openstack_test.go 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720
  1. /*
  2. Copyright 2014 The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package openstack
  14. import (
  15. "context"
  16. "fmt"
  17. "os"
  18. "reflect"
  19. "regexp"
  20. "sort"
  21. "strings"
  22. "testing"
  23. "time"
  24. "github.com/gophercloud/gophercloud"
  25. "github.com/gophercloud/gophercloud/openstack/compute/v2/servers"
  26. "k8s.io/api/core/v1"
  27. "k8s.io/apimachinery/pkg/api/resource"
  28. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  29. "k8s.io/apimachinery/pkg/util/rand"
  30. "k8s.io/apimachinery/pkg/util/wait"
  31. )
  32. const (
  33. testClusterName = "testCluster"
  34. volumeStatusTimeoutSeconds = 30
  35. // volumeStatus* is configuration of exponential backoff for
  36. // waiting for specified volume status. Starting with 1
  37. // seconds, multiplying by 1.2 with each step and taking 13 steps at maximum
  38. // it will time out after 32s, which roughly corresponds to 30s
  39. volumeStatusInitDelay = 1 * time.Second
  40. volumeStatusFactor = 1.2
  41. volumeStatusSteps = 13
  42. )
  43. func WaitForVolumeStatus(t *testing.T, os *OpenStack, volumeName string, status string) {
  44. backoff := wait.Backoff{
  45. Duration: volumeStatusInitDelay,
  46. Factor: volumeStatusFactor,
  47. Steps: volumeStatusSteps,
  48. }
  49. err := wait.ExponentialBackoff(backoff, func() (bool, error) {
  50. getVol, err := os.getVolume(volumeName)
  51. if err != nil {
  52. return false, err
  53. }
  54. if getVol.Status == status {
  55. t.Logf("Volume (%s) status changed to %s after %v seconds\n",
  56. volumeName,
  57. status,
  58. volumeStatusTimeoutSeconds)
  59. return true, nil
  60. }
  61. return false, nil
  62. })
  63. if err == wait.ErrWaitTimeout {
  64. t.Logf("Volume (%s) status did not change to %s after %v seconds\n",
  65. volumeName,
  66. status,
  67. volumeStatusTimeoutSeconds)
  68. return
  69. }
  70. if err != nil {
  71. t.Fatalf("Cannot get existing Cinder volume (%s): %v", volumeName, err)
  72. }
  73. }
  74. func TestReadConfig(t *testing.T) {
  75. _, err := readConfig(nil)
  76. if err == nil {
  77. t.Errorf("Should fail when no config is provided: %s", err)
  78. }
  79. // Since we are setting env vars, we need to reset old
  80. // values for other tests to succeed.
  81. env := clearEnviron(t)
  82. defer resetEnviron(t, env)
  83. os.Setenv("OS_PASSWORD", "mypass")
  84. defer os.Unsetenv("OS_PASSWORD")
  85. os.Setenv("OS_TENANT_NAME", "admin")
  86. defer os.Unsetenv("OS_TENANT_NAME")
  87. cfg, err := readConfig(strings.NewReader(`
  88. [Global]
  89. auth-url = http://auth.url
  90. user-id = user
  91. tenant-name = demo
  92. region = RegionOne
  93. [LoadBalancer]
  94. create-monitor = yes
  95. monitor-delay = 1m
  96. monitor-timeout = 30s
  97. monitor-max-retries = 3
  98. [BlockStorage]
  99. bs-version = auto
  100. trust-device-path = yes
  101. ignore-volume-az = yes
  102. [Metadata]
  103. search-order = configDrive, metadataService
  104. `))
  105. if err != nil {
