Create user defined "NodePort" services per pod
[yardstick.git] / yardstick / tests / unit / orchestrator / test_kubernetes.py
1 ##############################################################################
2 # Copyright (c) 2017 Intel Corporation
3 #
4 # All rights reserved. This program and the accompanying materials
5 # are made available under the terms of the Apache License, Version 2.0
6 # which accompanies this distribution, and is available at
7 # http://www.apache.org/licenses/LICENSE-2.0
8 ##############################################################################
9
10 import copy
11
12 import mock
13
14 from yardstick.common import exceptions
15 from yardstick.common import kubernetes_utils
16 from yardstick.orchestrator import kubernetes
17 from yardstick.tests.unit import base
18
19
20 class GetTemplateTestCase(base.BaseUnitTestCase):
21
22     def test_get_template(self):
23         output_t = {
24             "apiVersion": "v1",
25             "kind": "ReplicationController",
26             "metadata": {
27                 "name": "host-k8s-86096c30"
28             },
29             "spec": {
30                 "replicas": 1,
31                 "template": {
32                     "metadata": {
33                         "labels": {
34                             "app": "host-k8s-86096c30"
35                         }
36                     },
37                     "spec": {
38                         "containers": [
39                             {
40                                 "args": [
41                                     "-c",
42                                     "chmod 700 ~/.ssh; chmod 600 ~/.ssh/*; \
43 service ssh restart;while true ; do sleep 10000; done"
44                                 ],
45                                 "command": [
46                                     "/bin/bash"
47                                 ],
48                                 "image": "openretriever/yardstick",
49                                 "name": "host-k8s-86096c30-container",
50                                 "volumeMounts": [
51                                     {
52                                         "mountPath": "/tmp/.ssh/",
53                                         "name": "k8s-86096c30-key",
54                                         "readOnly": False
55                                     }
56                                 ]
57                             }
58                         ],
59                         "volumes": [
60                             {
61                                 "configMap": {
62                                     "name": "k8s-86096c30-key"
63                                 },
64                                 "name": "k8s-86096c30-key"
65                             }
66                         ],
67                         "nodeSelector": {
68                             "kubernetes.io/hostname": "node-01"
69                         }
70                     }
71                 }
72             }
73         }
74         input_s = {
75             'command': '/bin/bash',
76             'args': ['-c', 'chmod 700 ~/.ssh; chmod 600 ~/.ssh/*; \
77 service ssh restart;while true ; do sleep 10000; done'],
78             'ssh_key': 'k8s-86096c30-key',
79             'nodeSelector': {'kubernetes.io/hostname': 'node-01'},
80             'volumes': []
81         }
82         name = 'host-k8s-86096c30'
83         output_r = kubernetes.ReplicationControllerObject(
84             name, **input_s).get_template()
85         self.assertEqual(output_r, output_t)
86
87
88 class GetRcPodsTestCase(base.BaseUnitTestCase):
89
90     @mock.patch('yardstick.orchestrator.kubernetes.k8s_utils.get_pod_list')
91     def test_get_rc_pods(self, mock_get_pod_list):
92         servers = {
93             'host': {
94                 'image': 'openretriever/yardstick',
95                 'command': '/bin/bash',
96                 'args': ['-c', 'chmod 700 ~/.ssh; chmod 600 ~/.ssh/*; \
97 service ssh restart;while true ; do sleep 10000; done']
98             },
99             'target': {
100                 'image': 'openretriever/yardstick',
101                 'command': '/bin/bash',
102                 'args': ['-c', 'chmod 700 ~/.ssh; chmod 600 ~/.ssh/*; \
103 service ssh restart;while true ; do sleep 10000; done']
104             }
105         }
106         k8s_template = kubernetes.KubernetesTemplate('k8s-86096c30', servers)
107         mock_get_pod_list.return_value.items = []
108         pods = k8s_template.get_rc_pods()
109         self.assertEqual(pods, [])
110
111
112 class ReplicationControllerObjectTestCase(base.BaseUnitTestCase):
113
114     def test__init_one_container(self):
115         pod_name = 'pod_name'
116         _kwargs = {'args': ['arg1', 'arg2'],
117                    'image': 'fake_image',
118                    'command': 'fake_command'}
119         k8s_obj = kubernetes.ReplicationControllerObject(pod_name, **_kwargs)
120         self.assertEqual(1, len(k8s_obj._containers))
121         container = k8s_obj._containers[0]
