8e5b17cf13
Signed-off-by: Mrunal Patel <mrunalp@gmail.com>
1146 lines
40 KiB
Go
1146 lines
40 KiB
Go
/*
|
|
Copyright 2014 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package e2e
|
|
|
|
import (
|
|
"fmt"
|
|
"io/ioutil"
|
|
"path/filepath"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
inf "gopkg.in/inf.v0"
|
|
|
|
. "github.com/onsi/ginkgo"
|
|
. "github.com/onsi/gomega"
|
|
apierrs "k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/labels"
|
|
klabels "k8s.io/apimachinery/pkg/labels"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/apimachinery/pkg/types"
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
utilyaml "k8s.io/apimachinery/pkg/util/yaml"
|
|
"k8s.io/apimachinery/pkg/watch"
|
|
"k8s.io/kubernetes/pkg/api"
|
|
"k8s.io/kubernetes/pkg/api/resource"
|
|
"k8s.io/kubernetes/pkg/api/v1"
|
|
apps "k8s.io/kubernetes/pkg/apis/apps/v1beta1"
|
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
|
"k8s.io/kubernetes/pkg/controller/petset"
|
|
"k8s.io/kubernetes/pkg/util/intstr"
|
|
"k8s.io/kubernetes/test/e2e/framework"
|
|
)
|
|
|
|
const (
|
|
statefulsetPoll = 10 * time.Second
|
|
// Some pets install base packages via wget
|
|
statefulsetTimeout = 10 * time.Minute
|
|
// Timeout for stateful pods to change state
|
|
petPodTimeout = 5 * time.Minute
|
|
zookeeperManifestPath = "test/e2e/testing-manifests/petset/zookeeper"
|
|
mysqlGaleraManifestPath = "test/e2e/testing-manifests/petset/mysql-galera"
|
|
redisManifestPath = "test/e2e/testing-manifests/petset/redis"
|
|
cockroachDBManifestPath = "test/e2e/testing-manifests/petset/cockroachdb"
|
|
// We don't restart MySQL cluster regardless of restartCluster, since MySQL doesn't handle restart well
|
|
restartCluster = true
|
|
|
|
// Timeout for reads from databases running on stateful pods.
|
|
readTimeout = 60 * time.Second
|
|
)
|
|
|
|
// GCE Quota requirements: 3 pds, one per stateful pod manifest declared above.
|
|
// GCE Api requirements: nodes and master need storage r/w permissions.
|
|
var _ = framework.KubeDescribe("StatefulSet", func() {
|
|
f := framework.NewDefaultFramework("statefulset")
|
|
var ns string
|
|
var c clientset.Interface
|
|
|
|
BeforeEach(func() {
|
|
c = f.ClientSet
|
|
ns = f.Namespace.Name
|
|
})
|
|
|
|
framework.KubeDescribe("Basic StatefulSet functionality", func() {
|
|
psName := "ss"
|
|
labels := map[string]string{
|
|
"foo": "bar",
|
|
"baz": "blah",
|
|
}
|
|
headlessSvcName := "test"
|
|
var petMounts, podMounts []v1.VolumeMount
|
|
var ps *apps.StatefulSet
|
|
|
|
BeforeEach(func() {
|
|
petMounts = []v1.VolumeMount{{Name: "datadir", MountPath: "/data/"}}
|
|
podMounts = []v1.VolumeMount{{Name: "home", MountPath: "/home"}}
|
|
ps = newStatefulSet(psName, ns, headlessSvcName, 2, petMounts, podMounts, labels)
|
|
|
|
By("Creating service " + headlessSvcName + " in namespace " + ns)
|
|
headlessService := createServiceSpec(headlessSvcName, "", true, labels)
|
|
_, err := c.Core().Services(ns).Create(headlessService)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
})
|
|
|
|
AfterEach(func() {
|
|
if CurrentGinkgoTestDescription().Failed {
|
|
dumpDebugInfo(c, ns)
|
|
}
|
|
framework.Logf("Deleting all statefulset in ns %v", ns)
|
|
deleteAllStatefulSets(c, ns)
|
|
})
|
|
|
|
It("should provide basic identity", func() {
|
|
By("Creating statefulset " + psName + " in namespace " + ns)
|
|
*(ps.Spec.Replicas) = 3
|
|
setInitializedAnnotation(ps, "false")
|
|
|
|
_, err := c.Apps().StatefulSets(ns).Create(ps)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
pst := statefulSetTester{c: c}
|
|
|
|
By("Saturating stateful set " + ps.Name)
|
|
pst.saturate(ps)
|
|
|
|
By("Verifying statefulset mounted data directory is usable")
|
|
framework.ExpectNoError(pst.checkMount(ps, "/data"))
|
|
|
|
By("Verifying statefulset provides a stable hostname for each pod")
|
|
framework.ExpectNoError(pst.checkHostname(ps))
|
|
|
|
cmd := "echo $(hostname) > /data/hostname; sync;"
|
|
By("Running " + cmd + " in all stateful pods")
|
|
framework.ExpectNoError(pst.execInPets(ps, cmd))
|
|
|
|
By("Restarting statefulset " + ps.Name)
|
|
pst.restart(ps)
|
|
pst.saturate(ps)
|
|
|
|
By("Verifying statefulset mounted data directory is usable")
|
|
framework.ExpectNoError(pst.checkMount(ps, "/data"))
|
|
|
|
cmd = "if [ \"$(cat /data/hostname)\" = \"$(hostname)\" ]; then exit 0; else exit 1; fi"
|
|
By("Running " + cmd + " in all stateful pods")
|
|
framework.ExpectNoError(pst.execInPets(ps, cmd))
|
|
})
|
|
|
|
It("should handle healthy stateful pod restarts during scale", func() {
|
|
By("Creating statefulset " + psName + " in namespace " + ns)
|
|
*(ps.Spec.Replicas) = 2
|
|
setInitializedAnnotation(ps, "false")
|
|
|
|
_, err := c.Apps().StatefulSets(ns).Create(ps)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
pst := statefulSetTester{c: c}
|
|
|
|
pst.waitForRunningAndReady(1, ps)
|
|
|
|
By("Marking stateful pod at index 0 as healthy.")
|
|
pst.setHealthy(ps)
|
|
|
|
By("Waiting for stateful pod at index 1 to enter running.")
|
|
pst.waitForRunningAndReady(2, ps)
|
|
|
|
// Now we have 1 healthy and 1 unhealthy stateful pod. Deleting the healthy stateful pod should *not*
|
|
// create a new stateful pod till the remaining stateful pod becomes healthy, which won't happen till
|
|
// we set the healthy bit.
|
|
|
|
By("Deleting healthy stateful pod at index 0.")
|
|
pst.deletePetAtIndex(0, ps)
|
|
|
|
By("Confirming stateful pod at index 0 is not recreated.")
|
|
pst.confirmPetCount(1, ps, 10*time.Second)
|
|
|
|
By("Deleting unhealthy stateful pod at index 1.")
