azure_file_test.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415
  1. /*
  2. Copyright 2016 The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package azure_file
  14. import (
  15. "fmt"
  16. "io/ioutil"
  17. "os"
  18. "path/filepath"
  19. "reflect"
  20. "strings"
  21. "testing"
  22. "github.com/Azure/go-autorest/autorest/to"
  23. v1 "k8s.io/api/core/v1"
  24. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  25. "k8s.io/apimachinery/pkg/types"
  26. "k8s.io/client-go/kubernetes/fake"
  27. fakecloud "k8s.io/cloud-provider/fake"
  28. "k8s.io/kubernetes/pkg/util/mount"
  29. "k8s.io/kubernetes/pkg/volume"
  30. volumetest "k8s.io/kubernetes/pkg/volume/testing"
  31. "k8s.io/legacy-cloud-providers/azure"
  32. )
  33. func TestCanSupport(t *testing.T) {
  34. tmpDir, err := ioutil.TempDir(os.TempDir(), "azureFileTest")
  35. if err != nil {
  36. t.Fatalf("can't make a temp dir: %v", err)
  37. }
  38. defer os.RemoveAll(tmpDir)
  39. plugMgr := volume.VolumePluginMgr{}
  40. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(tmpDir, nil, nil))
  41. plug, err := plugMgr.FindPluginByName("kubernetes.io/azure-file")
  42. if err != nil {
  43. t.Errorf("Can't find the plugin by name")
  44. }
  45. if plug.GetPluginName() != "kubernetes.io/azure-file" {
  46. t.Errorf("Wrong name: %s", plug.GetPluginName())
  47. }
  48. if !plug.CanSupport(&volume.Spec{Volume: &v1.Volume{VolumeSource: v1.VolumeSource{AzureFile: &v1.AzureFileVolumeSource{}}}}) {
  49. t.Errorf("Expected true")
  50. }
  51. if !plug.CanSupport(&volume.Spec{PersistentVolume: &v1.PersistentVolume{Spec: v1.PersistentVolumeSpec{PersistentVolumeSource: v1.PersistentVolumeSource{AzureFile: &v1.AzureFilePersistentVolumeSource{}}}}}) {
  52. t.Errorf("Expected true")
  53. }
  54. }
  55. func TestGetAccessModes(t *testing.T) {
  56. tmpDir, err := ioutil.TempDir(os.TempDir(), "azureFileTest")
  57. if err != nil {
  58. t.Fatalf("can't make a temp dir: %v", err)
  59. }
  60. defer os.RemoveAll(tmpDir)
  61. plugMgr := volume.VolumePluginMgr{}
  62. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(tmpDir, nil, nil))
  63. plug, err := plugMgr.FindPersistentPluginByName("kubernetes.io/azure-file")
  64. if err != nil {
  65. t.Errorf("Can't find the plugin by name")
  66. }
  67. if !volumetest.ContainsAccessMode(plug.GetAccessModes(), v1.ReadWriteOnce) || !volumetest.ContainsAccessMode(plug.GetAccessModes(), v1.ReadOnlyMany) || !volumetest.ContainsAccessMode(plug.GetAccessModes(), v1.ReadWriteMany) {
  68. t.Errorf("Expected three AccessModeTypes: %s, %s, and %s", v1.ReadWriteOnce, v1.ReadOnlyMany, v1.ReadWriteMany)
  69. }
  70. }
  71. func getAzureTestCloud(t *testing.T) *azure.Cloud {
  72. config := `{
  73. "aadClientId": "--aad-client-id--",
  74. "aadClientSecret": "--aad-client-secret--"
  75. }`
  76. configReader := strings.NewReader(config)
  77. cloud, err := azure.NewCloud(configReader)
  78. if err != nil {
  79. t.Error(err)
  80. }
  81. azureCloud, ok := cloud.(*azure.Cloud)
  82. if !ok {
  83. t.Error("NewCloud returned incorrect type")
  84. }
  85. return azureCloud
  86. }
  87. func getTestTempDir(t *testing.T) string {
  88. tmpDir, err := ioutil.TempDir(os.TempDir(), "azurefileTest")
  89. if err != nil {
  90. t.Fatalf("can't make a temp dir: %v", err)
  91. }
  92. return tmpDir
  93. }
  94. func TestPluginAzureCloudProvider(t *testing.T) {