122         self.assertEqual(['arg1', 'arg2'], container._args)
123         self.assertEqual('fake_image', container._image)
124         self.assertEqual(['fake_command'], container._command)
125         self.assertEqual([], container._volume_mounts)
126
127     def test__init_multipe_containers(self):
128         pod_name = 'pod_name'
129         containers = []
130         for i in range(5):
131             containers.append({'args': ['arg1', 'arg2'],
132                                'image': 'fake_image_%s' % i,
133                                'command': 'fake_command_%s' % i})
134         _kwargs = {'containers': containers}
135         k8s_obj = kubernetes.ReplicationControllerObject(pod_name, **_kwargs)
136         self.assertEqual(5, len(k8s_obj._containers))
137         for i in range(5):
138             container = k8s_obj._containers[i]
139             self.assertEqual(['arg1', 'arg2'], container._args)
140             self.assertEqual('fake_image_%s' % i, container._image)
141             self.assertEqual(['fake_command_%s' % i], container._command)
142             self.assertEqual([], container._volume_mounts)
143
144     def test__add_volumes(self):
145         volume1 = {'name': 'fake_sshkey',
146                    'configMap': {'name': 'fake_sshkey'}}
147         volume2 = {'name': 'volume2',
148                    'configMap': 'data'}
149         k8s_obj = kubernetes.ReplicationControllerObject(
150             'name', ssh_key='fake_sshkey', volumes=[volume2])
151         k8s_obj._add_volumes()
152         volumes = k8s_obj.template['spec']['template']['spec']['volumes']
153         self.assertEqual(sorted([volume1, volume2], key=lambda k: k['name']),
154                          sorted(volumes, key=lambda k: k['name']))
155
156     def test__add_volumes_no_volumes(self):
157         volume1 = {'name': 'fake_sshkey',
158                    'configMap': {'name': 'fake_sshkey'}}
159         k8s_obj = kubernetes.ReplicationControllerObject(
160             'name', ssh_key='fake_sshkey')
161         k8s_obj._add_volumes()
162         volumes = k8s_obj.template['spec']['template']['spec']['volumes']
163         self.assertEqual([volume1], volumes)
164
165     def test__create_ssh_key_volume(self):
166         expected = {'name': 'fake_sshkey',
167                     'configMap': {'name': 'fake_sshkey'}}
168         k8s_obj = kubernetes.ReplicationControllerObject(
169             'name', ssh_key='fake_sshkey')
170         self.assertEqual(expected, k8s_obj._create_ssh_key_volume())
171
172     def test__create_volume_item(self):
173         for vol_type in kubernetes_utils.get_volume_types():
174             volume = {'name': 'vol_name',
175                       vol_type: 'data'}
176             self.assertEqual(
177                 volume,
178                 kubernetes.ReplicationControllerObject.
179                     _create_volume_item(volume))
180
181     def test__create_volume_item_invalid_type(self):
182         volume = {'name': 'vol_name',
183                   'invalid_type': 'data'}
184         with self.assertRaises(exceptions.KubernetesTemplateInvalidVolumeType):
185             kubernetes.ReplicationControllerObject._create_volume_item(volume)
186
187     def test__add_security_context(self):
188         k8s_obj = kubernetes.ReplicationControllerObject('pod_name')
189         self.assertNotIn('securityContext',
190                          k8s_obj.template['spec']['template']['spec'])
191
192         k8s_obj._security_context = {'key_pod': 'value_pod'}
193         k8s_obj._add_security_context()
194         self.assertEqual(
195             {'key_pod': 'value_pod'},
196             k8s_obj.template['spec']['template']['spec']['securityContext'])
197
198     def test__add_security_context_by_init(self):
199         containers = []
200         for i in range(5):
201             containers.append(
202                 {'securityContext': {'key%s' % i: 'value%s' % i}})
203         _kwargs = {'containers': containers,
204                    'securityContext': {'key_pod': 'value_pod'}}
205         k8s_obj = kubernetes.ReplicationControllerObject('pod_name', **_kwargs)
206         self.assertEqual(
207             {'key_pod': 'value_pod'},
208             k8s_obj.template['spec']['template']['spec']['securityContext'])
209         for i in range(5):
210             container = (
211                 k8s_obj.template['spec']['template']['spec']['containers'][i])
212             self.assertEqual({'key%s' % i: 'value%s' % i},
213                              container['securityContext'])
214
215     def test__add_networks(self):
216         k8s_obj = kubernetes.ReplicationControllerObject(
217             'name', networks=['network1', 'network2', 'network3'])
218         k8s_obj._add_networks()
219         networks = k8s_obj.\
220             template['spec']['template']['metadata']['annotations']['networks']
221         expected = ('[{"name": "network1"}, {"name": "network2"}, '
222                     '{"name": "network3"}]')
223         self.assertEqual(expected, networks)