  106. t.Fatalf("Should succeed when a valid config is provided: %s", err)
  107. }
  108. if cfg.Global.AuthURL != "http://auth.url" {
  109. t.Errorf("incorrect authurl: %s", cfg.Global.AuthURL)
  110. }
  111. if cfg.Global.UserID != "user" {
  112. t.Errorf("incorrect userid: %s", cfg.Global.UserID)
  113. }
  114. if cfg.Global.Password != "mypass" {
  115. t.Errorf("incorrect password: %s", cfg.Global.Password)
  116. }
  117. // config file wins over environment variable
  118. if cfg.Global.TenantName != "demo" {
  119. t.Errorf("incorrect tenant name: %s", cfg.Global.TenantName)
  120. }
  121. if cfg.Global.Region != "RegionOne" {
  122. t.Errorf("incorrect region: %s", cfg.Global.Region)
  123. }
  124. if !cfg.LoadBalancer.CreateMonitor {
  125. t.Errorf("incorrect lb.createmonitor: %t", cfg.LoadBalancer.CreateMonitor)
  126. }
  127. if cfg.LoadBalancer.MonitorDelay.Duration != 1*time.Minute {
  128. t.Errorf("incorrect lb.monitordelay: %s", cfg.LoadBalancer.MonitorDelay)
  129. }
  130. if cfg.LoadBalancer.MonitorTimeout.Duration != 30*time.Second {
  131. t.Errorf("incorrect lb.monitortimeout: %s", cfg.LoadBalancer.MonitorTimeout)
  132. }
  133. if cfg.LoadBalancer.MonitorMaxRetries != 3 {
  134. t.Errorf("incorrect lb.monitormaxretries: %d", cfg.LoadBalancer.MonitorMaxRetries)
  135. }
  136. if cfg.BlockStorage.TrustDevicePath != true {
  137. t.Errorf("incorrect bs.trustdevicepath: %v", cfg.BlockStorage.TrustDevicePath)
  138. }
  139. if cfg.BlockStorage.BSVersion != "auto" {
  140. t.Errorf("incorrect bs.bs-version: %v", cfg.BlockStorage.BSVersion)
  141. }
  142. if cfg.BlockStorage.IgnoreVolumeAZ != true {
  143. t.Errorf("incorrect bs.IgnoreVolumeAZ: %v", cfg.BlockStorage.IgnoreVolumeAZ)
  144. }
  145. if cfg.Metadata.SearchOrder != "configDrive, metadataService" {
  146. t.Errorf("incorrect md.search-order: %v", cfg.Metadata.SearchOrder)
  147. }
  148. }
  149. func TestToAuthOptions(t *testing.T) {
  150. cfg := Config{}
  151. cfg.Global.Username = "user"
  152. cfg.Global.Password = "pass"
  153. cfg.Global.DomainID = "2a73b8f597c04551a0fdc8e95544be8a"
  154. cfg.Global.DomainName = "local"
  155. cfg.Global.AuthURL = "http://auth.url"
  156. cfg.Global.UserID = "user"
  157. ao := cfg.toAuthOptions()
  158. if !ao.AllowReauth {
  159. t.Errorf("Will need to be able to reauthenticate")
  160. }
  161. if ao.Username != cfg.Global.Username {
  162. t.Errorf("Username %s != %s", ao.Username, cfg.Global.Username)
  163. }
  164. if ao.Password != cfg.Global.Password {
  165. t.Errorf("Password %s != %s", ao.Password, cfg.Global.Password)
  166. }
  167. if ao.DomainID != cfg.Global.DomainID {
  168. t.Errorf("DomainID %s != %s", ao.DomainID, cfg.Global.DomainID)
  169. }
  170. if ao.IdentityEndpoint != cfg.Global.AuthURL {
  171. t.Errorf("IdentityEndpoint %s != %s", ao.IdentityEndpoint, cfg.Global.AuthURL)
  172. }
  173. if ao.UserID != cfg.Global.UserID {
  174. t.Errorf("UserID %s != %s", ao.UserID, cfg.Global.UserID)
  175. }
  176. if ao.DomainName != cfg.Global.DomainName {
  177. t.Errorf("DomainName %s != %s", ao.DomainName, cfg.Global.DomainName)
