mirror of https://github.com/k3s-io/k3s
add dockershim checkpoint node e2e test
parent
cb1f5605a6
commit
6da0c11063
|
@ -185,6 +185,7 @@ docker-exec-handler
|
|||
docker-password
|
||||
docker-server
|
||||
docker-username
|
||||
dockershim-checkpoint-dir
|
||||
driver-port
|
||||
drop-embedded-fields
|
||||
dry-run
|
||||
|
|
|
@ -39,7 +39,8 @@ type TestContextType struct {
|
|||
CertDir string
|
||||
Host string
|
||||
// TODO: Deprecating this over time... instead just use gobindata_util.go , see #23987.
|
||||
RepoRoot string
|
||||
RepoRoot string
|
||||
DockershimCheckpointDir string
|
||||
|
||||
Provider string
|
||||
CloudConfig CloudConfig
|
||||
|
@ -181,6 +182,7 @@ func RegisterCommonFlags() {
|
|||
flag.StringVar(&TestContext.ContainerRuntime, "container-runtime", "docker", "The container runtime of cluster VM instances (docker/rkt/remote).")
|
||||
flag.StringVar(&TestContext.ContainerRuntimeEndpoint, "container-runtime-endpoint", "", "The container runtime endpoint of cluster VM instances.")
|
||||
flag.StringVar(&TestContext.ImageServiceEndpoint, "image-service-endpoint", "", "The image service endpoint of cluster VM instances.")
|
||||
flag.StringVar(&TestContext.DockershimCheckpointDir, "dockershim-checkpoint-dir", "/var/lib/dockershim/sandbox", "The directory for dockershim to store sandbox checkpoints.")
|
||||
}
|
||||
|
||||
// Register flags specific to the cluster e2e test suite.
|
||||
|
|
|
@ -70,6 +70,7 @@ go_test(
|
|||
"critical_pod_test.go",
|
||||
"density_test.go",
|
||||
"disk_eviction_test.go",
|
||||
"dockershim_checkpoint_test.go",
|
||||
"dynamic_kubelet_configuration_test.go",
|
||||
"e2e_node_suite_test.go",
|
||||
"garbage_collector_test.go",
|
||||
|
@ -138,6 +139,7 @@ go_test(
|
|||
"//vendor/k8s.io/apimachinery/pkg/util/intstr:go_default_library",
|
||||
"//vendor/k8s.io/apimachinery/pkg/util/sets:go_default_library",
|
||||
"//vendor/k8s.io/apimachinery/pkg/util/uuid:go_default_library",
|
||||
"//vendor/k8s.io/apimachinery/pkg/util/wait:go_default_library",
|
||||
"//vendor/k8s.io/apimachinery/pkg/watch:go_default_library",
|
||||
"//vendor/k8s.io/apiserver/pkg/util/feature:go_default_library",
|
||||
"//vendor/k8s.io/client-go/tools/cache:go_default_library",
|
||||
|
|
|
@ -0,0 +1,224 @@
|
|||
/*
|
||||
Copyright 2017 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package e2e_node
|
||||
|
||||
import (
|
||||
"crypto/md5"
|
||||
"fmt"
|
||||
"os"
|
||||
"os/exec"
|
||||
"path"
|
||||
"regexp"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
. "github.com/onsi/ginkgo"
|
||||
. "github.com/onsi/gomega"
|
||||
"k8s.io/api/core/v1"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/util/uuid"
|
||||
"k8s.io/apimachinery/pkg/util/wait"
|
||||
"k8s.io/kubernetes/test/e2e/framework"
|
||||
)
|
||||
|
||||
const (
|
||||
testCheckpoint = "checkpoint-test"
|
||||
// Container GC Period is 1 minute
|
||||
gcTimeout = 3 * time.Minute
|
||||
testCheckpointContent = `{"version":"v1","name":"fluentd-gcp-v2.0-vmnqx","namespace":"kube-system","data":{},"checksum":1799154314}`
|
||||
)
|
||||
