* Add Virtual Kubelet provider for VIC Initial virtual kubelet provider for VMware VIC. This provider currently handles creating and starting of a pod VM via the VIC portlayer and persona server. Image store handling via the VIC persona server. This provider currently requires the feature/wolfpack branch of VIC. * Added pod stop and delete. Also added node capacity. Added the ability to stop and delete pod VMs via VIC. Also retrieve node capacity information from the VCH. * Cleanup and readme file Some file clean up and added a Readme.md markdown file for the VIC provider. * Cleaned up errors, added function comments, moved operation code 1. Cleaned up error handling. Set standard for creating errors. 2. Added method prototype comments for all interface functions. 3. Moved PodCreator, PodStarter, PodStopper, and PodDeleter to a new folder. * Add mocking code and unit tests for podcache, podcreator, and podstarter Used the unit test framework used in VIC to handle assertions in the provider's unit test. Mocking code generated using OSS project mockery, which is compatible with the testify assertion framework. * Vendored packages for the VIC provider Requires feature/wolfpack branch of VIC and a few specific commit sha of projects used within VIC. * Implementation of POD Stopper and Deleter unit tests (#4) * Updated files for initial PR
301 lines
8.1 KiB
Go
301 lines
8.1 KiB
Go
// Copyright 2016 VMware, Inc. All Rights Reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package main
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"net"
|
|
"net/url"
|
|
"os"
|
|
"path"
|
|
"sync"
|
|
"testing"
|
|
|
|
log "github.com/Sirupsen/logrus"
|
|
"github.com/vishvananda/netlink"
|
|
"golang.org/x/crypto/ssh"
|
|
|
|
"github.com/vmware/vic/lib/config/executor"
|
|
"github.com/vmware/vic/lib/system"
|
|
"github.com/vmware/vic/lib/tether"
|
|
"github.com/vmware/vic/pkg/dio"
|
|
"github.com/vmware/vic/pkg/trace"
|
|
"github.com/vmware/vic/pkg/vsphere/extraconfig"
|
|
)
|
|
|
|
// Copied from lib/tether
|
|
// because there's no easy way to use test code from other packages and a separate
|
|
// package causes cyclic dependencies.
|
|
// Some modifications to deal with the change of package and attach usage
|
|
|
|
var Mocked Mocker
|
|
|
|
type Mocker struct {
|
|
Base tether.BaseOperations
|
|
|
|
// allow tests to tell when the tether has finished setup
|
|
Started chan bool
|
|
// allow tests to tell when the tether has finished
|
|
Cleaned chan bool
|
|
|
|
// debug output gets logged here
|
|
LogBuffer bytes.Buffer
|
|
|
|
// session output gets logged here
|
|
SessionLogBuffer bytes.Buffer
|
|
|
|
// track the number of interfaces for a run
|
|
maxSlot int
|
|
// the interfaces in the system indexed by name
|
|
Interfaces map[string]netlink.Link
|
|
|
|
// the hostname of the system
|
|
Hostname string
|
|
// the ip configuration for name index networks
|
|
IPs map[string]net.IP
|
|
// filesystem mounts, indexed by disk label
|
|
Mounts map[string]string
|
|
|
|
WindowCol uint32
|
|
WindowRow uint32
|
|
Signal ssh.Signal
|
|
|
|
once sync.Once
|
|
}
|
|
|
|
// Start implements the extension method
|
|
func (t *Mocker) Start() error {
|
|
return nil
|
|
}
|
|
|
|
// Stop implements the extension method
|
|
func (t *Mocker) Stop() error {
|
|
return nil
|
|
}
|
|
|
|
// Reload implements the extension method
