aws_ebs_test.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451
  1. // +build !providerless
  2. /*
  3. Copyright 2014 The Kubernetes Authors.
  4. Licensed under the Apache License, Version 2.0 (the "License");
  5. you may not use this file except in compliance with the License.
  6. You may obtain a copy of the License at
  7. http://www.apache.org/licenses/LICENSE-2.0
  8. Unless required by applicable law or agreed to in writing, software
  9. distributed under the License is distributed on an "AS IS" BASIS,
  10. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  11. See the License for the specific language governing permissions and
  12. limitations under the License.
  13. */
  14. package awsebs
  15. import (
  16. "fmt"
  17. "os"
  18. "path/filepath"
  19. "reflect"
  20. "testing"
  21. "github.com/stretchr/testify/assert"
  22. "k8s.io/utils/mount"
  23. v1 "k8s.io/api/core/v1"
  24. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  25. "k8s.io/apimachinery/pkg/types"
  26. "k8s.io/apimachinery/pkg/util/sets"
  27. "k8s.io/client-go/kubernetes/fake"
  28. utiltesting "k8s.io/client-go/util/testing"
  29. "k8s.io/kubernetes/pkg/volume"
  30. volumetest "k8s.io/kubernetes/pkg/volume/testing"
  31. "k8s.io/legacy-cloud-providers/aws"
  32. )
  33. func TestCanSupport(t *testing.T) {
  34. tmpDir, err := utiltesting.MkTmpdir("awsebsTest")
  35. if err != nil {
  36. t.Fatalf("can't make a temp dir: %v", err)
  37. }
  38. defer os.RemoveAll(tmpDir)
  39. plugMgr := volume.VolumePluginMgr{}
  40. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(t, tmpDir, nil, nil))
  41. plug, err := plugMgr.FindPluginByName("kubernetes.io/aws-ebs")
  42. if err != nil {
  43. t.Errorf("Can't find the plugin by name")
  44. }
  45. if plug.GetPluginName() != "kubernetes.io/aws-ebs" {
  46. t.Errorf("Wrong name: %s", plug.GetPluginName())
  47. }
  48. if !plug.CanSupport(&volume.Spec{Volume: &v1.Volume{VolumeSource: v1.VolumeSource{AWSElasticBlockStore: &v1.AWSElasticBlockStoreVolumeSource{}}}}) {
  49. t.Errorf("Expected true")
  50. }
  51. if !plug.CanSupport(&volume.Spec{PersistentVolume: &v1.PersistentVolume{Spec: v1.PersistentVolumeSpec{PersistentVolumeSource: v1.PersistentVolumeSource{AWSElasticBlockStore: &v1.AWSElasticBlockStoreVolumeSource{}}}}}) {
  52. t.Errorf("Expected true")
  53. }
  54. }
  55. func TestGetAccessModes(t *testing.T) {
  56. tmpDir, err := utiltesting.MkTmpdir("awsebsTest")
  57. if err != nil {
  58. t.Fatalf("can't make a temp dir: %v", err)
  59. }
  60. defer os.RemoveAll(tmpDir)
  61. plugMgr := volume.VolumePluginMgr{}
  62. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(t, tmpDir, nil, nil))
  63. plug, err := plugMgr.FindPersistentPluginByName("kubernetes.io/aws-ebs")
  64. if err != nil {
  65. t.Errorf("Can't find the plugin by name")
  66. }
  67. if !volumetest.ContainsAccessMode(plug.GetAccessModes(), v1.ReadWriteOnce) {
  68. t.Errorf("Expected to support AccessModeTypes: %s", v1.ReadWriteOnce)
  69. }
  70. if volumetest.ContainsAccessMode(plug.GetAccessModes(), v1.ReadOnlyMany) {
  71. t.Errorf("Expected not to support AccessModeTypes: %s", v1.ReadOnlyMany)
  72. }
  73. }
  74. type fakePDManager struct {
  75. }
  76. // TODO(jonesdl) To fully test this, we could create a loopback device
  77. // and mount that instead.
