mirror of
https://github.com/vmware-tanzu/velero.git
synced 2026-01-08 14:21:18 +00:00
Change the CreateFileToPod function's OS parameter as the E2E pass-in value.
Fix GetResourceWithLabel's bug: labels were not applied. Add workOS for deployment and pod creationg. Add OS label for select node. Enlarge the context timeout to 10 minutes. 5 min is not enough for Windows. Enlarge the Kibishii test context to 15 minutes for Windows. Signed-off-by: Xun Jiang <xun.jiang@broadcom.com>
This commit is contained in:
@@ -109,7 +109,7 @@ func BackupRestoreTest(backupRestoreTestConfig BackupRestoreTestConfig) {
|
||||
DeleteStorageClass(context.Background(), *veleroCfg.ClientToInstallVelero, KibishiiStorageClassName)
|
||||
})
|
||||
if InstallVelero {
|
||||
ctx, ctxCancel := context.WithTimeout(context.Background(), time.Minute*5)
|
||||
ctx, ctxCancel := context.WithTimeout(context.Background(), time.Minute*10)
|
||||
defer ctxCancel()
|
||||
err = VeleroUninstall(ctx, veleroCfg)
|
||||
Expect(err).To(Succeed())
|
||||
|
||||
@@ -29,6 +29,7 @@ import (
|
||||
|
||||
. "github.com/vmware-tanzu/velero/test"
|
||||
. "github.com/vmware-tanzu/velero/test/e2e/test"
|
||||
"github.com/vmware-tanzu/velero/test/util/common"
|
||||
. "github.com/vmware-tanzu/velero/test/util/common"
|
||||
. "github.com/vmware-tanzu/velero/test/util/k8s"
|
||||
)
|
||||
@@ -77,11 +78,6 @@ func (v *BackupVolumeInfo) Init() error {
|
||||
}
|
||||
|
||||
func (v *BackupVolumeInfo) Start() error {
|
||||
if v.VeleroCfg.CloudProvider == Vsphere && (!strings.Contains(v.CaseBaseName, "fs-upload") && !strings.Contains(v.CaseBaseName, "skipped")) {
|
||||
fmt.Printf("Skip snapshot case %s for vsphere environment.\n", v.CaseBaseName)
|
||||
Skip("Skip snapshot case due to vsphere environment doesn't cover the CSI test, and it doesn't have a Velero native snapshot plugin.")
|
||||
}
|
||||
|
||||
if strings.Contains(v.VeleroCfg.Features, FeatureCSI) {
|
||||
if strings.Contains(v.CaseBaseName, "native-snapshot") {
|
||||
fmt.Printf("Skip native snapshot case %s when the CSI feature is enabled.\n", v.CaseBaseName)
|
||||
@@ -100,6 +96,12 @@ func (v *BackupVolumeInfo) CreateResources() error {
|
||||
labels := map[string]string{
|
||||
"volume-info": "true",
|
||||
}
|
||||
|
||||
if v.VeleroCfg.WorkerOS == common.WorkerOSWindows {
|
||||
labels["pod-security.kubernetes.io/enforce"] = "privileged"
|
||||
labels["pod-security.kubernetes.io/enforce-version"] = "latest"
|
||||
}
|
||||
|
||||
for nsNum := 0; nsNum < v.NamespacesTotal; nsNum++ {
|
||||
fmt.Printf("Creating namespaces ...\n")
|
||||
createNSName := v.CaseBaseName
|
||||
@@ -121,7 +123,14 @@ func (v *BackupVolumeInfo) CreateResources() error {
|
||||
volumeName := fmt.Sprintf("volume-info-pv-%d", i)
|
||||
vols = append(vols, CreateVolumes(pvc.Name, []string{volumeName})...)