  178. }
  179. if ao.TenantID != cfg.Global.TenantID {
  180. t.Errorf("TenantID %s != %s", ao.TenantID, cfg.Global.TenantID)
  181. }
  182. }
  183. func TestCheckOpenStackOpts(t *testing.T) {
  184. delay := MyDuration{60 * time.Second}
  185. timeout := MyDuration{30 * time.Second}
  186. tests := []struct {
  187. name string
  188. openstackOpts *OpenStack
  189. expectedError error
  190. }{
  191. {
  192. name: "test1",
  193. openstackOpts: &OpenStack{
  194. provider: nil,
  195. lbOpts: LoadBalancerOpts{
  196. LBVersion: "v2",
  197. SubnetID: "6261548e-ffde-4bc7-bd22-59c83578c5ef",
  198. FloatingNetworkID: "38b8b5f9-64dc-4424-bf86-679595714786",
  199. LBMethod: "ROUND_ROBIN",
  200. LBProvider: "haproxy",
  201. CreateMonitor: true,
  202. MonitorDelay: delay,
  203. MonitorTimeout: timeout,
  204. MonitorMaxRetries: uint(3),
  205. ManageSecurityGroups: true,
  206. },
  207. metadataOpts: MetadataOpts{
  208. SearchOrder: configDriveID,
  209. },
  210. },
  211. expectedError: nil,
  212. },
  213. {
  214. name: "test2",
  215. openstackOpts: &OpenStack{
  216. provider: nil,
  217. lbOpts: LoadBalancerOpts{
  218. LBVersion: "v2",
  219. FloatingNetworkID: "38b8b5f9-64dc-4424-bf86-679595714786",
  220. LBMethod: "ROUND_ROBIN",
  221. CreateMonitor: true,
  222. MonitorDelay: delay,
  223. MonitorTimeout: timeout,
  224. MonitorMaxRetries: uint(3),
  225. ManageSecurityGroups: true,
  226. },
  227. metadataOpts: MetadataOpts{
  228. SearchOrder: configDriveID,
  229. },
  230. },
  231. expectedError: nil,
  232. },
  233. {
  234. name: "test3",
  235. openstackOpts: &OpenStack{
  236. provider: nil,
  237. lbOpts: LoadBalancerOpts{
  238. LBVersion: "v2",
  239. SubnetID: "6261548e-ffde-4bc7-bd22-59c83578c5ef",
  240. FloatingNetworkID: "38b8b5f9-64dc-4424-bf86-679595714786",
  241. LBMethod: "ROUND_ROBIN",
  242. CreateMonitor: true,
  243. MonitorTimeout: timeout,
  244. MonitorMaxRetries: uint(3),
  245. ManageSecurityGroups: true,
  246. },
  247. metadataOpts: MetadataOpts{
  248. SearchOrder: configDriveID,
  249. },
  250. },
  251. expectedError: fmt.Errorf("monitor-delay not set in cloud provider config"),
  252. },
  253. {
  254. name: "test4",
  255. openstackOpts: &OpenStack{
  256. provider: nil,
  257. metadataOpts: MetadataOpts{
  258. SearchOrder: "",
  259. },
  260. },
  261. expectedError: fmt.Errorf("invalid value in section [Metadata] with key `search-order`. Value cannot be empty"),
  262. },
  263. {
  264. name: "test5",
  265. openstackOpts: &OpenStack{
  266. provider: nil,
  267. metadataOpts: MetadataOpts{
  268. SearchOrder: "value1,value2,value3",
  269. },
  270. },
  271. expectedError: fmt.Errorf("invalid value in section [Metadata] with key `search-order`. Value cannot contain more than 2 elements"),
  272. },
  273. {
  274. name: "test6",
  275. openstackOpts: &OpenStack{
  276. provider: nil,
  277. metadataOpts: MetadataOpts{
  278. SearchOrder: "value1",
  279. },
  280. },
  281. expectedError: fmt.Errorf("invalid element %q found in section [Metadata] with key `search-order`."+
