123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382 |
- /*
- Copyright 2017 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package storageos
- import (
- "fmt"
- "os"
- "path/filepath"
- "testing"
- "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/types"
- "k8s.io/client-go/kubernetes/fake"
- utiltesting "k8s.io/client-go/util/testing"
- "k8s.io/kubernetes/pkg/util/mount"
- "k8s.io/kubernetes/pkg/volume"
- volumetest "k8s.io/kubernetes/pkg/volume/testing"
- )
- func TestCanSupport(t *testing.T) {
- tmpDir, err := utiltesting.MkTmpdir("storageos_test")
- if err != nil {
- t.Fatalf("error creating temp dir: %v", err)
- }
- defer os.RemoveAll(tmpDir)
- plugMgr := volume.VolumePluginMgr{}
- plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(tmpDir, nil, nil))
- plug, err := plugMgr.FindPluginByName("kubernetes.io/storageos")
- if err != nil {
- t.Errorf("Can't find the plugin by name")
- }
- if plug.GetPluginName() != "kubernetes.io/storageos" {
- t.Errorf("Wrong name: %s", plug.GetPluginName())
- }
- if !plug.CanSupport(&volume.Spec{Volume: &v1.Volume{VolumeSource: v1.VolumeSource{StorageOS: &v1.StorageOSVolumeSource{}}}}) {
- t.Errorf("Expected true")
- }
- if !plug.CanSupport(&volume.Spec{PersistentVolume: &v1.PersistentVolume{Spec: v1.PersistentVolumeSpec{PersistentVolumeSource: v1.PersistentVolumeSource{StorageOS: &v1.StorageOSPersistentVolumeSource{}}}}}) {
- t.Errorf("Expected true")
- }
- }
- func TestGetAccessModes(t *testing.T) {
- tmpDir, err := utiltesting.MkTmpdir("storageos_test")
- if err != nil {
- t.Fatalf("error creating temp dir: %v", err)
- }
- defer os.RemoveAll(tmpDir)
- plugMgr := volume.VolumePluginMgr{}
- plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(tmpDir, nil, nil))
- plug, err := plugMgr.FindPersistentPluginByName("kubernetes.io/storageos")
- if err != nil {
- t.Errorf("Can't find the plugin by name")
- }
- if !volumetest.ContainsAccessMode(plug.GetAccessModes(), v1.ReadWriteOnce) || !volumetest.ContainsAccessMode(plug.GetAccessModes(), v1.ReadOnlyMany) {
- t.Errorf("Expected two AccessModeTypes: %s and %s", v1.ReadWriteOnce, v1.ReadOnlyMany)
- }
- }
- type fakePDManager struct {
- api apiImplementer
- attachCalled bool
- attachDeviceCalled bool
- detachCalled bool
- mountCalled bool
- unmountCalled bool
- createCalled bool
- deleteCalled bool
- }
- func (fake *fakePDManager) NewAPI(apiCfg *storageosAPIConfig) error {
- fake.api = fakeAPI{}
- return nil
- }
- func (fake *fakePDManager) CreateVolume(p *storageosProvisioner) (*storageosVolume, error) {
- fake.createCalled = true
- labels := make(map[string]string)
- labels["fakepdmanager"] = "yes"
- return &storageosVolume{
- Name: "test-storageos-name",
- Namespace: "test-storageos-namespace",
- Pool: "test-storageos-pool",
- SizeGB: 100,
- Labels: labels,
- FSType: "ext2",
- }, nil
- }
- func (fake *fakePDManager) AttachVolume(b *storageosMounter) (string, error) {
- fake.attachCalled = true
- return "", nil
- }
- func (fake *fakePDManager) AttachDevice(b *storageosMounter, dir string) error {
- fake.attachDeviceCalled = true
- return nil
- }
- func (fake *fakePDManager) DetachVolume(b *storageosUnmounter, loopDevice string) error {
- fake.detachCalled = true
- return nil
- }
- func (fake *fakePDManager) MountVolume(b *storageosMounter, mntDevice, deviceMountPath string) error {
- fake.mountCalled = true
- return nil
- }
- func (fake *fakePDManager) UnmountVolume(b *storageosUnmounter) error {
- fake.unmountCalled = true
- return nil
- }
- func (fake *fakePDManager) DeleteVolume(d *storageosDeleter) error {
- fake.deleteCalled = true
- if d.volName != "test-storageos-name" {
- return fmt.Errorf("Deleter got unexpected volume name: %s", d.volName)
- }
- return nil
- }
- func (fake *fakePDManager) DeviceDir(mounter *storageosMounter) string {
- return defaultDeviceDir
- }
