2016-04-25 19:24:40 +00:00
|
|
|
/*
|
2016-06-03 00:25:58 +00:00
|
|
|
Copyright 2014 The Kubernetes Authors.
|
2016-04-25 19:24:40 +00:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package e2e
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2016-05-08 23:18:15 +00:00
|
|
|
"strings"
|
2016-04-25 19:24:40 +00:00
|
|
|
"time"
|
|
|
|
|
|
|
|
. "github.com/onsi/ginkgo"
|
|
|
|
. "github.com/onsi/gomega"
|
2017-01-11 14:09:48 +00:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
|
|
"k8s.io/apimachinery/pkg/labels"
|
|
|
|
klabels "k8s.io/apimachinery/pkg/labels"
|
|
|
|
"k8s.io/apimachinery/pkg/types"
|
2017-01-27 20:42:17 +00:00
|
|
|
"k8s.io/apimachinery/pkg/util/intstr"
|
2017-01-11 14:09:48 +00:00
|
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
|
|
"k8s.io/apimachinery/pkg/watch"
|
2016-11-18 20:55:17 +00:00
|
|
|
"k8s.io/kubernetes/pkg/api/v1"
|
2017-01-16 08:23:43 +00:00
|
|
|
apps "k8s.io/kubernetes/pkg/apis/apps/v1beta1"
|
2017-01-10 08:49:34 +00:00
|
|
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
2016-04-25 19:24:40 +00:00
|
|
|
"k8s.io/kubernetes/test/e2e/framework"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2017-01-16 07:28:32 +00:00
|
|
|
zookeeperManifestPath = "test/e2e/testing-manifests/statefulset/zookeeper"
|
|
|
|
mysqlGaleraManifestPath = "test/e2e/testing-manifests/statefulset/mysql-galera"
|
|
|
|
redisManifestPath = "test/e2e/testing-manifests/statefulset/redis"
|
|
|
|
cockroachDBManifestPath = "test/e2e/testing-manifests/statefulset/cockroachdb"
|
2016-11-16 19:39:05 +00:00
|
|
|
// We don't restart MySQL cluster regardless of restartCluster, since MySQL doesn't handle restart well
|
|
|
|
restartCluster = true
|
2016-10-20 01:47:46 +00:00
|
|
|
|
2016-11-22 23:35:50 +00:00
|
|
|
// Timeout for reads from databases running on stateful pods.
|
2016-10-20 01:47:46 +00:00
|
|
|
readTimeout = 60 * time.Second
|
2016-04-25 19:24:40 +00:00
|
|
|
)
|
|
|
|
|
2016-11-22 23:35:50 +00:00
|
|
|
// GCE Quota requirements: 3 pds, one per stateful pod manifest declared above.
|
2016-06-06 21:14:24 +00:00
|
|
|
// GCE Api requirements: nodes and master need storage r/w permissions.
|
2016-11-24 00:31:04 +00:00
|
|
|
var _ = framework.KubeDescribe("StatefulSet", func() {
|
2016-11-01 22:46:28 +00:00
|
|
|
f := framework.NewDefaultFramework("statefulset")
|
2016-04-25 19:24:40 +00:00
|
|
|
var ns string
|
2016-10-18 13:00:38 +00:00
|
|
|
var c clientset.Interface
|
2016-05-08 23:18:15 +00:00
|
|
|
|
2016-04-25 19:24:40 +00:00
|
|
|
BeforeEach(func() {
|
2016-10-18 13:00:38 +00:00
|
|
|
c = f.ClientSet
|
2016-04-25 19:24:40 +00:00
|
|
|
ns = f.Namespace.Name
|
|
|
|
})
|
|
|
|
|
2017-02-08 19:30:14 +00:00
|
|
|
framework.KubeDescribe("Basic StatefulSet functionality [StatefulSetBasic]", func() {
|
2017-01-16 07:28:32 +00:00
|
|
|
ssName := "ss"
|
2016-05-08 23:18:15 +00:00
|
|
|
labels := map[string]string{
|
|
|
|
"foo": "bar",
|
|
|
|
"baz": "blah",
|
|
|
|
}
|
|
|
|
headlessSvcName := "test"
|
2017-01-16 07:28:32 +00:00
|
|
|
var statefulPodMounts, podMounts []v1.VolumeMount
|
|
|
|
var ss *apps.StatefulSet
|
2016-05-08 23:18:15 +00:00
|
|
|
|
|
|
|
BeforeEach(func() {
|
2017-01-16 07:28:32 +00:00
|
|
|
statefulPodMounts = []v1.VolumeMount{{Name: "datadir", MountPath: "/data/"}}
|
2016-11-18 20:55:17 +00:00
|
|
|
podMounts = []v1.VolumeMount{{Name: "home", MountPath: "/home"}}
|
2017-02-09 22:05:47 +00:00
|
|
|
ss = framework.NewStatefulSet(ssName, ns, headlessSvcName, 2, statefulPodMounts, podMounts, labels)
|
2016-11-15 22:42:36 +00:00
|
|
|
|
|
|
|
By("Creating service " + headlessSvcName + " in namespace " + ns)
|
2016-08-22 20:43:20 +00:00
|
|
|
headlessService := createServiceSpec(headlessSvcName, "", true, labels)
|
2016-10-18 13:00:38 +00:00
|
|
|
_, err := c.Core().Services(ns).Create(headlessService)
|
2016-04-25 19:24:40 +00:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2016-05-08 23:18:15 +00:00
|
|
|
})
|
2016-04-25 19:24:40 +00:00
|
|
|
|
2016-06-06 21:14:24 +00:00
|
|
|
AfterEach(func() {
|
|
|
|
if CurrentGinkgoTestDescription().Failed {
|
|
|
|
dumpDebugInfo(c, ns)
|
|
|
|
}
|
2016-10-26 20:44:07 +00:00
|
|
|
framework.Logf("Deleting all statefulset in ns %v", ns)
|
2017-02-09 22:05:47 +00:00
|
|
|
framework.DeleteAllStatefulSets(c, ns)
|
2016-06-06 21:14:24 +00:00
|
|
|
})
|
|
|
|
|
2016-11-21 21:45:22 +00:00
|
|
|
It("should provide basic identity", func() {
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Creating statefulset " + ssName + " in namespace " + ns)
|
|
|
|
*(ss.Spec.Replicas) = 3
|
2017-02-09 22:05:47 +00:00