  95. tmpDir := getTestTempDir(t)
  96. defer os.RemoveAll(tmpDir)
  97. testPlugin(t, tmpDir, volumetest.NewFakeVolumeHostWithCloudProvider(tmpDir, nil, nil, getAzureTestCloud(t)))
  98. }
  99. func TestPluginWithoutCloudProvider(t *testing.T) {
  100. tmpDir := getTestTempDir(t)
  101. defer os.RemoveAll(tmpDir)
  102. testPlugin(t, tmpDir, volumetest.NewFakeVolumeHost(tmpDir, nil, nil))
  103. }
  104. func TestPluginWithOtherCloudProvider(t *testing.T) {
  105. tmpDir := getTestTempDir(t)
  106. defer os.RemoveAll(tmpDir)
  107. cloud := &fakecloud.Cloud{}
  108. testPlugin(t, tmpDir, volumetest.NewFakeVolumeHostWithCloudProvider(tmpDir, nil, nil, cloud))
  109. }
  110. func testPlugin(t *testing.T, tmpDir string, volumeHost volume.VolumeHost) {
  111. plugMgr := volume.VolumePluginMgr{}
  112. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumeHost)
  113. plug, err := plugMgr.FindPluginByName("kubernetes.io/azure-file")
  114. if err != nil {
  115. t.Errorf("Can't find the plugin by name")
  116. }
  117. spec := &v1.Volume{
  118. Name: "vol1",
  119. VolumeSource: v1.VolumeSource{
  120. AzureFile: &v1.AzureFileVolumeSource{
  121. SecretName: "secret",
  122. ShareName: "share",
  123. },
  124. },
  125. }
  126. fake := &mount.FakeMounter{}
  127. pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{UID: types.UID("poduid")}}
  128. mounter, err := plug.(*azureFilePlugin).newMounterInternal(volume.NewSpecFromVolume(spec), pod, &fakeAzureSvc{}, fake)
  129. if err != nil {
  130. t.Errorf("Failed to make a new Mounter: %v", err)
  131. }
  132. if mounter == nil {
  133. t.Errorf("Got a nil Mounter")
  134. }
  135. volPath := filepath.Join(tmpDir, "pods/poduid/volumes/kubernetes.io~azure-file/vol1")
  136. path := mounter.GetPath()
  137. if path != volPath {
  138. t.Errorf("Got unexpected path: %s", path)
  139. }
  140. if err := mounter.SetUp(volume.MounterArgs{}); err != nil {
  141. t.Errorf("Expected success, got: %v", err)
  142. }
  143. if _, err := os.Stat(path); err != nil {
  144. if os.IsNotExist(err) {
  145. t.Errorf("SetUp() failed, volume path not created: %s", path)
  146. } else {
  147. t.Errorf("SetUp() failed: %v", err)
  148. }
  149. }
  150. unmounter, err := plug.(*azureFilePlugin).newUnmounterInternal("vol1", types.UID("poduid"), &mount.FakeMounter{})
  151. if err != nil {
  152. t.Errorf("Failed to make a new Unmounter: %v", err)
  153. }
  154. if unmounter == nil {
  155. t.Errorf("Got a nil Unmounter")
  156. }
  157. if err := unmounter.TearDown(); err != nil {
  158. t.Errorf("Expected success, got: %v", err)
  159. }
  160. if _, err := os.Stat(path); err == nil {
  161. t.Errorf("TearDown() failed, volume path still exists: %s", path)
  162. } else if !os.IsNotExist(err) {
  163. t.Errorf("TearDown() failed: %v", err)
  164. }
  165. }
  166. func TestPersistentClaimReadOnlyFlag(t *testing.T) {
  167. pv := &v1.PersistentVolume{
  168. ObjectMeta: metav1.ObjectMeta{
  169. Name: "pvA",
  170. },
  171. Spec: v1.PersistentVolumeSpec{
  172. PersistentVolumeSource: v1.PersistentVolumeSource{
  173. AzureFile: &v1.AzureFilePersistentVolumeSource{},
  174. },
  175. ClaimRef: &v1.ObjectReference{
  176. Name: "claimA",
  177. },
  178. },
  179. }
  180. claim := &v1.PersistentVolumeClaim{
  181. ObjectMeta: metav1.ObjectMeta{
  182. Name: "claimA",
  183. Namespace: "nsA",
  184. },
  185. Spec: v1.PersistentVolumeClaimSpec{