|
||||
}
|
||||
deployment := NewDeployment(v.CaseBaseName, createNSName, 1, labels, v.VeleroCfg.ImageRegistryProxy).WithVolume(vols).Result()
|
||||
deployment := NewDeployment(
|
||||
v.CaseBaseName,
|
||||
createNSName,
|
||||
1,
|
||||
labels,
|
||||
v.VeleroCfg.ImageRegistryProxy,
|
||||
v.VeleroCfg.WorkerOS,
|
||||
).WithVolume(vols).Result()
|
||||
deployment, err := CreateDeployment(v.Client.ClientGo, createNSName, deployment)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, fmt.Sprintf("failed to delete the namespace %q", createNSName))
|
||||
@@ -139,14 +148,13 @@ func (v *BackupVolumeInfo) CreateResources() error {
|
||||
// So populate data only to some of pods, leave other pods empty to verify empty PV datamover
|
||||
if i%2 == 0 {
|
||||
Expect(CreateFileToPod(
|
||||
v.Ctx,
|
||||
createNSName,
|
||||
pod.Name,
|
||||
DefaultContainerName,
|
||||
vols[i].Name,
|
||||
fmt.Sprintf("file-%s", pod.Name),
|
||||
CreateFileContent(createNSName, pod.Name, vols[i].Name),
|
||||
WorkerOSLinux,
|
||||
v.VeleroCfg.WorkerOS,
|
||||
)).To(Succeed())
|
||||
}
|
||||
}
|
||||
|
||||
@@ -10,6 +10,7 @@ import (
|
||||
velerov1api "github.com/vmware-tanzu/velero/pkg/apis/velero/v1"
|
||||
. "github.com/vmware-tanzu/velero/test"
|
||||
. "github.com/vmware-tanzu/velero/test/e2e/test"
|
||||
"github.com/vmware-tanzu/velero/test/util/common"
|
||||
. "github.com/vmware-tanzu/velero/test/util/k8s"
|
||||
. "github.com/vmware-tanzu/velero/test/util/velero"
|
||||
)
|
||||
@@ -64,19 +65,36 @@ func (p *PVCSelectedNodeChanging) Init() error {
|
||||
|
||||
func (p *PVCSelectedNodeChanging) CreateResources() error {
|
||||
By(fmt.Sprintf("Create namespace %s", p.namespace), func() {
|
||||
Expect(CreateNamespace(p.Ctx, p.Client, p.namespace)).To(Succeed(),
|
||||
labels := make(map[string]string)
|
||||
if p.VeleroCfg.WorkerOS == common.WorkerOSWindows {
|
||||
labels = map[string]string{
|
||||
"pod-security.kubernetes.io/enforce": "privileged",
|
||||
"pod-security.kubernetes.io/enforce-version": "latest",
|
||||
}
|
||||
}
|
||||
Expect(CreateNamespaceWithLabel(p.Ctx, p.Client, p.namespace, labels)).To(Succeed(),
|
||||
fmt.Sprintf("Failed to create namespace %s", p.namespace))
|
||||
})
|
||||
|
||||
By(fmt.Sprintf("Create pod %s in namespace %s", p.podName, p.namespace), func() {
|
||||
nodeNameList, err := GetWorkerNodes(p.Ctx)
|
||||
nodeNameList, err := GetWorkerNodes(p.Ctx, p.VeleroCfg.WorkerOS)
|
||||
Expect(err).To(Succeed())
|
||||
for _, nodeName := range nodeNameList {
|
||||
p.oldNodeName = nodeName
|
||||
fmt.Printf("Create PVC on node %s\n", p.oldNodeName)
|
||||
pvcAnn := map[string]string{p.ann: nodeName}
|
||||
_, err := CreatePod(p.Client, p.namespace, p.podName, StorageClassName, p.pvcName, []string{p.volume},
|
||||
pvcAnn, nil, p.VeleroCfg.ImageRegistryProxy)
|
||||
_, err := CreatePod(
|
||||
p.Client,
|
||||
p.namespace,
|
||||
p.podName,
|
||||
StorageClassName,
|
||||
p.pvcName,
|
||||
[]string{p.volume},
|
||||
pvcAnn,
|
||||
nil,
|
||||
p.VeleroCfg.ImageRegistryProxy,
|
||||
p.VeleroCfg.WorkerOS,
|
||||
)
|
||||
Expect(err).To(Succeed())
|
||||
err = WaitForPods(p.Ctx, p.Client, p.namespace, []string{p.podName})
|
||||
Expect(err).To(Succeed())
|
||||
@@ -85,8 +103,9 @@ func (p *PVCSelectedNodeChanging) CreateResources() error {
|
||||
})
|
||||
|
||||
By("Prepare ConfigMap data", func() {
|
||||
nodeNameList, err := GetWorkerNodes(p.Ctx)
|
||||
nodeNameList, err := GetWorkerNodes(p.Ctx, p.VeleroCfg.WorkerOS)
|
||||
Expect(err).To(Succeed())
|
||||
// Expect Windows node or Linux node number are no less than 2.