  282. "Supported elements include %q and %q", "value1", configDriveID, metadataID),
  283. },
  284. {
  285. name: "test7",
  286. openstackOpts: &OpenStack{
  287. provider: nil,
  288. lbOpts: LoadBalancerOpts{
  289. LBVersion: "v2",
  290. SubnetID: "6261548e-ffde-4bc7-bd22-59c83578c5ef",
  291. FloatingNetworkID: "38b8b5f9-64dc-4424-bf86-679595714786",
  292. LBMethod: "ROUND_ROBIN",
  293. CreateMonitor: true,
  294. MonitorDelay: delay,
  295. MonitorTimeout: timeout,
  296. ManageSecurityGroups: true,
  297. },
  298. metadataOpts: MetadataOpts{
  299. SearchOrder: configDriveID,
  300. },
  301. },
  302. expectedError: fmt.Errorf("monitor-max-retries not set in cloud provider config"),
  303. },
  304. {
  305. name: "test8",
  306. openstackOpts: &OpenStack{
  307. provider: nil,
  308. lbOpts: LoadBalancerOpts{
  309. LBVersion: "v2",
  310. SubnetID: "6261548e-ffde-4bc7-bd22-59c83578c5ef",
  311. FloatingNetworkID: "38b8b5f9-64dc-4424-bf86-679595714786",
  312. LBMethod: "ROUND_ROBIN",
  313. CreateMonitor: true,
  314. MonitorDelay: delay,
  315. MonitorMaxRetries: uint(3),
  316. ManageSecurityGroups: true,
  317. },
  318. metadataOpts: MetadataOpts{
  319. SearchOrder: configDriveID,
  320. },
  321. },
  322. expectedError: fmt.Errorf("monitor-timeout not set in cloud provider config"),
  323. },
  324. }
  325. for _, testcase := range tests {
  326. err := checkOpenStackOpts(testcase.openstackOpts)
  327. if err == nil && testcase.expectedError == nil {
  328. continue
  329. }
  330. if (err != nil && testcase.expectedError == nil) || (err == nil && testcase.expectedError != nil) || err.Error() != testcase.expectedError.Error() {
  331. t.Errorf("%s failed: expected err=%q, got %q",
  332. testcase.name, testcase.expectedError, err)
  333. }
  334. }
  335. }
  336. func TestCaller(t *testing.T) {
  337. called := false
  338. myFunc := func() { called = true }
  339. c := newCaller()
  340. c.call(myFunc)
  341. if !called {
  342. t.Errorf("caller failed to call function in default case")
  343. }
  344. c.disarm()
  345. called = false
  346. c.call(myFunc)
  347. if called {
  348. t.Error("caller still called function when disarmed")
  349. }
  350. // Confirm the "usual" deferred caller pattern works as expected
  351. called = false
  352. successCase := func() {
  353. c := newCaller()
  354. defer c.call(func() { called = true })
  355. c.disarm()
  356. }
  357. if successCase(); called {
  358. t.Error("Deferred success case still invoked unwind")
  359. }
  360. called = false
  361. failureCase := func() {
  362. c := newCaller()
  363. defer c.call(func() { called = true })
  364. }
  365. if failureCase(); !called {
  366. t.Error("Deferred failure case failed to invoke unwind")
  367. }
  368. }
  369. // An arbitrary sort.Interface, just for easier comparison
  370. type AddressSlice []v1.NodeAddress
  371. func (a AddressSlice) Len() int { return len(a) }
  372. func (a AddressSlice) Less(i, j int) bool { return a[i].Address < a[j].Address }
  373. func (a AddressSlice) Swap(i, j int) { a[i], a[j] = a[j], a[i] }
  374. func TestNodeAddresses(t *testing.T) {
