Skip to content

Commit

Permalink
Add csi-sanity tests
Browse files Browse the repository at this point in the history
  • Loading branch information
ElijahQuinones committed Dec 4, 2024
1 parent 73e6802 commit 72c4b10
Show file tree
Hide file tree
Showing 4 changed files with 363 additions and 0 deletions.
4 changes: 4 additions & 0 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -123,6 +123,10 @@ cluster/uninstall: bin/helm bin/aws
## E2E targets
# Targets to run e2e tests

.PHONY: test-sanity
test-sanity:
go test -v -race ./tests/sanity/...

.PHONY: e2e/single-az
e2e/single-az: bin/helm bin/ginkgo
AWS_AVAILABILITY_ZONES=us-west-2a \
Expand Down
1 change: 1 addition & 0 deletions go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -87,6 +87,7 @@ require (
github.com/josharian/intern v1.0.0 // indirect
github.com/json-iterator/go v1.1.12 // indirect
github.com/klauspost/compress v1.17.11 // indirect
github.com/kubernetes-csi/csi-test/v5 v5.3.1
github.com/kylelemons/godebug v1.1.0 // indirect
github.com/mailru/easyjson v0.7.7 // indirect
github.com/moby/spdystream v0.5.0 // indirect
Expand Down
2 changes: 2 additions & 0 deletions go.sum
Original file line number Diff line number Diff line change
Expand Up @@ -227,6 +227,8 @@ github.com/kubernetes-csi/csi-proxy/client v1.1.3 h1:FdGU7NtxGhQX2wTfnuscmThG920
github.com/kubernetes-csi/csi-proxy/client v1.1.3/go.mod h1:SfK4HVKQdMH5KrffivddAWgX5hl3P5KmnuOTBbDNboU=
github.com/kubernetes-csi/csi-proxy/v2 v2.0.0-alpha.1 h1:tVPvlL5N5X598hrO3g9rhyoi6h0LP4RpSJlGHItsbEE=
github.com/kubernetes-csi/csi-proxy/v2 v2.0.0-alpha.1/go.mod h1:pacx+PW7lLlu6kAvpr8Lgq/5fdiAsKxOtXXFHMaLMb8=
github.com/kubernetes-csi/csi-test/v5 v5.3.1 h1:Wiukp1In+kif+BFo6q2ExjgB+MbrAz4jZWzGfijypuY=
github.com/kubernetes-csi/csi-test/v5 v5.3.1/go.mod h1:7hA2cSYJ6T8CraEZPA6zqkLZwemjBD54XAnPsPC3VpA=
github.com/kubernetes-csi/external-snapshotter/client/v4 v4.2.0 h1:nHHjmvjitIiyPlUHk/ofpgvBcNcawJLtf4PYHORLjAA=
github.com/kubernetes-csi/external-snapshotter/client/v4 v4.2.0/go.mod h1:YBCo4DoEeDndqvAn6eeu0vWM7QdXmHEeI9cFWplmBys=
github.com/kylelemons/godebug v1.1.0 h1:RPNrshWIDI6G2gRW9EHilWtl7Z6Sb1BR0xunSBf0SNc=
Expand Down
356 changes: 356 additions & 0 deletions tests/sanity/sanity_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,356 @@
// Copyright 2024 The Kubernetes Authors.
//
// Licensed under the Apache License, Version 2.0 (the 'License');
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an 'AS IS' BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

//go:build linux
// +build linux

package sanity

import (
"context"
"fmt"
"math/rand"
"os"
"path"
"strconv"
"testing"
"time"