|
|
|
framework.SetStatefulSetInitializedAnnotation(ss, "false")
|
2016-11-04 03:11:17 +00:00
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
_, err := c.Apps().StatefulSets(ns).Create(ss)
|
2016-05-08 23:18:15 +00:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2016-04-25 19:24:40 +00:00
|
|
|
|
2017-02-09 22:05:47 +00:00
|
|
|
sst := framework.NewStatefulSetTester(c)
|
2016-04-25 19:24:40 +00:00
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Saturating stateful set " + ss.Name)
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.Saturate(ss)
|
2016-04-25 19:24:40 +00:00
|
|
|
|
2016-10-26 20:44:07 +00:00
|
|
|
By("Verifying statefulset mounted data directory is usable")
|
2017-02-09 22:05:47 +00:00
|
|
|
framework.ExpectNoError(sst.CheckMount(ss, "/data"))
|
2016-06-13 19:02:07 +00:00
|
|
|
|
2016-11-01 23:38:46 +00:00
|
|
|
By("Verifying statefulset provides a stable hostname for each pod")
|
2017-02-09 22:05:47 +00:00
|
|
|
framework.ExpectNoError(sst.CheckHostname(ss))
|
2016-11-01 23:38:46 +00:00
|
|
|
|
2017-02-01 10:29:40 +00:00
|
|
|
By("Verifying statefulset set proper service name")
|
2017-02-09 22:05:47 +00:00
|
|
|
framework.ExpectNoError(sst.CheckServiceName(ss, headlessSvcName))
|
2017-02-01 10:29:40 +00:00
|
|
|
|
2016-06-06 21:14:24 +00:00
|
|
|
cmd := "echo $(hostname) > /data/hostname; sync;"
|
2016-11-22 23:35:50 +00:00
|
|
|
By("Running " + cmd + " in all stateful pods")
|
2017-02-09 22:05:47 +00:00
|
|
|
framework.ExpectNoError(sst.ExecInStatefulPods(ss, cmd))
|
2016-04-25 19:24:40 +00:00
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Restarting statefulset " + ss.Name)
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.Restart(ss)
|
|
|
|
sst.Saturate(ss)
|
2016-04-25 19:24:40 +00:00
|
|
|
|
2016-10-26 20:44:07 +00:00
|
|
|
By("Verifying statefulset mounted data directory is usable")
|
2017-02-09 22:05:47 +00:00
|
|
|
framework.ExpectNoError(sst.CheckMount(ss, "/data"))
|
2016-06-13 19:02:07 +00:00
|
|
|
|
2016-05-08 23:18:15 +00:00
|
|
|
cmd = "if [ \"$(cat /data/hostname)\" = \"$(hostname)\" ]; then exit 0; else exit 1; fi"
|
2016-11-22 23:35:50 +00:00
|
|
|
By("Running " + cmd + " in all stateful pods")
|
2017-02-09 22:05:47 +00:00
|
|
|
framework.ExpectNoError(sst.ExecInStatefulPods(ss, cmd))
|
2016-05-08 23:18:15 +00:00
|
|
|
})
|
2016-04-25 19:24:40 +00:00
|
|
|
|
2017-02-08 19:30:14 +00:00
|
|
|
It("should not deadlock when a pod's predecessor fails", func() {
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Creating statefulset " + ssName + " in namespace " + ns)
|
|
|
|
*(ss.Spec.Replicas) = 2
|
2017-02-09 22:05:47 +00:00
|
|
|
framework.SetStatefulSetInitializedAnnotation(ss, "false")
|
2016-11-15 22:42:36 +00:00
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
_, err := c.Apps().StatefulSets(ns).Create(ss)
|
2016-04-25 19:24:40 +00:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
2017-02-09 22:05:47 +00:00
|
|
|
sst := framework.NewStatefulSetTester(c)
|
2016-06-06 21:14:24 +00:00
|
|
|
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.WaitForRunningAndReady(1, ss)
|
2016-05-08 23:18:15 +00:00
|
|
|
|
2016-11-22 23:35:50 +00:00
|
|
|
By("Marking stateful pod at index 0 as healthy.")
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.SetHealthy(ss)
|
2016-05-08 23:18:15 +00:00
|
|
|
|
2016-11-22 23:35:50 +00:00
|
|
|
By("Waiting for stateful pod at index 1 to enter running.")
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.WaitForRunningAndReady(2, ss)
|
2016-05-08 23:18:15 +00:00
|
|
|
|
2016-11-22 23:35:50 +00:00
|
|
|
// Now we have 1 healthy and 1 unhealthy stateful pod. Deleting the healthy stateful pod should *not*
|
|
|
|
// create a new stateful pod till the remaining stateful pod becomes healthy, which won't happen till
|
2016-05-08 23:18:15 +00:00
|
|
|
// we set the healthy bit.
|
|
|
|
|
2016-11-22 23:35:50 +00:00
|
|
|
By("Deleting healthy stateful pod at index 0.")
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.DeleteStatefulPodAtIndex(0, ss)
|
2016-05-08 23:18:15 +00:00
|
|
|
|
2017-02-08 19:30:14 +00:00
|
|
|
By("Confirming stateful pod at index 0 is recreated.")
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.WaitForRunningAndReady(2, ss)
|
2016-05-08 23:18:15 +00:00
|
|
|
|
2016-11-22 23:35:50 +00:00
|
|
|
By("Deleting unhealthy stateful pod at index 1.")
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.DeleteStatefulPodAtIndex(1, ss)
|
2016-05-08 23:18:15 +00:00
|
|
|
|
2016-11-22 23:35:50 +00:00
|
|
|
By("Confirming all stateful pods in statefulset are created.")
