123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056 |
- /*
- Copyright 2015 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package framework
- import (
- "fmt"
- "time"
- "github.com/onsi/ginkgo"
- v1 "k8s.io/api/core/v1"
- apierrs "k8s.io/apimachinery/pkg/api/errors"
- "k8s.io/apimachinery/pkg/api/resource"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/labels"
- "k8s.io/apimachinery/pkg/types"
- "k8s.io/apimachinery/pkg/util/uuid"
- clientset "k8s.io/client-go/kubernetes"
- storageutil "k8s.io/kubernetes/pkg/apis/storage/v1/util"
- "k8s.io/kubernetes/pkg/volume/util"
- e2elog "k8s.io/kubernetes/test/e2e/framework/log"
- imageutils "k8s.io/kubernetes/test/utils/image"
- )
- const (
- pdRetryTimeout = 5 * time.Minute
- pdRetryPollTime = 5 * time.Second
- // VolumeSelectorKey is the key for volume selector.
- VolumeSelectorKey = "e2e-pv-pool"
- )
- var (
- // SELinuxLabel is common selinux labels.
- SELinuxLabel = &v1.SELinuxOptions{
- Level: "s0:c0,c1"}
- )
- type pvval struct{}
- // PVMap is a map of all PVs used in the multi pv-pvc tests. The key is the PV's name, which is
- // guaranteed to be unique. The value is {} (empty struct) since we're only interested
- // in the PV's name and if it is present. We must always Get the pv object before
- // referencing any of its values, eg its ClaimRef.
- type PVMap map[string]pvval
- type pvcval struct{}
- // PVCMap is a map of all PVCs used in the multi pv-pvc tests. The key is "namespace/pvc.Name". The
- // value is {} (empty struct) since we're only interested in the PVC's name and if it is
- // present. We must always Get the pvc object before referencing any of its values, eg.
- // its VolumeName.
- // Note: It's unsafe to add keys to a map in a loop. Their insertion in the map is
- // unpredictable and can result in the same key being iterated over again.
- type PVCMap map[types.NamespacedName]pvcval
- // PersistentVolumeConfig is consumed by MakePersistentVolume() to generate a PV object
- // for varying storage options (NFS, ceph, glusterFS, etc.).
- // (+optional) prebind holds a pre-bound PVC
- // Example pvSource:
- // pvSource: api.PersistentVolumeSource{
- // NFS: &api.NFSVolumeSource{
- // ...
- // },
- // }
- type PersistentVolumeConfig struct {
- PVSource v1.PersistentVolumeSource
- Prebind *v1.PersistentVolumeClaim
- ReclaimPolicy v1.PersistentVolumeReclaimPolicy
- NamePrefix string
- Labels labels.Set
- StorageClassName string
- NodeAffinity *v1.VolumeNodeAffinity
- VolumeMode *v1.PersistentVolumeMode
- }
- // PersistentVolumeClaimConfig is consumed by MakePersistentVolumeClaim() to generate a PVC object.
- // AccessModes defaults to all modes (RWO, RWX, ROX) if left empty
- // (+optional) Annotations defines the PVC's annotations
- type PersistentVolumeClaimConfig struct {
- AccessModes []v1.PersistentVolumeAccessMode
- Annotations map[string]string
- Selector *metav1.LabelSelector
- StorageClassName *string
- VolumeMode *v1.PersistentVolumeMode
- }
- // NodeSelection specifies where to run a pod, using a combination of fixed node name,
- // node selector and/or affinity.
- type NodeSelection struct {
- Name string
- Selector map[string]string
- Affinity *v1.Affinity
- }
- // PVPVCCleanup cleans up a pv and pvc in a single pv/pvc test case.
- // Note: delete errors are appended to []error so that we can attempt to delete both the pvc and pv.
- func PVPVCCleanup(c clientset.Interface, ns string, pv *v1.PersistentVolume, pvc *v1.PersistentVolumeClaim) []error {
- var errs []error
- if pvc != nil {
- err := DeletePersistentVolumeClaim(c, pvc.Name, ns)
- if err != nil {
- errs = append(errs, fmt.Errorf("failed to delete PVC %q: %v", pvc.Name, err))
- }
- } else {
- e2elog.Logf("pvc is nil")
- }
- if pv != nil {
- err := DeletePersistentVolume(c, pv.Name)
- if err != nil {
- errs = append(errs, fmt.Errorf("failed to delete PV %q: %v", pv.Name, err))
- }
- } else {
- e2elog.Logf("pv is nil")
- }
- return errs
- }
- // PVPVCMapCleanup Cleans up pvs and pvcs in multi-pv-pvc test cases. Entries found in the pv and claim maps are
- // deleted as long as the Delete api call succeeds.
- // Note: delete errors are appended to []error so that as many pvcs and pvs as possible are deleted.
- func PVPVCMapCleanup(c clientset.Interface, ns string, pvols PVMap, claims PVCMap) []error {
- var errs []error
- for pvcKey := range claims {
- err := DeletePersistentVolumeClaim(c, pvcKey.Name, ns)
- if err != nil {
- errs = append(errs, fmt.Errorf("failed to delete PVC %q: %v", pvcKey.Name, err))
- } else {
- delete(claims, pvcKey)
- }
- }
- for pvKey := range pvols {
- err := DeletePersistentVolume(c, pvKey)
- if err != nil {
- errs = append(errs, fmt.Errorf("failed to delete PV %q: %v", pvKey, err))
- } else {
- delete(pvols, pvKey)
- }
- }
- return errs
- }
- // DeletePersistentVolume deletes the PV.
- func DeletePersistentVolume(c clientset.Interface, pvName string) error {
- if c != nil && len(pvName) > 0 {
- e2elog.Logf("Deleting PersistentVolume %q", pvName)
- err := c.CoreV1().PersistentVolumes().Delete(pvName, nil)
- if err != nil && !apierrs.IsNotFound(err) {
- return fmt.Errorf("PV Delete API error: %v", err)
- }
- }
- return nil
- }
- // DeletePersistentVolumeClaim deletes the Claim.
