gce_pd_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343
  1. /*
  2. Copyright 2014 The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package gcepd
  14. import (
  15. "fmt"
  16. "os"
  17. "path/filepath"
  18. "reflect"
  19. "sort"
  20. "testing"
  21. "k8s.io/api/core/v1"
  22. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  23. "k8s.io/apimachinery/pkg/types"
  24. "k8s.io/client-go/kubernetes/fake"
  25. utiltesting "k8s.io/client-go/util/testing"
  26. volumehelpers "k8s.io/cloud-provider/volume/helpers"
  27. "k8s.io/kubernetes/pkg/util/mount"
  28. "k8s.io/kubernetes/pkg/volume"
  29. volumetest "k8s.io/kubernetes/pkg/volume/testing"
  30. )
  31. func TestCanSupport(t *testing.T) {
  32. tmpDir, err := utiltesting.MkTmpdir("gcepdTest")
  33. if err != nil {
  34. t.Fatalf("can't make a temp dir: %v", err)
  35. }
  36. defer os.RemoveAll(tmpDir)
  37. plugMgr := volume.VolumePluginMgr{}
  38. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(tmpDir, nil, nil))
  39. plug, err := plugMgr.FindPluginByName("kubernetes.io/gce-pd")
  40. if err != nil {
  41. t.Errorf("Can't find the plugin by name")
  42. }
  43. if plug.GetPluginName() != "kubernetes.io/gce-pd" {
  44. t.Errorf("Wrong name: %s", plug.GetPluginName())
  45. }
  46. if !plug.CanSupport(&volume.Spec{Volume: &v1.Volume{VolumeSource: v1.VolumeSource{GCEPersistentDisk: &v1.GCEPersistentDiskVolumeSource{}}}}) {
  47. t.Errorf("Expected true")
  48. }
  49. if !plug.CanSupport(&volume.Spec{PersistentVolume: &v1.PersistentVolume{Spec: v1.PersistentVolumeSpec{PersistentVolumeSource: v1.PersistentVolumeSource{GCEPersistentDisk: &v1.GCEPersistentDiskVolumeSource{}}}}}) {
  50. t.Errorf("Expected true")
  51. }
  52. }
  53. func TestGetAccessModes(t *testing.T) {
  54. tmpDir, err := utiltesting.MkTmpdir("gcepdTest")
  55. if err != nil {
  56. t.Fatalf("can't make a temp dir: %v", err)
  57. }
  58. defer os.RemoveAll(tmpDir)
  59. plugMgr := volume.VolumePluginMgr{}
  60. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(tmpDir, nil, nil))
  61. plug, err := plugMgr.FindPersistentPluginByName("kubernetes.io/gce-pd")
  62. if err != nil {
  63. t.Errorf("Can't find the plugin by name")
  64. }
  65. if !volumetest.ContainsAccessMode(plug.GetAccessModes(), v1.ReadWriteOnce) || !volumetest.ContainsAccessMode(plug.GetAccessModes(), v1.ReadOnlyMany) {
  66. t.Errorf("Expected two AccessModeTypes: %s and %s", v1.ReadWriteOnce, v1.ReadOnlyMany)
  67. }
  68. }
  69. type fakePDManager struct {
  70. }
  71. func (fake *fakePDManager) CreateVolume(c *gcePersistentDiskProvisioner, node *v1.Node, allowedTopologies []v1.TopologySelectorTerm) (volumeID string, volumeSizeGB int, labels map[string]string, fstype string, err error) {
  72. labels = make(map[string]string)
  73. labels["fakepdmanager"] = "yes"
  74. labels[v1.LabelZoneFailureDomain] = "zone1__zone2"
  75. return "test-gce-volume-name", 100, labels, "", nil
  76. }
  77. func (fake *fakePDManager) DeleteVolume(cd *gcePersistentDiskDeleter) error {
  78. if cd.pdName != "test-gce-volume-name" {
