
The enum constants are not namespaced. The shorter, unspecifc names are likely to cause naming conflicts in the future. Also replace "SandBox" with "Sandbox" in the API.
197 lines
6.6 KiB
Go
197 lines
6.6 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package dockershim
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
runtimeApi "k8s.io/kubernetes/pkg/kubelet/api/v1alpha1/runtime"
|
|
kubecontainer "k8s.io/kubernetes/pkg/kubelet/container"
|
|
"k8s.io/kubernetes/pkg/kubelet/types"
|
|
)
|
|
|
|
// A helper to create a basic config.
|
|
func makeSandboxConfig(name, namespace, uid string, attempt uint32) *runtimeApi.PodSandboxConfig {
|
|
return makeSandboxConfigWithLabelsAndAnnotations(name, namespace, uid, attempt, map[string]string{}, map[string]string{})
|
|
}
|
|
|
|
func makeSandboxConfigWithLabelsAndAnnotations(name, namespace, uid string, attempt uint32, labels, annotations map[string]string) *runtimeApi.PodSandboxConfig {
|
|
return &runtimeApi.PodSandboxConfig{
|
|
Metadata: &runtimeApi.PodSandboxMetadata{
|
|
Name: &name,
|
|
Namespace: &namespace,
|
|
Uid: &uid,
|
|
Attempt: &attempt,
|
|
},
|
|
Labels: labels,
|
|
Annotations: annotations,
|
|
}
|
|
}
|
|
|
|
// TestListSandboxes creates several sandboxes and then list them to check
|
|
// whether the correct metadatas, states, and labels are returned.
|
|
func TestListSandboxes(t *testing.T) {
|
|
ds, _, _ := newTestDockerService()
|
|
name, namespace := "foo", "bar"
|
|
configs := []*runtimeApi.PodSandboxConfig{}
|
|
for i := 0; i < 3; i++ {
|
|
c := makeSandboxConfigWithLabelsAndAnnotations(fmt.Sprintf("%s%d", name, i),
|
|
fmt.Sprintf("%s%d", namespace, i), fmt.Sprintf("%d", i), 0,
|
|
map[string]string{"label": fmt.Sprintf("foo%d", i)},
|
|
map[string]string{"annotation": fmt.Sprintf("bar%d", i)},
|
|
)
|
|
configs = append(configs, c)
|
|
}
|
|
|
|
expected := []*runtimeApi.PodSandbox{}
|
|
state := runtimeApi.PodSandboxState_SANDBOX_READY
|
|
var createdAt int64 = 0
|
|
for i := range configs {
|
|
id, err := ds.RunPodSandbox(configs[i])
|
|
assert.NoError(t, err)
|
|
// Prepend to the expected list because ListPodSandbox returns
|
|
// the most recent sandbox first.
|
|
expected = append([]*runtimeApi.PodSandbox{{
|
|
Metadata: configs[i].Metadata,
|
|
Id: &id,
|
|
State: &state,
|
|
CreatedAt: &createdAt,
|
|
Labels: configs[i].Labels,
|
|
Annotations: configs[i].Annotations,
|
|
}}, expected...)
|
|
}
|
|
sandboxes, err := ds.ListPodSandbox(nil)
|
|
assert.NoError(t, err)
|
|
assert.Len(t, sandboxes, len(expected))
|
|
assert.Equal(t, expected, sandboxes)
|
|
}
|
|
|
|
// TestSandboxStatus tests the basic lifecycle operations and verify that
|
|
// the status returned reflects the operations performed.
|
|
func TestSandboxStatus(t *testing.T) {
|
|
ds, fDocker, fClock := newTestDockerService()
|
|
labels := map[string]string{"label": "foobar1"}
|
|
annotations := map[string]string{"annotation": "abc"}
|
|
config := makeSandboxConfigWithLabelsAndAnnotations("foo", "bar", "1", 0, labels, annotations)
|
|
|
|
// TODO: The following variables depend on the internal
|
|
// implementation of FakeDockerClient, and should be fixed.
|
|
fakeIP := "2.3.4.5"
|
|
fakeNS := fmt.Sprintf("/proc/%d/ns/net", os.Getpid())
|
|
|
|
state := runtimeApi.PodSandboxState_SANDBOX_READY
|
|
ct := int64(0)
|
|
hostNetwork := false
|
|
expected := &runtimeApi.PodSandboxStatus{
|
|
State: &state,
|
|
CreatedAt: &ct,
|
|
Metadata: config.Metadata,
|
|
Network: &runtimeApi.PodSandboxNetworkStatus{Ip: &fakeIP},
|
|
Linux: &runtimeApi.LinuxPodSandboxStatus{Namespaces: &runtimeApi.Namespace{Network: &fakeNS, Options: &runtimeApi.NamespaceOption{HostNetwork: &hostNetwork}}},
|
|
Labels: labels,
|
|
Annotations: annotations,
|
|
}
|
|
|
|
// Create the sandbox.