|
|
pst.deletePetAtIndex(1, ps)
|
|
|
|
By("Confirming all stateful pods in statefulset are created.")
|
|
pst.saturate(ps)
|
|
})
|
|
|
|
It("should allow template updates", func() {
|
|
By("Creating stateful set " + psName + " in namespace " + ns)
|
|
*(ps.Spec.Replicas) = 2
|
|
|
|
ps, err := c.Apps().StatefulSets(ns).Create(ps)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
pst := statefulSetTester{c: c}
|
|
|
|
pst.waitForRunningAndReady(*ps.Spec.Replicas, ps)
|
|
|
|
newImage := newNginxImage
|
|
oldImage := ps.Spec.Template.Spec.Containers[0].Image
|
|
By(fmt.Sprintf("Updating stateful set template: update image from %s to %s", oldImage, newImage))
|
|
Expect(oldImage).NotTo(Equal(newImage), "Incorrect test setup: should update to a different image")
|
|
_, err = framework.UpdateStatefulSetWithRetries(c, ns, ps.Name, func(update *apps.StatefulSet) {
|
|
update.Spec.Template.Spec.Containers[0].Image = newImage
|
|
})
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
updateIndex := 0
|
|
By(fmt.Sprintf("Deleting stateful pod at index %d", updateIndex))
|
|
pst.deletePetAtIndex(updateIndex, ps)
|
|
|
|
By("Waiting for all stateful pods to be running again")
|
|
pst.waitForRunningAndReady(*ps.Spec.Replicas, ps)
|
|
|
|
By(fmt.Sprintf("Verifying stateful pod at index %d is updated", updateIndex))
|
|
verify := func(pod *v1.Pod) {
|
|
podImage := pod.Spec.Containers[0].Image
|
|
Expect(podImage).To(Equal(newImage), fmt.Sprintf("Expected stateful pod image %s updated to %s", podImage, newImage))
|
|
}
|
|
pst.verifyPodAtIndex(updateIndex, ps, verify)
|
|
})
|
|
|
|
It("Scaling down before scale up is finished should wait until current pod will be running and ready before it will be removed", func() {
|
|
By("Creating stateful set " + psName + " in namespace " + ns + ", and pausing scale operations after each pod")
|
|
testProbe := &v1.Probe{Handler: v1.Handler{HTTPGet: &v1.HTTPGetAction{
|
|
Path: "/index.html",
|
|
Port: intstr.IntOrString{IntVal: 80}}}}
|
|
ps := newStatefulSet(psName, ns, headlessSvcName, 1, nil, nil, labels)
|
|
ps.Spec.Template.Spec.Containers[0].ReadinessProbe = testProbe
|
|
setInitializedAnnotation(ps, "false")
|
|
ps, err := c.Apps().StatefulSets(ns).Create(ps)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
pst := &statefulSetTester{c: c}
|
|
pst.waitForRunningAndReady(1, ps)
|
|
|
|
By("Scaling up stateful set " + psName + " to 3 replicas and pausing after 2nd pod")
|
|
pst.setHealthy(ps)
|
|
pst.updateReplicas(ps, 3)
|
|
pst.waitForRunningAndReady(2, ps)
|
|
|
|
By("Before scale up finished setting 2nd pod to be not ready by breaking readiness probe")
|
|
pst.breakProbe(ps, testProbe)
|
|
pst.waitForRunningAndNotReady(2, ps)
|
|
|
|
By("Continue scale operation after the 2nd pod, and scaling down to 1 replica")
|
|
pst.setHealthy(ps)
|
|
pst.updateReplicas(ps, 1)
|
|
|
|
By("Verifying that the 2nd pod wont be removed if it is not running and ready")
|
|
pst.confirmPetCount(2, ps, 10*time.Second)
|
|
expectedPodName := ps.Name + "-1"
|
|
expectedPod, err := f.ClientSet.Core().Pods(ns).Get(expectedPodName, metav1.GetOptions{})
|
|
Expect(err).NotTo(HaveOccurred())
|
|
watcher, err := f.ClientSet.Core().Pods(ns).Watch(v1.SingleObject(
|
|
v1.ObjectMeta{
|
|
Name: expectedPod.Name,
|
|
ResourceVersion: expectedPod.ResourceVersion,
|
|
},
|
|
))
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
By("Verifying the 2nd pod is removed only when it becomes running and ready")
|
|
pst.restoreProbe(ps, testProbe)
|
|
_, err = watch.Until(statefulsetTimeout, watcher, func(event watch.Event) (bool, error) {
|
|
pod := event.Object.(*v1.Pod)
|
|
if event.Type == watch.Deleted && pod.Name == expectedPodName {
|
|
return false, fmt.Errorf("Pod %v was deleted before enter running", pod.Name)
|
|
}
|
|
framework.Logf("Observed event %v for pod %v. Phase %v, Pod is ready %v",
|
|
event.Type, pod.Name, pod.Status.Phase, v1.IsPodReady(pod))
|
|
if pod.Name != expectedPodName {
|
|
return false, nil
|
|
}
|
|
if pod.Status.Phase == v1.PodRunning && v1.IsPodReady(pod) {
|
|
return true, nil
|
|
}
|
|
return false, nil
|
|
})
|
|
Expect(err).NotTo(HaveOccurred())
|
|
})
|
|
|
|
It("Scaling should happen in predictable order and halt if any stateful pod is unhealthy", func() {
|
|
psLabels := klabels.Set(labels)
|
|
By("Initializing watcher for selector " + psLabels.String())
|
|
watcher, err := f.ClientSet.Core().Pods(ns).Watch(v1.ListOptions{
|
|
LabelSelector: psLabels.AsSelector().String(),
|
|
})
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
By("Creating stateful set " + psName + " in namespace " + ns)
|
|
testProbe := &v1.Probe{Handler: v1.Handler{HTTPGet: &v1.HTTPGetAction{
|
|
Path: "/index.html",
|
|
Port: intstr.IntOrString{IntVal: 80}}}}
|
|
ps := newStatefulSet(psName, ns, headlessSvcName, 1, nil, nil, psLabels)
|
|
ps.Spec.Template.Spec.Containers[0].ReadinessProbe = testProbe
|
|
ps, err = c.Apps().StatefulSets(ns).Create(ps)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
By("Waiting until all stateful set " + psName + " replicas will be running in namespace " + ns)
|
|
pst := &statefulSetTester{c: c}
|
|
pst.waitForRunningAndReady(*ps.Spec.Replicas, ps)