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.Saturate(ss)
|
2016-05-08 23:18:15 +00:00
|
|
|
})
|
2016-11-15 22:42:36 +00:00
|
|
|
|
|
|
|
It("should allow template updates", func() {
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Creating stateful set " + ssName + " in namespace " + ns)
|
|
|
|
*(ss.Spec.Replicas) = 2
|
2016-11-15 22:42:36 +00:00
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
ss, err := c.Apps().StatefulSets(ns).Create(ss)
|
2016-11-15 22:42:36 +00:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
2017-02-09 22:05:47 +00:00
|
|
|
sst := framework.NewStatefulSetTester(c)
|
2016-11-15 22:42:36 +00:00
|
|
|
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.WaitForRunningAndReady(*ss.Spec.Replicas, ss)
|
2016-11-15 22:42:36 +00:00
|
|
|
|
|
|
|
newImage := newNginxImage
|
2017-01-16 07:28:32 +00:00
|
|
|
oldImage := ss.Spec.Template.Spec.Containers[0].Image
|
2016-11-15 22:42:36 +00:00
|
|
|
By(fmt.Sprintf("Updating stateful set template: update image from %s to %s", oldImage, newImage))
|
|
|
|
Expect(oldImage).NotTo(Equal(newImage), "Incorrect test setup: should update to a different image")
|
2017-01-16 07:28:32 +00:00
|
|
|
_, err = framework.UpdateStatefulSetWithRetries(c, ns, ss.Name, func(update *apps.StatefulSet) {
|
2016-11-15 22:42:36 +00:00
|
|
|
update.Spec.Template.Spec.Containers[0].Image = newImage
|
|
|
|
})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
updateIndex := 0
|
|
|
|
By(fmt.Sprintf("Deleting stateful pod at index %d", updateIndex))
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.DeleteStatefulPodAtIndex(updateIndex, ss)
|
2016-11-15 22:42:36 +00:00
|
|
|
|
|
|
|
By("Waiting for all stateful pods to be running again")
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.WaitForRunningAndReady(*ss.Spec.Replicas, ss)
|
2016-11-15 22:42:36 +00:00
|
|
|
|
|
|
|
By(fmt.Sprintf("Verifying stateful pod at index %d is updated", updateIndex))
|
2016-11-18 20:55:17 +00:00
|
|
|
verify := func(pod *v1.Pod) {
|
2016-11-15 22:42:36 +00:00
|
|
|
podImage := pod.Spec.Containers[0].Image
|
|
|
|
Expect(podImage).To(Equal(newImage), fmt.Sprintf("Expected stateful pod image %s updated to %s", podImage, newImage))
|
|
|
|
}
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.VerifyPodAtIndex(updateIndex, ss, verify)
|
2016-11-15 22:42:36 +00:00
|
|
|
})
|
2016-11-18 11:18:50 +00:00
|
|
|
|
2016-11-18 16:15:22 +00:00
|
|
|
It("Scaling down before scale up is finished should wait until current pod will be running and ready before it will be removed", func() {
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Creating stateful set " + ssName + " in namespace " + ns + ", and pausing scale operations after each pod")
|
2016-11-18 20:55:17 +00:00
|
|
|
testProbe := &v1.Probe{Handler: v1.Handler{HTTPGet: &v1.HTTPGetAction{
|
2016-11-18 16:15:22 +00:00
|
|
|
Path: "/index.html",
|
|
|
|
Port: intstr.IntOrString{IntVal: 80}}}}
|
2017-02-09 22:05:47 +00:00
|
|
|
ss := framework.NewStatefulSet(ssName, ns, headlessSvcName, 1, nil, nil, labels)
|
2017-01-16 07:28:32 +00:00
|
|
|
ss.Spec.Template.Spec.Containers[0].ReadinessProbe = testProbe
|
2017-02-09 22:05:47 +00:00
|
|
|
framework.SetStatefulSetInitializedAnnotation(ss, "false")
|
2017-01-16 07:28:32 +00:00
|
|
|
ss, err := c.Apps().StatefulSets(ns).Create(ss)
|
2016-11-18 16:15:22 +00:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2017-02-09 22:05:47 +00:00
|
|
|
sst := framework.NewStatefulSetTester(c)
|
|
|
|
sst.WaitForRunningAndReady(1, ss)
|
2016-11-18 16:15:22 +00:00
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Scaling up stateful set " + ssName + " to 3 replicas and pausing after 2nd pod")
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.SetHealthy(ss)
|
|
|
|
sst.UpdateReplicas(ss, 3)
|
|
|
|
sst.WaitForRunningAndReady(2, ss)
|
2016-11-18 16:15:22 +00:00
|
|
|
|
|
|
|
By("Before scale up finished setting 2nd pod to be not ready by breaking readiness probe")
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.BreakProbe(ss, testProbe)
|
|
|
|
sst.WaitForRunningAndNotReady(2, ss)
|
2016-11-18 16:15:22 +00:00
|
|
|
|
|
|
|
By("Continue scale operation after the 2nd pod, and scaling down to 1 replica")
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.SetHealthy(ss)
|
|
|
|
sst.UpdateReplicas(ss, 1)
|
2016-11-18 16:15:22 +00:00
|
|
|
|
|
|
|
By("Verifying that the 2nd pod wont be removed if it is not running and ready")
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.ConfirmStatefulPodCount(2, ss, 10*time.Second)
|
2017-01-16 07:28:32 +00:00
|
|
|
expectedPodName := ss.Name + "-1"
|
2016-12-07 14:40:26 +00:00
|
|
|
expectedPod, err := f.ClientSet.Core().Pods(ns).Get(expectedPodName, metav1.GetOptions{})
|
2016-11-18 16:15:22 +00:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
2017-01-22 03:36:02 +00:00
|
|
|
watcher, err := f.ClientSet.Core().Pods(ns).Watch(metav1.SingleObject(
|
2017-01-17 03:38:19 +00:00
|
|
|
metav1.ObjectMeta{
|
2016-11-18 16:15:22 +00:00
|
|
|
Name: expectedPod.Name,
|
|
