mirror of
https://github.com/vmware-tanzu/velero.git
synced 2026-02-10 05:50:22 +00:00
1. In data movement scenario, volumesnapshotcontent by Velero backup will be deleted instead of retained in CSI scenaito, so add a checkpoint for data movement scenario to verify no volumesnapshotcontent left after Velero backup; 2. Fix global context varaible issue, context varaible is not effective due to it's initialized right after the very beginning of all tests instead of beginning of each test, so if someone script a new E2E test and did not overwrite it in the test body, then it will fail the test if it was triggerd one hour later; 3. Due to CSI plugin is deprecated, it breaked down migration tests, because v1.13 still needs to install CSI plugin for the test. Signed-off-by: danfengl <danfengl@vmware.com>
170 lines
6.0 KiB
Go
170 lines
6.0 KiB
Go
/*
|
|
Copyright the Velero contributors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package basic
|
|
|
|
import (
|
|
"fmt"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
. "github.com/onsi/ginkgo"
|
|
. "github.com/onsi/gomega"
|
|
"github.com/pkg/errors"
|
|
v1 "k8s.io/api/core/v1"
|
|
|
|
. "github.com/vmware-tanzu/velero/test"
|
|
. "github.com/vmware-tanzu/velero/test/e2e/test"
|
|
. "github.com/vmware-tanzu/velero/test/util/common"
|
|
. "github.com/vmware-tanzu/velero/test/util/k8s"
|
|
. "github.com/vmware-tanzu/velero/test/util/velero"
|
|
)
|
|
|
|
type BackupVolumeInfo struct {
|
|
TestCase
|
|
SnapshotVolumes bool
|
|
DefaultVolumesToFSBackup bool
|
|
SnapshotMoveData bool
|
|
TimeoutDuration time.Duration
|
|
}
|
|
|
|
func (v *BackupVolumeInfo) Init() error {
|
|
v.TestCase.Init()
|
|
v.CaseBaseName = v.CaseBaseName + v.UUIDgen
|
|
v.BackupName = "backup-" + v.CaseBaseName
|
|
v.RestoreName = "restore-" + v.CaseBaseName
|
|
v.TimeoutDuration = 10 * time.Minute
|
|
v.NamespacesTotal = 1
|
|
|
|
v.VeleroCfg = VeleroCfg
|
|
v.Client = *v.VeleroCfg.ClientToInstallVelero
|
|
v.NSIncluded = &[]string{v.CaseBaseName}
|
|
|
|
v.TestMsg = &TestMSG{
|
|
Desc: "Test backup's VolumeInfo metadata content",
|
|
Text: "The VolumeInfo should be generated based on the backup type",
|
|
FailedMSG: "Failed to verify the backup VolumeInfo's content",
|
|
}
|
|
|
|
v.BackupArgs = []string{
|
|
"backup", "create", v.BackupName,
|
|
"--namespace", v.VeleroCfg.VeleroNamespace,
|
|
"--include-namespaces", v.CaseBaseName,
|
|
"--snapshot-volumes" + "=" + strconv.FormatBool(v.SnapshotVolumes),
|
|
"--default-volumes-to-fs-backup" + "=" + strconv.FormatBool(v.DefaultVolumesToFSBackup),
|
|
"--snapshot-move-data" + "=" + strconv.FormatBool(v.SnapshotMoveData),
|
|
"--wait",
|
|
}
|
|
|
|
v.RestoreArgs = []string{
|
|
"create", "--namespace", v.VeleroCfg.VeleroNamespace, "restore", v.RestoreName,
|
|
"--from-backup", v.BackupName, "--wait",
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (v *BackupVolumeInfo) Start() error {
|
|
if v.VeleroCfg.CloudProvider == Vsphere && (!strings.Contains(v.CaseBaseName, "fs-upload") && !strings.Contains(v.CaseBaseName, "skipped")) {
|
|
fmt.Printf("Skip snapshot case %s for vsphere environment.\n", v.CaseBaseName)
|
|
Skip("Skip snapshot case due to vsphere environment doesn't cover the CSI test, and it doesn't have a Velero native snapshot plugin.")
|
|
}
|
|
|
|
if strings.Contains(v.VeleroCfg.Features, FeatureCSI) {
|
|
if strings.Contains(v.CaseBaseName, "native-snapshot") {
|
|
fmt.Printf("Skip native snapshot case %s when the CSI feature is enabled.\n", v.CaseBaseName)
|
|
Skip("Skip native snapshot case due to CSI feature is enabled.")