  375. srv := servers.Server{
  376. Status: "ACTIVE",
  377. HostID: "29d3c8c896a45aa4c34e52247875d7fefc3d94bbcc9f622b5d204362",
  378. AccessIPv4: "50.56.176.99",
  379. AccessIPv6: "2001:4800:790e:510:be76:4eff:fe04:82a8",
  380. Addresses: map[string]interface{}{
  381. "private": []interface{}{
  382. map[string]interface{}{
  383. "OS-EXT-IPS-MAC:mac_addr": "fa:16:3e:7c:1b:2b",
  384. "version": float64(4),
  385. "addr": "10.0.0.32",
  386. "OS-EXT-IPS:type": "fixed",
  387. },
  388. map[string]interface{}{
  389. "version": float64(4),
  390. "addr": "50.56.176.36",
  391. "OS-EXT-IPS:type": "floating",
  392. },
  393. map[string]interface{}{
  394. "version": float64(4),
  395. "addr": "10.0.0.31",
  396. // No OS-EXT-IPS:type
  397. },
  398. },
  399. "public": []interface{}{
  400. map[string]interface{}{
  401. "version": float64(4),
  402. "addr": "50.56.176.35",
  403. },
  404. map[string]interface{}{
  405. "version": float64(6),
  406. "addr": "2001:4800:780e:510:be76:4eff:fe04:84a8",
  407. },
  408. },
  409. },
  410. Metadata: map[string]string{
  411. "name": "a1-yinvcez57-0-bvynoyawrhcg-kube-minion-fg5i4jwcc2yy",
  412. TypeHostName: "a1-yinvcez57-0-bvynoyawrhcg-kube-minion-fg5i4jwcc2yy.novalocal",
  413. },
  414. }
  415. addrs, err := nodeAddresses(&srv)
  416. if err != nil {
  417. t.Fatalf("nodeAddresses returned error: %v", err)
  418. }
  419. sort.Sort(AddressSlice(addrs))
  420. t.Logf("addresses is %v", addrs)
  421. want := []v1.NodeAddress{
  422. {Type: v1.NodeInternalIP, Address: "10.0.0.31"},
  423. {Type: v1.NodeInternalIP, Address: "10.0.0.32"},
  424. {Type: v1.NodeExternalIP, Address: "2001:4800:780e:510:be76:4eff:fe04:84a8"},
  425. {Type: v1.NodeExternalIP, Address: "2001:4800:790e:510:be76:4eff:fe04:82a8"},
  426. {Type: v1.NodeExternalIP, Address: "50.56.176.35"},
  427. {Type: v1.NodeExternalIP, Address: "50.56.176.36"},
  428. {Type: v1.NodeExternalIP, Address: "50.56.176.99"},
  429. {Type: v1.NodeHostName, Address: "a1-yinvcez57-0-bvynoyawrhcg-kube-minion-fg5i4jwcc2yy.novalocal"},
  430. }
  431. if !reflect.DeepEqual(want, addrs) {
  432. t.Errorf("nodeAddresses returned incorrect value %v", addrs)
  433. }
  434. }
  435. func TestNewOpenStack(t *testing.T) {
  436. cfg, ok := configFromEnv()
  437. if !ok {
  438. t.Skip("No config found in environment")
  439. }
  440. _, err := newOpenStack(cfg)
  441. if err != nil {
  442. t.Fatalf("Failed to construct/authenticate OpenStack: %s", err)
  443. }
  444. }
  445. func TestLoadBalancer(t *testing.T) {
  446. cfg, ok := configFromEnv()
  447. if !ok {
  448. t.Skip("No config found in environment")
  449. }
  450. versions := []string{"v2", ""}
  451. for _, v := range versions {
  452. t.Logf("Trying LBVersion = '%s'\n", v)
  453. cfg.LoadBalancer.LBVersion = v
  454. os, err := newOpenStack(cfg)
  455. if err != nil {
  456. t.Fatalf("Failed to construct/authenticate OpenStack: %s", err)
  457. }
  458. lb, ok := os.LoadBalancer()
  459. if !ok {
  460. t.Fatalf("LoadBalancer() returned false - perhaps your stack doesn't support Neutron?")