|
|
ResourceVersion: expectedPod.ResourceVersion,
|
|
|
|
},
|
|
|
|
))
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
By("Verifying the 2nd pod is removed only when it becomes running and ready")
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.RestoreProbe(ss, testProbe)
|
|
|
|
_, err = watch.Until(framework.StatefulSetTimeout, watcher, func(event watch.Event) (bool, error) {
|
2016-11-18 20:55:17 +00:00
|
|
|
pod := event.Object.(*v1.Pod)
|
2016-11-18 16:15:22 +00:00
|
|
|
if event.Type == watch.Deleted && pod.Name == expectedPodName {
|
|
|
|
return false, fmt.Errorf("Pod %v was deleted before enter running", pod.Name)
|
|
|
|
}
|
|
|
|
framework.Logf("Observed event %v for pod %v. Phase %v, Pod is ready %v",
|
2016-11-18 20:55:17 +00:00
|
|
|
event.Type, pod.Name, pod.Status.Phase, v1.IsPodReady(pod))
|
2016-11-18 16:15:22 +00:00
|
|
|
if pod.Name != expectedPodName {
|
|
|
|
return false, nil
|
|
|
|
}
|
2016-11-18 20:55:17 +00:00
|
|
|
if pod.Status.Phase == v1.PodRunning && v1.IsPodReady(pod) {
|
2016-11-18 16:15:22 +00:00
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
return false, nil
|
|
|
|
})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
})
|
|
|
|
|
2016-11-22 23:35:50 +00:00
|
|
|
It("Scaling should happen in predictable order and halt if any stateful pod is unhealthy", func() {
|
2016-11-18 11:18:50 +00:00
|
|
|
psLabels := klabels.Set(labels)
|
|
|
|
By("Initializing watcher for selector " + psLabels.String())
|
2017-01-22 03:36:02 +00:00
|
|
|
watcher, err := f.ClientSet.Core().Pods(ns).Watch(metav1.ListOptions{
|
2016-11-18 20:55:17 +00:00
|
|
|
LabelSelector: psLabels.AsSelector().String(),
|
2016-11-18 11:18:50 +00:00
|
|
|
})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Creating stateful set " + ssName + " in namespace " + ns)
|
2016-11-18 20:55:17 +00:00
|
|
|
testProbe := &v1.Probe{Handler: v1.Handler{HTTPGet: &v1.HTTPGetAction{
|
2016-11-18 11:18:50 +00:00
|
|
|
Path: "/index.html",
|
|
|
|
Port: intstr.IntOrString{IntVal: 80}}}}
|
2017-02-09 22:05:47 +00:00
|
|
|
ss := framework.NewStatefulSet(ssName, ns, headlessSvcName, 1, nil, nil, psLabels)
|
2017-01-16 07:28:32 +00:00
|
|
|
ss.Spec.Template.Spec.Containers[0].ReadinessProbe = testProbe
|
|
|
|
ss, err = c.Apps().StatefulSets(ns).Create(ss)
|
2016-11-18 11:18:50 +00:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Waiting until all stateful set " + ssName + " replicas will be running in namespace " + ns)
|
2017-02-09 22:05:47 +00:00
|
|
|
sst := framework.NewStatefulSetTester(c)
|
|
|
|
sst.WaitForRunningAndReady(*ss.Spec.Replicas, ss)
|
2016-11-18 11:18:50 +00:00
|
|
|
|
2016-11-22 23:35:50 +00:00
|
|
|
By("Confirming that stateful set scale up will halt with unhealthy stateful pod")
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.BreakProbe(ss, testProbe)
|
|
|
|
sst.WaitForRunningAndNotReady(*ss.Spec.Replicas, ss)
|
|
|
|
sst.UpdateReplicas(ss, 3)
|
|
|
|
sst.ConfirmStatefulPodCount(1, ss, 10*time.Second)
|
2016-11-18 11:18:50 +00:00
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Scaling up stateful set " + ssName + " to 3 replicas and waiting until all of them will be running in namespace " + ns)
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.RestoreProbe(ss, testProbe)
|
|
|
|
sst.WaitForRunningAndReady(3, ss)
|
2016-11-18 11:18:50 +00:00
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Verifying that stateful set " + ssName + " was scaled up in order")
|
|
|
|
expectedOrder := []string{ssName + "-0", ssName + "-1", ssName + "-2"}
|
2017-02-09 22:05:47 +00:00
|
|
|
_, err = watch.Until(framework.StatefulSetTimeout, watcher, func(event watch.Event) (bool, error) {
|
2016-11-18 11:18:50 +00:00
|
|
|
if event.Type != watch.Added {
|
|
|
|
return false, nil
|
|
|
|
}
|
2016-11-18 20:55:17 +00:00
|
|
|
pod := event.Object.(*v1.Pod)
|
2016-11-18 11:18:50 +00:00
|
|
|
if pod.Name == expectedOrder[0] {
|
|
|
|
expectedOrder = expectedOrder[1:]
|
|
|
|
}
|
|
|
|
return len(expectedOrder) == 0, nil
|
|
|
|
|
|
|
|
})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
2016-11-22 23:35:50 +00:00
|
|
|
By("Scale down will halt with unhealthy stateful pod")
|
2017-01-22 03:36:02 +00:00
|
|
|
watcher, err = f.ClientSet.Core().Pods(ns).Watch(metav1.ListOptions{
|
2016-11-18 20:55:17 +00:00
|
|
|
LabelSelector: psLabels.AsSelector().String(),
|
2016-11-18 11:18:50 +00:00
|
|
|
})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.BreakProbe(ss, testProbe)
|
|
|
|
sst.WaitForRunningAndNotReady(3, ss)
|
|
|
|
sst.UpdateReplicas(ss, 0)
|
|
|
|
sst.ConfirmStatefulPodCount(3, ss, 10*time.Second)
|
2016-11-18 11:18:50 +00:00
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Scaling down stateful set " + ssName + " to 0 replicas and waiting until none of pods will run in namespace" + ns)
|
2017-02-09 22:05:47 +00:00
|
|
|
sst.RestoreProbe(ss, testProbe)
|
|
|
|
sst.Scale(ss, 0)
|
2016-11-18 11:18:50 +00:00
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Verifying that stateful set " + ssName + " was scaled down in reverse order")
