azure_file_test.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420
  1. // +build !providerless
  2. /*
  3. Copyright 2016 The Kubernetes Authors.
  4. Licensed under the Apache License, Version 2.0 (the "License");
  5. you may not use this file except in compliance with the License.
  6. You may obtain a copy of the License at
  7. http://www.apache.org/licenses/LICENSE-2.0
  8. Unless required by applicable law or agreed to in writing, software
  9. distributed under the License is distributed on an "AS IS" BASIS,
  10. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  11. See the License for the specific language governing permissions and
  12. limitations under the License.
  13. */
  14. package azure_file
  15. import (
  16. "fmt"
  17. "io/ioutil"
  18. "os"
  19. "path/filepath"
  20. "reflect"
  21. "strings"
  22. "testing"
  23. "github.com/Azure/go-autorest/autorest/to"
  24. v1 "k8s.io/api/core/v1"
  25. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  26. "k8s.io/apimachinery/pkg/types"
  27. "k8s.io/client-go/kubernetes/fake"
  28. fakecloud "k8s.io/cloud-provider/fake"
  29. "k8s.io/utils/mount"
  30. "k8s.io/kubernetes/pkg/volume"
  31. volumetest "k8s.io/kubernetes/pkg/volume/testing"
  32. "k8s.io/legacy-cloud-providers/azure"
  33. )
  34. func TestCanSupport(t *testing.T) {
  35. tmpDir, err := ioutil.TempDir(os.TempDir(), "azureFileTest")
  36. if err != nil {
  37. t.Fatalf("can't make a temp dir: %v", err)
  38. }
  39. defer os.RemoveAll(tmpDir)
  40. plugMgr := volume.VolumePluginMgr{}
  41. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(t, tmpDir, nil, nil))
  42. plug, err := plugMgr.FindPluginByName("kubernetes.io/azure-file")
  43. if err != nil {
  44. t.Errorf("Can't find the plugin by name")
  45. }
  46. if plug.GetPluginName() != "kubernetes.io/azure-file" {
  47. t.Errorf("Wrong name: %s", plug.GetPluginName())
  48. }
  49. if !plug.CanSupport(&volume.Spec{Volume: &v1.Volume{VolumeSource: v1.VolumeSource{AzureFile: &v1.AzureFileVolumeSource{}}}}) {
  50. t.Errorf("Expected true")
  51. }
  52. if !plug.CanSupport(&volume.Spec{PersistentVolume: &v1.PersistentVolume{Spec: v1.PersistentVolumeSpec{PersistentVolumeSource: v1.PersistentVolumeSource{AzureFile: &v1.AzureFilePersistentVolumeSource{}}}}}) {
  53. t.Errorf("Expected true")
  54. }
  55. }
  56. func TestGetAccessModes(t *testing.T) {
  57. tmpDir, err := ioutil.TempDir(os.TempDir(), "azureFileTest")
  58. if err != nil {
  59. t.Fatalf("can't make a temp dir: %v", err)
  60. }
  61. defer os.RemoveAll(tmpDir)
  62. plugMgr := volume.VolumePluginMgr{}
  63. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(t, tmpDir, nil, nil))
  64. plug, err := plugMgr.FindPersistentPluginByName("kubernetes.io/azure-file")
  65. if err != nil {
  66. t.Errorf("Can't find the plugin by name")
  67. }
  68. if !volumetest.ContainsAccessMode(plug.GetAccessModes(), v1.ReadWriteOnce) || !volumetest.ContainsAccessMode(plug.GetAccessModes(), v1.ReadOnlyMany) || !volumetest.ContainsAccessMode(plug.GetAccessModes(), v1.ReadWriteMany) {
  69. t.Errorf("Expected three AccessModeTypes: %s, %s, and %s", v1.ReadWriteOnce, v1.ReadOnlyMany, v1.ReadWriteMany)
  70. }
  71. }
  72. func getAzureTestCloud(t *testing.T) *azure.Cloud {
  73. config := `{
  74. "aadClientId": "--aad-client-id--",
  75. "aadClientSecret": "--aad-client-secret--"
  76. }`
  77. configReader := strings.NewReader(config)
  78. azureCloud, err := azure.NewCloudWithoutFeatureGates(configReader)
  79. if err != nil {
  80. t.Error(err)
  81. }
  82. return azureCloud
  83. }