|
||||
Expect(len(nodeNameList)).To(BeNumerically(">=", 2))
|
||||
for _, nodeName := range nodeNameList {
|
||||
if nodeName != p.oldNodeName {
|
||||
|
||||
@@ -10,6 +10,7 @@ import (
|
||||
velerov1api "github.com/vmware-tanzu/velero/pkg/apis/velero/v1"
|
||||
. "github.com/vmware-tanzu/velero/test"
|
||||
. "github.com/vmware-tanzu/velero/test/e2e/test"
|
||||
"github.com/vmware-tanzu/velero/test/util/common"
|
||||
. "github.com/vmware-tanzu/velero/test/util/k8s"
|
||||
. "github.com/vmware-tanzu/velero/test/util/velero"
|
||||
)
|
||||
@@ -73,7 +74,14 @@ func (s *StorageClasssChanging) CreateResources() error {
|
||||
}
|
||||
|
||||
By(fmt.Sprintf("Create namespace %s", s.namespace), func() {
|
||||
Expect(CreateNamespace(s.Ctx, s.Client, s.namespace)).To(Succeed(),
|
||||
nsLabels := make(map[string]string)
|
||||
if s.VeleroCfg.WorkerOS == common.WorkerOSWindows {
|
||||
nsLabels = map[string]string{
|
||||
"pod-security.kubernetes.io/enforce": "privileged",
|
||||
"pod-security.kubernetes.io/enforce-version": "latest",
|
||||
}
|
||||
}
|
||||
Expect(CreateNamespaceWithLabel(s.Ctx, s.Client, s.namespace, nsLabels)).To(Succeed(),
|
||||
fmt.Sprintf("Failed to create namespace %s", s.namespace))
|
||||
})
|
||||
|
||||
@@ -82,7 +90,14 @@ func (s *StorageClasssChanging) CreateResources() error {
|
||||
Expect(err).To(Succeed())
|
||||
vols := CreateVolumes(pvc.Name, []string{s.volume})
|
||||
|
||||
deployment := NewDeployment(s.CaseBaseName, s.namespace, 1, label, s.VeleroCfg.ImageRegistryProxy).WithVolume(vols).Result()
|
||||
deployment := NewDeployment(
|
||||
s.CaseBaseName,
|
||||
s.namespace,
|
||||
1,
|
||||
label,
|
||||
s.VeleroCfg.ImageRegistryProxy,
|
||||
s.VeleroCfg.WorkerOS,
|
||||
).WithVolume(vols).Result()
|
||||
deployment, err = CreateDeployment(s.Client.ClientGo, s.namespace, deployment)
|
||||
Expect(err).To(Succeed())
|
||||
s.deploymentName = deployment.Name
|
||||
|
||||
@@ -24,6 +24,7 @@ import (
|
||||
|
||||
. "github.com/vmware-tanzu/velero/test"
|
||||
. "github.com/vmware-tanzu/velero/test/e2e/test"
|
||||
"github.com/vmware-tanzu/velero/test/util/common"
|
||||
. "github.com/vmware-tanzu/velero/test/util/k8s"
|
||||
)
|
||||
|
||||
@@ -90,13 +91,30 @@ func (p *ParallelFilesDownload) Init() error {
|
||||
|
||||
func (p *ParallelFilesDownload) CreateResources() error {
|
||||
By(fmt.Sprintf("Create namespace %s", p.namespace), func() {
|
||||
Expect(CreateNamespace(p.Ctx, p.Client, p.namespace)).To(Succeed(),
|
||||
labels := make(map[string]string)
|
||||
if p.VeleroCfg.WorkerOS == common.WorkerOSWindows {
|
||||
labels = map[string]string{
|
||||
"pod-security.kubernetes.io/enforce": "privileged",
|
||||
"pod-security.kubernetes.io/enforce-version": "latest",
|
||||
}
|
||||
}
|
||||
Expect(CreateNamespaceWithLabel(p.Ctx, p.Client, p.namespace, labels)).To(Succeed(),
|
||||
fmt.Sprintf("Failed to create namespace %s", p.namespace))
|
||||
})
|
||||
|
||||
By(fmt.Sprintf("Create pod %s in namespace %s", p.pod, p.namespace), func() {
|
||||
_, err := CreatePod(p.Client, p.namespace, p.pod, StorageClassName, p.pvc, []string{p.volume},
|
||||
nil, nil, p.VeleroCfg.ImageRegistryProxy)
|
||||
_, err := CreatePod(
|
||||
p.Client,
|
||||
p.namespace,
|
||||
p.pod,
|
||||
StorageClassName,
|
||||
p.pvc,
|
||||
[]string{p.volume},
|
||||
nil,
|
||||
nil,
|
||||
p.VeleroCfg.ImageRegistryProxy,
|
||||
p.VeleroCfg.WorkerOS,
|
||||
)
|
||||
Expect(err).To(Succeed())
|
||||
err = WaitForPods(p.Ctx, p.Client, p.namespace, []string{p.pod})
|
||||
Expect(err).To(Succeed())
|
||||
|
||||
@@ -24,6 +24,7 @@ import (
|
||||
|
||||
. "github.com/vmware-tanzu/velero/test"
|
||||
. "github.com/vmware-tanzu/velero/test/e2e/test"
|
||||
"github.com/vmware-tanzu/velero/test/util/common"
|
||||
. "github.com/vmware-tanzu/velero/test/util/k8s"
|
||||
)
|
||||
|
||||