|
|
|
|
expectedOrder = []string{ssName + "-2", ssName + "-1", ssName + "-0"}
|
2017-02-09 22:05:47 +00:00
|
|
|
_, err = watch.Until(framework.StatefulSetTimeout, watcher, func(event watch.Event) (bool, error) {
|
2016-11-18 11:18:50 +00:00
|
|
|
if event.Type != watch.Deleted {
|
|
|
|
return false, nil
|
|
|
|
}
|
2016-11-18 20:55:17 +00:00
|
|
|
pod := event.Object.(*v1.Pod)
|
2016-11-18 11:18:50 +00:00
|
|
|
if pod.Name == expectedOrder[0] {
|
|
|
|
expectedOrder = expectedOrder[1:]
|
|
|
|
}
|
|
|
|
return len(expectedOrder) == 0, nil
|
|
|
|
|
|
|
|
})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
})
|
2016-12-13 11:01:20 +00:00
|
|
|
|
|
|
|
It("Should recreate evicted statefulset", func() {
|
|
|
|
podName := "test-pod"
|
2017-01-16 07:28:32 +00:00
|
|
|
statefulPodName := ssName + "-0"
|
2016-12-13 11:01:20 +00:00
|
|
|
By("Looking for a node to schedule stateful set and pod")
|
|
|
|
nodes := framework.GetReadySchedulableNodesOrDie(f.ClientSet)
|
|
|
|
node := nodes.Items[0]
|
|
|
|
|
|
|
|
By("Creating pod with conflicting port in namespace " + f.Namespace.Name)
|
|
|
|
conflictingPort := v1.ContainerPort{HostPort: 21017, ContainerPort: 21017, Name: "conflict"}
|
|
|
|
pod := &v1.Pod{
|
2017-01-17 03:38:19 +00:00
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2016-12-13 11:01:20 +00:00
|
|
|
Name: podName,
|
|
|
|
},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
Containers: []v1.Container{
|
|
|
|
{
|
|
|
|
Name: "nginx",
|
|
|
|
Image: "gcr.io/google_containers/nginx-slim:0.7",
|
|
|
|
Ports: []v1.ContainerPort{conflictingPort},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
NodeName: node.Name,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
pod, err := f.ClientSet.Core().Pods(f.Namespace.Name).Create(pod)
|
|
|
|
framework.ExpectNoError(err)
|
|
|
|
|
|
|
|
By("Creating statefulset with conflicting port in namespace " + f.Namespace.Name)
|
2017-02-09 22:05:47 +00:00
|
|
|
ss := framework.NewStatefulSet(ssName, f.Namespace.Name, headlessSvcName, 1, nil, nil, labels)
|
2017-01-16 07:28:32 +00:00
|
|
|
statefulPodContainer := &ss.Spec.Template.Spec.Containers[0]
|
|
|
|
statefulPodContainer.Ports = append(statefulPodContainer.Ports, conflictingPort)
|
|
|
|
ss.Spec.Template.Spec.NodeName = node.Name
|
|
|
|
_, err = f.ClientSet.Apps().StatefulSets(f.Namespace.Name).Create(ss)
|
2016-12-13 11:01:20 +00:00
|
|
|
framework.ExpectNoError(err)
|
|
|
|
|
|
|
|
By("Waiting until pod " + podName + " will start running in namespace " + f.Namespace.Name)
|
|
|
|
if err := f.WaitForPodRunning(podName); err != nil {
|
|
|
|
framework.Failf("Pod %v did not start running: %v", podName, err)
|
|
|
|
}
|
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
var initialStatefulPodUID types.UID
|
|
|
|
By("Waiting until stateful pod " + statefulPodName + " will be recreated and deleted at least once in namespace " + f.Namespace.Name)
|
2017-01-22 03:36:02 +00:00
|
|
|
w, err := f.ClientSet.Core().Pods(f.Namespace.Name).Watch(metav1.SingleObject(metav1.ObjectMeta{Name: statefulPodName}))
|
2016-12-13 11:01:20 +00:00
|
|
|
framework.ExpectNoError(err)
|
|
|
|
// we need to get UID from pod in any state and wait until stateful set controller will remove pod atleast once
|
2017-02-09 22:05:47 +00:00
|
|
|
_, err = watch.Until(framework.StatefulPodTimeout, w, func(event watch.Event) (bool, error) {
|
2016-12-13 11:01:20 +00:00
|
|
|
pod := event.Object.(*v1.Pod)
|
|
|
|
switch event.Type {
|
|
|
|
case watch.Deleted:
|
|
|
|
framework.Logf("Observed delete event for stateful pod %v in namespace %v", pod.Name, pod.Namespace)
|
2017-01-16 07:28:32 +00:00
|
|
|
if initialStatefulPodUID == "" {
|
2016-12-13 11:01:20 +00:00
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
framework.Logf("Observed stateful pod in namespace: %v, name: %v, uid: %v, status phase: %v. Waiting for statefulset controller to delete.",
|
|
|
|
pod.Namespace, pod.Name, pod.UID, pod.Status.Phase)
|
2017-01-16 07:28:32 +00:00
|
|
|
initialStatefulPodUID = pod.UID
|
2016-12-13 11:01:20 +00:00
|
|
|
return false, nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
2017-01-16 07:28:32 +00:00
|
|
|
framework.Failf("Pod %v expected to be re-created at least once", statefulPodName)
|
2016-12-13 11:01:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
By("Removing pod with conflicting port in namespace " + f.Namespace.Name)
|
2017-01-24 15:38:21 +00:00
|
|
|
err = f.ClientSet.Core().Pods(f.Namespace.Name).Delete(pod.Name, metav1.NewDeleteOptions(0))
|
2016-12-13 11:01:20 +00:00
|
|
|
framework.ExpectNoError(err)
|
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Waiting when stateful pod " + statefulPodName + " will be recreated in namespace " + f.Namespace.Name + " and will be in running state")
|
2016-12-13 11:01:20 +00:00
|
|
|
// we may catch delete event, thats why we are waiting for running phase like this, and not with watch.Until
|
|
|
|
Eventually(func() error {
|
2017-01-16 07:28:32 +00:00
|
|
|