  78. func (fake *fakePDManager) CreateVolume(c *awsElasticBlockStoreProvisioner, node *v1.Node, allowedTopologies []v1.TopologySelectorTerm) (volumeID aws.KubernetesVolumeID, volumeSizeGB int, labels map[string]string, fstype string, err error) {
  79. labels = make(map[string]string)
  80. labels["fakepdmanager"] = "yes"
  81. return "test-aws-volume-name", 100, labels, "", nil
  82. }
  83. func (fake *fakePDManager) DeleteVolume(cd *awsElasticBlockStoreDeleter) error {
  84. if cd.volumeID != "test-aws-volume-name" {
  85. return fmt.Errorf("Deleter got unexpected volume name: %s", cd.volumeID)
  86. }
  87. return nil
  88. }
  89. func TestPlugin(t *testing.T) {
  90. tmpDir, err := utiltesting.MkTmpdir("awsebsTest")
  91. if err != nil {
  92. t.Fatalf("can't make a temp dir: %v", err)
  93. }
  94. defer os.RemoveAll(tmpDir)
  95. plugMgr := volume.VolumePluginMgr{}
  96. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(t, tmpDir, nil, nil))
  97. plug, err := plugMgr.FindPluginByName("kubernetes.io/aws-ebs")
  98. if err != nil {
  99. t.Errorf("Can't find the plugin by name")
  100. }
  101. spec := &v1.Volume{
  102. Name: "vol1",
  103. VolumeSource: v1.VolumeSource{
  104. AWSElasticBlockStore: &v1.AWSElasticBlockStoreVolumeSource{
  105. VolumeID: "pd",
  106. FSType: "ext4",
  107. },
  108. },
  109. }
  110. fakeManager := &fakePDManager{}
  111. fakeMounter := mount.NewFakeMounter(nil)
  112. mounter, err := plug.(*awsElasticBlockStorePlugin).newMounterInternal(volume.NewSpecFromVolume(spec), types.UID("poduid"), fakeManager, fakeMounter)
  113. if err != nil {
  114. t.Errorf("Failed to make a new Mounter: %v", err)
  115. }
  116. if mounter == nil {
  117. t.Errorf("Got a nil Mounter")
  118. }
  119. volPath := filepath.Join(tmpDir, "pods/poduid/volumes/kubernetes.io~aws-ebs/vol1")
  120. path := mounter.GetPath()
  121. if path != volPath {
  122. t.Errorf("Got unexpected path: %s", path)
  123. }
  124. if err := mounter.SetUp(volume.MounterArgs{}); err != nil {
  125. t.Errorf("Expected success, got: %v", err)
  126. }
  127. if _, err := os.Stat(path); err != nil {
  128. if os.IsNotExist(err) {
  129. t.Errorf("SetUp() failed, volume path not created: %s", path)
  130. } else {
  131. t.Errorf("SetUp() failed: %v", err)
  132. }
  133. }
  134. fakeManager = &fakePDManager{}
  135. unmounter, err := plug.(*awsElasticBlockStorePlugin).newUnmounterInternal("vol1", types.UID("poduid"), fakeManager, fakeMounter)
  136. if err != nil {
  137. t.Errorf("Failed to make a new Unmounter: %v", err)
  138. }
  139. if unmounter == nil {
  140. t.Errorf("Got a nil Unmounter")
  141. }
  142. if err := unmounter.TearDown(); err != nil {
  143. t.Errorf("Expected success, got: %v", err)
  144. }
  145. if _, err := os.Stat(path); err == nil {
  146. t.Errorf("TearDown() failed, volume path still exists: %s", path)
  147. } else if !os.IsNotExist(err) {
  148. t.Errorf("TearDown() failed: %v", err)
  149. }
  150. // Test Provisioner
  151. options := volume.VolumeOptions{
  152. PVC: volumetest.CreateTestPVC("100Mi", []v1.PersistentVolumeAccessMode{v1.ReadWriteOnce}),