|
||||
var _ = framework.KubeDescribe("Dockershim [Serial] [Disruptive] [Feature:Docker]", func() {
|
||||
f := framework.NewDefaultFramework("dockerhism-checkpoint-test")
|
||||
|
||||
It("should clean up pod sandbox checkpoint after pod deletion", func() {
|
||||
podName := "pod-checkpoint-no-disrupt"
|
||||
runPodCheckpointTest(f, podName, func() {
|
||||
checkpoints := findCheckpoints(podName)
|
||||
if len(checkpoints) == 0 {
|
||||
framework.Failf("No checkpoint for the pod was found")
|
||||
}
|
||||
})
|
||||
})
|
||||
|
||||
It("should remove dangling checkpoint file", func() {
|
||||
filename := fmt.Sprintf("%x", md5.Sum([]byte(fmt.Sprintf("%s/%s", testCheckpoint, f.Namespace.Name))))
|
||||
fullpath := path.Join(framework.TestContext.DockershimCheckpointDir, filename)
|
||||
|
||||
By(fmt.Sprintf("Write a file at %q", fullpath))
|
||||
err := writeFileAndSync(fullpath, []byte(testCheckpointContent))
|
||||
framework.ExpectNoError(err, "Failed to create file %q", fullpath)
|
||||
|
||||
By("Check if file is removed")
|
||||
Eventually(func() bool {
|
||||
if _, err := os.Stat(fullpath); os.IsNotExist(err) {
|
||||
return true
|
||||
}
|
||||
return false
|
||||
}, gcTimeout, 10*time.Second).Should(BeTrue())
|
||||
|
||||
})
|
||||
|
||||
Context("When pod sandbox checkpoint is missing", func() {
|
||||
It("should complete pod sandbox clean up", func() {
|
||||
podName := "pod-checkpoint-missing"
|
||||
runPodCheckpointTest(f, podName, func() {
|
||||
checkpoints := findCheckpoints(podName)
|
||||
if len(checkpoints) == 0 {
|
||||
framework.Failf("No checkpoint for the pod was found")
|
||||
}
|
||||
By("Removing checkpoint of test pod")
|
||||
for _, filename := range checkpoints {
|
||||
if len(filename) == 0 {
|
||||
continue
|
||||
}
|
||||
framework.Logf("Removing checkpiont %q", filename)
|
||||
_, err := exec.Command("sudo", "rm", filename).CombinedOutput()
|
||||
framework.ExpectNoError(err, "Failed to remove checkpoint file %q: %v", string(filename), err)
|
||||
}
|
||||
})
|
||||
})
|
||||
})
|
||||
|
||||
Context("When all containers in pod are missing", func() {
|
||||
It("should complete pod sandbox clean up based on the information in sandbox checkpoint", func() {
|
||||
runPodCheckpointTest(f, "pod-containers-missing", func() {
|
||||
By("Gathering pod container ids")
|
||||
stdout, err := exec.Command("sudo", "docker", "ps", "-q", "-f",
|
||||
fmt.Sprintf("name=%s", f.Namespace.Name)).CombinedOutput()
|
||||
framework.ExpectNoError(err, "Failed to run docker ps: %v", err)
|
||||
lines := strings.Split(string(stdout), "\n")
|
||||
ids := []string{}
|
||||
for _, id := range lines {
|
||||
id = cleanString(id)
|
||||
if len(id) > 0 {
|
||||
ids = append(ids, id)
|
||||
}
|
||||
}
|
||||
|
||||
By("Stop and remove pod containers")
|
||||
dockerStopCmd := append([]string{"docker", "stop"}, ids...)
|
||||
_, err = exec.Command("sudo", dockerStopCmd...).CombinedOutput()
|
||||
framework.ExpectNoError(err, "Failed to run command %v: %v", dockerStopCmd, err)
|
||||
dockerRmCmd := append([]string{"docker", "rm"}, ids...)