- func DeletePersistentVolumeClaim(c clientset.Interface, pvcName string, ns string) error {
- if c != nil && len(pvcName) > 0 {
- e2elog.Logf("Deleting PersistentVolumeClaim %q", pvcName)
- err := c.CoreV1().PersistentVolumeClaims(ns).Delete(pvcName, nil)
- if err != nil && !apierrs.IsNotFound(err) {
- return fmt.Errorf("PVC Delete API error: %v", err)
- }
- }
- return nil
- }
- // DeletePVCandValidatePV deletes the PVC and waits for the PV to enter its expected phase. Validate that the PV
- // has been reclaimed (assumption here about reclaimPolicy). Caller tells this func which
- // phase value to expect for the pv bound to the to-be-deleted claim.
- func DeletePVCandValidatePV(c clientset.Interface, ns string, pvc *v1.PersistentVolumeClaim, pv *v1.PersistentVolume, expectPVPhase v1.PersistentVolumePhase) error {
- pvname := pvc.Spec.VolumeName
- e2elog.Logf("Deleting PVC %v to trigger reclamation of PV %v", pvc.Name, pvname)
- err := DeletePersistentVolumeClaim(c, pvc.Name, ns)
- if err != nil {
- return err
- }
- // Wait for the PV's phase to return to be `expectPVPhase`
- e2elog.Logf("Waiting for reclaim process to complete.")
- err = WaitForPersistentVolumePhase(expectPVPhase, c, pv.Name, Poll, PVReclaimingTimeout)
- if err != nil {
- return fmt.Errorf("pv %q phase did not become %v: %v", pv.Name, expectPVPhase, err)
- }
- // examine the pv's ClaimRef and UID and compare to expected values
- pv, err = c.CoreV1().PersistentVolumes().Get(pv.Name, metav1.GetOptions{})
- if err != nil {
- return fmt.Errorf("PV Get API error: %v", err)
- }
- cr := pv.Spec.ClaimRef
- if expectPVPhase == v1.VolumeAvailable {
- if cr != nil && len(cr.UID) > 0 {
- return fmt.Errorf("PV is 'Available' but ClaimRef.UID is not empty")
- }
- } else if expectPVPhase == v1.VolumeBound {
- if cr == nil {
- return fmt.Errorf("PV is 'Bound' but ClaimRef is nil")
- }
- if len(cr.UID) == 0 {
- return fmt.Errorf("PV is 'Bound' but ClaimRef.UID is empty")
- }
- }
- e2elog.Logf("PV %v now in %q phase", pv.Name, expectPVPhase)
- return nil
- }
- // DeletePVCandValidatePVGroup wraps deletePVCandValidatePV() by calling the function in a loop over the PV map. Only bound PVs
- // are deleted. Validates that the claim was deleted and the PV is in the expected Phase (Released,
- // Available, Bound).
- // Note: if there are more claims than pvs then some of the remaining claims may bind to just made
- // available pvs.
- func DeletePVCandValidatePVGroup(c clientset.Interface, ns string, pvols PVMap, claims PVCMap, expectPVPhase v1.PersistentVolumePhase) error {
- var boundPVs, deletedPVCs int
- for pvName := range pvols {
- pv, err := c.CoreV1().PersistentVolumes().Get(pvName, metav1.GetOptions{})
- if err != nil {
- return fmt.Errorf("PV Get API error: %v", err)
- }
- cr := pv.Spec.ClaimRef
- // if pv is bound then delete the pvc it is bound to
- if cr != nil && len(cr.Name) > 0 {
- boundPVs++
- // Assert bound PVC is tracked in this test. Failing this might
- // indicate external PVCs interfering with the test.
- pvcKey := makePvcKey(ns, cr.Name)
- if _, found := claims[pvcKey]; !found {
- return fmt.Errorf("internal: claims map is missing pvc %q", pvcKey)
- }
- // get the pvc for the delete call below
- pvc, err := c.CoreV1().PersistentVolumeClaims(ns).Get(cr.Name, metav1.GetOptions{})
- if err == nil {
- if err = DeletePVCandValidatePV(c, ns, pvc, pv, expectPVPhase); err != nil {
- return err
- }
- } else if !apierrs.IsNotFound(err) {
- return fmt.Errorf("PVC Get API error: %v", err)
- }
- // delete pvckey from map even if apierrs.IsNotFound above is true and thus the
- // claim was not actually deleted here
- delete(claims, pvcKey)
- deletedPVCs++
- }
- }
- if boundPVs != deletedPVCs {
- return fmt.Errorf("expect number of bound PVs (%v) to equal number of deleted PVCs (%v)", boundPVs, deletedPVCs)
- }
- return nil
- }
- // create the PV resource. Fails test on error.
- func createPV(c clientset.Interface, pv *v1.PersistentVolume) (*v1.PersistentVolume, error) {
- pv, err := c.CoreV1().PersistentVolumes().Create(pv)
- if err != nil {
- return nil, fmt.Errorf("PV Create API error: %v", err)
- }
- return pv, nil
- }
- // CreatePV creates the PV resource. Fails test on error.
- func CreatePV(c clientset.Interface, pv *v1.PersistentVolume) (*v1.PersistentVolume, error) {
- return createPV(c, pv)
- }
- // CreatePVC creates the PVC resource. Fails test on error.
- func CreatePVC(c clientset.Interface, ns string, pvc *v1.PersistentVolumeClaim) (*v1.PersistentVolumeClaim, error) {
- pvc, err := c.CoreV1().PersistentVolumeClaims(ns).Create(pvc)
- if err != nil {
- return nil, fmt.Errorf("PVC Create API error: %v", err)
- }
- return pvc, nil
- }
- // CreatePVCPV creates a PVC followed by the PV based on the passed in nfs-server ip and
- // namespace. If the "preBind" bool is true then pre-bind the PV to the PVC
- // via the PV's ClaimRef. Return the pv and pvc to reflect the created objects.