"github.com/aws/aws-sdk-go-v2/aws/arn"
"github.com/golang/mock/gomock"
csisanity "github.com/kubernetes-csi/csi-test/v5/pkg/sanity"
"github.com/kubernetes-sigs/aws-ebs-csi-driver/pkg/cloud"
"github.com/kubernetes-sigs/aws-ebs-csi-driver/pkg/cloud/metadata"
d "github.com/kubernetes-sigs/aws-ebs-csi-driver/pkg/driver"
"github.com/kubernetes-sigs/aws-ebs-csi-driver/pkg/mounter"
"github.com/kubernetes-sigs/aws-ebs-csi-driver/pkg/util"
"google.golang.org/grpc"
"google.golang.org/grpc/credentials/insecure"
)

const (
instanceID = "i-1234567890abcdef0"
region = "us-west-2"
availabilityZone = "us-west-2a"
)

var (
disks = make(map[string]*cloud.Disk)
snapshots = make(map[string]*cloud.Snapshot)
snapshotNameToID = make(map[string]string)
fakeMetaData = &metadata.Metadata{
InstanceID: instanceID,
Region: region,
}
outpostArn = &arn.ARN{
Partition: "aws",
Service: "outposts",
Region: "us-west-2",
AccountID: "123456789012",
Resource: "op-1234567890abcdef0",
}
)

func TestSanity(t *testing.T) {
defer func() {
if r := recover(); r != nil {
t.Errorf("Test panicked: %v", r)
}
}()

mockCtrl := gomock.NewController(t)
defer mockCtrl.Finish()

tmpDir, err := os.MkdirTemp("", "csi-sanity-")
if err != nil {
t.Fatalf("Failed to create sanity temp working dir: %v", err)
}
defer os.RemoveAll(tmpDir)

defer func() {
if err = os.RemoveAll(tmpDir); err != nil {
t.Fatalf("Failed to clean up sanity temp working dir %s: %v", tmpDir, err.Error())
}
}()

endpoint := fmt.Sprintf("unix:%s/csi.sock", tmpDir)
mountPath := path.Join(tmpDir, "mount")
stagePath := path.Join(tmpDir, "stage")

fakeMounter, fakeCloud, fakeMetadataService, fakeKubernetesClient := createMockObjects(mockCtrl)

mockNodeService(fakeMounter, fakeMetadataService, mountPath)
mockControllerService(fakeCloud, mountPath)

driverOptions := &d.Options{
Mode: d.AllMode,
ModifyVolumeRequestHandlerTimeout: 60,
Endpoint: endpoint,
}

drv, err := d.NewDriver(fakeCloud, driverOptions, fakeMounter, fakeMetadataService, fakeKubernetesClient)
if err != nil {
t.Fatalf("Failed to create fake driver: %v", err.Error())
}
go func() {
if err := drv.Run(); err != nil {
panic(fmt.Sprintf("%v", err))
}
}()

config := csisanity.TestConfig{
TargetPath: mountPath,
StagingPath: stagePath,
Address: endpoint,
DialOptions: []grpc.DialOption{grpc.WithTransportCredentials(insecure.NewCredentials())},
IDGen: csisanity.DefaultIDGenerator{},
TestVolumeSize: 10 * util.GiB,
TestVolumeAccessType: "mount",
}
csisanity.Test(t, config)
}

func createMockObjects(mockCtrl *gomock.Controller) (*mounter.MockMounter, *cloud.MockCloud, *metadata.MockMetadataService, *d.MockKubernetesClient) {
fakeMounter := mounter.NewMockMounter(mockCtrl)
fakeCloud := cloud.NewMockCloud(mockCtrl)
fakeMetadataService := metadata.NewMockMetadataService(mockCtrl)
fakeKubernetesClient := d.NewMockKubernetesClient(mockCtrl)