  153. PersistentVolumeReclaimPolicy: v1.PersistentVolumeReclaimDelete,
  154. }
  155. provisioner, err := plug.(*awsElasticBlockStorePlugin).newProvisionerInternal(options, &fakePDManager{})
  156. if err != nil {
  157. t.Errorf("Error creating new provisioner:%v", err)
  158. }
  159. persistentSpec, err := provisioner.Provision(nil, nil)
  160. if err != nil {
  161. t.Errorf("Provision() failed: %v", err)
  162. }
  163. if persistentSpec.Spec.PersistentVolumeSource.AWSElasticBlockStore.VolumeID != "test-aws-volume-name" {
  164. t.Errorf("Provision() returned unexpected volume ID: %s", persistentSpec.Spec.PersistentVolumeSource.AWSElasticBlockStore.VolumeID)
  165. }
  166. cap := persistentSpec.Spec.Capacity[v1.ResourceStorage]
  167. size := cap.Value()
  168. if size != 100*1024*1024*1024 {
  169. t.Errorf("Provision() returned unexpected volume size: %v", size)
  170. }
  171. if persistentSpec.Labels["fakepdmanager"] != "yes" {
  172. t.Errorf("Provision() returned unexpected labels: %v", persistentSpec.Labels)
  173. }
  174. // check nodeaffinity members
  175. if persistentSpec.Spec.NodeAffinity == nil {
  176. t.Errorf("Provision() returned unexpected nil NodeAffinity")
  177. }
  178. if persistentSpec.Spec.NodeAffinity.Required == nil {
  179. t.Errorf("Provision() returned unexpected nil NodeAffinity.Required")
  180. }
  181. n := len(persistentSpec.Spec.NodeAffinity.Required.NodeSelectorTerms)
  182. if n != 1 {
  183. t.Errorf("Provision() returned unexpected number of NodeSelectorTerms %d. Expected %d", n, 1)
  184. }
  185. n = len(persistentSpec.Spec.NodeAffinity.Required.NodeSelectorTerms[0].MatchExpressions)
  186. if n != 1 {
  187. t.Errorf("Provision() returned unexpected number of MatchExpressions %d. Expected %d", n, 1)
  188. }
  189. req := persistentSpec.Spec.NodeAffinity.Required.NodeSelectorTerms[0].MatchExpressions[0]
  190. if req.Key != "fakepdmanager" {
  191. t.Errorf("Provision() returned unexpected requirement key in NodeAffinity %v", req.Key)
  192. }
  193. if req.Operator != v1.NodeSelectorOpIn {
  194. t.Errorf("Provision() returned unexpected requirement operator in NodeAffinity %v", req.Operator)
  195. }
  196. if len(req.Values) != 1 || req.Values[0] != "yes" {
  197. t.Errorf("Provision() returned unexpected requirement value in NodeAffinity %v", req.Values)
  198. }
  199. // Test Deleter
  200. volSpec := &volume.Spec{
  201. PersistentVolume: persistentSpec,
  202. }
  203. deleter, err := plug.(*awsElasticBlockStorePlugin).newDeleterInternal(volSpec, &fakePDManager{})
  204. if err != nil {
  205. t.Errorf("Error creating new deleter:%v", err)
  206. }
  207. err = deleter.Delete()
  208. if err != nil {
  209. t.Errorf("Deleter() failed: %v", err)
  210. }
  211. }
  212. func TestPersistentClaimReadOnlyFlag(t *testing.T) {
  213. pv := &v1.PersistentVolume{
  214. ObjectMeta: metav1.ObjectMeta{
  215. Name: "pvA",
  216. },
  217. Spec: v1.PersistentVolumeSpec{
  218. PersistentVolumeSource: v1.PersistentVolumeSource{