- func TestPlugin(t *testing.T) {
- tmpDir, err := utiltesting.MkTmpdir("storageos_test")
- if err != nil {
- t.Fatalf("can't make a temp dir: %v", err)
- }
- defer os.RemoveAll(tmpDir)
- plugMgr := volume.VolumePluginMgr{}
- plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(tmpDir, nil, nil))
- plug, err := plugMgr.FindPluginByName("kubernetes.io/storageos")
- if err != nil {
- t.Errorf("Can't find the plugin by name")
- }
- secretName := "very-secret"
- spec := &v1.Volume{
- Name: "vol1-pvname",
- VolumeSource: v1.VolumeSource{
- StorageOS: &v1.StorageOSVolumeSource{
- VolumeName: "vol1",
- VolumeNamespace: "ns1",
- FSType: "ext3",
- SecretRef: &v1.LocalObjectReference{
- Name: secretName,
- },
- },
- },
- }
- client := fake.NewSimpleClientset()
- client.CoreV1().Secrets("default").Create(&v1.Secret{
- ObjectMeta: metav1.ObjectMeta{
- Name: secretName,
- Namespace: "default",
- },
- Type: "kubernetes.io/storageos",
- Data: map[string][]byte{
- "apiUsername": []byte("storageos"),
- "apiPassword": []byte("storageos"),
- "apiAddr": []byte("tcp://localhost:5705"),
- }})
- plug.(*storageosPlugin).host = volumetest.NewFakeVolumeHost(tmpDir, client, nil)
- // Test Mounter
- pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{UID: types.UID("poduid"), Namespace: "default"}}
- fakeManager := &fakePDManager{}
- apiCfg, err := parsePodSecret(pod, secretName, plug.(*storageosPlugin).host.GetKubeClient())
- if err != nil {
- t.Errorf("Couldn't get secret from %v/%v", pod.Namespace, secretName)
- }
- mounter, err := plug.(*storageosPlugin).newMounterInternal(volume.NewSpecFromVolume(spec), pod, apiCfg, fakeManager, &mount.FakeMounter{}, mount.NewFakeExec(nil))
- if err != nil {
- t.Fatalf("Failed to make a new Mounter: %v", err)
- }
- if mounter == nil {
- t.Fatalf("Got a nil Mounter")
- }
- expectedPath := filepath.Join(tmpDir, "pods/poduid/volumes/kubernetes.io~storageos/vol1-pvname.ns1.vol1")
- volPath := mounter.GetPath()
- if volPath != expectedPath {
- t.Errorf("Expected path: '%s' got: '%s'", expectedPath, volPath)
- }
- if err := mounter.SetUp(volume.MounterArgs{}); err != nil {
- t.Errorf("Expected success, got: %v", err)
- }
- if _, err := os.Stat(volPath); err != nil {
- if os.IsNotExist(err) {
- t.Errorf("SetUp() failed, volume path not created: %s", volPath)
- } else {
- t.Errorf("SetUp() failed: %v", err)
- }
- }
- if !fakeManager.attachDeviceCalled {
- t.Errorf("AttachDevice not called")
- }
- if !fakeManager.attachCalled {
- t.Errorf("Attach not called")
- }
- if !fakeManager.mountCalled {
- t.Errorf("Mount not called")
- }
- // Test Unmounter
- fakeManager = &fakePDManager{}
- unmounter, err := plug.(*storageosPlugin).newUnmounterInternal("vol1-pvname", types.UID("poduid"), fakeManager, &mount.FakeMounter{}, mount.NewFakeExec(nil))
- if err != nil {
- t.Errorf("Failed to make a new Unmounter: %v", err)
- }
- if unmounter == nil {
- t.Errorf("Got a nil Unmounter")
- }
- volPath = unmounter.GetPath()
- if volPath != expectedPath {
- t.Errorf("Expected path: '%s' got: '%s'", expectedPath, volPath)
- }
- if err := unmounter.TearDown(); err != nil {
- t.Errorf("Expected success, got: %v", err)
- }
- if _, err := os.Stat(volPath); err == nil {
- t.Errorf("TearDown() failed, volume path still exists: %s", volPath)
- } else if !os.IsNotExist(err) {
- t.Errorf("TearDown() failed: %v", err)
- }
- if !fakeManager.unmountCalled {
- t.Errorf("Unmount not called")
- }
- if !fakeManager.detachCalled {
- t.Errorf("Detach not called")
- }
- // Test Provisioner
- fakeManager = &fakePDManager{}
- mountOptions := []string{"sync", "noatime"}
- options := volume.VolumeOptions{
- PVC: volumetest.CreateTestPVC("100Mi", []v1.PersistentVolumeAccessMode{v1.ReadWriteOnce}),
- // PVName: "test-volume-name",
- PersistentVolumeReclaimPolicy: v1.PersistentVolumeReclaimDelete,
- Parameters: map[string]string{