|
|
fClock.SetTime(time.Now())
|
|
*expected.CreatedAt = fClock.Now().UnixNano()
|
|
id, err := ds.RunPodSandbox(config)
|
|
|
|
// Check internal labels
|
|
c, err := fDocker.InspectContainer(id)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, c.Config.Labels[containerTypeLabelKey], containerTypeLabelSandbox)
|
|
assert.Equal(t, c.Config.Labels[types.KubernetesContainerNameLabel], sandboxContainerName)
|
|
|
|
expected.Id = &id // ID is only known after the creation.
|
|
status, err := ds.PodSandboxStatus(id)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, expected, status)
|
|
|
|
// Stop the sandbox.
|
|
*expected.State = runtimeApi.PodSandboxState_SANDBOX_NOTREADY
|
|
err = ds.StopPodSandbox(id)
|
|
assert.NoError(t, err)
|
|
status, err = ds.PodSandboxStatus(id)
|
|
assert.Equal(t, expected, status)
|
|
|
|
// Remove the container.
|
|
err = ds.RemovePodSandbox(id)
|
|
assert.NoError(t, err)
|
|
status, err = ds.PodSandboxStatus(id)
|
|
assert.Error(t, err, fmt.Sprintf("status of sandbox: %+v", status))
|
|
}
|
|
|
|
// TestNetworkPluginInvocation checks that the right SetUpPod and TearDownPod
|
|
// calls are made when we run/stop a sandbox.
|
|
func TestNetworkPluginInvocation(t *testing.T) {
|
|
ds, _, _ := newTestDockerService()
|
|
mockPlugin := newTestNetworkPlugin(t)
|
|
ds.networkPlugin = mockPlugin
|
|
defer mockPlugin.Finish()
|
|
|
|
name := "foo0"
|
|
ns := "bar0"
|
|
c := makeSandboxConfigWithLabelsAndAnnotations(
|
|
name, ns, "0", 0,
|
|
map[string]string{"label": name},
|
|
map[string]string{"annotation": ns},
|
|
)
|
|
cID := kubecontainer.ContainerID{Type: runtimeName, ID: fmt.Sprintf("/%v", makeSandboxName(c))}
|
|
|
|
setup := mockPlugin.EXPECT().SetUpPod(ns, name, cID)
|
|
// StopPodSandbox performs a lookup on status to figure out if the sandbox
|
|
// is running with hostnetworking, as all its given is the ID.
|
|
mockPlugin.EXPECT().GetPodNetworkStatus(ns, name, cID)
|
|
mockPlugin.EXPECT().TearDownPod(ns, name, cID).After(setup)
|
|
|
|
_, err := ds.RunPodSandbox(c)
|
|
assert.NoError(t, err)
|
|
err = ds.StopPodSandbox(cID.ID)
|
|
assert.NoError(t, err)
|
|
}
|
|
|
|
// TestHostNetworkPluginInvocation checks that *no* SetUp/TearDown calls happen
|
|
// for host network sandboxes.
|
|
func TestHostNetworkPluginInvocation(t *testing.T) {
|
|
ds, _, _ := newTestDockerService()
|
|
mockPlugin := newTestNetworkPlugin(t)
|
|
ds.networkPlugin = mockPlugin
|
|
defer mockPlugin.Finish()
|
|
|
|
name := "foo0"
|
|
ns := "bar0"
|
|
c := makeSandboxConfigWithLabelsAndAnnotations(
|
|
name, ns, "0", 0,
|
|
map[string]string{"label": name},
|
|
map[string]string{"annotation": ns},
|
|
)
|
|
hostNetwork := true
|
|
c.Linux = &runtimeApi.LinuxPodSandboxConfig{NamespaceOptions: &runtimeApi.NamespaceOption{HostNetwork: &hostNetwork}}
|
|
cID := kubecontainer.ContainerID{Type: runtimeName, ID: fmt.Sprintf("/%v", makeSandboxName(c))}
|
|
|
|
// No calls to network plugin are expected
|
|
_, err := ds.RunPodSandbox(c)
|
|
assert.NoError(t, err)
|
|
assert.NoError(t, ds.StopPodSandbox(cID.ID))
|
|
}
|