123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130 |
- /*
- Copyright 2018 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package common
- import (
- "context"
- "fmt"
- "time"
- v1 "k8s.io/api/core/v1"
- apierrors "k8s.io/apimachinery/pkg/api/errors"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/fields"
- "k8s.io/apimachinery/pkg/util/wait"
- "k8s.io/kubernetes/pkg/kubelet/events"
- runtimeclasstest "k8s.io/kubernetes/pkg/kubelet/runtimeclass/testing"
- "k8s.io/kubernetes/test/e2e/framework"
- e2eevents "k8s.io/kubernetes/test/e2e/framework/events"
- e2enode "k8s.io/kubernetes/test/e2e/framework/node"
- e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
- "github.com/onsi/ginkgo"
- )
- var _ = ginkgo.Describe("[sig-node] RuntimeClass", func() {
- f := framework.NewDefaultFramework("runtimeclass")
- ginkgo.It("should reject a Pod requesting a non-existent RuntimeClass", func() {
- rcName := f.Namespace.Name + "-nonexistent"
- expectPodRejection(f, e2enode.NewRuntimeClassPod(rcName))
- })
- ginkgo.It("should reject a Pod requesting a RuntimeClass with an unconfigured handler", func() {
- handler := f.Namespace.Name + "-handler"
- rcName := createRuntimeClass(f, "unconfigured-handler", handler)
- pod := f.PodClient().Create(e2enode.NewRuntimeClassPod(rcName))
- expectSandboxFailureEvent(f, pod, handler)
- })
- // This test requires that the PreconfiguredRuntimeHandler has already been set up on nodes.
- ginkgo.It("should run a Pod requesting a RuntimeClass with a configured handler [NodeFeature:RuntimeHandler]", func() {
- // The built-in docker runtime does not support configuring runtime handlers.
- handler := e2enode.PreconfiguredRuntimeClassHandler(framework.TestContext.ContainerRuntime)
- rcName := createRuntimeClass(f, "preconfigured-handler", handler)
- pod := f.PodClient().Create(e2enode.NewRuntimeClassPod(rcName))
- expectPodSuccess(f, pod)
- })
- ginkgo.It("should reject a Pod requesting a deleted RuntimeClass", func() {
- rcName := createRuntimeClass(f, "delete-me", "runc")
- rcClient := f.ClientSet.NodeV1beta1().RuntimeClasses()
- ginkgo.By("Deleting RuntimeClass "+rcName, func() {
- err := rcClient.Delete(context.TODO(), rcName, nil)
- framework.ExpectNoError(err, "failed to delete RuntimeClass %s", rcName)
- ginkgo.By("Waiting for the RuntimeClass to disappear")
- framework.ExpectNoError(wait.PollImmediate(framework.Poll, time.Minute, func() (bool, error) {
- _, err := rcClient.Get(context.TODO(), rcName, metav1.GetOptions{})
- if apierrors.IsNotFound(err) {
- return true, nil // done
- }
- if err != nil {
- return true, err // stop wait with error
- }
- return false, nil
- }))
- })
- expectPodRejection(f, e2enode.NewRuntimeClassPod(rcName))
- })
- })
- // createRuntimeClass generates a RuntimeClass with the desired handler and a "namespaced" name,
- // synchronously creates it, and returns the generated name.
- func createRuntimeClass(f *framework.Framework, name, handler string) string {
- uniqueName := fmt.Sprintf("%s-%s", f.Namespace.Name, name)
- rc := runtimeclasstest.NewRuntimeClass(uniqueName, handler)
- rc, err := f.ClientSet.NodeV1beta1().RuntimeClasses().Create(context.TODO(), rc, metav1.CreateOptions{})
- framework.ExpectNoError(err, "failed to create RuntimeClass resource")
- return rc.GetName()
- }
- func expectPodRejection(f *framework.Framework, pod *v1.Pod) {
- // The Node E2E doesn't run the RuntimeClass admission controller, so we expect the rejection to
- // happen by the Kubelet.
- if framework.TestContext.NodeE2E {
- pod = f.PodClient().Create(pod)
- expectSandboxFailureEvent(f, pod, fmt.Sprintf("\"%s\" not found", *pod.Spec.RuntimeClassName))
- } else {
- _, err := f.ClientSet.CoreV1().Pods(f.Namespace.Name).Create(context.TODO(), pod, metav1.CreateOptions{})
- framework.ExpectError(err, "should be forbidden")
- framework.ExpectEqual(apierrors.IsForbidden(err), true, "should be forbidden error")
- }
- }
- // expectPodSuccess waits for the given pod to terminate successfully.
- func expectPodSuccess(f *framework.Framework, pod *v1.Pod) {
- framework.ExpectNoError(e2epod.WaitForPodSuccessInNamespace(
- f.ClientSet, pod.Name, f.Namespace.Name))
- }
- // expectSandboxFailureEvent polls for an event with reason "FailedCreatePodSandBox" containing the
- // expected message string.
- func expectSandboxFailureEvent(f *framework.Framework, pod *v1.Pod, msg string) {
- eventSelector := fields.Set{
- "involvedObject.kind": "Pod",
- "involvedObject.name": pod.Name,
- "involvedObject.namespace": f.Namespace.Name,
- "reason": events.FailedCreatePodSandBox,
- }.AsSelector().String()
- framework.ExpectNoError(e2eevents.WaitTimeoutForEvent(
- f.ClientSet, f.Namespace.Name, eventSelector, msg, framework.PodEventTimeout))
- }
|