  84. func getTestTempDir(t *testing.T) string {
  85. tmpDir, err := ioutil.TempDir(os.TempDir(), "azurefileTest")
  86. if err != nil {
  87. t.Fatalf("can't make a temp dir: %v", err)
  88. }
  89. return tmpDir
  90. }
  91. func TestPluginAzureCloudProvider(t *testing.T) {
  92. tmpDir := getTestTempDir(t)
  93. defer os.RemoveAll(tmpDir)
  94. testPlugin(t, tmpDir, volumetest.NewFakeVolumeHostWithCloudProvider(t, tmpDir, nil, nil, getAzureTestCloud(t)))
  95. }
  96. func TestPluginWithoutCloudProvider(t *testing.T) {
  97. tmpDir := getTestTempDir(t)
  98. defer os.RemoveAll(tmpDir)
  99. testPlugin(t, tmpDir, volumetest.NewFakeVolumeHost(t, tmpDir, nil, nil))
  100. }
  101. func TestPluginWithOtherCloudProvider(t *testing.T) {
  102. tmpDir := getTestTempDir(t)
  103. defer os.RemoveAll(tmpDir)
  104. cloud := &fakecloud.Cloud{}
  105. testPlugin(t, tmpDir, volumetest.NewFakeVolumeHostWithCloudProvider(t, tmpDir, nil, nil, cloud))
  106. }
  107. func testPlugin(t *testing.T, tmpDir string, volumeHost volume.VolumeHost) {
  108. plugMgr := volume.VolumePluginMgr{}
  109. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumeHost)
  110. plug, err := plugMgr.FindPluginByName("kubernetes.io/azure-file")
  111. if err != nil {
  112. t.Errorf("Can't find the plugin by name")
  113. }
  114. spec := &v1.Volume{
  115. Name: "vol1",
  116. VolumeSource: v1.VolumeSource{
  117. AzureFile: &v1.AzureFileVolumeSource{
  118. SecretName: "secret",
  119. ShareName: "share",
  120. },
  121. },
  122. }
  123. fake := mount.NewFakeMounter(nil)
  124. pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{UID: types.UID("poduid")}}
  125. mounter, err := plug.(*azureFilePlugin).newMounterInternal(volume.NewSpecFromVolume(spec), pod, &fakeAzureSvc{}, fake)
  126. if err != nil {
  127. t.Errorf("Failed to make a new Mounter: %v", err)
  128. }
  129. if mounter == nil {
  130. t.Errorf("Got a nil Mounter")
  131. }
  132. volPath := filepath.Join(tmpDir, "pods/poduid/volumes/kubernetes.io~azure-file/vol1")
  133. path := mounter.GetPath()
  134. if path != volPath {
  135. t.Errorf("Got unexpected path: %s", path)
  136. }
  137. if err := mounter.SetUp(volume.MounterArgs{}); err != nil {
  138. t.Errorf("Expected success, got: %v", err)
  139. }
  140. if _, err := os.Stat(path); err != nil {
  141. if os.IsNotExist(err) {
  142. t.Errorf("SetUp() failed, volume path not created: %s", path)
  143. } else {
  144. t.Errorf("SetUp() failed: %v", err)
  145. }
  146. }
  147. unmounter, err := plug.(*azureFilePlugin).newUnmounterInternal("vol1", types.UID("poduid"), mount.NewFakeMounter(nil))
  148. if err != nil {
  149. t.Errorf("Failed to make a new Unmounter: %v", err)
  150. }
  151. if unmounter == nil {
  152. t.Errorf("Got a nil Unmounter")
  153. }
  154. if err := unmounter.TearDown(); err != nil {
  155. t.Errorf("Expected success, got: %v", err)
  156. }
  157. if _, err := os.Stat(path); err == nil {
  158. t.Errorf("TearDown() failed, volume path still exists: %s", path)
  159. } else if !os.IsNotExist(err) {
  160. t.Errorf("TearDown() failed: %v", err)
  161. }
  162. }
  163. func TestPersistentClaimReadOnlyFlag(t *testing.T) {
  164. pv := &v1.PersistentVolume{
  165. ObjectMeta: metav1.ObjectMeta{
  166. Name: "pvA",
  167. },
  168. Spec: v1.PersistentVolumeSpec{
  169. PersistentVolumeSource: v1.PersistentVolumeSource{
  170. AzureFile: &v1.AzureFilePersistentVolumeSource{},
  171. },
  172. ClaimRef: &v1.ObjectReference{
  173. Name: "claimA",
  174. },
  175. },
  176. }
  177. claim := &v1.PersistentVolumeClaim{