- // Note: in the pre-bind case the real PVC name, which is generated, is not
- // known until after the PVC is instantiated. This is why the pvc is created
- // before the pv.
- func CreatePVCPV(c clientset.Interface, pvConfig PersistentVolumeConfig, pvcConfig PersistentVolumeClaimConfig, ns string, preBind bool) (*v1.PersistentVolume, *v1.PersistentVolumeClaim, error) {
- // make the pvc spec
- pvc := MakePersistentVolumeClaim(pvcConfig, ns)
- preBindMsg := ""
- if preBind {
- preBindMsg = " pre-bound"
- pvConfig.Prebind = pvc
- }
- // make the pv spec
- pv := MakePersistentVolume(pvConfig)
- ginkgo.By(fmt.Sprintf("Creating a PVC followed by a%s PV", preBindMsg))
- pvc, err := CreatePVC(c, ns, pvc)
- if err != nil {
- return nil, nil, err
- }
- // instantiate the pv, handle pre-binding by ClaimRef if needed
- if preBind {
- pv.Spec.ClaimRef.Name = pvc.Name
- }
- pv, err = createPV(c, pv)
- if err != nil {
- return nil, pvc, err
- }
- return pv, pvc, nil
- }
- // CreatePVPVC creates a PV followed by the PVC based on the passed in nfs-server ip and
- // namespace. If the "preBind" bool is true then pre-bind the PVC to the PV
- // via the PVC's VolumeName. Return the pv and pvc to reflect the created
- // objects.
- // Note: in the pre-bind case the real PV name, which is generated, is not
- // known until after the PV is instantiated. This is why the pv is created
- // before the pvc.
- func CreatePVPVC(c clientset.Interface, pvConfig PersistentVolumeConfig, pvcConfig PersistentVolumeClaimConfig, ns string, preBind bool) (*v1.PersistentVolume, *v1.PersistentVolumeClaim, error) {
- preBindMsg := ""
- if preBind {
- preBindMsg = " pre-bound"
- }
- e2elog.Logf("Creating a PV followed by a%s PVC", preBindMsg)
- // make the pv and pvc definitions
- pv := MakePersistentVolume(pvConfig)
- pvc := MakePersistentVolumeClaim(pvcConfig, ns)
- // instantiate the pv
- pv, err := createPV(c, pv)
- if err != nil {
- return nil, nil, err
- }
- // instantiate the pvc, handle pre-binding by VolumeName if needed
- if preBind {
- pvc.Spec.VolumeName = pv.Name
- }
- pvc, err = CreatePVC(c, ns, pvc)
- if err != nil {
- return pv, nil, err
- }
- return pv, pvc, nil
- }
- // CreatePVsPVCs creates the desired number of PVs and PVCs and returns them in separate maps. If the
- // number of PVs != the number of PVCs then the min of those two counts is the number of
- // PVs expected to bind. If a Create error occurs, the returned maps may contain pv and pvc
- // entries for the resources that were successfully created. In other words, when the caller
- // sees an error returned, it needs to decide what to do about entries in the maps.
- // Note: when the test suite deletes the namespace orphaned pvcs and pods are deleted. However,
- // orphaned pvs are not deleted and will remain after the suite completes.
- func CreatePVsPVCs(numpvs, numpvcs int, c clientset.Interface, ns string, pvConfig PersistentVolumeConfig, pvcConfig PersistentVolumeClaimConfig) (PVMap, PVCMap, error) {
- pvMap := make(PVMap, numpvs)
- pvcMap := make(PVCMap, numpvcs)
- extraPVCs := 0
- extraPVs := numpvs - numpvcs
- if extraPVs < 0 {
- extraPVCs = -extraPVs
- extraPVs = 0
- }
- pvsToCreate := numpvs - extraPVs // want the min(numpvs, numpvcs)
- // create pvs and pvcs
- for i := 0; i < pvsToCreate; i++ {
- pv, pvc, err := CreatePVPVC(c, pvConfig, pvcConfig, ns, false)
- if err != nil {
- return pvMap, pvcMap, err
- }
- pvMap[pv.Name] = pvval{}
- pvcMap[makePvcKey(ns, pvc.Name)] = pvcval{}
- }
- // create extra pvs or pvcs as needed
- for i := 0; i < extraPVs; i++ {
- pv := MakePersistentVolume(pvConfig)
- pv, err := createPV(c, pv)
- if err != nil {
- return pvMap, pvcMap, err
- }
- pvMap[pv.Name] = pvval{}
- }
- for i := 0; i < extraPVCs; i++ {
- pvc := MakePersistentVolumeClaim(pvcConfig, ns)
- pvc, err := CreatePVC(c, ns, pvc)
- if err != nil {
- return pvMap, pvcMap, err
- }
- pvcMap[makePvcKey(ns, pvc.Name)] = pvcval{}
- }
- return pvMap, pvcMap, nil
- }
- // WaitOnPVandPVC waits for the pv and pvc to bind to each other.
- func WaitOnPVandPVC(c clientset.Interface, ns string, pv *v1.PersistentVolume, pvc *v1.PersistentVolumeClaim) error {
- // Wait for newly created PVC to bind to the PV
- e2elog.Logf("Waiting for PV %v to bind to PVC %v", pv.Name, pvc.Name)
- err := WaitForPersistentVolumeClaimPhase(v1.ClaimBound, c, ns, pvc.Name, Poll, ClaimBindingTimeout)
- if err != nil {
- return fmt.Errorf("PVC %q did not become Bound: %v", pvc.Name, err)
- }
- // Wait for PersistentVolume.Status.Phase to be Bound, which it should be
- // since the PVC is already bound.
