
Automatic merge from submit-queue (batch tested with PRs 60435, 60334, 60458, 59301, 60125). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. dockershim: don't check pod IP in StopPodSandbox We're about to tear the container down, there's no point. It also suppresses an annoying error message due to kubelet stupidity that causes multiple parallel calls to StopPodSandbox for the same sandbox. docker_sandbox.go:355] failed to read pod IP from plugin/docker: NetworkPlugin cni failed on the status hook for pod "docker-registry-1-deploy_default": Unexpected command output nsenter: cannot open /proc/22646/ns/net: No such file or directory 1) A first StopPodSandbox() request triggered by SyncLoop(PLEG) for a ContainerDied event calls into TearDownPod() and thus the network plugin. Until this completes, networkReady=true for the sandbox. 2) A second StopPodSandbox() request triggered by SyncLoop(REMOVE) calls PodSandboxStatus() and calls into the network plugin to read the IP address because networkReady=true 3) The first request exits the network plugin, sets networReady=false, and calls StopContainer() on the sandbox. This destroys the network namespace. 4) The second request finally gets around to running nsenter but the network namespace is already destroyed. It returns an error which is logged by getIP(). ```release-note NONE ``` @yujuhong @freehan
305 lines
11 KiB
Go
305 lines
11 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package dockershim
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"math/rand"
|
|
"net"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
runtimeapi "k8s.io/kubernetes/pkg/kubelet/apis/cri/runtime/v1alpha2"
|
|
kubecontainer "k8s.io/kubernetes/pkg/kubelet/container"
|
|
"k8s.io/kubernetes/pkg/kubelet/dockershim/libdocker"
|
|
"k8s.io/kubernetes/pkg/kubelet/network"
|
|
"k8s.io/kubernetes/pkg/kubelet/types"
|
|
)
|
|
|
|
// A helper to create a basic config.
|
|
func makeSandboxConfig(name, namespace, uid string, attempt uint32) *runtimeapi.PodSandboxConfig {
|
|
return makeSandboxConfigWithLabelsAndAnnotations(name, namespace, uid, attempt, map[string]string{}, map[string]string{})
|
|
}
|
|
|
|
func makeSandboxConfigWithLabelsAndAnnotations(name, namespace, uid string, attempt uint32, labels, annotations map[string]string) *runtimeapi.PodSandboxConfig {
|
|
return &runtimeapi.PodSandboxConfig{
|
|
Metadata: &runtimeapi.PodSandboxMetadata{
|
|
Name: name,
|
|
Namespace: namespace,
|
|
Uid: uid,
|
|
Attempt: attempt,
|
|
},
|
|
Labels: labels,
|
|
Annotations: annotations,
|
|
}
|
|
}
|
|
|
|
// TestListSandboxes creates several sandboxes and then list them to check
|
|
// whether the correct metadatas, states, and labels are returned.
|
|
func TestListSandboxes(t *testing.T) {
|
|
ds, _, fakeClock := newTestDockerService()
|
|
name, namespace := "foo", "bar"
|
|
configs := []*runtimeapi.PodSandboxConfig{}
|
|
for i := 0; i < 3; i++ {
|
|
c := makeSandboxConfigWithLabelsAndAnnotations(fmt.Sprintf("%s%d", name, i),
|
|
fmt.Sprintf("%s%d", namespace, i), fmt.Sprintf("%d", i), 0,
|
|
map[string]string{"label": fmt.Sprintf("foo%d", i)},
|
|
map[string]string{"annotation": fmt.Sprintf("bar%d", i)},
|
|
)
|
|
configs = append(configs, c)
|
|
}
|
|
|
|
expected := []*runtimeapi.PodSandbox{}
|
|
state := runtimeapi.PodSandboxState_SANDBOX_READY
|
|
var createdAt int64 = fakeClock.Now().UnixNano()
|
|
for i := range configs {
|
|
runResp, err := ds.RunPodSandbox(getTestCTX(), &runtimeapi.RunPodSandboxRequest{Config: configs[i]})
|
|
require.NoError(t, err)
|
|
// Prepend to the expected list because ListPodSandbox returns
|
|
// the most recent sandbox first.