@@ -81,13 +82,31 @@ func (p *ParallelFilesUpload) Init() error {
|
||||
|
||||
func (p *ParallelFilesUpload) CreateResources() error {
|
||||
By(fmt.Sprintf("Create namespace %s", p.namespace), func() {
|
||||
Expect(CreateNamespace(p.Ctx, p.Client, p.namespace)).To(Succeed(),
|
||||
labels := make(map[string]string)
|
||||
if p.VeleroCfg.WorkerOS == common.WorkerOSWindows {
|
||||
labels = map[string]string{
|
||||
"pod-security.kubernetes.io/enforce": "privileged",
|
||||
"pod-security.kubernetes.io/enforce-version": "latest",
|
||||
}
|
||||
}
|
||||
|
||||
Expect(CreateNamespaceWithLabel(p.Ctx, p.Client, p.namespace, labels)).To(Succeed(),
|
||||
fmt.Sprintf("Failed to create namespace %s", p.namespace))
|
||||
})
|
||||
|
||||
By(fmt.Sprintf("Create pod %s in namespace %s", p.pod, p.namespace), func() {
|
||||
_, err := CreatePod(p.Client, p.namespace, p.pod, StorageClassName, p.pvc,
|
||||
[]string{p.volume}, nil, nil, p.VeleroCfg.ImageRegistryProxy)
|
||||
_, err := CreatePod(
|
||||
p.Client,
|
||||
p.namespace,
|
||||
p.pod,
|
||||
StorageClassName,
|
||||
p.pvc,
|
||||
[]string{p.volume},
|
||||
nil,
|
||||
nil,
|
||||
p.VeleroCfg.ImageRegistryProxy,
|
||||
p.VeleroCfg.WorkerOS,
|
||||
)
|
||||
Expect(err).To(Succeed())
|
||||
err = WaitForPods(p.Ctx, p.Client, p.namespace, []string{p.pod})
|
||||
Expect(err).To(Succeed())
|
||||
|
||||
@@ -4,6 +4,7 @@ import (
|
||||
"context"
|
||||
"fmt"
|
||||
"strings"
|
||||
"unicode"
|
||||
|
||||
. "github.com/onsi/ginkgo/v2"
|
||||
. "github.com/onsi/gomega"
|
||||
@@ -11,6 +12,7 @@ import (
|
||||
|
||||
. "github.com/vmware-tanzu/velero/test"
|
||||
. "github.com/vmware-tanzu/velero/test/e2e/test"
|
||||
"github.com/vmware-tanzu/velero/test/util/common"
|
||||
. "github.com/vmware-tanzu/velero/test/util/common"
|
||||
. "github.com/vmware-tanzu/velero/test/util/k8s"
|
||||
)
|
||||
@@ -65,7 +67,14 @@ func (p *PVBackupFiltering) Init() error {
|
||||
func (p *PVBackupFiltering) CreateResources() error {
|
||||
for _, ns := range *p.NSIncluded {
|
||||
By(fmt.Sprintf("Create namespaces %s for workload\n", ns), func() {
|
||||
Expect(CreateNamespace(p.Ctx, p.Client, ns)).To(Succeed(), fmt.Sprintf("Failed to create namespace %s", ns))
|
||||
labels := make(map[string]string)
|
||||
if p.VeleroCfg.WorkerOS == common.WorkerOSWindows {
|
||||
labels = map[string]string{
|
||||
"pod-security.kubernetes.io/enforce": "privileged",
|
||||
"pod-security.kubernetes.io/enforce-version": "latest",
|
||||
}
|
||||
}
|
||||
Expect(CreateNamespaceWithLabel(p.Ctx, p.Client, ns, labels)).To(Succeed(), fmt.Sprintf("Failed to create namespace %s", ns))
|
||||
})
|
||||
var pods []string
|
||||
By(fmt.Sprintf("Deploy a few pods with several PVs in namespace %s", ns), func() {
|
||||
@@ -87,8 +96,18 @@ func (p *PVBackupFiltering) CreateResources() error {
|
||||
podName := fmt.Sprintf("pod-%d", i)
|
||||
pods = append(pods, podName)
|
||||
By(fmt.Sprintf("Create pod %s in namespace %s", podName, ns), func() {
|
||||
pod, err := CreatePod(p.Client, ns, podName, StorageClassName, "",
|
||||
volumes, nil, nil, p.VeleroCfg.ImageRegistryProxy)
|
||||
pod, err := CreatePod(
|
||||
p.Client,
|
||||
ns,
|
||||
podName,
|
||||
StorageClassName,
|
||||
"",
|
||||
volumes,
|
||||
nil,
|
||||
nil,
|
||||
p.VeleroCfg.ImageRegistryProxy,
|
||||
p.VeleroCfg.WorkerOS,
|
||||
)
|
||||
Expect(err).To(Succeed())
|
||||
ann := map[string]string{
|
||||
p.annotation: volumesToAnnotation,
|
||||
@@ -116,7 +135,6 @@ func (p *PVBackupFiltering) CreateResources() error {
|
||||
for i, pod := range p.podsList[index] {
|
||||
for j := range p.volumesList[i] {
|
||||
Expect(CreateFileToPod(
|
||||
p.Ctx,
|
||||
ns,
|
||||
pod,
|
||||
pod,
|
||||
@@ -207,16 +225,20 @@ func fileExist(
|
||||
volume string,
|
||||
workerOS string,
|
||||
) error {
|
||||