  79. return fmt.Errorf("Deleter got unexpected volume name: %s", cd.pdName)
  80. }
  81. return nil
  82. }
  83. func getNodeSelectorRequirementWithKey(key string, term v1.NodeSelectorTerm) (*v1.NodeSelectorRequirement, error) {
  84. for _, r := range term.MatchExpressions {
  85. if r.Key == key {
  86. return &r, nil
  87. }
  88. }
  89. return nil, fmt.Errorf("key %s not found", key)
  90. }
  91. func TestPlugin(t *testing.T) {
  92. tmpDir, err := utiltesting.MkTmpdir("gcepdTest")
  93. if err != nil {
  94. t.Fatalf("can't make a temp dir: %v", err)
  95. }
  96. defer os.RemoveAll(tmpDir)
  97. plugMgr := volume.VolumePluginMgr{}
  98. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(tmpDir, nil, nil))
  99. plug, err := plugMgr.FindPluginByName("kubernetes.io/gce-pd")
  100. if err != nil {
  101. t.Errorf("Can't find the plugin by name")
  102. }
  103. spec := &v1.Volume{
  104. Name: "vol1",
  105. VolumeSource: v1.VolumeSource{
  106. GCEPersistentDisk: &v1.GCEPersistentDiskVolumeSource{
  107. PDName: "pd",
  108. FSType: "ext4",
  109. },
  110. },
  111. }
  112. fakeManager := &fakePDManager{}
  113. fakeMounter := &mount.FakeMounter{}
  114. mounter, err := plug.(*gcePersistentDiskPlugin).newMounterInternal(volume.NewSpecFromVolume(spec), types.UID("poduid"), fakeManager, fakeMounter)
  115. if err != nil {
  116. t.Errorf("Failed to make a new Mounter: %v", err)
  117. }
  118. if mounter == nil {
  119. t.Errorf("Got a nil Mounter")
  120. }
  121. volPath := filepath.Join(tmpDir, "pods/poduid/volumes/kubernetes.io~gce-pd/vol1")
  122. path := mounter.GetPath()
  123. if path != volPath {
  124. t.Errorf("Got unexpected path: %s", path)
  125. }
  126. if err := mounter.SetUp(volume.MounterArgs{}); err != nil {
  127. t.Errorf("Expected success, got: %v", err)
  128. }
  129. if _, err := os.Stat(path); err != nil {
  130. if os.IsNotExist(err) {
  131. t.Errorf("SetUp() failed, volume path not created: %s", path)
  132. } else {
  133. t.Errorf("SetUp() failed: %v", err)
  134. }
  135. }
  136. fakeManager = &fakePDManager{}
  137. unmounter, err := plug.(*gcePersistentDiskPlugin).newUnmounterInternal("vol1", types.UID("poduid"), fakeManager, fakeMounter)
  138. if err != nil {
  139. t.Errorf("Failed to make a new Unmounter: %v", err)
  140. }
  141. if unmounter == nil {
  142. t.Errorf("Got a nil Unmounter")
  143. }
  144. if err := unmounter.TearDown(); err != nil {
  145. t.Errorf("Expected success, got: %v", err)
  146. }
  147. if _, err := os.Stat(path); err == nil {
  148. t.Errorf("TearDown() failed, volume path still exists: %s", path)
  149. } else if !os.IsNotExist(err) {
  150. t.Errorf("TearDown() failed: %v", err)
  151. }
  152. // Test Provisioner
  153. options := volume.VolumeOptions{
  154. PVC: volumetest.CreateTestPVC("100Mi", []v1.PersistentVolumeAccessMode{v1.ReadWriteOnce}),
  155. PersistentVolumeReclaimPolicy: v1.PersistentVolumeReclaimDelete,
  156. }
  157. provisioner, err := plug.(*gcePersistentDiskPlugin).newProvisionerInternal(options, &fakePDManager{})