|
||||
_, err = exec.Command("sudo", dockerRmCmd...).CombinedOutput()
|
||||
framework.ExpectNoError(err, "Failed to run command %v: %v", dockerRmCmd, err)
|
||||
})
|
||||
})
|
||||
})
|
||||
|
||||
Context("When checkpoint file is corrupted", func() {
|
||||
It("should complete pod sandbox clean up", func() {
|
||||
podName := "pod-checkpoint-corrupted"
|
||||
runPodCheckpointTest(f, podName, func() {
|
||||
By("Corrupt checkpoint file")
|
||||
checkpoints := findCheckpoints(podName)
|
||||
if len(checkpoints) == 0 {
|
||||
framework.Failf("No checkpoint for the pod was found")
|
||||
}
|
||||
for _, file := range checkpoints {
|
||||
f, err := os.OpenFile(file, os.O_WRONLY|os.O_APPEND, 0644)
|
||||
framework.ExpectNoError(err, "Failed to open file %q", file)
|
||||
_, err = f.WriteString("blabblab")
|
||||
framework.ExpectNoError(err, "Failed to write to file %q", file)
|
||||
f.Sync()
|
||||
f.Close()
|
||||
}
|
||||
})
|
||||
})
|
||||
})
|
||||
})
|
||||
|
||||
func runPodCheckpointTest(f *framework.Framework, podName string, twist func()) {
|
||||
podName = podName + string(uuid.NewUUID())
|
||||
By(fmt.Sprintf("Creating test pod: %s", podName))
|
||||
f.PodClient().CreateSync(&v1.Pod{
|
||||
ObjectMeta: metav1.ObjectMeta{Name: podName},
|
||||
Spec: v1.PodSpec{
|
||||
Containers: []v1.Container{
|
||||
{
|
||||
Image: framework.GetPauseImageName(f.ClientSet),
|
||||
Name: "pause-container",
|
||||
},
|
||||
},
|
||||
},
|
||||
})
|
||||
|
||||
By("Performing disruptive operations")
|
||||
twist()
|
||||
|
||||
By("Remove test pod")
|
||||
f.PodClient().DeleteSync(podName, &metav1.DeleteOptions{}, framework.DefaultPodDeletionTimeout)
|
||||
|
||||
By("Waiting for checkpoint to be removed")
|
||||
if err := wait.PollImmediate(10*time.Second, gcTimeout, func() (bool, error) {
|
||||
checkpoints := findCheckpoints(podName)
|
||||
if len(checkpoints) == 0 {
|
||||
return true, nil
|
||||
}
|
||||
framework.Logf("Checkpoint of %q still exists: %v", podName, checkpoints)
|
||||
return false, nil
|
||||
}); err != nil {
|
||||
framework.Failf("Failed to observe checkpoint being removed within timeout: %v", err)
|
||||
}
|
||||
}
|
||||
|
||||
// cleanString cleans up any trailing spaces and new line character for the input string
|
||||
func cleanString(output string) string {
|
||||
processed := strings.TrimSpace(string(output))
|
||||
regex := regexp.MustCompile(`\r?\n`)
|
||||
processed = regex.ReplaceAllString(processed, "")
|
||||
return processed
|
||||
}
|
||||
|
||||
func writeFileAndSync(path string, data []byte) error {
|
||||
f, err := os.OpenFile(path, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0644)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
_, err = f.Write(data)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
f.Sync()
|
||||
if err1 := f.Close(); err == nil {
|
||||
err = err1
|
||||
}
|
||||
return err
|
||||
}
|
||||
|
||||
// findCheckpoints returns all checkpoint files containing input string
|
||||
func findCheckpoints(match string) []string {
|
||||
By(fmt.Sprintf("Search checkpoints containing %q", match))
|
||||
checkpoints := []string{}
|
||||
stdout, err := exec.Command("sudo", "grep", "-rl", match, framework.TestContext.DockershimCheckpointDir).CombinedOutput()
|
||||
if err != nil {
|
||||
framework.Logf("grep from dockershim checkpoint directory returns error: %v", err)
|
||||
}
|
||||
if stdout == nil {
|
||||
return checkpoints
|
||||
}
|
||||
files := strings.Split(string(stdout), "\n")
|
||||
for _, file := range files {
|
||||
cleaned := cleanString(file)
|
||||
if len(cleaned) == 0 {
|
||||
continue
|
||||
}
|
||||
checkpoints = append(checkpoints, cleaned)
|
||||
}
|
||||
return checkpoints
|
||||
}
|
Loading…
Reference in New Issue