  178. ObjectMeta: metav1.ObjectMeta{
  179. Name: "claimA",
  180. Namespace: "nsA",
  181. },
  182. Spec: v1.PersistentVolumeClaimSpec{
  183. VolumeName: "pvA",
  184. },
  185. Status: v1.PersistentVolumeClaimStatus{
  186. Phase: v1.ClaimBound,
  187. },
  188. }
  189. client := fake.NewSimpleClientset(pv, claim)
  190. plugMgr := volume.VolumePluginMgr{}
  191. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(t, "/tmp/fake", client, nil))
  192. plug, _ := plugMgr.FindPluginByName(azureFilePluginName)
  193. // readOnly bool is supplied by persistent-claim volume source when its mounter creates other volumes
  194. spec := volume.NewSpecFromPersistentVolume(pv, true)
  195. pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{UID: types.UID("poduid")}}
  196. mounter, _ := plug.NewMounter(spec, pod, volume.VolumeOptions{})
  197. if mounter == nil {
  198. t.Fatalf("Got a nil Mounter")
  199. }
  200. if !mounter.GetAttributes().ReadOnly {
  201. t.Errorf("Expected true for mounter.IsReadOnly")
  202. }
  203. }
  204. type fakeAzureSvc struct{}
  205. func (s *fakeAzureSvc) GetAzureCredentials(host volume.VolumeHost, nameSpace, secretName string) (string, string, error) {
  206. return "name", "key", nil
  207. }
  208. func (s *fakeAzureSvc) SetAzureCredentials(host volume.VolumeHost, nameSpace, accountName, accountKey string) (string, error) {
  209. return "secret", nil
  210. }
  211. func TestMounterAndUnmounterTypeAssert(t *testing.T) {
  212. tmpDir, err := ioutil.TempDir(os.TempDir(), "azurefileTest")
  213. if err != nil {
  214. t.Fatalf("can't make a temp dir: %v", err)
  215. }
  216. defer os.RemoveAll(tmpDir)
  217. plugMgr := volume.VolumePluginMgr{}
  218. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(t, tmpDir, nil, nil))
  219. plug, err := plugMgr.FindPluginByName("kubernetes.io/azure-file")
  220. if err != nil {
  221. t.Errorf("Can't find the plugin by name")
  222. }
  223. spec := &v1.Volume{
  224. Name: "vol1",
  225. VolumeSource: v1.VolumeSource{
  226. AzureFile: &v1.AzureFileVolumeSource{
  227. SecretName: "secret",
  228. ShareName: "share",
  229. },
  230. },
  231. }
  232. fake := mount.NewFakeMounter(nil)
  233. pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{UID: types.UID("poduid")}}
  234. mounter, err := plug.(*azureFilePlugin).newMounterInternal(volume.NewSpecFromVolume(spec), pod, &fakeAzureSvc{}, fake)
  235. if err != nil {
  236. t.Errorf("MounterInternal() failed: %v", err)
  237. }
  238. if _, ok := mounter.(volume.Unmounter); ok {
  239. t.Errorf("Volume Mounter can be type-assert to Unmounter")
  240. }
  241. unmounter, err := plug.(*azureFilePlugin).newUnmounterInternal("vol1", types.UID("poduid"), mount.NewFakeMounter(nil))
  242. if err != nil {
  243. t.Errorf("MounterInternal() failed: %v", err)
  244. }
  245. if _, ok := unmounter.(volume.Mounter); ok {
  246. t.Errorf("Volume Unmounter can be type-assert to Mounter")
  247. }
  248. }
  249. type testcase struct {
  250. name string
  251. defaultNs string
  252. spec *volume.Spec
  253. // Expected return of the test
  254. expectedName string
  255. expectedNs string
  256. expectedError error
  257. }
  258. func TestGetSecretNameAndNamespaceForPV(t *testing.T) {
  259. secretNs := "ns"
  260. tests := []testcase{
  261. {
  262. name: "persistent volume source",
  263. defaultNs: "default",
  264. spec: &volume.Spec{
  265. PersistentVolume: &v1.PersistentVolume{
  266. Spec: v1.PersistentVolumeSpec{
  267. PersistentVolumeSource: v1.PersistentVolumeSource{
  268. AzureFile: &v1.AzureFilePersistentVolumeSource{