- err = WaitForPersistentVolumePhase(v1.VolumeBound, c, pv.Name, Poll, PVBindingTimeout)
- if err != nil {
- return fmt.Errorf("PV %q did not become Bound: %v", pv.Name, err)
- }
- // Re-get the pv and pvc objects
- pv, err = c.CoreV1().PersistentVolumes().Get(pv.Name, metav1.GetOptions{})
- if err != nil {
- return fmt.Errorf("PV Get API error: %v", err)
- }
- pvc, err = c.CoreV1().PersistentVolumeClaims(ns).Get(pvc.Name, metav1.GetOptions{})
- if err != nil {
- return fmt.Errorf("PVC Get API error: %v", err)
- }
- // The pv and pvc are both bound, but to each other?
- // Check that the PersistentVolume.ClaimRef matches the PVC
- if pv.Spec.ClaimRef == nil {
- return fmt.Errorf("PV %q ClaimRef is nil", pv.Name)
- }
- if pv.Spec.ClaimRef.Name != pvc.Name {
- return fmt.Errorf("PV %q ClaimRef's name (%q) should be %q", pv.Name, pv.Spec.ClaimRef.Name, pvc.Name)
- }
- if pvc.Spec.VolumeName != pv.Name {
- return fmt.Errorf("PVC %q VolumeName (%q) should be %q", pvc.Name, pvc.Spec.VolumeName, pv.Name)
- }
- if pv.Spec.ClaimRef.UID != pvc.UID {
- return fmt.Errorf("PV %q ClaimRef's UID (%q) should be %q", pv.Name, pv.Spec.ClaimRef.UID, pvc.UID)
- }
- return nil
- }
- // WaitAndVerifyBinds searches for bound PVs and PVCs by examining pvols for non-nil claimRefs.
- // NOTE: Each iteration waits for a maximum of 3 minutes per PV and, if the PV is bound,
- // up to 3 minutes for the PVC. When the number of PVs != number of PVCs, this can lead
- // to situations where the maximum wait times are reached several times in succession,
- // extending test time. Thus, it is recommended to keep the delta between PVs and PVCs
- // small.
- func WaitAndVerifyBinds(c clientset.Interface, ns string, pvols PVMap, claims PVCMap, testExpected bool) error {
- var actualBinds int
- expectedBinds := len(pvols)
- if expectedBinds > len(claims) { // want the min of # pvs or #pvcs
- expectedBinds = len(claims)
- }
- for pvName := range pvols {
- err := WaitForPersistentVolumePhase(v1.VolumeBound, c, pvName, Poll, PVBindingTimeout)
- if err != nil && len(pvols) > len(claims) {
- e2elog.Logf("WARN: pv %v is not bound after max wait", pvName)
- e2elog.Logf(" This may be ok since there are more pvs than pvcs")
- continue
- }
- if err != nil {
- return fmt.Errorf("PV %q did not become Bound: %v", pvName, err)
- }
- pv, err := c.CoreV1().PersistentVolumes().Get(pvName, metav1.GetOptions{})
- if err != nil {
- return fmt.Errorf("PV Get API error: %v", err)
- }
- cr := pv.Spec.ClaimRef
- if cr != nil && len(cr.Name) > 0 {
- // Assert bound pvc is a test resource. Failing assertion could
- // indicate non-test PVC interference or a bug in the test
- pvcKey := makePvcKey(ns, cr.Name)
- if _, found := claims[pvcKey]; !found {
- return fmt.Errorf("internal: claims map is missing pvc %q", pvcKey)
- }
- err := WaitForPersistentVolumeClaimPhase(v1.ClaimBound, c, ns, cr.Name, Poll, ClaimBindingTimeout)
- if err != nil {
- return fmt.Errorf("PVC %q did not become Bound: %v", cr.Name, err)
- }
- actualBinds++
- }
- }
- if testExpected && actualBinds != expectedBinds {
- return fmt.Errorf("expect number of bound PVs (%v) to equal number of claims (%v)", actualBinds, expectedBinds)
- }
- return nil
- }
- // Test the pod's exit code to be zero.
- func testPodSuccessOrFail(c clientset.Interface, ns string, pod *v1.Pod) error {
- ginkgo.By("Pod should terminate with exitcode 0 (success)")
- if err := WaitForPodSuccessInNamespace(c, pod.Name, ns); err != nil {
- return fmt.Errorf("pod %q failed to reach Success: %v", pod.Name, err)
- }
- e2elog.Logf("Pod %v succeeded ", pod.Name)
- return nil
- }
- // DeletePodWithWait deletes the passed-in pod and waits for the pod to be terminated. Resilient to the pod
- // not existing.
- func DeletePodWithWait(f *Framework, c clientset.Interface, pod *v1.Pod) error {
- if pod == nil {
- return nil
- }
- return DeletePodWithWaitByName(f, c, pod.GetName(), pod.GetNamespace())
- }
- // DeletePodWithWaitByName deletes the named and namespaced pod and waits for the pod to be terminated. Resilient to the pod
- // not existing.
- func DeletePodWithWaitByName(f *Framework, c clientset.Interface, podName, podNamespace string) error {
- e2elog.Logf("Deleting pod %q in namespace %q", podName, podNamespace)
- err := c.CoreV1().Pods(podNamespace).Delete(podName, nil)
- if err != nil {
- if apierrs.IsNotFound(err) {
- return nil // assume pod was already deleted
- }
- return fmt.Errorf("pod Delete API error: %v", err)
- }
- e2elog.Logf("Wait up to %v for pod %q to be fully deleted", PodDeleteTimeout, podName)
- err = f.WaitForPodNotFound(podName, PodDeleteTimeout)
- if err != nil {
- return fmt.Errorf("pod %q was not deleted: %v", podName, err)
- }
- return nil
- }
- // CreateWaitAndDeletePod creates the test pod, wait for (hopefully) success, and then delete the pod.
- // Note: need named return value so that the err assignment in the defer sets the returned error.
- // Has been shown to be necessary using Go 1.7.