return fakeMounter, fakeCloud, fakeMetadataService, fakeKubernetesClient
}

func mockNodeService(m *mounter.MockMounter, md *metadata.MockMetadataService, mountPath string) {
m.EXPECT().Unpublish(gomock.Any()).Return(nil).AnyTimes()
m.EXPECT().GetDeviceNameFromMount(gomock.Any()).Return("", 0, nil).AnyTimes()
m.EXPECT().Unstage(gomock.Any()).Return(nil).AnyTimes()
m.EXPECT().FormatAndMountSensitiveWithFormatOptions(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Return(nil).AnyTimes()
m.EXPECT().NeedResize(gomock.Any(), gomock.Any()).Return(false, nil).AnyTimes()
m.EXPECT().MakeDir(gomock.Any()).DoAndReturn(
func(path string) error {
err := os.MkdirAll(path, os.FileMode(0755))
if err != nil {
if !os.IsExist(err) {
return err
}
}
return nil
},
).AnyTimes()
m.EXPECT().IsLikelyNotMountPoint(gomock.Any()).Return(true, nil).AnyTimes()
m.EXPECT().Mount(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).Return(nil).AnyTimes()
m.EXPECT().FindDevicePath(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).DoAndReturn(
func(devicePath, volumeID, partition, region string) (string, error) {
if len(devicePath) == 0 {
return devicePath, cloud.ErrNotFound
}
return devicePath, nil
},
).AnyTimes()
m.EXPECT().PreparePublishTarget(gomock.Any()).Return(nil).AnyTimes()
m.EXPECT().IsBlockDevice(gomock.Any()).Return(true, nil).AnyTimes()
m.EXPECT().GetBlockSizeBytes(gomock.Any()).Return(int64(0), nil).AnyTimes()
m.EXPECT().PathExists(gomock.Any()).DoAndReturn(
func(targetPath string) (bool, error) {
if targetPath == mountPath {
return true, nil
}
return false, nil
},
).AnyTimes()
md.EXPECT().GetAvailabilityZone().Return(availabilityZone).AnyTimes()
md.EXPECT().GetOutpostArn().Return(*outpostArn).AnyTimes()
md.EXPECT().GetInstanceID().Return(instanceID).AnyTimes()
md.EXPECT().GetRegion().Return(region).AnyTimes()
}

func mockControllerService(c *cloud.MockCloud, mountPath string) {
// CreateDisk
c.EXPECT().CreateDisk(gomock.Any(), gomock.Any(), gomock.Any()).DoAndReturn(
func(ctx context.Context, volumeID string, diskOptions *cloud.DiskOptions) (*cloud.Disk, error) {
for _, existingDisk := range disks {
if existingDisk.VolumeID == volumeID && existingDisk.CapacityGiB != util.BytesToGiB(diskOptions.CapacityBytes) {
return nil, cloud.ErrAlreadyExists
}
}

if diskOptions.SnapshotID != "" {
if _, exists := snapshots[diskOptions.SnapshotID]; !exists {
return nil, cloud.ErrNotFound
}
}

newDisk := &cloud.Disk{
VolumeID: volumeID,
AvailabilityZone: diskOptions.AvailabilityZone,
CapacityGiB: util.BytesToGiB(diskOptions.CapacityBytes),
}
disks[volumeID] = newDisk
return newDisk, nil
},
).AnyTimes()

// DeleteDisk
c.EXPECT().DeleteDisk(gomock.Any(), gomock.Any()).DoAndReturn(
func(ctx context.Context, volumeID string) (bool, error) {
_, exists := disks[volumeID]
if !exists {
return false, cloud.ErrNotFound
}
delete(disks, volumeID)
return true, nil
},
).AnyTimes()

// GetDiskByID
c.EXPECT().GetDiskByID(gomock.Any(), gomock.Any()).DoAndReturn(
func(ctx context.Context, volumeID string) (*cloud.Disk, error) {
disk, exists := disks[volumeID]
if !exists {
return nil, cloud.ErrNotFound
}
return disk, nil
},
).AnyTimes()

// CreateSnapshot
c.EXPECT().
CreateSnapshot(gomock.Any(), gomock.Any(), gomock.Any()).DoAndReturn(
func(ctx context.Context, volumeID string, opts *cloud.SnapshotOptions) (*cloud.Snapshot, error) {
snapshotID := fmt.Sprintf("snapshot-%d", rand.New(rand.NewSource(time.Now().UnixNano())).Uint64())

_, exists := snapshots[snapshotID]
if exists {
return nil, cloud.ErrAlreadyExists
}
newSnapshot := &cloud.Snapshot{
SnapshotID: snapshotID,
SourceVolumeID: volumeID,
CreationTime: time.Now(),
}
snapshots[snapshotID] = newSnapshot
snapshotNameToID[opts.Tags["CSIVolumeSnapshotName"]] = snapshotID
return newSnapshot, nil
}).AnyTimes()