  461. }
  462. _, exists, err := lb.GetLoadBalancer(context.TODO(), testClusterName, &v1.Service{ObjectMeta: metav1.ObjectMeta{Name: "noexist"}})
  463. if err != nil {
  464. t.Fatalf("GetLoadBalancer(\"noexist\") returned error: %s", err)
  465. }
  466. if exists {
  467. t.Fatalf("GetLoadBalancer(\"noexist\") returned exists")
  468. }
  469. }
  470. }
  471. func TestZones(t *testing.T) {
  472. SetMetadataFixture(&FakeMetadata)
  473. defer ClearMetadata()
  474. os := OpenStack{
  475. provider: &gophercloud.ProviderClient{
  476. IdentityBase: "http://auth.url/",
  477. },
  478. region: "myRegion",
  479. }
  480. z, ok := os.Zones()
  481. if !ok {
  482. t.Fatalf("Zones() returned false")
  483. }
  484. zone, err := z.GetZone(context.TODO())
  485. if err != nil {
  486. t.Fatalf("GetZone() returned error: %s", err)
  487. }
  488. if zone.Region != "myRegion" {
  489. t.Fatalf("GetZone() returned wrong region (%s)", zone.Region)
  490. }
  491. if zone.FailureDomain != "nova" {
  492. t.Fatalf("GetZone() returned wrong failure domain (%s)", zone.FailureDomain)
  493. }
  494. }
  495. var diskPathRegexp = regexp.MustCompile("/dev/disk/(?:by-id|by-path)/")
  496. func TestVolumes(t *testing.T) {
  497. cfg, ok := configFromEnv()
  498. if !ok {
  499. t.Skip("No config found in environment")
  500. }
  501. os, err := newOpenStack(cfg)
  502. if err != nil {
  503. t.Fatalf("Failed to construct/authenticate OpenStack: %s", err)
  504. }
  505. tags := map[string]string{
  506. "test": "value",
  507. }
  508. vol, _, _, _, err := os.CreateVolume("kubernetes-test-volume-"+rand.String(10), 1, "", "", &tags)
  509. if err != nil {
  510. t.Fatalf("Cannot create a new Cinder volume: %v", err)
  511. }
  512. t.Logf("Volume (%s) created\n", vol)
  513. WaitForVolumeStatus(t, os, vol, volumeAvailableStatus)
  514. id, err := os.InstanceID()
  515. if err != nil {
  516. t.Logf("Cannot find instance id: %v - perhaps you are running this test outside a VM launched by OpenStack", err)
  517. } else {
  518. diskID, err := os.AttachDisk(id, vol)
  519. if err != nil {
  520. t.Fatalf("Cannot AttachDisk Cinder volume %s: %v", vol, err)
  521. }
  522. t.Logf("Volume (%s) attached, disk ID: %s\n", vol, diskID)
  523. WaitForVolumeStatus(t, os, vol, volumeInUseStatus)
  524. devicePath := os.GetDevicePath(diskID)
  525. if diskPathRegexp.FindString(devicePath) == "" {
  526. t.Fatalf("GetDevicePath returned and unexpected path for Cinder volume %s, returned %s", vol, devicePath)
  527. }
  528. t.Logf("Volume (%s) found at path: %s\n", vol, devicePath)
  529. err = os.DetachDisk(id, vol)
  530. if err != nil {
  531. t.Fatalf("Cannot DetachDisk Cinder volume %s: %v", vol, err)
  532. }
  533. t.Logf("Volume (%s) detached\n", vol)
  534. WaitForVolumeStatus(t, os, vol, volumeAvailableStatus)
  535. }
  536. expectedVolSize := resource.MustParse("2Gi")
  537. newVolSize, err := os.ExpandVolume(vol, resource.MustParse("1Gi"), expectedVolSize)
  538. if err != nil {
  539. t.Fatalf("Cannot expand a Cinder volume: %v", err)
  540. }
  541. if newVolSize != expectedVolSize {
  542. t.Logf("Expected: %v but got: %v ", expectedVolSize, newVolSize)
  543. }
  544. t.Logf("Volume expanded to (%v) \n", newVolSize)
  545. WaitForVolumeStatus(t, os, vol, volumeAvailableStatus)