- func CreateWaitAndDeletePod(f *Framework, c clientset.Interface, ns string, pvc *v1.PersistentVolumeClaim) (err error) {
- e2elog.Logf("Creating nfs test pod")
- pod := MakeWritePod(ns, pvc)
- runPod, err := c.CoreV1().Pods(ns).Create(pod)
- if err != nil {
- return fmt.Errorf("pod Create API error: %v", err)
- }
- defer func() {
- delErr := DeletePodWithWait(f, c, runPod)
- if err == nil { // don't override previous err value
- err = delErr // assign to returned err, can be nil
- }
- }()
- err = testPodSuccessOrFail(c, ns, runPod)
- if err != nil {
- return fmt.Errorf("pod %q did not exit with Success: %v", runPod.Name, err)
- }
- return // note: named return value
- }
- // Return a pvckey struct.
- func makePvcKey(ns, name string) types.NamespacedName {
- return types.NamespacedName{Namespace: ns, Name: name}
- }
- // MakePersistentVolume returns a PV definition based on the nfs server IP. If the PVC is not nil
- // then the PV is defined with a ClaimRef which includes the PVC's namespace.
- // If the PVC is nil then the PV is not defined with a ClaimRef. If no reclaimPolicy
- // is assigned, assumes "Retain". Specs are expected to match the test's PVC.
- // Note: the passed-in claim does not have a name until it is created and thus the PV's
- // ClaimRef cannot be completely filled-in in this func. Therefore, the ClaimRef's name
- // is added later in CreatePVCPV.
- func MakePersistentVolume(pvConfig PersistentVolumeConfig) *v1.PersistentVolume {
- var claimRef *v1.ObjectReference
- // If the reclaimPolicy is not provided, assume Retain
- if pvConfig.ReclaimPolicy == "" {
- e2elog.Logf("PV ReclaimPolicy unspecified, default: Retain")
- pvConfig.ReclaimPolicy = v1.PersistentVolumeReclaimRetain
- }
- if pvConfig.Prebind != nil {
- claimRef = &v1.ObjectReference{
- Name: pvConfig.Prebind.Name,
- Namespace: pvConfig.Prebind.Namespace,
- }
- }
- return &v1.PersistentVolume{
- ObjectMeta: metav1.ObjectMeta{
- GenerateName: pvConfig.NamePrefix,
- Labels: pvConfig.Labels,
- Annotations: map[string]string{
- util.VolumeGidAnnotationKey: "777",
- },
- },
- Spec: v1.PersistentVolumeSpec{
- PersistentVolumeReclaimPolicy: pvConfig.ReclaimPolicy,
- Capacity: v1.ResourceList{
- v1.ResourceName(v1.ResourceStorage): resource.MustParse("2Gi"),
- },
- PersistentVolumeSource: pvConfig.PVSource,
- AccessModes: []v1.PersistentVolumeAccessMode{
- v1.ReadWriteOnce,
- v1.ReadOnlyMany,
- v1.ReadWriteMany,
- },
- ClaimRef: claimRef,
- StorageClassName: pvConfig.StorageClassName,
- NodeAffinity: pvConfig.NodeAffinity,
- VolumeMode: pvConfig.VolumeMode,
- },
- }
- }
- // MakePersistentVolumeClaim returns a PVC definition based on the namespace.
- // Note: if this PVC is intended to be pre-bound to a PV, whose name is not
- // known until the PV is instantiated, then the func CreatePVPVC will add
- // pvc.Spec.VolumeName to this claim.
- func MakePersistentVolumeClaim(cfg PersistentVolumeClaimConfig, ns string) *v1.PersistentVolumeClaim {
- // Specs are expected to match this test's PersistentVolume
- if len(cfg.AccessModes) == 0 {
- e2elog.Logf("AccessModes unspecified, default: all modes (RWO, RWX, ROX).")
- cfg.AccessModes = append(cfg.AccessModes, v1.ReadWriteOnce, v1.ReadOnlyMany, v1.ReadOnlyMany)
- }
- return &v1.PersistentVolumeClaim{
- ObjectMeta: metav1.ObjectMeta{
- GenerateName: "pvc-",
- Namespace: ns,
- Annotations: cfg.Annotations,
- },
- Spec: v1.PersistentVolumeClaimSpec{
- Selector: cfg.Selector,
- AccessModes: cfg.AccessModes,
- Resources: v1.ResourceRequirements{
- Requests: v1.ResourceList{
- v1.ResourceName(v1.ResourceStorage): resource.MustParse("1Gi"),
- },
- },
- StorageClassName: cfg.StorageClassName,
- VolumeMode: cfg.VolumeMode,
- },
- }
- }
- func createPDWithRetry(zone string) (string, error) {
- var err error
- for start := time.Now(); time.Since(start) < pdRetryTimeout; time.Sleep(pdRetryPollTime) {
- newDiskName, err := createPD(zone)
- if err != nil {
- e2elog.Logf("Couldn't create a new PD, sleeping 5 seconds: %v", err)
- continue
- }
- e2elog.Logf("Successfully created a new PD: %q.", newDiskName)
- return newDiskName, nil
- }
- return "", err
- }
- // CreatePDWithRetry creates PD with retry.
- func CreatePDWithRetry() (string, error) {
- return createPDWithRetry("")
- }
- // CreatePDWithRetryAndZone creates PD on zone with retry.
- func CreatePDWithRetryAndZone(zone string) (string, error) {
- return createPDWithRetry(zone)
- }
- // DeletePDWithRetry deletes PD with retry.