  219. AWSElasticBlockStore: &v1.AWSElasticBlockStoreVolumeSource{},
  220. },
  221. ClaimRef: &v1.ObjectReference{
  222. Name: "claimA",
  223. },
  224. },
  225. }
  226. claim := &v1.PersistentVolumeClaim{
  227. ObjectMeta: metav1.ObjectMeta{
  228. Name: "claimA",
  229. Namespace: "nsA",
  230. },
  231. Spec: v1.PersistentVolumeClaimSpec{
  232. VolumeName: "pvA",
  233. },
  234. Status: v1.PersistentVolumeClaimStatus{
  235. Phase: v1.ClaimBound,
  236. },
  237. }
  238. clientset := fake.NewSimpleClientset(pv, claim)
  239. tmpDir, err := utiltesting.MkTmpdir("awsebsTest")
  240. if err != nil {
  241. t.Fatalf("can't make a temp dir: %v", err)
  242. }
  243. defer os.RemoveAll(tmpDir)
  244. plugMgr := volume.VolumePluginMgr{}
  245. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(t, tmpDir, clientset, nil))
  246. plug, _ := plugMgr.FindPluginByName(awsElasticBlockStorePluginName)
  247. // readOnly bool is supplied by persistent-claim volume source when its mounter creates other volumes
  248. spec := volume.NewSpecFromPersistentVolume(pv, true)
  249. pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{UID: types.UID("poduid")}}
  250. mounter, _ := plug.NewMounter(spec, pod, volume.VolumeOptions{})
  251. if !mounter.GetAttributes().ReadOnly {
  252. t.Errorf("Expected true for mounter.IsReadOnly")
  253. }
  254. }
  255. func TestMounterAndUnmounterTypeAssert(t *testing.T) {
  256. tmpDir, err := utiltesting.MkTmpdir("awsebsTest")
  257. if err != nil {
  258. t.Fatalf("can't make a temp dir: %v", err)
  259. }
  260. defer os.RemoveAll(tmpDir)
  261. plugMgr := volume.VolumePluginMgr{}
  262. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(t, tmpDir, nil, nil))
  263. plug, err := plugMgr.FindPluginByName("kubernetes.io/aws-ebs")
  264. if err != nil {
  265. t.Errorf("Can't find the plugin by name")
  266. }
  267. spec := &v1.Volume{
  268. Name: "vol1",
  269. VolumeSource: v1.VolumeSource{
  270. AWSElasticBlockStore: &v1.AWSElasticBlockStoreVolumeSource{
  271. VolumeID: "pd",
  272. FSType: "ext4",
  273. },
  274. },
  275. }
  276. mounter, err := plug.(*awsElasticBlockStorePlugin).newMounterInternal(volume.NewSpecFromVolume(spec), types.UID("poduid"), &fakePDManager{}, mount.NewFakeMounter(nil))
  277. if err != nil {
  278. t.Errorf("Error creating new mounter:%v", err)
  279. }
  280. if _, ok := mounter.(volume.Unmounter); ok {
  281. t.Errorf("Volume Mounter can be type-assert to Unmounter")
  282. }
  283. unmounter, err := plug.(*awsElasticBlockStorePlugin).newUnmounterInternal("vol1", types.UID("poduid"), &fakePDManager{}, mount.NewFakeMounter(nil))
  284. if err != nil {
  285. t.Errorf("Error creating new unmounter:%v", err)
  286. }
  287. if _, ok := unmounter.(volume.Mounter); ok {
  288. t.Errorf("Volume Unmounter can be type-assert to Mounter")
  289. }
  290. }
  291. func TestMountOptions(t *testing.T) {
  292. tmpDir, err := utiltesting.MkTmpdir("aws-ebs")
  293. if err != nil {
  294. t.Fatalf("can't make a temp dir: %v", err)
  295. }
  296. defer os.RemoveAll(tmpDir)
  297. plugMgr := volume.VolumePluginMgr{}