  158. if err != nil {
  159. t.Errorf("Error creating new provisioner:%v", err)
  160. }
  161. persistentSpec, err := provisioner.Provision(nil, nil)
  162. if err != nil {
  163. t.Errorf("Provision() failed: %v", err)
  164. }
  165. if persistentSpec.Spec.PersistentVolumeSource.GCEPersistentDisk.PDName != "test-gce-volume-name" {
  166. t.Errorf("Provision() returned unexpected volume ID: %s", persistentSpec.Spec.PersistentVolumeSource.GCEPersistentDisk.PDName)
  167. }
  168. cap := persistentSpec.Spec.Capacity[v1.ResourceStorage]
  169. size := cap.Value()
  170. if size != 100*volumehelpers.GiB {
  171. t.Errorf("Provision() returned unexpected volume size: %v", size)
  172. }
  173. if persistentSpec.Labels["fakepdmanager"] != "yes" {
  174. t.Errorf("Provision() returned unexpected value for fakepdmanager: %v", persistentSpec.Labels["fakepdmanager"])
  175. }
  176. if persistentSpec.Labels[v1.LabelZoneFailureDomain] != "zone1__zone2" {
  177. t.Errorf("Provision() returned unexpected value for %s: %v", v1.LabelZoneFailureDomain, persistentSpec.Labels[v1.LabelZoneFailureDomain])
  178. }
  179. if persistentSpec.Spec.NodeAffinity == nil {
  180. t.Errorf("Unexpected nil NodeAffinity found")
  181. }
  182. if len(persistentSpec.Spec.NodeAffinity.Required.NodeSelectorTerms) != 1 {
  183. t.Errorf("Unexpected number of NodeSelectorTerms")
  184. }
  185. term := persistentSpec.Spec.NodeAffinity.Required.NodeSelectorTerms[0]
  186. if len(term.MatchExpressions) != 2 {
  187. t.Errorf("Unexpected number of NodeSelectorRequirements in volume NodeAffinity: %d", len(term.MatchExpressions))
  188. }
  189. r, _ := getNodeSelectorRequirementWithKey("fakepdmanager", term)
  190. if r == nil || r.Values[0] != "yes" || r.Operator != v1.NodeSelectorOpIn {
  191. t.Errorf("NodeSelectorRequirement fakepdmanager-in-yes not found in volume NodeAffinity")
  192. }
  193. zones, _ := volumehelpers.ZonesToSet("zone1,zone2")
  194. r, _ = getNodeSelectorRequirementWithKey(v1.LabelZoneFailureDomain, term)
  195. if r == nil {
  196. t.Errorf("NodeSelectorRequirement %s-in-%v not found in volume NodeAffinity", v1.LabelZoneFailureDomain, zones)
  197. }
  198. sort.Strings(r.Values)
  199. if !reflect.DeepEqual(r.Values, zones.List()) {
  200. t.Errorf("ZoneFailureDomain elements %v does not match zone labels %v", r.Values, zones)
  201. }
  202. // Test Deleter
  203. volSpec := &volume.Spec{
  204. PersistentVolume: persistentSpec,
  205. }
  206. deleter, err := plug.(*gcePersistentDiskPlugin).newDeleterInternal(volSpec, &fakePDManager{})
  207. if err != nil {
  208. t.Errorf("Error creating new deleter:%v", err)
  209. }
  210. err = deleter.Delete()
  211. if err != nil {
  212. t.Errorf("Deleter() failed: %v", err)
  213. }
  214. }
  215. func TestMountOptions(t *testing.T) {
  216. tmpDir, err := utiltesting.MkTmpdir("gcepdTest")
  217. if err != nil {
  218. t.Fatalf("can't make a temp dir: %v", err)
  219. }
  220. defer os.RemoveAll(tmpDir)
  221. plugMgr := volume.VolumePluginMgr{}
  222. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(tmpDir, nil, nil))