c, _, err := ReadFileFromPodVolume(ctx, namespace, podName, podName, volume, FILE_NAME, workerOS)
|
||||
c, _, err := ReadFileFromPodVolume(namespace, podName, podName, volume, FILE_NAME, workerOS)
|
||||
if err != nil {
|
||||
fmt.Printf("Fail to read file %s from volume %s of pod %s in %s: %s",
|
||||
FILE_NAME, volume, podName, namespace, err.Error(),
|
||||
)
|
||||
return errors.Wrap(err, fmt.Sprintf("Fail to read file %s from volume %s of pod %s in %s ",
|
||||
FILE_NAME, volume, podName, namespace))
|
||||
}
|
||||
c = strings.Replace(c, "\n", "", -1)
|
||||
origin_content := strings.Replace(CreateFileContent(namespace, podName, volume), "\n", "", -1)
|
||||
c = strings.TrimRightFunc(c, unicode.IsSpace)
|
||||
origin_content := strings.TrimRightFunc(CreateFileContent(namespace, podName, volume), unicode.IsSpace)
|
||||
if c == origin_content {
|
||||
return nil
|
||||
} else {
|
||||
fmt.Printf("Content not match: \n origin: %s\n result: %s\n", origin_content, c)
|
||||
return errors.New(fmt.Sprintf("UNEXPECTED: File %s does not exist in volume %s of pod %s in namespace %s.",
|
||||
FILE_NAME, volume, podName, namespace))
|
||||
}
|
||||
@@ -228,7 +250,7 @@ func fileNotExist(
|
||||
volume string,
|
||||
workerOS string,
|
||||
) error {
|
||||
_, _, err := ReadFileFromPodVolume(ctx, namespace, podName, podName, volume, FILE_NAME, workerOS)
|
||||
_, _, err := ReadFileFromPodVolume(namespace, podName, podName, volume, FILE_NAME, workerOS)
|
||||
if err != nil {
|
||||
return nil
|
||||
} else {
|
||||
|
||||
@@ -24,6 +24,7 @@ import (
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
|
||||
. "github.com/vmware-tanzu/velero/test/e2e/test"
|
||||
"github.com/vmware-tanzu/velero/test/util/common"
|
||||
. "github.com/vmware-tanzu/velero/test/util/k8s"
|
||||
)
|
||||
|
||||
@@ -63,12 +64,26 @@ func (f *FilteringCase) CreateResources() error {
|
||||
for nsNum := 0; nsNum < f.NamespacesTotal; nsNum++ {
|
||||
namespace := fmt.Sprintf("%s-%00000d", f.CaseBaseName, nsNum)
|
||||
fmt.Printf("Creating resources in namespace ...%s\n", namespace)
|
||||
if err := CreateNamespace(f.Ctx, f.Client, namespace); err != nil {
|
||||
nsLabels := make(map[string]string)
|
||||
if f.VeleroCfg.WorkerOS == common.WorkerOSWindows {
|
||||
nsLabels = map[string]string{
|
||||
"pod-security.kubernetes.io/enforce": "privileged",
|
||||
"pod-security.kubernetes.io/enforce-version": "latest",
|
||||
}
|
||||
}
|
||||
if err := CreateNamespaceWithLabel(f.Ctx, f.Client, namespace, nsLabels); err != nil {
|
||||
return errors.Wrapf(err, "Failed to create namespace %s", namespace)
|
||||
}
|
||||
//Create deployment
|
||||
fmt.Printf("Creating deployment in namespaces ...%s\n", namespace)
|
||||
deployment := NewDeployment(f.CaseBaseName, namespace, f.replica, f.labels, f.VeleroCfg.ImageRegistryProxy).Result()
|
||||
deployment := NewDeployment(
|
||||
f.CaseBaseName,
|
||||
namespace,
|
||||
f.replica,
|
||||
f.labels,
|
||||
f.VeleroCfg.ImageRegistryProxy,
|
||||
f.VeleroCfg.WorkerOS,
|
||||
).Result()
|
||||
deployment, err := CreateDeployment(f.Client.ClientGo, namespace, deployment)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, fmt.Sprintf("failed to delete the namespace %q", namespace))
|
||||
|
||||
@@ -26,6 +26,7 @@ import (
|
||||
|
||||
velerov1api "github.com/vmware-tanzu/velero/pkg/apis/velero/v1"
|
||||
. "github.com/vmware-tanzu/velero/test/e2e/test"
|
||||
"github.com/vmware-tanzu/velero/test/util/common"
|
||||
. "github.com/vmware-tanzu/velero/test/util/k8s"
|
||||
)
|
||||
|
||||
@@ -83,12 +84,28 @@ func (e *ExcludeFromBackup) CreateResources() error {
|
||||
velerov1api.ExcludeFromBackupLabel: "false",
|
||||
}
|
||||
fmt.Printf("Creating resources in namespace ...%s\n", namespace)
|
||||
if err := CreateNamespace(e.Ctx, e.Client, namespace); err != nil {
|
||||
|
||||
nsLabels := make(map[string]string)
|
||||