  269. ShareName: "share",
  270. SecretName: "name",
  271. SecretNamespace: &secretNs,
  272. },
  273. },
  274. },
  275. },
  276. },
  277. expectedName: "name",
  278. expectedNs: "ns",
  279. expectedError: nil,
  280. },
  281. {
  282. name: "persistent volume source without namespace",
  283. defaultNs: "default",
  284. spec: &volume.Spec{
  285. PersistentVolume: &v1.PersistentVolume{
  286. Spec: v1.PersistentVolumeSpec{
  287. PersistentVolumeSource: v1.PersistentVolumeSource{
  288. AzureFile: &v1.AzureFilePersistentVolumeSource{
  289. ShareName: "share",
  290. SecretName: "name",
  291. },
  292. },
  293. },
  294. },
  295. },
  296. expectedName: "name",
  297. expectedNs: "default",
  298. expectedError: nil,
  299. },
  300. {
  301. name: "pod volume source",
  302. defaultNs: "default",
  303. spec: &volume.Spec{
  304. Volume: &v1.Volume{
  305. VolumeSource: v1.VolumeSource{
  306. AzureFile: &v1.AzureFileVolumeSource{
  307. ShareName: "share",
  308. SecretName: "name",
  309. },
  310. },
  311. },
  312. },
  313. expectedName: "name",
  314. expectedNs: "default",
  315. expectedError: nil,
  316. },
  317. }
  318. for _, testcase := range tests {
  319. resultName, resultNs, err := getSecretNameAndNamespace(testcase.spec, testcase.defaultNs)
  320. if err != testcase.expectedError || resultName != testcase.expectedName || resultNs != testcase.expectedNs {
  321. t.Errorf("%s failed: expected err=%v ns=%q name=%q, got %v/%q/%q", testcase.name, testcase.expectedError, testcase.expectedNs, testcase.expectedName,
  322. err, resultNs, resultName)
  323. }
  324. }
  325. }
  326. func TestAppendDefaultMountOptions(t *testing.T) {
  327. tests := []struct {
  328. options []string
  329. fsGroup *int64
  330. expected []string
  331. }{
  332. {
  333. options: []string{"dir_mode=0777"},
  334. fsGroup: nil,
  335. expected: []string{"dir_mode=0777",
  336. fmt.Sprintf("%s=%s", fileMode, defaultFileMode),
  337. fmt.Sprintf("%s=%s", vers, defaultVers)},
  338. },
  339. {
  340. options: []string{"file_mode=0777"},
  341. fsGroup: to.Int64Ptr(0),
  342. expected: []string{"file_mode=0777",
  343. fmt.Sprintf("%s=%s", dirMode, defaultDirMode),
  344. fmt.Sprintf("%s=%s", vers, defaultVers),
  345. fmt.Sprintf("%s=0", gid)},
  346. },
  347. {
  348. options: []string{"vers=2.1"},
  349. fsGroup: to.Int64Ptr(1000),
  350. expected: []string{"vers=2.1",
  351. fmt.Sprintf("%s=%s", fileMode, defaultFileMode),
  352. fmt.Sprintf("%s=%s", dirMode, defaultDirMode),
  353. fmt.Sprintf("%s=1000", gid)},
  354. },
  355. {
  356. options: []string{""},
  357. expected: []string{"", fmt.Sprintf("%s=%s",
  358. fileMode, defaultFileMode),
  359. fmt.Sprintf("%s=%s", dirMode, defaultDirMode),
  360. fmt.Sprintf("%s=%s", vers, defaultVers)},
  361. },
  362. {
  363. options: []string{"file_mode=0777", "dir_mode=0777"},
  364. expected: []string{"file_mode=0777", "dir_mode=0777", fmt.Sprintf("%s=%s", vers, defaultVers)},
  365. },
  366. {
  367. options: []string{"gid=2000"},
  368. fsGroup: to.Int64Ptr(1000),
  369. expected: []string{"gid=2000",
  370. fmt.Sprintf("%s=%s", fileMode, defaultFileMode),
  371. fmt.Sprintf("%s=%s", dirMode, defaultDirMode),
  372. "vers=3.0"},
  373. },
  374. }
  375. for _, test := range tests {
  376. result := appendDefaultMountOptions(test.options, test.fsGroup)
  377. if !reflect.DeepEqual(result, test.expected) {
  378. t.Errorf("input: %q, appendDefaultMountOptions result: %q, expected: %q", test.options, result, test.expected)
  379. }
  380. }
  381. }