSource{ CSI: &v1.CSIVolumeSource{ Driver: "no-such-driver.example.com", }, }, }, }, }, } pod, err := c.CoreV1().Pods(ns).Create(context.TODO(), pod, metav1.CreateOptions{}) switch { case err == nil: // Pod was created, feature supported. StopPod(c, pod) return true, nil case apierrors.IsInvalid(err): // "Invalid" because it uses a feature that isn't supported. return false, nil default: // Unexpected error. return false, err } }