statefulPod, err := f.ClientSet.Core().Pods(f.Namespace.Name).Get(statefulPodName, metav1.GetOptions{})
|
2016-12-13 11:01:20 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-01-16 07:28:32 +00:00
|
|
|
if statefulPod.Status.Phase != v1.PodRunning {
|
|
|
|
return fmt.Errorf("Pod %v is not in running phase: %v", statefulPod.Name, statefulPod.Status.Phase)
|
|
|
|
} else if statefulPod.UID == initialStatefulPodUID {
|
|
|
|
return fmt.Errorf("Pod %v wasn't recreated: %v == %v", statefulPod.Name, statefulPod.UID, initialStatefulPodUID)
|
2016-12-13 11:01:20 +00:00
|
|
|
}
|
|
|
|
return nil
|
2017-02-09 22:05:47 +00:00
|
|
|
}, framework.StatefulPodTimeout, 2*time.Second).Should(BeNil())
|
2016-12-13 11:01:20 +00:00
|
|
|
})
|
2016-05-08 23:18:15 +00:00
|
|
|
})
|
|
|
|
|
2016-11-24 00:31:04 +00:00
|
|
|
framework.KubeDescribe("Deploy clustered applications [Feature:StatefulSet] [Slow]", func() {
|
2017-02-09 22:05:47 +00:00
|
|
|
var sst *framework.StatefulSetTester
|
2016-11-15 01:42:04 +00:00
|
|
|
var appTester *clusterAppTester
|
|
|
|
|
|
|
|
BeforeEach(func() {
|
2017-02-09 22:05:47 +00:00
|
|
|
sst = framework.NewStatefulSetTester(c)
|
2017-01-16 07:28:32 +00:00
|
|
|
appTester = &clusterAppTester{tester: sst, ns: ns}
|
2016-11-15 01:42:04 +00:00
|
|
|
})
|
|
|
|
|
2016-05-08 23:18:15 +00:00
|
|
|
AfterEach(func() {
|
2016-06-06 21:14:24 +00:00
|
|
|
if CurrentGinkgoTestDescription().Failed {
|
|
|
|
dumpDebugInfo(c, ns)
|
2016-05-08 23:18:15 +00:00
|
|
|
}
|
2016-10-26 20:44:07 +00:00
|
|
|
framework.Logf("Deleting all statefulset in ns %v", ns)
|
2017-02-09 22:05:47 +00:00
|
|
|
framework.DeleteAllStatefulSets(c, ns)
|
2016-05-08 23:18:15 +00:00
|
|
|
})
|
2016-04-25 19:24:40 +00:00
|
|
|
|
2016-11-21 21:45:22 +00:00
|
|
|
It("should creating a working zookeeper cluster", func() {
|
2017-01-16 07:28:32 +00:00
|
|
|
appTester.statefulPod = &zookeeperTester{tester: sst}
|
2016-11-15 01:42:04 +00:00
|
|
|
appTester.run()
|
2016-05-08 23:18:15 +00:00
|
|
|
})
|
|
|
|
|
2016-11-21 21:45:22 +00:00
|
|
|
It("should creating a working redis cluster", func() {
|
2017-01-16 07:28:32 +00:00
|
|
|
appTester.statefulPod = &redisTester{tester: sst}
|
2016-11-15 01:42:04 +00:00
|
|
|
appTester.run()
|
2016-05-08 23:18:15 +00:00
|
|
|
})
|
2016-04-25 19:24:40 +00:00
|
|
|
|
2016-11-21 21:45:22 +00:00
|
|
|
It("should creating a working mysql cluster", func() {
|
2017-01-16 07:28:32 +00:00
|
|
|
appTester.statefulPod = &mysqlGaleraTester{tester: sst}
|
2016-11-15 01:42:04 +00:00
|
|
|
appTester.run()
|
|
|
|
})
|
2016-04-25 19:24:40 +00:00
|
|
|
|
2016-11-21 21:45:22 +00:00
|
|
|
It("should creating a working CockroachDB cluster", func() {
|
2017-01-16 07:28:32 +00:00
|
|
|
appTester.statefulPod = &cockroachDBTester{tester: sst}
|
2016-11-15 01:42:04 +00:00
|
|
|
appTester.run()
|
2016-05-08 23:18:15 +00:00
|
|
|
})
|
2016-04-25 19:24:40 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2016-10-18 13:00:38 +00:00
|
|
|
func dumpDebugInfo(c clientset.Interface, ns string) {
|
2017-01-22 03:36:02 +00:00
|
|
|
sl, _ := c.Core().Pods(ns).List(metav1.ListOptions{LabelSelector: labels.Everything().String()})
|
2017-01-16 08:23:43 +00:00
|
|
|
for _, s := range sl.Items {
|
2017-01-16 07:28:32 +00:00
|
|
|
desc, _ := framework.RunKubectl("describe", "po", s.Name, fmt.Sprintf("--namespace=%v", ns))
|
|
|
|
framework.Logf("\nOutput of kubectl describe %v:\n%v", s.Name, desc)
|
2016-05-08 23:18:15 +00:00
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
l, _ := framework.RunKubectl("logs", s.Name, fmt.Sprintf("--namespace=%v", ns), "--tail=100")
|
|
|
|
framework.Logf("\nLast 100 log lines of %v:\n%v", s.Name, l)
|
2016-05-08 23:18:15 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func kubectlExecWithRetries(args ...string) (out string) {
|
|
|
|
var err error
|
|
|
|
for i := 0; i < 3; i++ {
|
|
|
|
if out, err = framework.RunKubectl(args...); err == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
framework.Logf("Retrying %v:\nerror %v\nstdout %v", args, err, out)
|
|
|
|
}
|
|
|
|
framework.Failf("Failed to execute \"%v\" with retries: %v", args, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
type statefulPodTester interface {
|
2016-10-26 20:44:07 +00:00
|
|
|
deploy(ns string) *apps.StatefulSet
|
2017-01-16 07:28:32 +00:00
|
|
|
write(statefulPodIndex int, kv map[string]string)
|
|
|
|
read(statefulPodIndex int, key string) string
|
2016-05-08 23:18:15 +00:00
|
|
|
name() string
|
|
|
|
}
|
|
|
|
|
2016-11-15 01:42:04 +00:00
|
|
|
type clusterAppTester struct {
|
2017-01-16 07:28:32 +00:00
|
|
|
ns string
|
|
|
|
statefulPod statefulPodTester
|
2017-02-09 22:05:47 +00:00
|
|
|
tester *framework.StatefulSetTester
|
2016-11-15 01:42:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *clusterAppTester) run() {
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Deploying " + c.statefulPod.name())
|
|
|
|
ss := c.statefulPod.deploy(c.ns)
|
2016-11-15 01:42:04 +00:00
|
|
|
|
|
|
|
By("Creating foo:bar in member with index 0")
|
2017-01-16 07:28:32 +00:00
|
|