  223. plug, err := plugMgr.FindPluginByName("kubernetes.io/gce-pd")
  224. if err != nil {
  225. t.Errorf("Can't find the plugin by name")
  226. }
  227. pv := &v1.PersistentVolume{
  228. ObjectMeta: metav1.ObjectMeta{
  229. Name: "pvA",
  230. },
  231. Spec: v1.PersistentVolumeSpec{
  232. PersistentVolumeSource: v1.PersistentVolumeSource{
  233. GCEPersistentDisk: &v1.GCEPersistentDiskVolumeSource{},
  234. },
  235. ClaimRef: &v1.ObjectReference{
  236. Name: "claimA",
  237. },
  238. MountOptions: []string{"_netdev"},
  239. },
  240. }
  241. fakeManager := &fakePDManager{}
  242. fakeMounter := &mount.FakeMounter{}
  243. mounter, err := plug.(*gcePersistentDiskPlugin).newMounterInternal(volume.NewSpecFromPersistentVolume(pv, false), types.UID("poduid"), fakeManager, fakeMounter)
  244. if err != nil {
  245. t.Errorf("Failed to make a new Mounter: %v", err)
  246. }
  247. if mounter == nil {
  248. t.Errorf("Got a nil Mounter")
  249. }
  250. if err := mounter.SetUp(volume.MounterArgs{}); err != nil {
  251. t.Errorf("Expected success, got: %v", err)
  252. }
  253. mountOptions := fakeMounter.MountPoints[0].Opts
  254. expectedMountOptions := []string{"_netdev", "bind"}
  255. if !reflect.DeepEqual(mountOptions, expectedMountOptions) {
  256. t.Errorf("Expected mount options to be %v got %v", expectedMountOptions, mountOptions)
  257. }
  258. }
  259. func TestPersistentClaimReadOnlyFlag(t *testing.T) {
  260. pv := &v1.PersistentVolume{
  261. ObjectMeta: metav1.ObjectMeta{
  262. Name: "pvA",
  263. },
  264. Spec: v1.PersistentVolumeSpec{
  265. PersistentVolumeSource: v1.PersistentVolumeSource{
  266. GCEPersistentDisk: &v1.GCEPersistentDiskVolumeSource{},
  267. },
  268. ClaimRef: &v1.ObjectReference{
  269. Name: "claimA",
  270. },
  271. },
  272. }
  273. claim := &v1.PersistentVolumeClaim{
  274. ObjectMeta: metav1.ObjectMeta{
  275. Name: "claimA",
  276. Namespace: "nsA",
  277. },
  278. Spec: v1.PersistentVolumeClaimSpec{
  279. VolumeName: "pvA",
  280. },
  281. Status: v1.PersistentVolumeClaimStatus{
  282. Phase: v1.ClaimBound,
  283. },
  284. }
  285. client := fake.NewSimpleClientset(pv, claim)
  286. tmpDir, err := utiltesting.MkTmpdir("gcepdTest")
  287. if err != nil {
  288. t.Fatalf("can't make a temp dir: %v", err)
  289. }
  290. defer os.RemoveAll(tmpDir)
  291. plugMgr := volume.VolumePluginMgr{}
  292. plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(tmpDir, client, nil))
  293. plug, _ := plugMgr.FindPluginByName(gcePersistentDiskPluginName)
  294. // readOnly bool is supplied by persistent-claim volume source when its mounter creates other volumes
  295. spec := volume.NewSpecFromPersistentVolume(pv, true)
  296. pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{UID: types.UID("poduid")}}
  297. mounter, _ := plug.NewMounter(spec, pod, volume.VolumeOptions{})
  298. if mounter == nil {
  299. t.Fatalf("Got a nil Mounter")
  300. }
  301. if !mounter.GetAttributes().ReadOnly {
  302. t.Errorf("Expected true for mounter.IsReadOnly")
  303. }
  304. }