- func DeletePDWithRetry(diskName string) error {
- var err error
- for start := time.Now(); time.Since(start) < pdRetryTimeout; time.Sleep(pdRetryPollTime) {
- err = deletePD(diskName)
- if err != nil {
- e2elog.Logf("Couldn't delete PD %q, sleeping %v: %v", diskName, pdRetryPollTime, err)
- continue
- }
- e2elog.Logf("Successfully deleted PD %q.", diskName)
- return nil
- }
- return fmt.Errorf("unable to delete PD %q: %v", diskName, err)
- }
- func createPD(zone string) (string, error) {
- if zone == "" {
- zone = TestContext.CloudConfig.Zone
- }
- return TestContext.CloudConfig.Provider.CreatePD(zone)
- }
- func deletePD(pdName string) error {
- return TestContext.CloudConfig.Provider.DeletePD(pdName)
- }
- // MakeWritePod returns a pod definition based on the namespace. The pod references the PVC's
- // name.
- func MakeWritePod(ns string, pvc *v1.PersistentVolumeClaim) *v1.Pod {
- return MakePod(ns, nil, []*v1.PersistentVolumeClaim{pvc}, true, "touch /mnt/volume1/SUCCESS && (id -G | grep -E '\\b777\\b')")
- }
- // MakePod returns a pod definition based on the namespace. The pod references the PVC's
- // name. A slice of BASH commands can be supplied as args to be run by the pod
- func MakePod(ns string, nodeSelector map[string]string, pvclaims []*v1.PersistentVolumeClaim, isPrivileged bool, command string) *v1.Pod {
- if len(command) == 0 {
- command = "trap exit TERM; while true; do sleep 1; done"
- }
- podSpec := &v1.Pod{
- TypeMeta: metav1.TypeMeta{
- Kind: "Pod",
- APIVersion: "v1",
- },
- ObjectMeta: metav1.ObjectMeta{
- GenerateName: "pvc-tester-",
- Namespace: ns,
- },
- Spec: v1.PodSpec{
- Containers: []v1.Container{
- {
- Name: "write-pod",
- Image: BusyBoxImage,
- Command: []string{"/bin/sh"},
- Args: []string{"-c", command},
- SecurityContext: &v1.SecurityContext{
- Privileged: &isPrivileged,
- },
- },
- },
- RestartPolicy: v1.RestartPolicyOnFailure,
- },
- }
- var volumeMounts = make([]v1.VolumeMount, len(pvclaims))
- var volumes = make([]v1.Volume, len(pvclaims))
- for index, pvclaim := range pvclaims {
- volumename := fmt.Sprintf("volume%v", index+1)
- volumeMounts[index] = v1.VolumeMount{Name: volumename, MountPath: "/mnt/" + volumename}
- volumes[index] = v1.Volume{Name: volumename, VolumeSource: v1.VolumeSource{PersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{ClaimName: pvclaim.Name, ReadOnly: false}}}
- }
- podSpec.Spec.Containers[0].VolumeMounts = volumeMounts
- podSpec.Spec.Volumes = volumes
- if nodeSelector != nil {
- podSpec.Spec.NodeSelector = nodeSelector
- }
- return podSpec
- }
- // makeNginxPod returns a pod definition based on the namespace using nginx image
- func makeNginxPod(ns string, nodeSelector map[string]string, pvclaims []*v1.PersistentVolumeClaim) *v1.Pod {
- podSpec := &v1.Pod{
- TypeMeta: metav1.TypeMeta{
- Kind: "Pod",
- APIVersion: "v1",
- },
- ObjectMeta: metav1.ObjectMeta{
- GenerateName: "pvc-tester-",
- Namespace: ns,
- },
- Spec: v1.PodSpec{
- Containers: []v1.Container{
- {
- Name: "write-pod",
- Image: "nginx",
- Ports: []v1.ContainerPort{
- {
- Name: "http-server",
- ContainerPort: 80,
- },
- },
- },
- },
- },
- }
- var volumeMounts = make([]v1.VolumeMount, len(pvclaims))
- var volumes = make([]v1.Volume, len(pvclaims))
- for index, pvclaim := range pvclaims {
- volumename := fmt.Sprintf("volume%v", index+1)
- volumeMounts[index] = v1.VolumeMount{Name: volumename, MountPath: "/mnt/" + volumename}
- volumes[index] = v1.Volume{Name: volumename, VolumeSource: v1.VolumeSource{PersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{ClaimName: pvclaim.Name, ReadOnly: false}}}
- }
- podSpec.Spec.Containers[0].VolumeMounts = volumeMounts
- podSpec.Spec.Volumes = volumes
- if nodeSelector != nil {
- podSpec.Spec.NodeSelector = nodeSelector
- }
- return podSpec
- }
- // MakeSecPod returns a pod definition based on the namespace. The pod references the PVC's
- // name. A slice of BASH commands can be supplied as args to be run by the pod.
- // SELinux testing requires to pass HostIPC and HostPID as booleansi arguments.