|
|
|
|
By("Confirming that stateful set scale up will halt with unhealthy stateful pod")
|
|
pst.breakProbe(ps, testProbe)
|
|
pst.waitForRunningAndNotReady(*ps.Spec.Replicas, ps)
|
|
pst.updateReplicas(ps, 3)
|
|
pst.confirmPetCount(1, ps, 10*time.Second)
|
|
|
|
By("Scaling up stateful set " + psName + " to 3 replicas and waiting until all of them will be running in namespace " + ns)
|
|
pst.restoreProbe(ps, testProbe)
|
|
pst.waitForRunningAndReady(3, ps)
|
|
|
|
By("Verifying that stateful set " + psName + " was scaled up in order")
|
|
expectedOrder := []string{psName + "-0", psName + "-1", psName + "-2"}
|
|
_, err = watch.Until(statefulsetTimeout, watcher, func(event watch.Event) (bool, error) {
|
|
if event.Type != watch.Added {
|
|
return false, nil
|
|
}
|
|
pod := event.Object.(*v1.Pod)
|
|
if pod.Name == expectedOrder[0] {
|
|
expectedOrder = expectedOrder[1:]
|
|
}
|
|
return len(expectedOrder) == 0, nil
|
|
|
|
})
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
By("Scale down will halt with unhealthy stateful pod")
|
|
watcher, err = f.ClientSet.Core().Pods(ns).Watch(v1.ListOptions{
|
|
LabelSelector: psLabels.AsSelector().String(),
|
|
})
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
pst.breakProbe(ps, testProbe)
|
|
pst.waitForRunningAndNotReady(3, ps)
|
|
pst.updateReplicas(ps, 0)
|
|
pst.confirmPetCount(3, ps, 10*time.Second)
|
|
|
|
By("Scaling down stateful set " + psName + " to 0 replicas and waiting until none of pods will run in namespace" + ns)
|
|
pst.restoreProbe(ps, testProbe)
|
|
pst.scale(ps, 0)
|
|
|
|
By("Verifying that stateful set " + psName + " was scaled down in reverse order")
|
|
expectedOrder = []string{psName + "-2", psName + "-1", psName + "-0"}
|
|
_, err = watch.Until(statefulsetTimeout, watcher, func(event watch.Event) (bool, error) {
|
|
if event.Type != watch.Deleted {
|
|
return false, nil
|
|
}
|
|
pod := event.Object.(*v1.Pod)
|
|
if pod.Name == expectedOrder[0] {
|
|
expectedOrder = expectedOrder[1:]
|
|
}
|
|
return len(expectedOrder) == 0, nil
|
|
|
|
})
|
|
Expect(err).NotTo(HaveOccurred())
|
|
})
|
|
|
|
It("Should recreate evicted statefulset", func() {
|
|
podName := "test-pod"
|
|
petPodName := psName + "-0"
|
|
By("Looking for a node to schedule stateful set and pod")
|
|
nodes := framework.GetReadySchedulableNodesOrDie(f.ClientSet)
|
|
node := nodes.Items[0]
|
|
|
|
By("Creating pod with conflicting port in namespace " + f.Namespace.Name)
|
|
conflictingPort := v1.ContainerPort{HostPort: 21017, ContainerPort: 21017, Name: "conflict"}
|
|
pod := &v1.Pod{
|
|
ObjectMeta: v1.ObjectMeta{
|
|
Name: podName,
|
|
},
|
|
Spec: v1.PodSpec{
|
|
Containers: []v1.Container{
|
|
{
|
|
Name: "nginx",
|
|
Image: "gcr.io/google_containers/nginx-slim:0.7",
|
|
Ports: []v1.ContainerPort{conflictingPort},
|
|
},
|
|
},
|
|
NodeName: node.Name,
|
|
},
|
|
}
|
|
pod, err := f.ClientSet.Core().Pods(f.Namespace.Name).Create(pod)
|
|
framework.ExpectNoError(err)
|
|
|
|
By("Creating statefulset with conflicting port in namespace " + f.Namespace.Name)
|
|
ps := newStatefulSet(psName, f.Namespace.Name, headlessSvcName, 1, nil, nil, labels)
|
|
petContainer := &ps.Spec.Template.Spec.Containers[0]
|
|
petContainer.Ports = append(petContainer.Ports, conflictingPort)
|
|
ps.Spec.Template.Spec.NodeName = node.Name
|
|
_, err = f.ClientSet.Apps().StatefulSets(f.Namespace.Name).Create(ps)
|
|
framework.ExpectNoError(err)
|
|
|
|
By("Waiting until pod " + podName + " will start running in namespace " + f.Namespace.Name)
|
|
if err := f.WaitForPodRunning(podName); err != nil {
|
|
framework.Failf("Pod %v did not start running: %v", podName, err)
|
|
}
|
|
|
|
var initialPetPodUID types.UID
|
|
By("Waiting until stateful pod " + petPodName + " will be recreated and deleted at least once in namespace " + f.Namespace.Name)
|
|
w, err := f.ClientSet.Core().Pods(f.Namespace.Name).Watch(v1.SingleObject(v1.ObjectMeta{Name: petPodName}))
|
|
framework.ExpectNoError(err)
|
|
// we need to get UID from pod in any state and wait until stateful set controller will remove pod atleast once
|
|
_, err = watch.Until(petPodTimeout, w, func(event watch.Event) (bool, error) {
|
|
pod := event.Object.(*v1.Pod)
|
|
switch event.Type {
|
|
case watch.Deleted:
|
|
framework.Logf("Observed delete event for stateful pod %v in namespace %v", pod.Name, pod.Namespace)
|
|
if initialPetPodUID == "" {
|
|
return false, nil
|
|
}
|
|
return true, nil
|
|
}
|
|
framework.Logf("Observed stateful pod in namespace: %v, name: %v, uid: %v, status phase: %v. Waiting for statefulset controller to delete.",
|
|
pod.Namespace, pod.Name, pod.UID, pod.Status.Phase)
|
|
initialPetPodUID = pod.UID
|
|
return false, nil
|
|
})
|
|
if err != nil {
|
|
framework.Failf("Pod %v expected to be re-created at least once", petPodName)
|
|
}
|
|
|
|
By("Removing pod with conflicting port in namespace " + f.Namespace.Name)
|
|
err = f.ClientSet.Core().Pods(f.Namespace.Name).Delete(pod.Name, v1.NewDeleteOptions(0))
|
|
framework.ExpectNoError(err)
|
|
|
|
By("Waiting when stateful pod " + petPodName + " will be recreated in namespace " + f.Namespace.Name + " and will be in running state")
|
|