if e.VeleroCfg.WorkerOS == common.WorkerOSWindows {
|
||||
nsLabels = map[string]string{
|
||||
"pod-security.kubernetes.io/enforce": "privileged",
|
||||
"pod-security.kubernetes.io/enforce-version": "latest",
|
||||
}
|
||||
}
|
||||
|
||||
if err := CreateNamespaceWithLabel(e.Ctx, e.Client, namespace, nsLabels); err != nil {
|
||||
return errors.Wrapf(err, "Failed to create namespace %s", namespace)
|
||||
}
|
||||
//Create deployment: to be included
|
||||
fmt.Printf("Creating deployment in namespaces ...%s\n", namespace)
|
||||
deployment := NewDeployment(e.CaseBaseName, namespace, e.replica, label2, e.VeleroCfg.ImageRegistryProxy).Result()
|
||||
deployment := NewDeployment(
|
||||
e.CaseBaseName,
|
||||
namespace,
|
||||
e.replica,
|
||||
label2,
|
||||
e.VeleroCfg.ImageRegistryProxy,
|
||||
e.VeleroCfg.WorkerOS,
|
||||
).Result()
|
||||
deployment, err := CreateDeployment(e.Client.ClientGo, namespace, deployment)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, fmt.Sprintf("failed to delete the namespace %q", namespace))
|
||||
|
||||
@@ -25,6 +25,7 @@ import (
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
|
||||
. "github.com/vmware-tanzu/velero/test/e2e/test"
|
||||
"github.com/vmware-tanzu/velero/test/util/common"
|
||||
. "github.com/vmware-tanzu/velero/test/util/k8s"
|
||||
)
|
||||
|
||||
@@ -82,13 +83,26 @@ func (l *LabelSelector) CreateResources() error {
|
||||
"resourcefiltering": "false",
|
||||
}
|
||||
}
|
||||
|
||||
if l.VeleroCfg.WorkerOS == common.WorkerOSWindows {
|
||||
labels["pod-security.kubernetes.io/enforce"] = "privileged"
|
||||
labels["pod-security.kubernetes.io/enforce-version"] = "latest"
|
||||
}
|
||||
|
||||
if err := CreateNamespaceWithLabel(l.Ctx, l.Client, namespace, labels); err != nil {
|
||||
return errors.Wrapf(err, "Failed to create namespace %s", namespace)
|
||||
}
|
||||
//Create deployment
|
||||
fmt.Printf("Creating deployment in namespaces ...%s\n", namespace)
|
||||
|
||||
deployment := NewDeployment(l.CaseBaseName, namespace, l.replica, labels, l.VeleroCfg.ImageRegistryProxy).Result()
|
||||
deployment := NewDeployment(
|
||||
l.CaseBaseName,
|
||||
namespace,
|
||||
l.replica,
|
||||
labels,
|
||||
l.VeleroCfg.ImageRegistryProxy,
|
||||
l.VeleroCfg.WorkerOS,
|
||||
).Result()
|
||||
deployment, err := CreateDeployment(l.Client.ClientGo, namespace, deployment)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, fmt.Sprintf("failed to delete the namespace %q", namespace))
|
||||
|
||||
@@ -25,6 +25,7 @@ import (
|
||||
"github.com/pkg/errors"
|
||||
|
||||
. "github.com/vmware-tanzu/velero/test/e2e/test"
|
||||
"github.com/vmware-tanzu/velero/test/util/common"
|
||||
. "github.com/vmware-tanzu/velero/test/util/k8s"
|
||||
)
|
||||
|
||||
@@ -105,8 +106,16 @@ func (r *ResourceModifiersCase) CreateResources() error {
|
||||
|
||||
for nsNum := 0; nsNum < r.NamespacesTotal; nsNum++ {
|
||||
namespace := fmt.Sprintf("%s-%00000d", r.CaseBaseName, nsNum)
|
||||
nsLabels := make(map[string]string)
|
||||
if r.VeleroCfg.WorkerOS == common.WorkerOSWindows {
|
||||
nsLabels = map[string]string{
|
||||
"pod-security.kubernetes.io/enforce": "privileged",
|
||||
"pod-security.kubernetes.io/enforce-version": "latest",
|
||||
}
|
||||
}
|
||||
|
||||
By(fmt.Sprintf("Create namespaces %s for workload\n", namespace), func() {
|
||||
Expect(CreateNamespace(r.Ctx, r.Client, namespace)).To(Succeed(), fmt.Sprintf("Failed to create namespace %s", namespace))
|
||||
Expect(CreateNamespaceWithLabel(r.Ctx, r.Client, namespace, nsLabels)).To(Succeed(), fmt.Sprintf("Failed to create namespace %s", namespace))
|
||||
})
|
||||
|
||||
By(fmt.Sprintf("Creating deployment in namespaces ...%s\n", namespace), func() {
|
||||
@@ -145,7 +154,14 @@ func (r *ResourceModifiersCase) Clean() error {
|
||||
}
|
||||
|
||||