|
|
func (t *Mocker) Reload(config *tether.ExecutorConfig) error {
|
|
t.once.Do(func() {
|
|
// the tether has definitely finished it's startup by the time we hit this
|
|
close(t.Started)
|
|
})
|
|
return nil
|
|
}
|
|
|
|
func (t *Mocker) Setup(config tether.Config) error {
|
|
return t.Base.Setup(config)
|
|
}
|
|
|
|
func (t *Mocker) Cleanup() error {
|
|
err := t.Base.Cleanup()
|
|
close(t.Cleaned)
|
|
|
|
return err
|
|
}
|
|
|
|
func (t *Mocker) Log() (io.Writer, error) {
|
|
return os.Stdout, nil
|
|
}
|
|
|
|
func (t *Mocker) SessionLog(session *tether.SessionConfig) (dio.DynamicMultiWriter, dio.DynamicMultiWriter, error) {
|
|
return dio.MultiWriter(&t.SessionLogBuffer), dio.MultiWriter(&t.SessionLogBuffer), nil
|
|
}
|
|
|
|
func (t *Mocker) HandleSessionExit(config *tether.ExecutorConfig, session *tether.SessionConfig) func() {
|
|
// check for executor behaviour
|
|
return func() {
|
|
if session.ID == config.ID {
|
|
tthr.Stop()
|
|
}
|
|
}
|
|
}
|
|
|
|
func (t *Mocker) ProcessEnv(env []string) []string {
|
|
return t.Base.ProcessEnv(env)
|
|
}
|
|
|
|
// SetHostname sets both the kernel hostname and /etc/hostname to the specified string
|
|
func (t *Mocker) SetHostname(hostname string, aliases ...string) error {
|
|
defer trace.End(trace.Begin("mocking hostname to " + hostname))
|
|
|
|
// TODO: we could mock at a much finer granularity, only extracting the syscall
|
|
// that would exercise the file modification paths, however it's much less generalizable
|
|
t.Hostname = hostname
|
|
return nil
|
|
}
|
|
|
|
func (t *Mocker) SetupFirewall(ctx context.Context, config *tether.ExecutorConfig) error {
|
|
err := setupFirewall(ctx, &t.Base, config)
|
|
// NOTE: we squash errors from here for now because it's almost certain to fail
|
|
// in absence of a mock for the iptables update
|
|
if err != nil {
|
|
log.Error(err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// Apply takes the network endpoint configuration and applies it to the system
|
|
func (t *Mocker) Apply(endpoint *tether.NetworkEndpoint) error {
|
|
return tether.ApplyEndpoint(t, &t.Base, endpoint)
|
|
}
|
|
|
|
// MountLabel performs a mount with the source treated as a disk label
|
|
// This assumes that /dev/disk/by-label is being populated, probably by udev
|
|
func (t *Mocker) MountLabel(ctx context.Context, label, target string) error {
|
|
defer trace.End(trace.Begin(fmt.Sprintf("mocking mounting %s on %s", label, target)))
|
|
|
|
if t.Mounts == nil {
|
|
t.Mounts = make(map[string]string)
|
|
}
|
|
|
|
t.Mounts[label] = target
|
|
return nil
|
|
}
|
|
|
|
// MountTarget performs a mount with the source treated as an nfs target
|
|
func (t *Mocker) MountTarget(ctx context.Context, source url.URL, target string, mountOptions string) error {
|
|
defer trace.End(trace.Begin(fmt.Sprintf("mocking mounting %s on %s", source.String(), target)))
|
|
|
|
if t.Mounts == nil {
|
|
t.Mounts = make(map[string]string)
|
|
}
|
|
|
|
t.Mounts[source.String()] = target
|
|
return nil
|
|
}
|
|
|
|
// CopyExistingContent copies the underlying files shadowed by a mount on a directory
|
|
// to the volume mounted on the directory
|
|
func (t *Mocker) CopyExistingContent(source string) error {
|
|
defer trace.End(trace.Begin(fmt.Sprintf("mocking copyExistingContent from %s", source)))
|
|
return nil