// we may catch delete event, thats why we are waiting for running phase like this, and not with watch.Until
|
|
Eventually(func() error {
|
|
petPod, err := f.ClientSet.Core().Pods(f.Namespace.Name).Get(petPodName, metav1.GetOptions{})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if petPod.Status.Phase != v1.PodRunning {
|
|
return fmt.Errorf("Pod %v is not in running phase: %v", petPod.Name, petPod.Status.Phase)
|
|
} else if petPod.UID == initialPetPodUID {
|
|
return fmt.Errorf("Pod %v wasn't recreated: %v == %v", petPod.Name, petPod.UID, initialPetPodUID)
|
|
}
|
|
return nil
|
|
}, petPodTimeout, 2*time.Second).Should(BeNil())
|
|
})
|
|
})
|
|
|
|
framework.KubeDescribe("Deploy clustered applications [Feature:StatefulSet] [Slow]", func() {
|
|
var pst *statefulSetTester
|
|
var appTester *clusterAppTester
|
|
|
|
BeforeEach(func() {
|
|
pst = &statefulSetTester{c: c}
|
|
appTester = &clusterAppTester{tester: pst, ns: ns}
|
|
})
|
|
|
|
AfterEach(func() {
|
|
if CurrentGinkgoTestDescription().Failed {
|
|
dumpDebugInfo(c, ns)
|
|
}
|
|
framework.Logf("Deleting all statefulset in ns %v", ns)
|
|
deleteAllStatefulSets(c, ns)
|
|
})
|
|
|
|
It("should creating a working zookeeper cluster", func() {
|
|
appTester.pet = &zookeeperTester{tester: pst}
|
|
appTester.run()
|
|
})
|
|
|
|
It("should creating a working redis cluster", func() {
|
|
appTester.pet = &redisTester{tester: pst}
|
|
appTester.run()
|
|
})
|
|
|
|
It("should creating a working mysql cluster", func() {
|
|
appTester.pet = &mysqlGaleraTester{tester: pst}
|
|
appTester.run()
|
|
})
|
|
|
|
It("should creating a working CockroachDB cluster", func() {
|
|
appTester.pet = &cockroachDBTester{tester: pst}
|
|
appTester.run()
|
|
})
|
|
})
|
|
})
|
|
|
|
func dumpDebugInfo(c clientset.Interface, ns string) {
|
|
pl, _ := c.Core().Pods(ns).List(v1.ListOptions{LabelSelector: labels.Everything().String()})
|
|
for _, p := range pl.Items {
|
|
desc, _ := framework.RunKubectl("describe", "po", p.Name, fmt.Sprintf("--namespace=%v", ns))
|
|
framework.Logf("\nOutput of kubectl describe %v:\n%v", p.Name, desc)
|
|
|
|
l, _ := framework.RunKubectl("logs", p.Name, fmt.Sprintf("--namespace=%v", ns), "--tail=100")
|
|
framework.Logf("\nLast 100 log lines of %v:\n%v", p.Name, l)
|
|
}
|
|
}
|
|
|
|
func kubectlExecWithRetries(args ...string) (out string) {
|
|
var err error
|
|
for i := 0; i < 3; i++ {
|
|
if out, err = framework.RunKubectl(args...); err == nil {
|
|
return
|
|
}
|
|
framework.Logf("Retrying %v:\nerror %v\nstdout %v", args, err, out)
|
|
}
|
|
framework.Failf("Failed to execute \"%v\" with retries: %v", args, err)
|
|
return
|
|
}
|
|
|
|
type petTester interface {
|
|
deploy(ns string) *apps.StatefulSet
|
|
write(petIndex int, kv map[string]string)
|
|
read(petIndex int, key string) string
|
|
name() string
|
|
}
|
|
|
|
type clusterAppTester struct {
|
|
ns string
|
|
pet petTester
|
|
tester *statefulSetTester
|
|
}
|
|
|
|
func (c *clusterAppTester) run() {
|
|
By("Deploying " + c.pet.name())
|
|
ps := c.pet.deploy(c.ns)
|
|
|
|
By("Creating foo:bar in member with index 0")
|
|
c.pet.write(0, map[string]string{"foo": "bar"})
|
|
|
|
switch c.pet.(type) {
|
|
case *mysqlGaleraTester:
|
|
// Don't restart MySQL cluster since it doesn't handle restarts well
|
|
default:
|
|
if restartCluster {
|
|
By("Restarting stateful set " + ps.Name)
|
|
c.tester.restart(ps)
|
|
c.tester.waitForRunningAndReady(*ps.Spec.Replicas, ps)
|
|
}
|
|
}
|
|
|
|
By("Reading value under foo from member with index 2")
|
|
if err := pollReadWithTimeout(c.pet, 2, "foo", "bar"); err != nil {
|
|
framework.Failf("%v", err)
|
|
}
|
|
}
|
|
|
|
type zookeeperTester struct {
|
|
ps *apps.StatefulSet
|
|
tester *statefulSetTester
|
|
}
|
|
|
|
func (z *zookeeperTester) name() string {
|
|
return "zookeeper"
|
|
}
|
|
|
|
func (z *zookeeperTester) deploy(ns string) *apps.StatefulSet {
|
|
z.ps = z.tester.createStatefulSet(zookeeperManifestPath, ns)
|
|
return z.ps
|
|
}
|
|
|
|
func (z *zookeeperTester) write(petIndex int, kv map[string]string) {
|
|
name := fmt.Sprintf("%v-%d", z.ps.Name, petIndex)
|
|
ns := fmt.Sprintf("--namespace=%v", z.ps.Namespace)
|
|
for k, v := range kv {
|
|
cmd := fmt.Sprintf("/opt/zookeeper/bin/zkCli.sh create /%v %v", k, v)
|
|
framework.Logf(framework.RunKubectlOrDie("exec", ns, name, "--", "/bin/sh", "-c", cmd))
|
|
}
|
|
}
|
|
|
|
func (z *zookeeperTester) read(petIndex int, key string) string {
|
|
name := fmt.Sprintf("%v-%d", z.ps.Name, petIndex)
|
|
ns := fmt.Sprintf("--namespace=%v", z.ps.Namespace)
|
|
cmd := fmt.Sprintf("/opt/zookeeper/bin/zkCli.sh get /%v", key)
|
|
return lastLine(framework.RunKubectlOrDie("exec", ns, name, "--", "/bin/sh", "-c", cmd))
|
|
}
|
|
|
|
type mysqlGaleraTester struct {
|
|
ps *apps.StatefulSet
|
|
tester *statefulSetTester
|
|
}
|
|
|
|
func (m *mysqlGaleraTester) name() string {
|
|
return "mysql: galera"
|
|
}
|
|
|
|
func (m *mysqlGaleraTester) mysqlExec(cmd, ns, podName string) string {
|
|
cmd = fmt.Sprintf("/usr/bin/mysql -u root -B -e '%v'", cmd)
|
|
// TODO: Find a readiness probe for mysql that guarantees writes will
|
|
// succeed and ditch retries. Current probe only reads, so there's a window
|
|
// for a race.