- func MakeSecPod(ns string, pvclaims []*v1.PersistentVolumeClaim, isPrivileged bool, command string, hostIPC bool, hostPID bool, seLinuxLabel *v1.SELinuxOptions, fsGroup *int64) *v1.Pod {
- if len(command) == 0 {
- command = "trap exit TERM; while true; do sleep 1; done"
- }
- podName := "security-context-" + string(uuid.NewUUID())
- if fsGroup == nil {
- fsGroup = func(i int64) *int64 {
- return &i
- }(1000)
- }
- podSpec := &v1.Pod{
- TypeMeta: metav1.TypeMeta{
- Kind: "Pod",
- APIVersion: "v1",
- },
- ObjectMeta: metav1.ObjectMeta{
- Name: podName,
- Namespace: ns,
- },
- Spec: v1.PodSpec{
- HostIPC: hostIPC,
- HostPID: hostPID,
- SecurityContext: &v1.PodSecurityContext{
- FSGroup: fsGroup,
- },
- Containers: []v1.Container{
- {
- Name: "write-pod",
- Image: imageutils.GetE2EImage(imageutils.BusyBox),
- Command: []string{"/bin/sh"},
- Args: []string{"-c", command},
- SecurityContext: &v1.SecurityContext{
- Privileged: &isPrivileged,
- },
- },
- },
- RestartPolicy: v1.RestartPolicyOnFailure,
- },
- }
- var volumeMounts = make([]v1.VolumeMount, 0)
- var volumeDevices = make([]v1.VolumeDevice, 0)
- var volumes = make([]v1.Volume, len(pvclaims))
- for index, pvclaim := range pvclaims {
- volumename := fmt.Sprintf("volume%v", index+1)
- if pvclaim.Spec.VolumeMode != nil && *pvclaim.Spec.VolumeMode == v1.PersistentVolumeBlock {
- volumeDevices = append(volumeDevices, v1.VolumeDevice{Name: volumename, DevicePath: "/mnt/" + volumename})
- } else {
- volumeMounts = append(volumeMounts, v1.VolumeMount{Name: volumename, MountPath: "/mnt/" + volumename})
- }
- volumes[index] = v1.Volume{Name: volumename, VolumeSource: v1.VolumeSource{PersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{ClaimName: pvclaim.Name, ReadOnly: false}}}
- }
- podSpec.Spec.Containers[0].VolumeMounts = volumeMounts
- podSpec.Spec.Containers[0].VolumeDevices = volumeDevices
- podSpec.Spec.Volumes = volumes
- podSpec.Spec.SecurityContext.SELinuxOptions = seLinuxLabel
- return podSpec
- }
- // CreatePod with given claims based on node selector
- func CreatePod(client clientset.Interface, namespace string, nodeSelector map[string]string, pvclaims []*v1.PersistentVolumeClaim, isPrivileged bool, command string) (*v1.Pod, error) {
- pod := MakePod(namespace, nodeSelector, pvclaims, isPrivileged, command)
- pod, err := client.CoreV1().Pods(namespace).Create(pod)
- if err != nil {
- return nil, fmt.Errorf("pod Create API error: %v", err)
- }
- // Waiting for pod to be running
- err = WaitForPodNameRunningInNamespace(client, pod.Name, namespace)
- if err != nil {
- return pod, fmt.Errorf("pod %q is not Running: %v", pod.Name, err)
- }
- // get fresh pod info
- pod, err = client.CoreV1().Pods(namespace).Get(pod.Name, metav1.GetOptions{})
- if err != nil {
- return pod, fmt.Errorf("pod Get API error: %v", err)
- }
- return pod, nil
- }
- // CreateNginxPod creates an enginx pod.
- func CreateNginxPod(client clientset.Interface, namespace string, nodeSelector map[string]string, pvclaims []*v1.PersistentVolumeClaim) (*v1.Pod, error) {
- pod := makeNginxPod(namespace, nodeSelector, pvclaims)
- pod, err := client.CoreV1().Pods(namespace).Create(pod)
- if err != nil {
- return nil, fmt.Errorf("pod Create API error: %v", err)
- }
- // Waiting for pod to be running
- err = WaitForPodNameRunningInNamespace(client, pod.Name, namespace)
- if err != nil {
- return pod, fmt.Errorf("pod %q is not Running: %v", pod.Name, err)
- }
- // get fresh pod info
- pod, err = client.CoreV1().Pods(namespace).Get(pod.Name, metav1.GetOptions{})
- if err != nil {
- return pod, fmt.Errorf("pod Get API error: %v", err)
- }
- return pod, nil
- }
- // CreateSecPod creates security pod with given claims
- func CreateSecPod(client clientset.Interface, namespace string, pvclaims []*v1.PersistentVolumeClaim, isPrivileged bool, command string, hostIPC bool, hostPID bool, seLinuxLabel *v1.SELinuxOptions, fsGroup *int64, timeout time.Duration) (*v1.Pod, error) {
- return CreateSecPodWithNodeSelection(client, namespace, pvclaims, isPrivileged, command, hostIPC, hostPID, seLinuxLabel, fsGroup, NodeSelection{}, timeout)
- }
- // CreateSecPodWithNodeSelection creates security pod with given claims
- func CreateSecPodWithNodeSelection(client clientset.Interface, namespace string, pvclaims []*v1.PersistentVolumeClaim, isPrivileged bool, command string, hostIPC bool, hostPID bool, seLinuxLabel *v1.SELinuxOptions, fsGroup *int64, node NodeSelection, timeout time.Duration) (*v1.Pod, error) {
- pod := MakeSecPod(namespace, pvclaims, isPrivileged, command, hostIPC, hostPID, seLinuxLabel, fsGroup)
- // Setting node
- pod.Spec.NodeName = node.Name
- pod.Spec.NodeSelector = node.Selector
- pod.Spec.Affinity = node.Affinity
- pod, err := client.CoreV1().Pods(namespace).Create(pod)
- if err != nil {
- return nil, fmt.Errorf("pod Create API error: %v", err)
- }
- // Waiting for pod to be running
- err = WaitTimeoutForPodRunningInNamespace(client, pod.Name, namespace, timeout)
- if err != nil {
- return pod, fmt.Errorf("pod %q is not Running: %v", pod.Name, err)
- }
- // get fresh pod info
- pod, err = client.CoreV1().Pods(namespace).Get(pod.Name, metav1.GetOptions{})
- if err != nil {
- return pod, fmt.Errorf("pod Get API error: %v", err)
- }
- return pod, nil
- }
- // SetNodeAffinityRequirement sets affinity with specified operator to nodeName to nodeSelection
- func SetNodeAffinityRequirement(nodeSelection *NodeSelection, operator v1.NodeSelectorOperator, nodeName string) {
- // Add node-anti-affinity.