|
c.statefulPod.write(0, map[string]string{"foo": "bar"})
|
2016-11-15 01:42:04 +00:00
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
switch c.statefulPod.(type) {
|
2016-11-16 19:39:05 +00:00
|
|
|
case *mysqlGaleraTester:
|
|
|
|
// Don't restart MySQL cluster since it doesn't handle restarts well
|
|
|
|
default:
|
|
|
|
if restartCluster {
|
2017-01-16 07:28:32 +00:00
|
|
|
By("Restarting stateful set " + ss.Name)
|
2017-02-09 22:05:47 +00:00
|
|
|
c.tester.Restart(ss)
|
|
|
|
c.tester.WaitForRunningAndReady(*ss.Spec.Replicas, ss)
|
2016-11-16 19:39:05 +00:00
|
|
|
}
|
2016-11-15 01:42:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
By("Reading value under foo from member with index 2")
|
2017-01-16 07:28:32 +00:00
|
|
|
if err := pollReadWithTimeout(c.statefulPod, 2, "foo", "bar"); err != nil {
|
2016-11-15 01:42:04 +00:00
|
|
|
framework.Failf("%v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-08 23:18:15 +00:00
|
|
|
type zookeeperTester struct {
|
2017-01-16 07:28:32 +00:00
|
|
|
ss *apps.StatefulSet
|
2017-02-09 22:05:47 +00:00
|
|
|
tester *framework.StatefulSetTester
|
2016-05-08 23:18:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (z *zookeeperTester) name() string {
|
|
|
|
return "zookeeper"
|
|
|
|
}
|
|
|
|
|
2016-10-26 20:44:07 +00:00
|
|
|
func (z *zookeeperTester) deploy(ns string) *apps.StatefulSet {
|
2017-02-09 22:05:47 +00:00
|
|
|
z.ss = z.tester.CreateStatefulSet(zookeeperManifestPath, ns)
|
2017-01-16 07:28:32 +00:00
|
|
|
return z.ss
|
2016-05-08 23:18:15 +00:00
|
|
|
}
|
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
func (z *zookeeperTester) write(statefulPodIndex int, kv map[string]string) {
|
|
|
|
name := fmt.Sprintf("%v-%d", z.ss.Name, statefulPodIndex)
|
|
|
|
ns := fmt.Sprintf("--namespace=%v", z.ss.Namespace)
|
2016-05-08 23:18:15 +00:00
|
|
|
for k, v := range kv {
|
|
|
|
cmd := fmt.Sprintf("/opt/zookeeper/bin/zkCli.sh create /%v %v", k, v)
|
|
|
|
framework.Logf(framework.RunKubectlOrDie("exec", ns, name, "--", "/bin/sh", "-c", cmd))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
func (z *zookeeperTester) read(statefulPodIndex int, key string) string {
|
|
|
|
name := fmt.Sprintf("%v-%d", z.ss.Name, statefulPodIndex)
|
|
|
|
ns := fmt.Sprintf("--namespace=%v", z.ss.Namespace)
|
2016-05-08 23:18:15 +00:00
|
|
|
cmd := fmt.Sprintf("/opt/zookeeper/bin/zkCli.sh get /%v", key)
|
|
|
|
return lastLine(framework.RunKubectlOrDie("exec", ns, name, "--", "/bin/sh", "-c", cmd))
|
|
|
|
}
|
|
|
|
|
|
|
|
type mysqlGaleraTester struct {
|
2017-01-16 07:28:32 +00:00
|
|
|
ss *apps.StatefulSet
|
2017-02-09 22:05:47 +00:00
|
|
|
tester *framework.StatefulSetTester
|
2016-05-08 23:18:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (m *mysqlGaleraTester) name() string {
|
|
|
|
return "mysql: galera"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *mysqlGaleraTester) mysqlExec(cmd, ns, podName string) string {
|
|
|
|
cmd = fmt.Sprintf("/usr/bin/mysql -u root -B -e '%v'", cmd)
|
|
|
|
// TODO: Find a readiness probe for mysql that guarantees writes will
|
|
|
|
// succeed and ditch retries. Current probe only reads, so there's a window
|
|
|
|
// for a race.
|
|
|
|
return kubectlExecWithRetries(fmt.Sprintf("--namespace=%v", ns), "exec", podName, "--", "/bin/sh", "-c", cmd)
|
|
|
|
}
|
|
|
|
|
2016-10-26 20:44:07 +00:00
|
|
|
func (m *mysqlGaleraTester) deploy(ns string) *apps.StatefulSet {
|
2017-02-09 22:05:47 +00:00
|
|
|
m.ss = m.tester.CreateStatefulSet(mysqlGaleraManifestPath, ns)
|
2016-05-08 23:18:15 +00:00
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
framework.Logf("Deployed statefulset %v, initializing database", m.ss.Name)
|
2016-05-08 23:18:15 +00:00
|
|
|
for _, cmd := range []string{
|
2016-10-26 20:44:07 +00:00
|
|
|
"create database statefulset;",
|
2016-11-22 23:35:50 +00:00
|
|
|
"use statefulset; create table foo (k varchar(20), v varchar(20));",
|
2016-05-08 23:18:15 +00:00
|
|
|
} {
|
2017-01-16 07:28:32 +00:00
|
|
|
framework.Logf(m.mysqlExec(cmd, ns, fmt.Sprintf("%v-0", m.ss.Name)))
|
2016-05-08 23:18:15 +00:00
|
|
|
}
|
2017-01-16 07:28:32 +00:00
|
|
|
return m.ss
|
2016-05-08 23:18:15 +00:00
|
|
|
}
|
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
func (m *mysqlGaleraTester) write(statefulPodIndex int, kv map[string]string) {
|
|
|
|
name := fmt.Sprintf("%v-%d", m.ss.Name, statefulPodIndex)
|
2016-05-08 23:18:15 +00:00
|
|
|
for k, v := range kv {
|
2016-11-22 23:35:50 +00:00
|
|
|
cmd := fmt.Sprintf("use statefulset; insert into foo (k, v) values (\"%v\", \"%v\");", k, v)
|
2017-01-16 07:28:32 +00:00
|
|
|
framework.Logf(m.mysqlExec(cmd, m.ss.Namespace, name))
|
2016-05-08 23:18:15 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
func (m *mysqlGaleraTester) read(statefulPodIndex int, key string) string {
|
|
|
|
name := fmt.Sprintf("%v-%d", m.ss.Name, statefulPodIndex)
|
|
|
|
return lastLine(m.mysqlExec(fmt.Sprintf("use statefulset; select v from foo where k=\"%v\";", key), m.ss.Namespace, name))
|