|
|
return kubectlExecWithRetries(fmt.Sprintf("--namespace=%v", ns), "exec", podName, "--", "/bin/sh", "-c", cmd)
|
|
}
|
|
|
|
func (m *mysqlGaleraTester) deploy(ns string) *apps.StatefulSet {
|
|
m.ps = m.tester.createStatefulSet(mysqlGaleraManifestPath, ns)
|
|
|
|
framework.Logf("Deployed statefulset %v, initializing database", m.ps.Name)
|
|
for _, cmd := range []string{
|
|
"create database statefulset;",
|
|
"use statefulset; create table foo (k varchar(20), v varchar(20));",
|
|
} {
|
|
framework.Logf(m.mysqlExec(cmd, ns, fmt.Sprintf("%v-0", m.ps.Name)))
|
|
}
|
|
return m.ps
|
|
}
|
|
|
|
func (m *mysqlGaleraTester) write(petIndex int, kv map[string]string) {
|
|
name := fmt.Sprintf("%v-%d", m.ps.Name, petIndex)
|
|
for k, v := range kv {
|
|
cmd := fmt.Sprintf("use statefulset; insert into foo (k, v) values (\"%v\", \"%v\");", k, v)
|
|
framework.Logf(m.mysqlExec(cmd, m.ps.Namespace, name))
|
|
}
|
|
}
|
|
|
|
func (m *mysqlGaleraTester) read(petIndex int, key string) string {
|
|
name := fmt.Sprintf("%v-%d", m.ps.Name, petIndex)
|
|
return lastLine(m.mysqlExec(fmt.Sprintf("use statefulset; select v from foo where k=\"%v\";", key), m.ps.Namespace, name))
|
|
}
|
|
|
|
type redisTester struct {
|
|
ps *apps.StatefulSet
|
|
tester *statefulSetTester
|
|
}
|
|
|
|
func (m *redisTester) name() string {
|
|
return "redis: master/slave"
|
|
}
|
|
|
|
func (m *redisTester) redisExec(cmd, ns, podName string) string {
|
|
cmd = fmt.Sprintf("/opt/redis/redis-cli -h %v %v", podName, cmd)
|
|
return framework.RunKubectlOrDie(fmt.Sprintf("--namespace=%v", ns), "exec", podName, "--", "/bin/sh", "-c", cmd)
|
|
}
|
|
|
|
func (m *redisTester) deploy(ns string) *apps.StatefulSet {
|
|
m.ps = m.tester.createStatefulSet(redisManifestPath, ns)
|
|
return m.ps
|
|
}
|
|
|
|
func (m *redisTester) write(petIndex int, kv map[string]string) {
|
|
name := fmt.Sprintf("%v-%d", m.ps.Name, petIndex)
|
|
for k, v := range kv {
|
|
framework.Logf(m.redisExec(fmt.Sprintf("SET %v %v", k, v), m.ps.Namespace, name))
|
|
}
|
|
}
|
|
|
|
func (m *redisTester) read(petIndex int, key string) string {
|
|
name := fmt.Sprintf("%v-%d", m.ps.Name, petIndex)
|
|
return lastLine(m.redisExec(fmt.Sprintf("GET %v", key), m.ps.Namespace, name))
|
|
}
|
|
|
|
type cockroachDBTester struct {
|
|
ps *apps.StatefulSet
|
|
tester *statefulSetTester
|
|
}
|
|
|
|
func (c *cockroachDBTester) name() string {
|
|
return "CockroachDB"
|
|
}
|
|
|
|
func (c *cockroachDBTester) cockroachDBExec(cmd, ns, podName string) string {
|
|
cmd = fmt.Sprintf("/cockroach/cockroach sql --host %s.cockroachdb -e \"%v\"", podName, cmd)
|
|
return framework.RunKubectlOrDie(fmt.Sprintf("--namespace=%v", ns), "exec", podName, "--", "/bin/sh", "-c", cmd)
|
|
}
|
|
|
|
func (c *cockroachDBTester) deploy(ns string) *apps.StatefulSet {
|
|
c.ps = c.tester.createStatefulSet(cockroachDBManifestPath, ns)
|
|
framework.Logf("Deployed statefulset %v, initializing database", c.ps.Name)
|
|
for _, cmd := range []string{
|
|
"CREATE DATABASE IF NOT EXISTS foo;",
|
|
"CREATE TABLE IF NOT EXISTS foo.bar (k STRING PRIMARY KEY, v STRING);",
|
|
} {
|
|
framework.Logf(c.cockroachDBExec(cmd, ns, fmt.Sprintf("%v-0", c.ps.Name)))
|
|
}
|
|
return c.ps
|
|
}
|
|
|
|
func (c *cockroachDBTester) write(petIndex int, kv map[string]string) {
|
|
name := fmt.Sprintf("%v-%d", c.ps.Name, petIndex)
|
|
for k, v := range kv {
|
|
cmd := fmt.Sprintf("UPSERT INTO foo.bar VALUES ('%v', '%v');", k, v)
|
|
framework.Logf(c.cockroachDBExec(cmd, c.ps.Namespace, name))
|
|
}
|
|
}
|
|
func (c *cockroachDBTester) read(petIndex int, key string) string {
|
|
name := fmt.Sprintf("%v-%d", c.ps.Name, petIndex)
|
|
return lastLine(c.cockroachDBExec(fmt.Sprintf("SELECT v FROM foo.bar WHERE k='%v';", key), c.ps.Namespace, name))
|
|
}
|
|
|
|
func lastLine(out string) string {
|
|
outLines := strings.Split(strings.Trim(out, "\n"), "\n")
|
|
return outLines[len(outLines)-1]
|
|
}
|
|
|
|
func statefulSetFromManifest(fileName, ns string) *apps.StatefulSet {
|
|
var ps apps.StatefulSet
|
|
framework.Logf("Parsing statefulset from %v", fileName)
|
|
data, err := ioutil.ReadFile(fileName)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
json, err := utilyaml.ToJSON(data)
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
Expect(runtime.DecodeInto(api.Codecs.UniversalDecoder(), json, &ps)).NotTo(HaveOccurred())
|
|
ps.Namespace = ns
|
|
if ps.Spec.Selector == nil {
|
|
ps.Spec.Selector = &metav1.LabelSelector{
|
|
MatchLabels: ps.Spec.Template.Labels,
|
|
}
|
|
}
|
|
return &ps
|
|
}
|
|
|
|
// statefulSetTester has all methods required to test a single statefulset.