func (r *ResourceModifiersCase) createDeployment(namespace string) error {
|
||||
deployment := NewDeployment(r.CaseBaseName, namespace, 1, map[string]string{"app": "test"}, r.VeleroCfg.ImageRegistryProxy).Result()
|
||||
deployment := NewDeployment(
|
||||
r.CaseBaseName,
|
||||
namespace,
|
||||
1,
|
||||
map[string]string{"app": "test"},
|
||||
r.VeleroCfg.ImageRegistryProxy,
|
||||
r.VeleroCfg.WorkerOS,
|
||||
).Result()
|
||||
deployment, err := CreateDeployment(r.Client.ClientGo, namespace, deployment)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, fmt.Sprintf("failed to create deloyment %s the namespace %q", deployment.Name, namespace))
|
||||
|
||||
@@ -19,6 +19,7 @@ package resourcepolicies
|
||||
import (
|
||||
"fmt"
|
||||
"strings"
|
||||
"unicode"
|
||||
|
||||
. "github.com/onsi/ginkgo/v2"
|
||||
. "github.com/onsi/gomega"
|
||||
@@ -111,8 +112,17 @@ func (r *ResourcePoliciesCase) CreateResources() error {
|
||||
|
||||
for nsNum := 0; nsNum < r.NamespacesTotal; nsNum++ {
|
||||
namespace := fmt.Sprintf("%s-%00000d", r.CaseBaseName, nsNum)
|
||||
|
||||
nsLabels := make(map[string]string)
|
||||
if r.VeleroCfg.WorkerOS == common.WorkerOSWindows {
|
||||
nsLabels = map[string]string{
|
||||
"pod-security.kubernetes.io/enforce": "privileged",
|
||||
"pod-security.kubernetes.io/enforce-version": "latest",
|
||||
}
|
||||
}
|
||||
|
||||
By(fmt.Sprintf("Create namespaces %s for workload\n", namespace), func() {
|
||||
Expect(CreateNamespace(r.Ctx, r.Client, namespace)).To(Succeed(), fmt.Sprintf("Failed to create namespace %s", namespace))
|
||||
Expect(CreateNamespaceWithLabel(r.Ctx, r.Client, namespace, nsLabels)).To(Succeed(), fmt.Sprintf("Failed to create namespace %s", namespace))
|
||||
})
|
||||
|
||||
volName := fmt.Sprintf("vol-%s-%00000d", r.CaseBaseName, nsNum)
|
||||
@@ -153,7 +163,6 @@ func (r *ResourcePoliciesCase) Verify() error {
|
||||
continue
|
||||
}
|
||||
content, _, err := ReadFileFromPodVolume(
|
||||
r.Ctx,
|
||||
ns,
|
||||
pod.Name,
|
||||
"container-busybox",
|
||||
@@ -167,11 +176,12 @@ func (r *ResourcePoliciesCase) Verify() error {
|
||||
Expect(err).NotTo(HaveOccurred(), fmt.Sprintf("Fail to read file %s from volume %s of pod %s in namespace %s",
|
||||
FileName, vol.Name, pod.Name, ns))
|
||||
|
||||
content = strings.Replace(content, "\n", "", -1)
|
||||
originContent := strings.Replace(fmt.Sprintf("ns-%s pod-%s volume-%s", ns, pod.Name, vol.Name), "\n", "", -1)
|
||||
content = strings.TrimRightFunc(content, unicode.IsSpace)
|
||||
originContent := fmt.Sprintf("ns-%s pod-%s volume-%s", ns, pod.Name, vol.Name)
|
||||
|
||||
Expect(content).To(Equal(originContent), fmt.Sprintf("File %s does not exist in volume %s of pod %s in namespace %s",
|
||||
FileName, vol.Name, pod.Name, ns))
|
||||
Expect(content).To(Equal(originContent),
|
||||
fmt.Sprintf("Content not match.\n origin: %s\n result: %s\n", originContent, content),
|
||||
)
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -218,7 +228,14 @@ func (r *ResourcePoliciesCase) createPVC(index int, namespace string, volList []
|
||||
}
|
||||
|
||||
func (r *ResourcePoliciesCase) createDeploymentWithVolume(namespace string, volList []*corev1api.Volume) error {
|
||||
deployment := NewDeployment(r.CaseBaseName, namespace, 1, map[string]string{"resource-policies": "resource-policies"}, r.VeleroCfg.ImageRegistryProxy).WithVolume(volList).Result()
|
||||
deployment := NewDeployment(
|
||||
r.CaseBaseName,
|
||||
namespace,
|
||||
1,
|
||||
map[string]string{"resource-policies": "resource-policies"},
|
||||
r.VeleroCfg.ImageRegistryProxy,
|
||||
r.VeleroCfg.WorkerOS,
|
||||
).WithVolume(volList).Result()
|
||||
deployment, err := CreateDeployment(r.Client.ClientGo, namespace, deployment)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, fmt.Sprintf("failed to create deloyment %s the namespace %q", deployment.Name, namespace))