|
|
}
|
|
|
|
// Fork triggers vmfork and handles the necessary pre/post OS level operations
|
|
func (t *Mocker) Fork() error {
|
|
return errors.New("Fork test not implemented")
|
|
}
|
|
|
|
// LaunchUtility uses the underlying implementation for launching and tracking utility processes
|
|
func (t *Mocker) LaunchUtility(fn tether.UtilityFn) (<-chan int, error) {
|
|
return t.Base.LaunchUtility(fn)
|
|
}
|
|
|
|
func (t *Mocker) HandleUtilityExit(pid, exitCode int) bool {
|
|
return t.Base.HandleUtilityExit(pid, exitCode)
|
|
}
|
|
|
|
// TestMain simply so we have control of debugging level and somewhere to call package wide test setup
|
|
func TestMain(m *testing.M) {
|
|
log.SetLevel(log.DebugLevel)
|
|
|
|
retCode := m.Run()
|
|
|
|
// call with result of m.Run()
|
|
os.Exit(retCode)
|
|
}
|
|
|
|
func StartTether(t *testing.T, cfg *executor.ExecutorConfig, mocker *Mocker) (tether.Tether, extraconfig.DataSource, extraconfig.DataSink) {
|
|
store := extraconfig.New()
|
|
sink := store.Put
|
|
src := store.Get
|
|
extraconfig.Encode(sink, cfg)
|
|
log.Debugf("Test configuration: %#v", sink)
|
|
|
|
tthr = tether.New(src, sink, mocker)
|
|
tthr.Register("mocker", mocker)
|
|
|
|
// run the tether to service the attach
|
|
go func() {
|
|
erR := tthr.Start()
|
|
if erR != nil {
|
|
t.Error(erR)
|
|
}
|
|
}()
|
|
|
|
return tthr, src, sink
|
|
}
|
|
|
|
func StartAttachTether(t *testing.T, cfg *executor.ExecutorConfig, mocker *Mocker) (tether.Tether, extraconfig.DataSource, net.Conn) {
|
|
store := extraconfig.New()
|
|
sink := store.Put
|
|
src := store.Get
|
|
extraconfig.Encode(sink, cfg)
|
|
log.Debugf("Test configuration: %#v", sink)
|
|
|
|
tthr = tether.New(src, sink, mocker)
|
|
tthr.Register("mocker", mocker)
|
|
tthr.Register("Attach", server)
|
|
|
|
// run the tether to service the attach
|
|
go func() {
|
|
erR := tthr.Start()
|
|
if erR != nil {
|
|
t.Error(erR)
|
|
}
|
|
}()
|
|
|
|
// create client on the mock pipe
|
|
conn, err := mockBackChannel(context.Background())
|
|
if err != nil && (err != io.EOF || server.(*testAttachServer).enabled) {
|
|
// we accept the case where the error is end-of-file and the attach server is disabled because that's
|
|
// expected when the tether is shut down.
|
|
t.Error(err)
|
|
}
|
|
|
|
return tthr, src, conn
|
|
}
|
|
|
|
func tetherTestSetup(t *testing.T) *Mocker {
|
|
log.Infof("Started test setup for %s", t.Name())
|
|
|
|
// use the mock ops - fresh one each time as tests might apply different mocked calls
|
|
mocker := Mocker{
|
|
Started: make(chan bool),
|
|
Cleaned: make(chan bool),
|
|
Interfaces: make(map[string]netlink.Link, 0),
|
|
}
|
|
|
|
// replace the Sys variable with a mock
|
|
tether.Sys = system.NewWithRoot(pathPrefix)
|
|
tether.Sys.Syscall = &tether.MockSyscall{}
|
|
|
|
tether.BindSys = system.NewWithRoot(path.Join(pathPrefix, "/.tether"))
|
|
tether.BindSys.Syscall = &tether.MockSyscall{}
|
|
|
|
// ensure that the sys and bindsys root exists
|
|
// #nosec
|
|
os.MkdirAll(tether.Sys.Root, 0700)
|
|
// #nosec
|
|
os.MkdirAll(tether.BindSys.Root, 0700)
|
|
|
|
return &mocker
|
|
}
|
|
|
|
func tetherTestTeardown(t *testing.T, mocker *Mocker) {
|
|
<-mocker.Cleaned
|
|
|
|
// cleanup
|
|
os.RemoveAll(pathPrefix)
|
|
log.SetOutput(os.Stdout)
|
|
|
|
log.Infof("Finished test teardown for %s", t.Name())
|
|
}
|