|
|
type statefulSetTester struct {
|
|
c clientset.Interface
|
|
}
|
|
|
|
func (p *statefulSetTester) createStatefulSet(manifestPath, ns string) *apps.StatefulSet {
|
|
mkpath := func(file string) string {
|
|
return filepath.Join(framework.TestContext.RepoRoot, manifestPath, file)
|
|
}
|
|
ps := statefulSetFromManifest(mkpath("petset.yaml"), ns)
|
|
|
|
framework.Logf(fmt.Sprintf("creating " + ps.Name + " service"))
|
|
framework.RunKubectlOrDie("create", "-f", mkpath("service.yaml"), fmt.Sprintf("--namespace=%v", ns))
|
|
|
|
framework.Logf(fmt.Sprintf("creating statefulset %v/%v with %d replicas and selector %+v", ps.Namespace, ps.Name, *(ps.Spec.Replicas), ps.Spec.Selector))
|
|
framework.RunKubectlOrDie("create", "-f", mkpath("petset.yaml"), fmt.Sprintf("--namespace=%v", ns))
|
|
p.waitForRunningAndReady(*ps.Spec.Replicas, ps)
|
|
return ps
|
|
}
|
|
|
|
func (p *statefulSetTester) checkMount(ps *apps.StatefulSet, mountPath string) error {
|
|
for _, cmd := range []string{
|
|
// Print inode, size etc
|
|
fmt.Sprintf("ls -idlh %v", mountPath),
|
|
// Print subdirs
|
|
fmt.Sprintf("find %v", mountPath),
|
|
// Try writing
|
|
fmt.Sprintf("touch %v", filepath.Join(mountPath, fmt.Sprintf("%v", time.Now().UnixNano()))),
|
|
} {
|
|
if err := p.execInPets(ps, cmd); err != nil {
|
|
return fmt.Errorf("failed to execute %v, error: %v", cmd, err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (p *statefulSetTester) execInPets(ps *apps.StatefulSet, cmd string) error {
|
|
podList := p.getPodList(ps)
|
|
for _, pet := range podList.Items {
|
|
stdout, err := framework.RunHostCmd(pet.Namespace, pet.Name, cmd)
|
|
framework.Logf("stdout of %v on %v: %v", cmd, pet.Name, stdout)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (p *statefulSetTester) checkHostname(ps *apps.StatefulSet) error {
|
|
cmd := "printf $(hostname)"
|
|
podList := p.getPodList(ps)
|
|
for _, pet := range podList.Items {
|
|
hostname, err := framework.RunHostCmd(pet.Namespace, pet.Name, cmd)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if hostname != pet.Name {
|
|
return fmt.Errorf("unexpected hostname (%s) and stateful pod name (%s) not equal", hostname, pet.Name)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
func (p *statefulSetTester) saturate(ps *apps.StatefulSet) {
|
|
// TODO: Watch events and check that creation timestamps don't overlap
|
|
var i int32
|
|
for i = 0; i < *(ps.Spec.Replicas); i++ {
|
|
framework.Logf("Waiting for stateful pod at index " + fmt.Sprintf("%v", i+1) + " to enter Running")
|
|
p.waitForRunningAndReady(i+1, ps)
|
|
framework.Logf("Marking stateful pod at index " + fmt.Sprintf("%v", i) + " healthy")
|
|
p.setHealthy(ps)
|
|
}
|
|
}
|
|
|
|
func (p *statefulSetTester) deletePetAtIndex(index int, ps *apps.StatefulSet) {
|
|
name := getPodNameAtIndex(index, ps)
|
|
noGrace := int64(0)
|
|
if err := p.c.Core().Pods(ps.Namespace).Delete(name, &v1.DeleteOptions{GracePeriodSeconds: &noGrace}); err != nil {
|
|
framework.Failf("Failed to delete stateful pod %v for StatefulSet %v/%v: %v", name, ps.Namespace, ps.Name, err)
|
|
}
|
|
}
|
|
|
|
type verifyPodFunc func(*v1.Pod)
|
|
|
|
func (p *statefulSetTester) verifyPodAtIndex(index int, ps *apps.StatefulSet, verify verifyPodFunc) {
|
|
name := getPodNameAtIndex(index, ps)
|
|
pod, err := p.c.Core().Pods(ps.Namespace).Get(name, metav1.GetOptions{})
|
|
Expect(err).NotTo(HaveOccurred(), fmt.Sprintf("Failed to get stateful pod %s for StatefulSet %s/%s", name, ps.Namespace, ps.Name))
|
|
verify(pod)
|
|
}
|
|
|
|
func getPodNameAtIndex(index int, ps *apps.StatefulSet) string {
|
|
// TODO: we won't use "-index" as the name strategy forever,
|
|
// pull the name out from an identity mapper.
|
|
return fmt.Sprintf("%v-%v", ps.Name, index)
|
|
}
|
|
|
|
func (p *statefulSetTester) scale(ps *apps.StatefulSet, count int32) error {
|
|
name := ps.Name
|
|
ns := ps.Namespace
|
|
p.update(ns, name, func(ps *apps.StatefulSet) { *(ps.Spec.Replicas) = count })
|
|
|
|
var petList *v1.PodList
|
|
pollErr := wait.PollImmediate(statefulsetPoll, statefulsetTimeout, func() (bool, error) {
|
|
petList = p.getPodList(ps)
|
|
if int32(len(petList.Items)) == count {
|
|
return true, nil
|
|
}
|
|
return false, nil
|
|
})
|
|
if pollErr != nil {
|
|
unhealthy := []string{}
|
|
for _, pet := range petList.Items {
|
|
delTs, phase, readiness := pet.DeletionTimestamp, pet.Status.Phase, v1.IsPodReady(&pet)
|
|
if delTs != nil || phase != v1.PodRunning || !readiness {
|
|
unhealthy = append(unhealthy, fmt.Sprintf("%v: deletion %v, phase %v, readiness %v", pet.Name, delTs, phase, readiness))
|
|
}
|
|
}
|
|
return fmt.Errorf("Failed to scale statefulset to %d in %v. Remaining pods:\n%v", count, statefulsetTimeout, unhealthy)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (p *statefulSetTester) updateReplicas(ps *apps.StatefulSet, count int32) {
|
|
p.update(ps.Namespace, ps.Name, func(ps *apps.StatefulSet) { ps.Spec.Replicas = &count })
|
|
}
|
|
|
|
func (p *statefulSetTester) restart(ps *apps.StatefulSet) {
|
|
oldReplicas := *(ps.Spec.Replicas)
|
|
framework.ExpectNoError(p.scale(ps, 0))
|
|
p.update(ps.Namespace, ps.Name, func(ps *apps.StatefulSet) { *(ps.Spec.Replicas) = oldReplicas })
|
|
}
|
|
|
|
func (p *statefulSetTester) update(ns, name string, update func(ps *apps.StatefulSet)) {
|
|
for i := 0; i < 3; i++ {
|
|
ps, err := p.c.Apps().StatefulSets(ns).Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
framework.Failf("failed to get statefulset %q: %v", name, err)
|
|
}
|
|
update(ps)
|
|
ps, err = p.c.Apps().StatefulSets(ns).Update(ps)
|
|
if err == nil {
|
|
return
|
|
}
|
|
if !apierrs.IsConflict(err) && !apierrs.IsServerTimeout(err) {
|
|
framework.Failf("failed to update statefulset %q: %v", name, err)
