-
Notifications
You must be signed in to change notification settings - Fork 40.1k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
369 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,369 @@ | ||
//go:build linux | ||
// +build linux | ||
|
||
/* | ||
Copyright 2024 The Kubernetes Authors. | ||
Licensed under the Apache License, Version 2.0 (the "License"); | ||
you may not use this file except in compliance with the License. | ||
You may obtain a copy of the License at | ||
http://www.apache.org/licenses/LICENSE-2.0 | ||
Unless required by applicable law or agreed to in writing, software | ||
distributed under the License is distributed on an "AS IS" BASIS, | ||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
See the License for the specific language governing permissions and | ||
limitations under the License. | ||
*/ | ||
|
||
package e2enode | ||
|
||
import ( | ||
"context" | ||
"fmt" | ||
"os" | ||
"sync" | ||
"time" | ||
|
||
"github.com/onsi/ginkgo/v2" | ||
"github.com/onsi/gomega" | ||
"github.com/pkg/errors" | ||
|
||
v1 "k8s.io/api/core/v1" | ||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" | ||
"k8s.io/apimachinery/pkg/util/uuid" | ||
kubeletconfig "k8s.io/kubernetes/pkg/kubelet/apis/config" | ||
"k8s.io/kubernetes/test/e2e/feature" | ||
"k8s.io/kubernetes/test/e2e/framework" | ||
e2epod "k8s.io/kubernetes/test/e2e/framework/pod" | ||
"k8s.io/kubernetes/test/e2e_node/criproxy" | ||
imageutils "k8s.io/kubernetes/test/utils/image" | ||
admissionapi "k8s.io/pod-security-admission/api" | ||
) | ||
|
||
// This test needs to run in serial to prevent caching of the images by other tests | ||
// and to prevent the wait time of image pulls to be increased by other images | ||
var _ = SIGDescribe("PLEG", feature.CriProxy, framework.WithSerial(), func() { | ||
|
||
f := framework.NewDefaultFramework("pleg-test") | ||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged | ||
|
||
ginkgo.Context("pod start successfully with EventedPLEG=true", func() { | ||
tempSetCurrentKubeletConfig(f, func(ctx context.Context, initialConfig *kubeletconfig.KubeletConfiguration) { | ||
if initialConfig.FeatureGates == nil { | ||
initialConfig.FeatureGates = make(map[string]bool) | ||
} | ||
initialConfig.FeatureGates["EventedPLEG"] = true | ||
}) | ||
runAllTests(f) | ||
}) | ||
|
||
ginkgo.Context("pod start successfully with EventedPLEG=false", func() { | ||
tempSetCurrentKubeletConfig(f, func(ctx context.Context, initialConfig *kubeletconfig.KubeletConfiguration) { | ||
if initialConfig.FeatureGates == nil { | ||
initialConfig.FeatureGates = make(map[string]bool) | ||
} | ||
initialConfig.FeatureGates["EventedPLEG"] = false | ||
}) | ||
runAllTests(f) | ||
}) | ||
}) | ||
|
||
func runAllTests(f *framework.Framework) { | ||
|
||
ginkgo.BeforeEach(func(ctx context.Context) { | ||
if err := resetCRIProxyInjector(); err != nil { | ||
ginkgo.Skip("Skip the test since the CRI Proxy is undefined.") | ||
} | ||
}) | ||
|
||
ginkgo.AfterEach(func(ctx context.Context) { | ||
err := resetCRIProxyInjector() | ||
framework.ExpectNoError(err) | ||
deletePodSyncByName(ctx, f, "testpod") | ||
}) | ||
ginkgo.It("should be running finally with first init container start failure", func(ctx context.Context) { | ||
var mu sync.Mutex | ||
callCh := make(chan struct{}) | ||
callStatus := make(map[int]chan struct{}) | ||
firstStartContainerErrorInjector := func(apiName string) error { | ||
if apiName == criproxy.StartContainer { | ||
mu.Lock() | ||
callID := len(callStatus) | ||
callStatus[callID] = callCh | ||
mu.Unlock() | ||
if callID == 0 { | ||
// stuck the first container start | ||
return errors.New("stuck the first container start") | ||
} | ||
} | ||
return nil | ||
} | ||
image1 := imageutils.GetE2EImage(imageutils.Httpd) | ||
node := getNodeName(ctx, f) | ||
|
||
testpod := &v1.Pod{ | ||
ObjectMeta: metav1.ObjectMeta{ | ||
Name: "testpod", | ||
Namespace: f.Namespace.Name, | ||
}, | ||
Spec: v1.PodSpec{ | ||