|
|
expected = append([]*runtimeapi.PodSandbox{{
|
|
Metadata: configs[i].Metadata,
|
|
Id: runResp.PodSandboxId,
|
|
State: state,
|
|
CreatedAt: createdAt,
|
|
Labels: configs[i].Labels,
|
|
Annotations: configs[i].Annotations,
|
|
}}, expected...)
|
|
}
|
|
listResp, err := ds.ListPodSandbox(getTestCTX(), &runtimeapi.ListPodSandboxRequest{})
|
|
require.NoError(t, err)
|
|
assert.Len(t, listResp.Items, len(expected))
|
|
assert.Equal(t, expected, listResp.Items)
|
|
}
|
|
|
|
// TestSandboxStatus tests the basic lifecycle operations and verify that
|
|
// the status returned reflects the operations performed.
|
|
func TestSandboxStatus(t *testing.T) {
|
|
ds, fDocker, fClock := newTestDockerService()
|
|
labels := map[string]string{"label": "foobar1"}
|
|
annotations := map[string]string{"annotation": "abc"}
|
|
config := makeSandboxConfigWithLabelsAndAnnotations("foo", "bar", "1", 0, labels, annotations)
|
|
r := rand.New(rand.NewSource(0)).Uint32()
|
|
podIP := fmt.Sprintf("10.%d.%d.%d", byte(r>>16), byte(r>>8), byte(r))
|
|
|
|
state := runtimeapi.PodSandboxState_SANDBOX_READY
|
|
ct := int64(0)
|
|
expected := &runtimeapi.PodSandboxStatus{
|
|
State: state,
|
|
CreatedAt: ct,
|
|
Metadata: config.Metadata,
|
|
Network: &runtimeapi.PodSandboxNetworkStatus{Ip: podIP},
|
|
Linux: &runtimeapi.LinuxPodSandboxStatus{
|
|
Namespaces: &runtimeapi.Namespace{
|
|
Options: &runtimeapi.NamespaceOption{
|
|
Pid: runtimeapi.NamespaceMode_CONTAINER,
|
|
},
|
|
},
|
|
},
|
|
Labels: labels,
|
|
Annotations: annotations,
|
|
}
|
|
|
|
// Create the sandbox.
|
|
fClock.SetTime(time.Now())
|
|
expected.CreatedAt = fClock.Now().UnixNano()
|
|
runResp, err := ds.RunPodSandbox(getTestCTX(), &runtimeapi.RunPodSandboxRequest{Config: config})
|
|
require.NoError(t, err)
|
|
id := runResp.PodSandboxId
|
|
|
|
// Check internal labels
|
|
c, err := fDocker.InspectContainer(id)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, c.Config.Labels[containerTypeLabelKey], containerTypeLabelSandbox)
|
|
assert.Equal(t, c.Config.Labels[types.KubernetesContainerNameLabel], sandboxContainerName)
|
|
|
|
expected.Id = id // ID is only known after the creation.
|
|
statusResp, err := ds.PodSandboxStatus(getTestCTX(), &runtimeapi.PodSandboxStatusRequest{PodSandboxId: id})
|
|
require.NoError(t, err)
|
|
assert.Equal(t, expected, statusResp.Status)
|
|
|
|
// Stop the sandbox.
|
|
expected.State = runtimeapi.PodSandboxState_SANDBOX_NOTREADY
|
|
_, err = ds.StopPodSandbox(getTestCTX(), &runtimeapi.StopPodSandboxRequest{PodSandboxId: id})
|
|
require.NoError(t, err)
|
|
// IP not valid after sandbox stop
|
|
expected.Network.Ip = ""
|
|
statusResp, err = ds.PodSandboxStatus(getTestCTX(), &runtimeapi.PodSandboxStatusRequest{PodSandboxId: id})
|
|
require.NoError(t, err)
|
|
assert.Equal(t, expected, statusResp.Status)
|
|
|
|
// Remove the container.