|
|
}
|
|
}
|
|
framework.Failf("too many retries draining statefulset %q", name)
|
|
}
|
|
|
|
func (p *statefulSetTester) getPodList(ps *apps.StatefulSet) *v1.PodList {
|
|
selector, err := metav1.LabelSelectorAsSelector(ps.Spec.Selector)
|
|
framework.ExpectNoError(err)
|
|
podList, err := p.c.Core().Pods(ps.Namespace).List(v1.ListOptions{LabelSelector: selector.String()})
|
|
framework.ExpectNoError(err)
|
|
return podList
|
|
}
|
|
|
|
func (p *statefulSetTester) confirmPetCount(count int, ps *apps.StatefulSet, timeout time.Duration) {
|
|
start := time.Now()
|
|
deadline := start.Add(timeout)
|
|
for t := time.Now(); t.Before(deadline); t = time.Now() {
|
|
podList := p.getPodList(ps)
|
|
petCount := len(podList.Items)
|
|
if petCount != count {
|
|
framework.Failf("StatefulSet %v scaled unexpectedly scaled to %d -> %d replicas: %+v", ps.Name, count, len(podList.Items), podList)
|
|
}
|
|
framework.Logf("Verifying statefulset %v doesn't scale past %d for another %+v", ps.Name, count, deadline.Sub(t))
|
|
time.Sleep(1 * time.Second)
|
|
}
|
|
}
|
|
|
|
func (p *statefulSetTester) waitForRunning(numPets int32, ps *apps.StatefulSet, shouldBeReady bool) {
|
|
pollErr := wait.PollImmediate(statefulsetPoll, statefulsetTimeout,
|
|
func() (bool, error) {
|
|
podList := p.getPodList(ps)
|
|
if int32(len(podList.Items)) < numPets {
|
|
framework.Logf("Found %d stateful pods, waiting for %d", len(podList.Items), numPets)
|
|
return false, nil
|
|
}
|
|
if int32(len(podList.Items)) > numPets {
|
|
return false, fmt.Errorf("Too many pods scheduled, expected %d got %d", numPets, len(podList.Items))
|
|
}
|
|
for _, p := range podList.Items {
|
|
isReady := v1.IsPodReady(&p)
|
|
desiredReadiness := shouldBeReady == isReady
|
|
framework.Logf("Waiting for pod %v to enter %v - Ready=%v, currently %v - Ready=%v", p.Name, v1.PodRunning, shouldBeReady, p.Status.Phase, isReady)
|
|
if p.Status.Phase != v1.PodRunning || !desiredReadiness {
|
|
return false, nil
|
|
}
|
|
}
|
|
return true, nil
|
|
})
|
|
if pollErr != nil {
|
|
framework.Failf("Failed waiting for pods to enter running: %v", pollErr)
|
|
}
|
|
}
|
|
|
|
func (p *statefulSetTester) waitForRunningAndReady(numPets int32, ps *apps.StatefulSet) {
|
|
p.waitForRunning(numPets, ps, true)
|
|
}
|
|
|
|
func (p *statefulSetTester) waitForRunningAndNotReady(numPets int32, ps *apps.StatefulSet) {
|
|
p.waitForRunning(numPets, ps, false)
|
|
}
|
|
|
|
func (p *statefulSetTester) breakProbe(ps *apps.StatefulSet, probe *v1.Probe) error {
|
|
path := probe.HTTPGet.Path
|
|
if path == "" {
|
|
return fmt.Errorf("Path expected to be not empty: %v", path)
|
|
}
|
|
cmd := fmt.Sprintf("mv -v /usr/share/nginx/html%v /tmp/", path)
|
|
return p.execInPets(ps, cmd)
|
|
}
|
|
|
|
func (p *statefulSetTester) restoreProbe(ps *apps.StatefulSet, probe *v1.Probe) error {
|
|
path := probe.HTTPGet.Path
|
|
if path == "" {
|
|
return fmt.Errorf("Path expected to be not empty: %v", path)
|
|
}
|
|
cmd := fmt.Sprintf("mv -v /tmp%v /usr/share/nginx/html/", path)
|
|
return p.execInPets(ps, cmd)
|
|
}
|
|
|
|
func (p *statefulSetTester) setHealthy(ps *apps.StatefulSet) {
|
|
podList := p.getPodList(ps)
|
|
markedHealthyPod := ""
|
|
for _, pod := range podList.Items {
|
|
if pod.Status.Phase != v1.PodRunning {
|
|
framework.Failf("Found pod in %v cannot set health", pod.Status.Phase)
|
|
}
|
|
if isInitialized(pod) {
|
|
continue
|
|
}
|
|
if markedHealthyPod != "" {
|
|
framework.Failf("Found multiple non-healthy stateful pods: %v and %v", pod.Name, markedHealthyPod)
|
|
}
|
|
p, err := framework.UpdatePodWithRetries(p.c, pod.Namespace, pod.Name, func(up *v1.Pod) {
|
|
up.Annotations[petset.StatefulSetInitAnnotation] = "true"
|
|
})
|
|
framework.ExpectNoError(err)
|
|
framework.Logf("Set annotation %v to %v on pod %v", petset.StatefulSetInitAnnotation, p.Annotations[petset.StatefulSetInitAnnotation], pod.Name)
|
|
markedHealthyPod = pod.Name
|
|
}
|
|
}
|
|
|
|
func (p *statefulSetTester) waitForStatus(ps *apps.StatefulSet, expectedReplicas int32) {
|
|
framework.Logf("Waiting for statefulset status.replicas updated to %d", expectedReplicas)
|
|
|
|
ns, name := ps.Namespace, ps.Name
|
|
pollErr := wait.PollImmediate(statefulsetPoll, statefulsetTimeout,
|
|
func() (bool, error) {
|
|
psGet, err := p.c.Apps().StatefulSets(ns).Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
if psGet.Status.Replicas != expectedReplicas {
|
|
framework.Logf("Waiting for stateful set status to become %d, currently %d", expectedReplicas, psGet.Status.Replicas)
|
|
return false, nil
|
|
}
|
|
return true, nil
|
|
})
|
|
if pollErr != nil {
|
|
framework.Failf("Failed waiting for stateful set status.replicas updated to %d: %v", expectedReplicas, pollErr)
|
|
}
|
|
}
|
|
|
|
func deleteAllStatefulSets(c clientset.Interface, ns string) {
|
|
pst := &statefulSetTester{c: c}
|
|
psList, err := c.Apps().StatefulSets(ns).List(v1.ListOptions{LabelSelector: labels.Everything().String()})
|
|
framework.ExpectNoError(err)
|
|
|
|
// Scale down each statefulset, then delete it completely.
|
|
// Deleting a pvc without doing this will leak volumes, #25101.
|
|
errList := []string{}
|
|
for _, ps := range psList.Items {
|
|
framework.Logf("Scaling statefulset %v to 0", ps.Name)
|
|
if err := pst.scale(&ps, 0); err != nil {
|
|
errList = append(errList, fmt.Sprintf("%v", err))
|
|
}
|
|
pst.waitForStatus(&ps, 0)
|
|
framework.Logf("Deleting statefulset %v", ps.Name)
|
|
if err := c.Apps().StatefulSets(ps.Namespace).Delete(ps.Name, nil); err != nil {
|
|
errList = append(errList, fmt.Sprintf("%v", err))
|
|
}
|
|
}
|
|
|
|
// pvs are global, so we need to wait for the exact ones bound to the statefulset pvcs.