InitContainers: []v1.Container{{ | ||
Name: "init-1", | ||
Image: image1, | ||
ImagePullPolicy: v1.PullAlways, | ||
RestartPolicy: &containerRestartPolicyAlways, | ||
}}, | ||
Containers: []v1.Container{{ | ||
Name: "testpod", | ||
Image: image1, | ||
ImagePullPolicy: v1.PullAlways, | ||
}}, | ||
NodeName: node, | ||
RestartPolicy: v1.RestartPolicyNever, | ||
}, | ||
} | ||
podRunningWithInject(f, ctx, testpod, firstStartContainerErrorInjector) | ||
}) | ||
|
||
ginkgo.It("should be running finally with first container start failure", func(ctx context.Context) { | ||
var mu sync.Mutex | ||
callCh := make(chan struct{}) | ||
callStatus := make(map[int]chan struct{}) | ||
firstStartContainerErrorInjector := func(apiName string) error { | ||
if apiName == criproxy.StartContainer { | ||
mu.Lock() | ||
callID := len(callStatus) | ||
callStatus[callID] = callCh | ||
mu.Unlock() | ||
if callID == 0 { | ||
// stuck the first container start | ||
return errors.New("stuck the first container start") | ||
} | ||
} | ||
return nil | ||
} | ||
image1 := imageutils.GetE2EImage(imageutils.Httpd) | ||
node := getNodeName(ctx, f) | ||
|
||
testpod := &v1.Pod{ | ||
ObjectMeta: metav1.ObjectMeta{ | ||
Name: "testpod", | ||
Namespace: f.Namespace.Name, | ||
}, | ||
Spec: v1.PodSpec{ | ||
Containers: []v1.Container{{ | ||
Name: "testpod", | ||
Image: image1, | ||
ImagePullPolicy: v1.PullAlways, | ||
}}, | ||
NodeName: node, | ||
RestartPolicy: v1.RestartPolicyNever, | ||
}, | ||
} | ||
podRunningWithInject(f, ctx, testpod, firstStartContainerErrorInjector) | ||
}) | ||
|
||
ginkgo.It("should be running finally with first container start timeout", func(ctx context.Context) { | ||
image1 := imageutils.GetE2EImage(imageutils.Httpd) | ||
node := getNodeName(ctx, f) | ||
|
||
testpod := &v1.Pod{ | ||
ObjectMeta: metav1.ObjectMeta{ | ||
Name: "testpod", | ||
Namespace: f.Namespace.Name, | ||
}, | ||
Spec: v1.PodSpec{ | ||
Containers: []v1.Container{{ | ||
Name: "testpod", | ||
Image: image1, | ||
ImagePullPolicy: v1.PullAlways, | ||
}}, | ||
NodeName: node, | ||
RestartPolicy: v1.RestartPolicyNever, | ||
}, | ||
} | ||
var mu sync.Mutex | ||
callCh := make(chan struct{}) | ||
callStatus := make(map[int]chan struct{}) | ||
firstStartContainerTimeoutInjector := func(apiName string) error { | ||
if apiName == criproxy.StartContainer { | ||
mu.Lock() | ||
callID := len(callStatus) | ||
callStatus[callID] = callCh | ||
mu.Unlock() | ||
if callID == 0 { | ||
time.Sleep(5 * time.Minute) | ||
} | ||
} | ||
return nil | ||
} | ||
podRunningWithInject(f, ctx, testpod, firstStartContainerTimeoutInjector) | ||
}) | ||
|
||
ginkgo.It("should be running finally with first init container start timeout", func(ctx context.Context) { | ||
image1 := imageutils.GetE2EImage(imageutils.Httpd) | ||
node := getNodeName(ctx, f) | ||
|
||
testpod := &v1.Pod{ | ||
ObjectMeta: metav1.ObjectMeta{ | ||
Name: "testpod", | ||
Namespace: f.Namespace.Name, | ||
}, | ||
Spec: v1.PodSpec{ | ||
InitContainers: []v1.Container{{ | ||
Name: "init-1", | ||
Image: image1, | ||
ImagePullPolicy: v1.PullAlways, | ||
}}, | ||
Containers: []v1.Container{{ | ||
Name: "testpod", | ||
Image: image1, | ||
ImagePullPolicy: v1.PullAlways, | ||
}}, | ||
NodeName: node, | ||
RestartPolicy: v1.RestartPolicyNever, | ||
}, | ||
} | ||
var mu sync.Mutex | ||
callCh := make(chan struct{}) | ||
callStatus := make(map[int]chan struct{}) | ||
firstStartContainerTimeoutInjector := func(apiName string) error { | ||
if apiName == criproxy.StartContainer { | ||
mu.Lock() | ||
callID := len(callStatus) | ||
callStatus[callID] = callCh | ||
mu.Unlock() | ||
if callID == 0 { | ||
time.Sleep(5 * time.Minute) | ||
} | ||
} | ||
return nil | ||
} | ||
podRunningWithInject(f, ctx, testpod, firstStartContainerTimeoutInjector) | ||
}) | ||
|
||
ginkgo.It("should be running finally with static pod first container start failure", func(ctx context.Context) { | ||