  298. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(t, tmpDir, nil, nil))
  299. plug, err := plugMgr.FindPluginByName("kubernetes.io/aws-ebs")
  300. if err != nil {
  301. t.Errorf("Can't find the plugin by name")
  302. }
  303. pv := &v1.PersistentVolume{
  304. ObjectMeta: metav1.ObjectMeta{
  305. Name: "pvA",
  306. },
  307. Spec: v1.PersistentVolumeSpec{
  308. PersistentVolumeSource: v1.PersistentVolumeSource{
  309. AWSElasticBlockStore: &v1.AWSElasticBlockStoreVolumeSource{},
  310. },
  311. ClaimRef: &v1.ObjectReference{
  312. Name: "claimA",
  313. },
  314. MountOptions: []string{"_netdev"},
  315. },
  316. }
  317. fakeManager := &fakePDManager{}
  318. fakeMounter := mount.NewFakeMounter(nil)
  319. mounter, err := plug.(*awsElasticBlockStorePlugin).newMounterInternal(volume.NewSpecFromPersistentVolume(pv, false), types.UID("poduid"), fakeManager, fakeMounter)
  320. if err != nil {
  321. t.Errorf("Failed to make a new Mounter: %v", err)
  322. }
  323. if mounter == nil {
  324. t.Errorf("Got a nil Mounter")
  325. }
  326. if err := mounter.SetUp(volume.MounterArgs{}); err != nil {
  327. t.Errorf("Expected success, got: %v", err)
  328. }
  329. mountOptions := fakeMounter.MountPoints[0].Opts
  330. expectedMountOptions := []string{"_netdev", "bind"}
  331. if !reflect.DeepEqual(mountOptions, expectedMountOptions) {
  332. t.Errorf("Expected mount options to be %v got %v", expectedMountOptions, mountOptions)
  333. }
  334. }
  335. func TestGetCandidateZone(t *testing.T) {
  336. const testZone = "my-zone-1a"
  337. // TODO: add test case for immediate bind volume when we have a good way to mock Cloud outside cloudprovider
  338. tests := []struct {
  339. cloud *aws.Cloud
  340. node *v1.Node
  341. expectedZones sets.String
  342. }{
  343. {
  344. cloud: nil,
  345. node: &v1.Node{
  346. ObjectMeta: metav1.ObjectMeta{
  347. Labels: map[string]string{
  348. v1.LabelZoneFailureDomain: testZone,
  349. },
  350. },
  351. },
  352. expectedZones: sets.NewString(),
  353. },
  354. {
  355. cloud: nil,
  356. node: &v1.Node{},
  357. expectedZones: sets.NewString(),
  358. },
  359. }
  360. for _, test := range tests {
  361. zones, err := getCandidateZones(test.cloud, test.node)
  362. assert.Nil(t, err)
  363. assert.Equal(t, test.expectedZones, zones)
  364. }
  365. }
  366. func TestFormatVolumeID(t *testing.T) {
  367. tests := []struct {
  368. volumeIDFromPath string
  369. expectedVolumeID string
  370. }{
  371. {
  372. "aws/vol-1234",
  373. "aws:///vol-1234",
  374. },
  375. {
  376. "aws:/vol-1234",
  377. "aws:///vol-1234",
  378. },
  379. {
  380. "aws/us-east-1/vol-1234",
  381. "aws://us-east-1/vol-1234",
  382. },
  383. {
  384. "aws:/us-east-1/vol-1234",
  385. "aws://us-east-1/vol-1234",
  386. },
  387. {
  388. "vol-1234",
  389. "vol-1234",
  390. },
  391. }
  392. for _, test := range tests {
  393. volumeID, err := formatVolumeID(test.volumeIDFromPath)
  394. assert.Nil(t, err)
  395. assert.Equal(t, test.expectedVolumeID, volumeID, test.volumeIDFromPath)
  396. }
  397. }