2016-05-08 23:18:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type redisTester struct {
|
2017-01-16 07:28:32 +00:00
|
|
|
ss *apps.StatefulSet
|
2017-02-09 22:05:47 +00:00
|
|
|
tester *framework.StatefulSetTester
|
2016-05-08 23:18:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (m *redisTester) name() string {
|
|
|
|
return "redis: master/slave"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *redisTester) redisExec(cmd, ns, podName string) string {
|
|
|
|
cmd = fmt.Sprintf("/opt/redis/redis-cli -h %v %v", podName, cmd)
|
|
|
|
return framework.RunKubectlOrDie(fmt.Sprintf("--namespace=%v", ns), "exec", podName, "--", "/bin/sh", "-c", cmd)
|
|
|
|
}
|
|
|
|
|
2016-10-26 20:44:07 +00:00
|
|
|
func (m *redisTester) deploy(ns string) *apps.StatefulSet {
|
2017-02-09 22:05:47 +00:00
|
|
|
m.ss = m.tester.CreateStatefulSet(redisManifestPath, ns)
|
2017-01-16 07:28:32 +00:00
|
|
|
return m.ss
|
2016-05-08 23:18:15 +00:00
|
|
|
}
|
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
func (m *redisTester) write(statefulPodIndex int, kv map[string]string) {
|
|
|
|
name := fmt.Sprintf("%v-%d", m.ss.Name, statefulPodIndex)
|
2016-05-08 23:18:15 +00:00
|
|
|
for k, v := range kv {
|
2017-01-16 07:28:32 +00:00
|
|
|
framework.Logf(m.redisExec(fmt.Sprintf("SET %v %v", k, v), m.ss.Namespace, name))
|
2016-05-08 23:18:15 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
func (m *redisTester) read(statefulPodIndex int, key string) string {
|
|
|
|
name := fmt.Sprintf("%v-%d", m.ss.Name, statefulPodIndex)
|
|
|
|
return lastLine(m.redisExec(fmt.Sprintf("GET %v", key), m.ss.Namespace, name))
|
2016-05-08 23:18:15 +00:00
|
|
|
}
|
|
|
|
|
2016-11-15 01:42:04 +00:00
|
|
|
type cockroachDBTester struct {
|
2017-01-16 07:28:32 +00:00
|
|
|
ss *apps.StatefulSet
|
2017-02-09 22:05:47 +00:00
|
|
|
tester *framework.StatefulSetTester
|
2016-11-15 01:42:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *cockroachDBTester) name() string {
|
|
|
|
return "CockroachDB"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *cockroachDBTester) cockroachDBExec(cmd, ns, podName string) string {
|
|
|
|
cmd = fmt.Sprintf("/cockroach/cockroach sql --host %s.cockroachdb -e \"%v\"", podName, cmd)
|
|
|
|
return framework.RunKubectlOrDie(fmt.Sprintf("--namespace=%v", ns), "exec", podName, "--", "/bin/sh", "-c", cmd)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *cockroachDBTester) deploy(ns string) *apps.StatefulSet {
|
2017-02-09 22:05:47 +00:00
|
|
|
c.ss = c.tester.CreateStatefulSet(cockroachDBManifestPath, ns)
|
2017-01-16 07:28:32 +00:00
|
|
|
framework.Logf("Deployed statefulset %v, initializing database", c.ss.Name)
|
2016-11-15 01:42:04 +00:00
|
|
|
for _, cmd := range []string{
|
|
|
|
"CREATE DATABASE IF NOT EXISTS foo;",
|
|
|
|
"CREATE TABLE IF NOT EXISTS foo.bar (k STRING PRIMARY KEY, v STRING);",
|
|
|
|
} {
|
2017-01-16 07:28:32 +00:00
|
|
|
framework.Logf(c.cockroachDBExec(cmd, ns, fmt.Sprintf("%v-0", c.ss.Name)))
|
2016-11-15 01:42:04 +00:00
|
|
|
}
|
2017-01-16 07:28:32 +00:00
|
|
|
return c.ss
|
2016-11-15 01:42:04 +00:00
|
|
|
}
|
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
func (c *cockroachDBTester) write(statefulPodIndex int, kv map[string]string) {
|
|
|
|
name := fmt.Sprintf("%v-%d", c.ss.Name, statefulPodIndex)
|
2016-11-15 01:42:04 +00:00
|
|
|
for k, v := range kv {
|
|
|
|
cmd := fmt.Sprintf("UPSERT INTO foo.bar VALUES ('%v', '%v');", k, v)
|
2017-01-16 07:28:32 +00:00
|
|
|
framework.Logf(c.cockroachDBExec(cmd, c.ss.Namespace, name))
|
2016-11-15 01:42:04 +00:00
|
|
|
}
|
|
|
|
}
|
2017-01-16 07:28:32 +00:00
|
|
|
func (c *cockroachDBTester) read(statefulPodIndex int, key string) string {
|
|
|
|
name := fmt.Sprintf("%v-%d", c.ss.Name, statefulPodIndex)
|
|
|
|
return lastLine(c.cockroachDBExec(fmt.Sprintf("SELECT v FROM foo.bar WHERE k='%v';", key), c.ss.Namespace, name))
|
2016-11-15 01:42:04 +00:00
|
|
|
}
|
|
|
|
|
2016-05-08 23:18:15 +00:00
|
|
|
func lastLine(out string) string {
|
|
|
|
outLines := strings.Split(strings.Trim(out, "\n"), "\n")
|
|
|
|
return outLines[len(outLines)-1]
|
|
|
|
}
|
|
|
|
|
2017-01-16 07:28:32 +00:00
|
|
|
func pollReadWithTimeout(statefulPod statefulPodTester, statefulPodNumber int, key, expectedVal string) error {
|
2016-10-20 01:47:46 +00:00
|
|
|
err := wait.PollImmediate(time.Second, readTimeout, func() (bool, error) {
|
2017-01-16 07:28:32 +00:00
|
|
|
val := statefulPod.read(statefulPodNumber, key)
|
2016-10-19 21:08:33 +00:00
|
|
|
if val == "" {
|
|
|
|
return false, nil
|
|
|
|
} else if val != expectedVal {
|
2016-10-20 01:47:46 +00:00
|
|
|
return false, fmt.Errorf("expected value %v, found %v", expectedVal, val)
|
2016-10-19 21:08:33 +00:00
|
|
|
}
|
|
|
|
return true, nil
|
|
|
|
})
|
2016-10-20 01:47:46 +00:00
|
|
|
|
|
|
|
if err == wait.ErrWaitTimeout {
|
2017-01-16 07:28:32 +00:00
|
|
|
return fmt.Errorf("timed out when trying to read value for key %v from stateful pod %d", key, statefulPodNumber)
|
2016-10-20 01:47:46 +00:00
|
|
|
}
|
|
|
|
return err
|
2016-10-19 21:08:33 +00:00
|
|
|
}
|