- if nodeSelection.Affinity == nil {
- nodeSelection.Affinity = &v1.Affinity{}
- }
- if nodeSelection.Affinity.NodeAffinity == nil {
- nodeSelection.Affinity.NodeAffinity = &v1.NodeAffinity{}
- }
- if nodeSelection.Affinity.NodeAffinity.RequiredDuringSchedulingIgnoredDuringExecution == nil {
- nodeSelection.Affinity.NodeAffinity.RequiredDuringSchedulingIgnoredDuringExecution = &v1.NodeSelector{}
- }
- nodeSelection.Affinity.NodeAffinity.RequiredDuringSchedulingIgnoredDuringExecution.NodeSelectorTerms = append(nodeSelection.Affinity.NodeAffinity.RequiredDuringSchedulingIgnoredDuringExecution.NodeSelectorTerms,
- v1.NodeSelectorTerm{
- MatchFields: []v1.NodeSelectorRequirement{
- {Key: "metadata.name", Operator: operator, Values: []string{nodeName}},
- },
- })
- }
- // SetAffinity sets affinity to nodeName to nodeSelection
- func SetAffinity(nodeSelection *NodeSelection, nodeName string) {
- SetNodeAffinityRequirement(nodeSelection, v1.NodeSelectorOpIn, nodeName)
- }
- // SetAntiAffinity sets anti-affinity to nodeName to nodeSelection
- func SetAntiAffinity(nodeSelection *NodeSelection, nodeName string) {
- SetNodeAffinityRequirement(nodeSelection, v1.NodeSelectorOpNotIn, nodeName)
- }
- // CreateClientPod defines and creates a pod with a mounted PV. Pod runs infinite loop until killed.
- func CreateClientPod(c clientset.Interface, ns string, pvc *v1.PersistentVolumeClaim) (*v1.Pod, error) {
- return CreatePod(c, ns, nil, []*v1.PersistentVolumeClaim{pvc}, true, "")
- }
- // CreateUnschedulablePod with given claims based on node selector
- func CreateUnschedulablePod(client clientset.Interface, namespace string, nodeSelector map[string]string, pvclaims []*v1.PersistentVolumeClaim, isPrivileged bool, command string) (*v1.Pod, error) {
- pod := MakePod(namespace, nodeSelector, pvclaims, isPrivileged, command)
- pod, err := client.CoreV1().Pods(namespace).Create(pod)
- if err != nil {
- return nil, fmt.Errorf("pod Create API error: %v", err)
- }
- // Waiting for pod to become Unschedulable
- err = WaitForPodNameUnschedulableInNamespace(client, pod.Name, namespace)
- if err != nil {
- return pod, fmt.Errorf("pod %q is not Unschedulable: %v", pod.Name, err)
- }
- // get fresh pod info
- pod, err = client.CoreV1().Pods(namespace).Get(pod.Name, metav1.GetOptions{})
- if err != nil {
- return pod, fmt.Errorf("pod Get API error: %v", err)
- }
- return pod, nil
- }
- // WaitForPVClaimBoundPhase waits until all pvcs phase set to bound
- func WaitForPVClaimBoundPhase(client clientset.Interface, pvclaims []*v1.PersistentVolumeClaim, timeout time.Duration) ([]*v1.PersistentVolume, error) {
- persistentvolumes := make([]*v1.PersistentVolume, len(pvclaims))
- for index, claim := range pvclaims {
- err := WaitForPersistentVolumeClaimPhase(v1.ClaimBound, client, claim.Namespace, claim.Name, Poll, timeout)
- if err != nil {
- return persistentvolumes, err
- }
- // Get new copy of the claim
- claim, err = client.CoreV1().PersistentVolumeClaims(claim.Namespace).Get(claim.Name, metav1.GetOptions{})
- if err != nil {
- return persistentvolumes, fmt.Errorf("PVC Get API error: %v", err)
- }
- // Get the bounded PV
- persistentvolumes[index], err = client.CoreV1().PersistentVolumes().Get(claim.Spec.VolumeName, metav1.GetOptions{})
- if err != nil {
- return persistentvolumes, fmt.Errorf("PV Get API error: %v", err)
- }
- }
- return persistentvolumes, nil
- }
- // CreatePVSource creates a PV source.
- func CreatePVSource(zone string) (*v1.PersistentVolumeSource, error) {
- diskName, err := CreatePDWithRetryAndZone(zone)
- if err != nil {
- return nil, err
- }
- return TestContext.CloudConfig.Provider.CreatePVSource(zone, diskName)
- }
- // DeletePVSource deletes a PV source.
- func DeletePVSource(pvSource *v1.PersistentVolumeSource) error {
- return TestContext.CloudConfig.Provider.DeletePVSource(pvSource)
- }
- // GetBoundPV returns a PV details.
- func GetBoundPV(client clientset.Interface, pvc *v1.PersistentVolumeClaim) (*v1.PersistentVolume, error) {
- // Get new copy of the claim
- claim, err := client.CoreV1().PersistentVolumeClaims(pvc.Namespace).Get(pvc.Name, metav1.GetOptions{})
- if err != nil {
- return nil, err
- }
- // Get the bound PV
- pv, err := client.CoreV1().PersistentVolumes().Get(claim.Spec.VolumeName, metav1.GetOptions{})
- return pv, err
- }
- // GetDefaultStorageClassName returns default storageClass or return error
- func GetDefaultStorageClassName(c clientset.Interface) (string, error) {
- list, err := c.StorageV1().StorageClasses().List(metav1.ListOptions{})
- if err != nil {
- return "", fmt.Errorf("Error listing storage classes: %v", err)
- }
- var scName string
- for _, sc := range list.Items {
- if storageutil.IsDefaultAnnotation(sc.ObjectMeta) {
- if len(scName) != 0 {
- return "", fmt.Errorf("Multiple default storage classes found: %q and %q", scName, sc.Name)
- }
- scName = sc.Name
- }
- }
- if len(scName) == 0 {
- return "", fmt.Errorf("No default storage class found")
- }
- e2elog.Logf("Default storage class: %q", scName)
- return scName, nil
- }
- // SkipIfNoDefaultStorageClass skips tests if no default SC can be found.
- func SkipIfNoDefaultStorageClass(c clientset.Interface) {
- _, err := GetDefaultStorageClassName(c)
- if err != nil {
- Skipf("error finding default storageClass : %v", err)
- }
- }
|