  186. VolumeName: "pvA",
  187. },
  188. Status: v1.PersistentVolumeClaimStatus{
  189. Phase: v1.ClaimBound,
  190. },
  191. }
  192. client := fake.NewSimpleClientset(pv, claim)
  193. plugMgr := volume.VolumePluginMgr{}
  194. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost("/tmp/fake", client, nil))
  195. plug, _ := plugMgr.FindPluginByName(azureFilePluginName)
  196. // readOnly bool is supplied by persistent-claim volume source when its mounter creates other volumes
  197. spec := volume.NewSpecFromPersistentVolume(pv, true)
  198. pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{UID: types.UID("poduid")}}
  199. mounter, _ := plug.NewMounter(spec, pod, volume.VolumeOptions{})
  200. if mounter == nil {
  201. t.Fatalf("Got a nil Mounter")
  202. }
  203. if !mounter.GetAttributes().ReadOnly {
  204. t.Errorf("Expected true for mounter.IsReadOnly")
  205. }
  206. }
  207. type fakeAzureSvc struct{}
  208. func (s *fakeAzureSvc) GetAzureCredentials(host volume.VolumeHost, nameSpace, secretName string) (string, string, error) {
  209. return "name", "key", nil
  210. }
  211. func (s *fakeAzureSvc) SetAzureCredentials(host volume.VolumeHost, nameSpace, accountName, accountKey string) (string, error) {
  212. return "secret", nil
  213. }
  214. func TestMounterAndUnmounterTypeAssert(t *testing.T) {
  215. tmpDir, err := ioutil.TempDir(os.TempDir(), "azurefileTest")
  216. if err != nil {
  217. t.Fatalf("can't make a temp dir: %v", err)
  218. }
  219. defer os.RemoveAll(tmpDir)
  220. plugMgr := volume.VolumePluginMgr{}
  221. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(tmpDir, nil, nil))
  222. plug, err := plugMgr.FindPluginByName("kubernetes.io/azure-file")
  223. if err != nil {
  224. t.Errorf("Can't find the plugin by name")
  225. }
  226. spec := &v1.Volume{
  227. Name: "vol1",
  228. VolumeSource: v1.VolumeSource{
  229. AzureFile: &v1.AzureFileVolumeSource{
  230. SecretName: "secret",
  231. ShareName: "share",
  232. },
  233. },
  234. }
  235. fake := &mount.FakeMounter{}
  236. pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{UID: types.UID("poduid")}}
  237. mounter, err := plug.(*azureFilePlugin).newMounterInternal(volume.NewSpecFromVolume(spec), pod, &fakeAzureSvc{}, fake)
  238. if _, ok := mounter.(volume.Unmounter); ok {
  239. t.Errorf("Volume Mounter can be type-assert to Unmounter")
  240. }
  241. unmounter, err := plug.(*azureFilePlugin).newUnmounterInternal("vol1", types.UID("poduid"), &mount.FakeMounter{})
  242. if _, ok := unmounter.(volume.Mounter); ok {
  243. t.Errorf("Volume Unmounter can be type-assert to Mounter")
  244. }
  245. }
  246. type testcase struct {
  247. name string
  248. defaultNs string
  249. spec *volume.Spec
  250. // Expected return of the test
  251. expectedName string
  252. expectedNs string
  253. expectedError error
  254. }
  255. func TestGetSecretNameAndNamespaceForPV(t *testing.T) {
  256. secretNs := "ns"
  257. tests := []testcase{
  258. {
  259. name: "persistent volume source",
  260. defaultNs: "default",
  261. spec: &volume.Spec{
  262. PersistentVolume: &v1.PersistentVolume{
  263. Spec: v1.PersistentVolumeSpec{
  264. PersistentVolumeSource: v1.PersistentVolumeSource{
  265. AzureFile: &v1.AzureFilePersistentVolumeSource{
  266. ShareName: "share",
  267. SecretName: "name",
  268. SecretNamespace: &secretNs,
  269. },
  270. },
  271. },
  272. },
  273. },