- "VolumeNamespace": "test-volume-namespace",
- "adminSecretName": secretName,
- },
- MountOptions: mountOptions,
- }
- provisioner, err := plug.(*storageosPlugin).newProvisionerInternal(options, fakeManager)
- if err != nil {
- t.Errorf("newProvisionerInternal() failed: %v", err)
- }
- persistentSpec, err := provisioner.Provision(nil, nil)
- if err != nil {
- t.Fatalf("Provision() failed: %v", err)
- }
- if persistentSpec.Spec.PersistentVolumeSource.StorageOS.VolumeName != "test-storageos-name" {
- t.Errorf("Provision() returned unexpected volume Name: %s, expected test-storageos-name", persistentSpec.Spec.PersistentVolumeSource.StorageOS.VolumeName)
- }
- if persistentSpec.Spec.PersistentVolumeSource.StorageOS.VolumeNamespace != "test-storageos-namespace" {
- t.Errorf("Provision() returned unexpected volume Namespace: %s", persistentSpec.Spec.PersistentVolumeSource.StorageOS.VolumeNamespace)
- }
- cap := persistentSpec.Spec.Capacity[v1.ResourceStorage]
- size := cap.Value()
- if size != 100*1024*1024*1024 {
- t.Errorf("Provision() returned unexpected volume size: %v", size)
- }
- if persistentSpec.Spec.PersistentVolumeSource.StorageOS.FSType != "ext2" {
- t.Errorf("Provision() returned unexpected volume FSType: %s", persistentSpec.Spec.PersistentVolumeSource.StorageOS.FSType)
- }
- if len(persistentSpec.Spec.MountOptions) != 2 {
- t.Errorf("Provision() returned unexpected volume mount options: %v", persistentSpec.Spec.MountOptions)
- }
- if persistentSpec.Labels["fakepdmanager"] != "yes" {
- t.Errorf("Provision() returned unexpected labels: %v", persistentSpec.Labels)
- }
- if !fakeManager.createCalled {
- t.Errorf("Create not called")
- }
- // Test Deleter
- fakeManager = &fakePDManager{}
- volSpec := &volume.Spec{
- PersistentVolume: persistentSpec,
- }
- deleter, err := plug.(*storageosPlugin).newDeleterInternal(volSpec, apiCfg, fakeManager)
- if err != nil {
- t.Errorf("newDeleterInternal() failed: %v", err)
- }
- err = deleter.Delete()
- if err != nil {
- t.Errorf("Deleter() failed: %v", err)
- }
- if !fakeManager.deleteCalled {
- t.Errorf("Delete not called")
- }
- }
- func TestPersistentClaimReadOnlyFlag(t *testing.T) {
- tmpDir, err := utiltesting.MkTmpdir("storageos_test")
- if err != nil {
- t.Fatalf("error creating temp dir: %v", err)
- }
- defer os.RemoveAll(tmpDir)
- pv := &v1.PersistentVolume{
- ObjectMeta: metav1.ObjectMeta{
- Name: "pvA",
- },
- Spec: v1.PersistentVolumeSpec{
- PersistentVolumeSource: v1.PersistentVolumeSource{
- StorageOS: &v1.StorageOSPersistentVolumeSource{VolumeName: "pvA", VolumeNamespace: "vnsA", ReadOnly: false},
- },
- ClaimRef: &v1.ObjectReference{
- Name: "claimA",
- },
- },
- }
- claim := &v1.PersistentVolumeClaim{
- ObjectMeta: metav1.ObjectMeta{
- Name: "claimA",
- Namespace: "nsA",
- },
- Spec: v1.PersistentVolumeClaimSpec{
- VolumeName: "pvA",
- },
- Status: v1.PersistentVolumeClaimStatus{
- Phase: v1.ClaimBound,
- },
- }
- client := fake.NewSimpleClientset(pv, claim)
- plugMgr := volume.VolumePluginMgr{}
- plugMgr.InitPlugins(ProbeVolumePlugins(), nil /* prober */, volumetest.NewFakeVolumeHost(tmpDir, client, nil))
- plug, _ := plugMgr.FindPluginByName(storageosPluginName)
- // readOnly bool is supplied by persistent-claim volume source when its mounter creates other volumes
- spec := volume.NewSpecFromPersistentVolume(pv, true)
- pod := &v1.Pod{ObjectMeta: metav1.ObjectMeta{Namespace: "nsA", UID: types.UID("poduid")}}
- fakeManager := &fakePDManager{}
- fakeConfig := &fakeConfig{}
- apiCfg := fakeConfig.GetAPIConfig()
- mounter, err := plug.(*storageosPlugin).newMounterInternal(spec, pod, apiCfg, fakeManager, &mount.FakeMounter{}, mount.NewFakeExec(nil))
- if err != nil {
- t.Fatalf("error creating a new internal mounter:%v", err)
- }
- if !mounter.GetAttributes().ReadOnly {
- t.Errorf("Expected true for mounter.IsReadOnly")
- }
- }
|