  546. err = os.DeleteVolume(vol)
  547. if err != nil {
  548. t.Fatalf("Cannot delete Cinder volume %s: %v", vol, err)
  549. }
  550. t.Logf("Volume (%s) deleted\n", vol)
  551. }
  552. func TestInstanceIDFromProviderID(t *testing.T) {
  553. testCases := []struct {
  554. providerID string
  555. instanceID string
  556. fail bool
  557. }{
  558. {
  559. providerID: ProviderName + "://" + "/" + "7b9cf879-7146-417c-abfd-cb4272f0c935",
  560. instanceID: "7b9cf879-7146-417c-abfd-cb4272f0c935",
  561. fail: false,
  562. },
  563. {
  564. providerID: "openstack://7b9cf879-7146-417c-abfd-cb4272f0c935",
  565. instanceID: "",
  566. fail: true,
  567. },
  568. {
  569. providerID: "7b9cf879-7146-417c-abfd-cb4272f0c935",
  570. instanceID: "",
  571. fail: true,
  572. },
  573. {
  574. providerID: "other-provider:///7b9cf879-7146-417c-abfd-cb4272f0c935",
  575. instanceID: "",
  576. fail: true,
  577. },
  578. }
  579. for _, test := range testCases {
  580. instanceID, err := instanceIDFromProviderID(test.providerID)
  581. if (err != nil) != test.fail {
  582. t.Errorf("%s yielded `err != nil` as %t. expected %t", test.providerID, (err != nil), test.fail)
  583. }
  584. if test.fail {
  585. continue
  586. }
  587. if instanceID != test.instanceID {
  588. t.Errorf("%s yielded %s. expected %s", test.providerID, instanceID, test.instanceID)
  589. }
  590. }
  591. }
  592. func TestToAuth3Options(t *testing.T) {
  593. cfg := Config{}
  594. cfg.Global.Username = "user"
  595. cfg.Global.Password = "pass"
  596. cfg.Global.DomainID = "2a73b8f597c04551a0fdc8e95544be8a"
  597. cfg.Global.DomainName = "local"
  598. cfg.Global.AuthURL = "http://auth.url"
  599. cfg.Global.UserID = "user"
  600. ao := cfg.toAuth3Options()
  601. if !ao.AllowReauth {
  602. t.Errorf("Will need to be able to reauthenticate")
  603. }
  604. if ao.Username != cfg.Global.Username {
  605. t.Errorf("Username %s != %s", ao.Username, cfg.Global.Username)
  606. }
  607. if ao.Password != cfg.Global.Password {
  608. t.Errorf("Password %s != %s", ao.Password, cfg.Global.Password)
  609. }
  610. if ao.DomainID != cfg.Global.DomainID {
  611. t.Errorf("DomainID %s != %s", ao.DomainID, cfg.Global.DomainID)
  612. }
  613. if ao.IdentityEndpoint != cfg.Global.AuthURL {
  614. t.Errorf("IdentityEndpoint %s != %s", ao.IdentityEndpoint, cfg.Global.AuthURL)
  615. }
  616. if ao.UserID != cfg.Global.UserID {
  617. t.Errorf("UserID %s != %s", ao.UserID, cfg.Global.UserID)
  618. }
  619. if ao.DomainName != cfg.Global.DomainName {
  620. t.Errorf("DomainName %s != %s", ao.DomainName, cfg.Global.DomainName)
  621. }
  622. }
  623. func clearEnviron(t *testing.T) []string {
  624. env := os.Environ()
  625. for _, pair := range env {
  626. if strings.HasPrefix(pair, "OS_") {
  627. i := strings.Index(pair, "=") + 1
  628. os.Unsetenv(pair[:i-1])
  629. }
  630. }
  631. return env
  632. }
  633. func resetEnviron(t *testing.T, items []string) {
  634. for _, pair := range items {
  635. if strings.HasPrefix(pair, "OS_") {
  636. i := strings.Index(pair, "=") + 1
  637. if err := os.Setenv(pair[:i-1], pair[i:]); err != nil {
  638. t.Errorf("Setenv(%q, %q) failed during reset: %v", pair[:i-1], pair[i:], err)
  639. }
  640. }
  641. }
  642. }