|
|
_, err = ds.RemovePodSandbox(getTestCTX(), &runtimeapi.RemovePodSandboxRequest{PodSandboxId: id})
|
|
require.NoError(t, err)
|
|
statusResp, err = ds.PodSandboxStatus(getTestCTX(), &runtimeapi.PodSandboxStatusRequest{PodSandboxId: id})
|
|
assert.Error(t, err, fmt.Sprintf("status of sandbox: %+v", statusResp))
|
|
}
|
|
|
|
// TestSandboxStatusAfterRestart tests that retrieving sandbox status returns
|
|
// an IP address even if RunPodSandbox() was not yet called for this pod, as
|
|
// would happen on kubelet restart
|
|
func TestSandboxStatusAfterRestart(t *testing.T) {
|
|
ds, _, fClock := newTestDockerService()
|
|
config := makeSandboxConfig("foo", "bar", "1", 0)
|
|
r := rand.New(rand.NewSource(0)).Uint32()
|
|
podIP := fmt.Sprintf("10.%d.%d.%d", byte(r>>16), byte(r>>8), byte(r))
|
|
|
|
state := runtimeapi.PodSandboxState_SANDBOX_READY
|
|
ct := int64(0)
|
|
expected := &runtimeapi.PodSandboxStatus{
|
|
State: state,
|
|
CreatedAt: ct,
|
|
Metadata: config.Metadata,
|
|
Network: &runtimeapi.PodSandboxNetworkStatus{Ip: podIP},
|
|
Linux: &runtimeapi.LinuxPodSandboxStatus{
|
|
Namespaces: &runtimeapi.Namespace{
|
|
Options: &runtimeapi.NamespaceOption{
|
|
Pid: runtimeapi.NamespaceMode_CONTAINER,
|
|
},
|
|
},
|
|
},
|
|
Labels: map[string]string{},
|
|
Annotations: map[string]string{},
|
|
}
|
|
|
|
// Create the sandbox.
|
|
fClock.SetTime(time.Now())
|
|
expected.CreatedAt = fClock.Now().UnixNano()
|
|
|
|
createConfig, err := ds.makeSandboxDockerConfig(config, defaultSandboxImage)
|
|
assert.NoError(t, err)
|
|
|
|
createResp, err := ds.client.CreateContainer(*createConfig)
|
|
assert.NoError(t, err)
|
|
err = ds.client.StartContainer(createResp.ID)
|
|
assert.NoError(t, err)
|
|
|
|
// Check status without RunPodSandbox() having set up networking
|
|
expected.Id = createResp.ID // ID is only known after the creation.
|
|
|
|
statusResp, err := ds.PodSandboxStatus(getTestCTX(), &runtimeapi.PodSandboxStatusRequest{PodSandboxId: createResp.ID})
|
|
require.NoError(t, err)
|
|
assert.Equal(t, expected, statusResp.Status)
|
|
}
|
|
|
|
// TestNetworkPluginInvocation checks that the right SetUpPod and TearDownPod
|
|
// calls are made when we run/stop a sandbox.
|
|
func TestNetworkPluginInvocation(t *testing.T) {
|
|
ds, _, _ := newTestDockerService()
|
|
mockPlugin := newTestNetworkPlugin(t)
|
|
ds.network = network.NewPluginManager(mockPlugin)
|
|
defer mockPlugin.Finish()
|
|
|
|
name := "foo0"
|
|
ns := "bar0"
|
|
c := makeSandboxConfigWithLabelsAndAnnotations(
|
|
name, ns, "0", 0,
|
|
map[string]string{"label": name},
|
|
map[string]string{"annotation": ns},
|
|
)
|
|
cID := kubecontainer.ContainerID{Type: runtimeName, ID: libdocker.GetFakeContainerID(fmt.Sprintf("/%v", makeSandboxName(c)))}
|
|
|
|
mockPlugin.EXPECT().Name().Return("mockNetworkPlugin").AnyTimes()
|
|
setup := mockPlugin.EXPECT().SetUpPod(ns, name, cID)
|
|
mockPlugin.EXPECT().TearDownPod(ns, name, cID).After(setup)
|
|
|
|
_, err := ds.RunPodSandbox(getTestCTX(), &runtimeapi.RunPodSandboxRequest{Config: c})
|
|
require.NoError(t, err)
|
|
_, err = ds.StopPodSandbox(getTestCTX(), &runtimeapi.StopPodSandboxRequest{PodSandboxId: cID.ID})
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
// TestHostNetworkPluginInvocation checks that *no* SetUp/TearDown calls happen
|
|
// for host network sandboxes.