|
|
pvNames := sets.NewString()
|
|
// TODO: Don't assume all pvcs in the ns belong to a statefulset
|
|
pvcPollErr := wait.PollImmediate(statefulsetPoll, statefulsetTimeout, func() (bool, error) {
|
|
pvcList, err := c.Core().PersistentVolumeClaims(ns).List(v1.ListOptions{LabelSelector: labels.Everything().String()})
|
|
if err != nil {
|
|
framework.Logf("WARNING: Failed to list pvcs, retrying %v", err)
|
|
return false, nil
|
|
}
|
|
for _, pvc := range pvcList.Items {
|
|
pvNames.Insert(pvc.Spec.VolumeName)
|
|
// TODO: Double check that there are no pods referencing the pvc
|
|
framework.Logf("Deleting pvc: %v with volume %v", pvc.Name, pvc.Spec.VolumeName)
|
|
if err := c.Core().PersistentVolumeClaims(ns).Delete(pvc.Name, nil); err != nil {
|
|
return false, nil
|
|
}
|
|
}
|
|
return true, nil
|
|
})
|
|
if pvcPollErr != nil {
|
|
errList = append(errList, fmt.Sprintf("Timeout waiting for pvc deletion."))
|
|
}
|
|
|
|
pollErr := wait.PollImmediate(statefulsetPoll, statefulsetTimeout, func() (bool, error) {
|
|
pvList, err := c.Core().PersistentVolumes().List(v1.ListOptions{LabelSelector: labels.Everything().String()})
|
|
if err != nil {
|
|
framework.Logf("WARNING: Failed to list pvs, retrying %v", err)
|
|
return false, nil
|
|
}
|
|
waitingFor := []string{}
|
|
for _, pv := range pvList.Items {
|
|
if pvNames.Has(pv.Name) {
|
|
waitingFor = append(waitingFor, fmt.Sprintf("%v: %+v", pv.Name, pv.Status))
|
|
}
|
|
}
|
|
if len(waitingFor) == 0 {
|
|
return true, nil
|
|
}
|
|
framework.Logf("Still waiting for pvs of statefulset to disappear:\n%v", strings.Join(waitingFor, "\n"))
|
|
return false, nil
|
|
})
|
|
if pollErr != nil {
|
|
errList = append(errList, fmt.Sprintf("Timeout waiting for pv provisioner to delete pvs, this might mean the test leaked pvs."))
|
|
}
|
|
if len(errList) != 0 {
|
|
framework.ExpectNoError(fmt.Errorf("%v", strings.Join(errList, "\n")))
|
|
}
|
|
}
|
|
|
|
func pollReadWithTimeout(pet petTester, petNumber int, key, expectedVal string) error {
|
|
err := wait.PollImmediate(time.Second, readTimeout, func() (bool, error) {
|
|
val := pet.read(petNumber, key)
|
|
if val == "" {
|
|
return false, nil
|
|
} else if val != expectedVal {
|
|
return false, fmt.Errorf("expected value %v, found %v", expectedVal, val)
|
|
}
|
|
return true, nil
|
|
})
|
|
|
|
if err == wait.ErrWaitTimeout {
|
|
return fmt.Errorf("timed out when trying to read value for key %v from stateful pod %d", key, petNumber)
|
|
}
|
|
return err
|
|
}
|
|
|
|
func isInitialized(pod v1.Pod) bool {
|
|
initialized, ok := pod.Annotations[petset.StatefulSetInitAnnotation]
|
|
if !ok {
|
|
return false
|
|
}
|
|
inited, err := strconv.ParseBool(initialized)
|
|
if err != nil {
|
|
framework.Failf("Couldn't parse statefulset init annotations %v", initialized)
|
|
}
|
|
return inited
|
|
}
|
|
|
|
func dec(i int64, exponent int) *inf.Dec {
|
|
return inf.NewDec(i, inf.Scale(-exponent))
|
|
}
|
|
|
|
func newPVC(name string) v1.PersistentVolumeClaim {
|
|
return v1.PersistentVolumeClaim{
|
|
ObjectMeta: v1.ObjectMeta{
|
|
Name: name,
|
|
Annotations: map[string]string{
|
|
"volume.alpha.kubernetes.io/storage-class": "anything",
|
|
},
|
|
},
|
|
Spec: v1.PersistentVolumeClaimSpec{
|
|
AccessModes: []v1.PersistentVolumeAccessMode{
|
|
v1.ReadWriteOnce,
|
|
},
|
|
Resources: v1.ResourceRequirements{
|
|
Requests: v1.ResourceList{
|
|
v1.ResourceStorage: *resource.NewQuantity(1, resource.BinarySI),
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
func newStatefulSet(name, ns, governingSvcName string, replicas int32, petMounts []v1.VolumeMount, podMounts []v1.VolumeMount, labels map[string]string) *apps.StatefulSet {
|
|
mounts := append(petMounts, podMounts...)
|
|
claims := []v1.PersistentVolumeClaim{}
|
|
for _, m := range petMounts {
|
|
claims = append(claims, newPVC(m.Name))
|
|
}
|
|
|
|
vols := []v1.Volume{}
|
|
for _, m := range podMounts {
|
|
vols = append(vols, v1.Volume{
|
|
Name: m.Name,
|
|
VolumeSource: v1.VolumeSource{
|
|
HostPath: &v1.HostPathVolumeSource{
|
|
Path: fmt.Sprintf("/tmp/%v", m.Name),
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
return &apps.StatefulSet{
|
|
TypeMeta: metav1.TypeMeta{
|
|
Kind: "StatefulSet",
|
|
APIVersion: "apps/v1beta1",
|
|
},
|
|
ObjectMeta: v1.ObjectMeta{
|
|
Name: name,
|
|
Namespace: ns,
|
|
},
|
|
Spec: apps.StatefulSetSpec{
|
|
Selector: &metav1.LabelSelector{
|
|
MatchLabels: labels,
|
|
},
|
|
Replicas: func(i int32) *int32 { return &i }(replicas),
|
|
Template: v1.PodTemplateSpec{
|
|
ObjectMeta: v1.ObjectMeta{
|
|
Labels: labels,
|
|
Annotations: map[string]string{},
|
|
},
|
|
Spec: v1.PodSpec{
|
|
Containers: []v1.Container{
|
|
{
|
|
Name: "nginx",
|
|
Image: nginxImage,
|
|
VolumeMounts: mounts,
|
|
},
|
|
},
|
|
Volumes: vols,
|
|
},
|
|
},
|
|
VolumeClaimTemplates: claims,
|
|
ServiceName: governingSvcName,
|
|
},
|
|
}
|
|
}
|
|
|
|
func setInitializedAnnotation(ss *apps.StatefulSet, value string) {
|
|
ss.Spec.Template.ObjectMeta.Annotations["pod.alpha.kubernetes.io/initialized"] = value
|
|
}
|