var ns, podPath, staticPodName, mirrorPodName string | ||
ns = f.Namespace.Name | ||
staticPodName = "graceful-pod-" + string(uuid.NewUUID()) | ||
mirrorPodName = staticPodName + "-" + framework.TestContext.NodeName | ||
|
||
podPath = kubeletCfg.StaticPodPath | ||
|
||
var mu sync.Mutex | ||
callCh := make(chan struct{}) | ||
callStatus := make(map[int]chan struct{}) | ||
firstStartContainerTimeoutInjector := func(apiName string) error { | ||
if apiName == criproxy.StartContainer { | ||
mu.Lock() | ||
callID := len(callStatus) | ||
callStatus[callID] = callCh | ||
mu.Unlock() | ||
if callID == 0 { | ||
return errors.New("stuck the first container start") | ||
} | ||
} | ||
return nil | ||
} | ||
|
||
err := addCRIProxyInjector(firstStartContainerTimeoutInjector) | ||
framework.ExpectNoError(err) | ||
|
||
ginkgo.By("create the static pod") | ||
err = createHttpdStaticPod(podPath, staticPodName, ns) | ||
framework.ExpectNoError(err) | ||
|
||
ginkgo.By("wait for the mirror pod to be running") | ||
gomega.Eventually(ctx, func(ctx context.Context) error { | ||
return checkMirrorPodRunning(ctx, f.ClientSet, mirrorPodName, ns) | ||
}, 3*time.Minute, time.Second*4).Should(gomega.BeNil()) | ||
}) | ||
|
||
ginkgo.It("should be running finally with static pod first two containers start timeout", func(ctx context.Context) { | ||
var ns, podPath, staticPodName, mirrorPodName string | ||
ns = f.Namespace.Name | ||
staticPodName = "graceful-pod-" + string(uuid.NewUUID()) | ||
mirrorPodName = staticPodName + "-" + framework.TestContext.NodeName | ||
|
||
podPath = kubeletCfg.StaticPodPath | ||
|
||
var mu sync.Mutex | ||
callCh := make(chan struct{}) | ||
callStatus := make(map[int]chan struct{}) | ||
firstStartContainerTimeoutInjector := func(apiName string) error { | ||
if apiName == criproxy.StartContainer { | ||
mu.Lock() | ||
callID := len(callStatus) | ||
callStatus[callID] = callCh | ||
mu.Unlock() | ||
if callID == 0 { | ||
time.Sleep(5 * time.Minute) | ||
} | ||
} | ||
return nil | ||
} | ||
|
||
err := addCRIProxyInjector(firstStartContainerTimeoutInjector) | ||
framework.ExpectNoError(err) | ||
|
||
ginkgo.By("create the static pod") | ||
err = createHttpdStaticPod(podPath, staticPodName, ns) | ||
framework.ExpectNoError(err) | ||
|
||
ginkgo.By("wait for the mirror pod to be running") | ||
gomega.Eventually(ctx, func(ctx context.Context) error { | ||
return checkMirrorPodRunning(ctx, f.ClientSet, mirrorPodName, ns) | ||
}, 3*time.Minute, time.Second*4).Should(gomega.BeNil()) | ||
}) | ||
} | ||
|
||
func createHttpdStaticPod(dir, name, namespace string) error { | ||
template := ` | ||
apiVersion: v1 | ||
kind: Pod | ||
metadata: | ||
name: %s | ||
namespace: %s | ||
spec: | ||
containers: | ||
- name: m-test | ||
image: %s | ||
ports: | ||
- containerPort: 80 | ||
` | ||
file := staticPodPath(dir, name, namespace) | ||
podYaml := fmt.Sprintf(template, name, namespace, imageutils.GetE2EImage(imageutils.Httpd)) | ||
|
||
f, err := os.OpenFile(file, os.O_RDWR|os.O_TRUNC|os.O_CREATE, 0666) | ||
if err != nil { | ||
return err | ||
} | ||
defer func() { | ||
closeErr := f.Close() | ||
if closeErr != nil && err == nil { | ||
err = closeErr | ||
} | ||
}() | ||
|
||
_, err = f.WriteString(podYaml) | ||
framework.Logf("has written %v", file) | ||
return err | ||
} | ||
|
||
func podRunningWithInject(f *framework.Framework, ctx context.Context, testpod *v1.Pod, injector func(apiName string) error) { | ||
err := addCRIProxyInjector(injector) | ||
framework.ExpectNoError(err) | ||
pod := e2epod.NewPodClient(f).Create(ctx, testpod) | ||
err = e2epod.WaitForPodCondition(ctx, f.ClientSet, f.Namespace.Name, pod.Name, "Running", 3*time.Minute, func(pod *v1.Pod) (bool, error) { | ||
if pod.Status.Phase == v1.PodRunning { | ||
return true, nil | ||
} | ||
return false, nil | ||
}) | ||
framework.ExpectNoError(err) | ||
|
||
err = e2epod.NewPodClient(f).Delete(ctx, testpod.Name, metav1.DeleteOptions{}) | ||
framework.ExpectNoError(err) | ||
} |