  274. expectedName: "name",
  275. expectedNs: "ns",
  276. expectedError: nil,
  277. },
  278. {
  279. name: "persistent volume source without namespace",
  280. defaultNs: "default",
  281. spec: &volume.Spec{
  282. PersistentVolume: &v1.PersistentVolume{
  283. Spec: v1.PersistentVolumeSpec{
  284. PersistentVolumeSource: v1.PersistentVolumeSource{
  285. AzureFile: &v1.AzureFilePersistentVolumeSource{
  286. ShareName: "share",
  287. SecretName: "name",
  288. },
  289. },
  290. },
  291. },
  292. },
  293. expectedName: "name",
  294. expectedNs: "default",
  295. expectedError: nil,
  296. },
  297. {
  298. name: "pod volume source",
  299. defaultNs: "default",
  300. spec: &volume.Spec{
  301. Volume: &v1.Volume{
  302. VolumeSource: v1.VolumeSource{
  303. AzureFile: &v1.AzureFileVolumeSource{
  304. ShareName: "share",
  305. SecretName: "name",
  306. },
  307. },
  308. },
  309. },
  310. expectedName: "name",
  311. expectedNs: "default",
  312. expectedError: nil,
  313. },
  314. }
  315. for _, testcase := range tests {
  316. resultName, resultNs, err := getSecretNameAndNamespace(testcase.spec, testcase.defaultNs)
  317. if err != testcase.expectedError || resultName != testcase.expectedName || resultNs != testcase.expectedNs {
  318. t.Errorf("%s failed: expected err=%v ns=%q name=%q, got %v/%q/%q", testcase.name, testcase.expectedError, testcase.expectedNs, testcase.expectedName,
  319. err, resultNs, resultName)
  320. }
  321. }
  322. }
  323. func TestAppendDefaultMountOptions(t *testing.T) {
  324. tests := []struct {
  325. options []string
  326. fsGroup *int64
  327. expected []string
  328. }{
  329. {
  330. options: []string{"dir_mode=0777"},
  331. fsGroup: nil,
  332. expected: []string{"dir_mode=0777",
  333. fmt.Sprintf("%s=%s", fileMode, defaultFileMode),
  334. fmt.Sprintf("%s=%s", vers, defaultVers)},
  335. },
  336. {
  337. options: []string{"file_mode=0777"},
  338. fsGroup: to.Int64Ptr(0),
  339. expected: []string{"file_mode=0777",
  340. fmt.Sprintf("%s=%s", dirMode, defaultDirMode),
  341. fmt.Sprintf("%s=%s", vers, defaultVers),
  342. fmt.Sprintf("%s=0", gid)},
  343. },
  344. {
  345. options: []string{"vers=2.1"},
  346. fsGroup: to.Int64Ptr(1000),
  347. expected: []string{"vers=2.1",
  348. fmt.Sprintf("%s=%s", fileMode, defaultFileMode),
  349. fmt.Sprintf("%s=%s", dirMode, defaultDirMode),
  350. fmt.Sprintf("%s=1000", gid)},
  351. },
  352. {
  353. options: []string{""},
  354. expected: []string{"", fmt.Sprintf("%s=%s",
  355. fileMode, defaultFileMode),
  356. fmt.Sprintf("%s=%s", dirMode, defaultDirMode),
  357. fmt.Sprintf("%s=%s", vers, defaultVers)},
  358. },
  359. {
  360. options: []string{"file_mode=0777", "dir_mode=0777"},
  361. expected: []string{"file_mode=0777", "dir_mode=0777", fmt.Sprintf("%s=%s", vers, defaultVers)},
  362. },
  363. {
  364. options: []string{"gid=2000"},
  365. fsGroup: to.Int64Ptr(1000),
  366. expected: []string{"gid=2000",
  367. fmt.Sprintf("%s=%s", fileMode, defaultFileMode),
  368. fmt.Sprintf("%s=%s", dirMode, defaultDirMode),
  369. "vers=3.0"},
  370. },
  371. }
  372. for _, test := range tests {
  373. result := appendDefaultMountOptions(test.options, test.fsGroup)
  374. if !reflect.DeepEqual(result, test.expected) {
  375. t.Errorf("input: %q, appendDefaultMountOptions result: %q, expected: %q", test.options, result, test.expected)
  376. }
  377. }
  378. }