// DeleteSnapshot
c.EXPECT().DeleteSnapshot(gomock.Any(), gomock.Any()).DoAndReturn(
func(ctx context.Context, snapshotID string) (bool, error) {
if _, exists := snapshots[snapshotID]; !exists {
return false, cloud.ErrNotFound
}
for name, id := range snapshotNameToID {
if id == snapshotID {
delete(snapshotNameToID, name)
break
}
}
delete(snapshots, snapshotID)
return true, nil
},
).AnyTimes()

// GetSnapshotByID
c.EXPECT().GetSnapshotByID(gomock.Any(), gomock.Any()).DoAndReturn(
func(ctx context.Context, snapshotID string) (*cloud.Snapshot, error) {
snapshot, exists := snapshots[snapshotID]
if !exists {
return nil, cloud.ErrNotFound
}
return snapshot, nil
},
).AnyTimes()

// GetSnapshotByName
c.EXPECT().GetSnapshotByName(gomock.Any(), gomock.Any()).DoAndReturn(
func(ctx context.Context, name string) (*cloud.Snapshot, error) {
if snapshotID, exists := snapshotNameToID[name]; exists {
return snapshots[snapshotID], nil
}
return nil, cloud.ErrNotFound
},
).AnyTimes()

// ListSnapshots
c.EXPECT().
ListSnapshots(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).
DoAndReturn(func(ctx context.Context, sourceVolumeID string, maxResults int64, nextToken string) (*cloud.ListSnapshotsResponse, error) {
var s []*cloud.Snapshot
startIndex := 0
var err error

if nextToken != "" {
startIndex, err = strconv.Atoi(nextToken)
if err != nil {
return nil, fmt.Errorf("invalid next token %s", nextToken)
}
}

var nextTokenStr string
count := 0
for _, snap := range snapshots {
if snap.SourceVolumeID == sourceVolumeID || sourceVolumeID == "" {
if startIndex <= count {
s = append(s, snap)
if maxResults > 0 && int64(len(s)) >= maxResults {
nextTokenStr = strconv.Itoa(startIndex + int(maxResults))
break
}
}
count++
}
}

return &cloud.ListSnapshotsResponse{
Snapshots: s,
NextToken: nextTokenStr,
}, nil
}).
AnyTimes()

// AttachDisk
c.EXPECT().AttachDisk(gomock.Any(), gomock.Any(), gomock.Any()).DoAndReturn(
func(ctx context.Context, volumeID string, instanceID string) (string, error) {
_, diskExists := disks[volumeID]
if !diskExists || instanceID != fakeMetaData.InstanceID {
return "", cloud.ErrNotFound
}
return mountPath, nil
},
).AnyTimes()

// DetachDisk
c.EXPECT().DetachDisk(gomock.Any(), gomock.Any(), gomock.Any()).DoAndReturn(
func(ctx context.Context, volumeID string, instanceID string) (bool, error) {
_, diskExists := disks[volumeID]
if !diskExists || instanceID != fakeMetaData.InstanceID {
return false, cloud.ErrNotFound
}
return true, nil
},
).AnyTimes()

// ResizeOrModifyDisk
c.EXPECT().ResizeOrModifyDisk(gomock.Any(), gomock.Any(), gomock.Any(), gomock.Any()).DoAndReturn(
func(ctx context.Context, volumeID string, newSizeBytes int64, modifyOptions *cloud.ModifyDiskOptions) (int64, error) {
disk, exists := disks[volumeID]
if !exists {
return 0, cloud.ErrNotFound
}
newSizeGiB := util.BytesToGiB(newSizeBytes)
disk.CapacityGiB = newSizeGiB
disks[volumeID] = disk
return newSizeBytes, nil
},
).AnyTimes()
}

0 comments on commit 72c4b10

Please sign in to comment.