|
|
func TestHostNetworkPluginInvocation(t *testing.T) {
|
|
ds, _, _ := newTestDockerService()
|
|
mockPlugin := newTestNetworkPlugin(t)
|
|
ds.network = network.NewPluginManager(mockPlugin)
|
|
defer mockPlugin.Finish()
|
|
|
|
name := "foo0"
|
|
ns := "bar0"
|
|
c := makeSandboxConfigWithLabelsAndAnnotations(
|
|
name, ns, "0", 0,
|
|
map[string]string{"label": name},
|
|
map[string]string{"annotation": ns},
|
|
)
|
|
c.Linux = &runtimeapi.LinuxPodSandboxConfig{
|
|
SecurityContext: &runtimeapi.LinuxSandboxSecurityContext{
|
|
NamespaceOptions: &runtimeapi.NamespaceOption{
|
|
Network: runtimeapi.NamespaceMode_NODE,
|
|
},
|
|
},
|
|
}
|
|
cID := kubecontainer.ContainerID{Type: runtimeName, ID: libdocker.GetFakeContainerID(fmt.Sprintf("/%v", makeSandboxName(c)))}
|
|
|
|
// No calls to network plugin are expected
|
|
_, err := ds.RunPodSandbox(getTestCTX(), &runtimeapi.RunPodSandboxRequest{Config: c})
|
|
require.NoError(t, err)
|
|
|
|
_, err = ds.StopPodSandbox(getTestCTX(), &runtimeapi.StopPodSandboxRequest{PodSandboxId: cID.ID})
|
|
require.NoError(t, err)
|
|
}
|
|
|
|
// TestSetUpPodFailure checks that the sandbox should be not ready when it
|
|
// hits a SetUpPod failure.
|
|
func TestSetUpPodFailure(t *testing.T) {
|
|
ds, _, _ := newTestDockerService()
|
|
mockPlugin := newTestNetworkPlugin(t)
|
|
ds.network = network.NewPluginManager(mockPlugin)
|
|
defer mockPlugin.Finish()
|
|
|
|
name := "foo0"
|
|
ns := "bar0"
|
|
c := makeSandboxConfigWithLabelsAndAnnotations(
|
|
name, ns, "0", 0,
|
|
map[string]string{"label": name},
|
|
map[string]string{"annotation": ns},
|
|
)
|
|
cID := kubecontainer.ContainerID{Type: runtimeName, ID: libdocker.GetFakeContainerID(fmt.Sprintf("/%v", makeSandboxName(c)))}
|
|
mockPlugin.EXPECT().Name().Return("mockNetworkPlugin").AnyTimes()
|
|
mockPlugin.EXPECT().SetUpPod(ns, name, cID).Return(errors.New("setup pod error")).AnyTimes()
|
|
// Assume network plugin doesn't return error, dockershim should still be able to return not ready correctly.
|
|
mockPlugin.EXPECT().GetPodNetworkStatus(ns, name, cID).Return(&network.PodNetworkStatus{IP: net.IP("127.0.0.01")}, nil).AnyTimes()
|
|
|
|
t.Logf("RunPodSandbox should return error")
|
|
_, err := ds.RunPodSandbox(getTestCTX(), &runtimeapi.RunPodSandboxRequest{Config: c})
|
|
assert.Error(t, err)
|
|
|
|
t.Logf("PodSandboxStatus should be not ready")
|
|
statusResp, err := ds.PodSandboxStatus(getTestCTX(), &runtimeapi.PodSandboxStatusRequest{PodSandboxId: cID.ID})
|
|
require.NoError(t, err)
|
|
assert.Equal(t, runtimeapi.PodSandboxState_SANDBOX_NOTREADY, statusResp.Status.State)
|
|
|
|
t.Logf("ListPodSandbox should also show not ready")
|
|
listResp, err := ds.ListPodSandbox(getTestCTX(), &runtimeapi.ListPodSandboxRequest{})
|
|
require.NoError(t, err)
|
|
var sandbox *runtimeapi.PodSandbox
|
|
for _, s := range listResp.Items {
|
|
if s.Id == cID.ID {
|
|
sandbox = s
|
|
break
|
|
}
|
|
}
|
|
assert.NotNil(t, sandbox)
|
|
assert.Equal(t, runtimeapi.PodSandboxState_SANDBOX_NOTREADY, sandbox.State)
|
|
}
|