|
||||
@@ -241,14 +258,13 @@ func (r *ResourcePoliciesCase) writeDataIntoPods(namespace, volName string) erro
|
||||
continue
|
||||
}
|
||||
err := CreateFileToPod(
|
||||
r.Ctx,
|
||||
namespace,
|
||||
pod.Name,
|
||||
"container-busybox",
|
||||
vol.Name,
|
||||
FileName,
|
||||
fmt.Sprintf("ns-%s pod-%s volume-%s", namespace, pod.Name, vol.Name),
|
||||
common.WorkerOSLinux,
|
||||
r.VeleroCfg.WorkerOS,
|
||||
)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, fmt.Sprintf("failed to create file into pod %s in namespace: %q", pod.Name, namespace))
|
||||
|
||||
@@ -14,6 +14,7 @@ import (
|
||||
velerov1api "github.com/vmware-tanzu/velero/pkg/apis/velero/v1"
|
||||
"github.com/vmware-tanzu/velero/test"
|
||||
framework "github.com/vmware-tanzu/velero/test/e2e/test"
|
||||
"github.com/vmware-tanzu/velero/test/util/common"
|
||||
k8sutil "github.com/vmware-tanzu/velero/test/util/k8s"
|
||||
veleroutil "github.com/vmware-tanzu/velero/test/util/velero"
|
||||
)
|
||||
@@ -64,11 +65,19 @@ func (s *InProgressCase) Init() error {
|
||||
|
||||
func (s *InProgressCase) CreateResources() error {
|
||||
By(fmt.Sprintf("Create namespace %s", s.namespace), func() {
|
||||
labels := make(map[string]string)
|
||||
if s.VeleroCfg.WorkerOS == common.WorkerOSWindows {
|
||||
labels = map[string]string{
|
||||
"pod-security.kubernetes.io/enforce": "privileged",
|
||||
"pod-security.kubernetes.io/enforce-version": "latest",
|
||||
}
|
||||
}
|
||||
Expect(
|
||||
k8sutil.CreateNamespace(
|
||||
k8sutil.CreateNamespaceWithLabel(
|
||||
s.Ctx,
|
||||
s.Client,
|
||||
s.namespace,
|
||||
labels,
|
||||
),
|
||||
).To(Succeed(),
|
||||
fmt.Sprintf("Failed to create namespace %s", s.namespace))
|
||||
@@ -85,6 +94,7 @@ func (s *InProgressCase) CreateResources() error {
|
||||
nil,
|
||||
s.podAnn,
|
||||
s.VeleroCfg.ImageRegistryProxy,
|
||||
s.VeleroCfg.WorkerOS,
|
||||
)
|
||||
Expect(err).To(Succeed())
|
||||
|
||||
|
||||
@@ -32,6 +32,7 @@ import (
|
||||
|
||||
velerov1api "github.com/vmware-tanzu/velero/pkg/apis/velero/v1"
|
||||
framework "github.com/vmware-tanzu/velero/test/e2e/test"
|
||||
"github.com/vmware-tanzu/velero/test/util/common"
|
||||
k8sutil "github.com/vmware-tanzu/velero/test/util/k8s"
|
||||
veleroutil "github.com/vmware-tanzu/velero/test/util/velero"
|
||||
)
|
||||
@@ -92,14 +93,29 @@ func (o *OrderedResources) CreateResources() error {
|
||||
"orderedresources": "true",
|
||||
}
|
||||
fmt.Printf("Creating resources in %s namespace ...\n", o.Namespace)
|
||||
if err := k8sutil.CreateNamespace(o.Ctx, o.Client, o.Namespace); err != nil {
|
||||
|
||||
nsLabels := make(map[string]string)
|
||||
if o.VeleroCfg.WorkerOS == common.WorkerOSWindows {
|
||||
nsLabels = map[string]string{
|
||||
"pod-security.kubernetes.io/enforce": "privileged",
|
||||
"pod-security.kubernetes.io/enforce-version": "latest",
|
||||
}
|
||||
}
|
||||
if err := k8sutil.CreateNamespaceWithLabel(o.Ctx, o.Client, o.Namespace, nsLabels); err != nil {
|
||||
return errors.Wrapf(err, "failed to create namespace %s", o.Namespace)
|
||||
}
|
||||
|
||||
//Create deployment
|
||||
deploymentName := fmt.Sprintf("deploy-%s", o.CaseBaseName)
|
||||
fmt.Printf("Creating deployment %s in %s namespaces ...\n", deploymentName, o.Namespace)
|
||||
deployment := k8sutil.NewDeployment(deploymentName, o.Namespace, 1, label, o.VeleroCfg.ImageRegistryProxy).Result()
|
||||
deployment := k8sutil.NewDeployment(
|
||||
deploymentName,
|
||||
o.Namespace,
|
||||
1,
|
||||
label,
|
||||
o.VeleroCfg.ImageRegistryProxy,
|
||||
o.VeleroCfg.WorkerOS,
|
||||
).Result()
|
||||
_, err := k8sutil.CreateDeployment(o.Client.ClientGo, o.Namespace, deployment)
|
||||
if err != nil {
|
||||
return errors.Wrap(err, fmt.Sprintf("failed to create namespace %q with err %v", o.Namespace, err))
|
||||
|
||||
Reference in New Issue
Block a user