|
|
}
|
|
} else {
|
|
if strings.Contains(v.CaseBaseName, "csi") {
|
|
fmt.Printf("Skip CSI related case %s when the CSI feature is not enabled.\n", v.CaseBaseName)
|
|
Skip("Skip CSI cases due to CSI feature is not enabled.")
|
|
}
|
|
}
|
|
v.TestCase.Start()
|
|
return nil
|
|
}
|
|
func (v *BackupVolumeInfo) CreateResources() error {
|
|
labels := map[string]string{
|
|
"volume-info": "true",
|
|
}
|
|
for nsNum := 0; nsNum < v.NamespacesTotal; nsNum++ {
|
|
fmt.Printf("Creating namespaces ...\n")
|
|
createNSName := v.CaseBaseName
|
|
if err := CreateNamespaceWithLabel(v.Ctx, v.Client, createNSName, labels); err != nil {
|
|
return errors.Wrapf(err, "Failed to create namespace %s", createNSName)
|
|
}
|
|
|
|
// Install StorageClass
|
|
Expect(InstallTestStorageClasses(fmt.Sprintf("../testdata/storage-class/%s-csi.yaml", v.VeleroCfg.CloudProvider))).To(Succeed(), "Failed to install StorageClass")
|
|
|
|
// Create deployment
|
|
fmt.Printf("Creating deployment in namespaces ...%s\n", createNSName)
|
|
// Make sure PVC count is great than 3 to allow both empty volumes and file populated volumes exist per pod
|
|
pvcCount := 4
|
|
Expect(pvcCount).To(BeNumerically(">", 3))
|
|
|
|
var vols []*v1.Volume
|
|
for i := 0; i <= pvcCount-1; i++ {
|
|
pvcName := fmt.Sprintf("volume-info-pvc-%d", i)
|
|
pvc, err := CreatePVC(v.Client, createNSName, pvcName, CSIStorageClassName, nil)
|
|
Expect(err).To(Succeed())
|
|
volumeName := fmt.Sprintf("volume-info-pv-%d", i)
|
|
vols = append(vols, CreateVolumes(pvc.Name, []string{volumeName})...)
|
|
}
|
|
deployment := NewDeployment(v.CaseBaseName, createNSName, 1, labels, nil).WithVolume(vols).Result()
|
|
deployment, err := CreateDeployment(v.Client.ClientGo, createNSName, deployment)
|
|
if err != nil {
|
|
return errors.Wrap(err, fmt.Sprintf("failed to delete the namespace %q", createNSName))
|
|
}
|
|
err = WaitForReadyDeployment(v.Client.ClientGo, createNSName, deployment.Name)
|
|
if err != nil {
|
|
return errors.Wrap(err, fmt.Sprintf("failed to ensure job completion in namespace: %q", createNSName))
|
|
}
|
|
podList, err := ListPods(v.Ctx, v.Client, createNSName)
|
|
Expect(err).To(Succeed(), fmt.Sprintf("failed to list pods in namespace: %q with error %v", createNSName, err))
|
|
|
|
for _, pod := range podList.Items {
|
|
for i := 0; i <= pvcCount-1; i++ {
|
|
// Hitting issue https://github.com/vmware-tanzu/velero/issues/7388
|
|
// So populate data only to some of pods, leave other pods empty to verify empty PV datamover
|
|
if i%2 == 0 {
|
|
Expect(CreateFileToPod(v.Ctx, createNSName, pod.Name, DefaultContainerName, vols[i].Name,
|
|
fmt.Sprintf("file-%s", pod.Name), CreateFileContent(createNSName, pod.Name, vols[i].Name))).To(Succeed())
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (v *BackupVolumeInfo) Destroy() error {
|
|
err := CleanupNamespaces(v.Ctx, v.Client, v.CaseBaseName)
|
|
if err != nil {
|
|
return errors.Wrap(err, "Could cleanup retrieve namespaces")
|
|
}
|
|
|
|
return WaitAllSelectedNSDeleted(v.Ctx, v.Client, "ns-test=true")
|
|
}
|
|
|
|
func (v *BackupVolumeInfo) cleanResource() error {
|
|
if err := DeleteStorageClass(v.Ctx, v.Client, CSIStorageClassName); err != nil {
|
|
return errors.Wrap(err, "fail to delete the StorageClass")
|
|
}
|
|
|
|
return nil
|
|
}
|