224
225
226 class ContainerObjectTestCase(base.BaseUnitTestCase):
227
228     def test__create_volume_mounts(self):
229         volume_mount = {'name': 'fake_name',
230                         'mountPath': 'fake_path'}
231         ssh_vol = {'name': 'fake_ssh_key',
232                    'mountPath': kubernetes.ContainerObject.SSH_MOUNT_PATH,
233                    'readOnly': False}
234         expected = copy.deepcopy(volume_mount)
235         expected['readOnly'] = False
236         expected = [expected, ssh_vol]
237         container_obj = kubernetes.ContainerObject(
238             'cname', 'fake_ssh_key', volumeMounts=[volume_mount])
239         output = container_obj._create_volume_mounts()
240         self.assertEqual(expected, output)
241
242     def test__create_volume_mounts_no_volume_mounts(self):
243         ssh_vol = {'name': 'fake_ssh_key2',
244                    'mountPath': kubernetes.ContainerObject.SSH_MOUNT_PATH,
245                    'readOnly': False}
246         container_obj = kubernetes.ContainerObject('name', 'fake_ssh_key2')
247         output = container_obj._create_volume_mounts()
248         self.assertEqual([ssh_vol], output)
249
250     def test__create_volume_mounts_item(self):
251         volume_mount = {'name': 'fake_name',
252                         'mountPath': 'fake_path'}
253         expected = copy.deepcopy(volume_mount)
254         expected['readOnly'] = False
255         output = kubernetes.ContainerObject._create_volume_mounts_item(
256             volume_mount)
257         self.assertEqual(expected, output)
258
259     def test_get_container_item(self):
260         volume_mount = {'name': 'fake_name',
261                         'mountPath': 'fake_path'}
262         args = ['arg1', 'arg2']
263         container_obj = kubernetes.ContainerObject(
264             'cname', ssh_key='fake_sshkey', volumeMount=[volume_mount],
265             args=args)
266         expected = {'args': args,
267                     'command': [kubernetes.ContainerObject.COMMAND_DEFAULT],
268                     'image': kubernetes.ContainerObject.IMAGE_DEFAULT,
269                     'name': 'cname-container',
270                     'volumeMounts': container_obj._create_volume_mounts()}
271         self.assertEqual(expected, container_obj.get_container_item())
272
273     def test_get_container_item_with_security_context(self):
274         volume_mount = {'name': 'fake_name',
275                         'mountPath': 'fake_path'}
276         args = ['arg1', 'arg2']
277         container_obj = kubernetes.ContainerObject(
278             'cname', ssh_key='fake_sshkey', volumeMount=[volume_mount],
279             args=args, securityContext={'key': 'value'})
280         expected = {'args': args,
281                     'command': [kubernetes.ContainerObject.COMMAND_DEFAULT],
282                     'image': kubernetes.ContainerObject.IMAGE_DEFAULT,
283                     'name': 'cname-container',
284                     'volumeMounts': container_obj._create_volume_mounts(),
285                     'securityContext': {'key': 'value'}}
286         self.assertEqual(expected, container_obj.get_container_item())
287
288
289 class CustomResourceDefinitionObjectTestCase(base.BaseUnitTestCase):
290
291     def test__init(self):
292         template = {
293             'metadata': {
294                 'name': 'newcrds.ctx_name.com'
295             },
296             'spec': {
297                 'group': 'ctx_name.com',
298                 'version': 'v2',
299                 'scope': 'scope',
300                 'names': {'plural': 'newcrds',
301                           'singular': 'newcrd',
302                           'kind': 'Newcrd'}
303             }
304         }
305         crd_obj = kubernetes.CustomResourceDefinitionObject(
306             'ctx_name', name='newcrd', version='v2', scope='scope')
307         self.assertEqual('newcrds.ctx_name.com', crd_obj._name)
308         self.assertEqual(template, crd_obj._template)
309
310     def test__init_missing_parameter(self):
311         with self.assertRaises(exceptions.KubernetesCRDObjectDefinitionError):
312             kubernetes.CustomResourceDefinitionObject('ctx_name',
313                                                       noname='name')
314
315
316 class NetworkObjectTestCase(base.BaseUnitTestCase):
317
318     def setUp(self):
319         self.net_obj = kubernetes.NetworkObject(name='fake_name',
320                                                 plugin='fake_plugin',
321                                                 args='fake_args')
322
323     def test__init_missing_parameter(self):
324         with self.assertRaises(
325                 exceptions.KubernetesNetworkObjectDefinitionError):
326             kubernetes.NetworkObject(name='name', plugin='plugin')
327         with self.assertRaises(
328                 exceptions.KubernetesNetworkObjectDefinitionError):
329             kubernetes.NetworkObject(name='name', args='args')
330         with self.assertRaises(
331                 exceptions.KubernetesNetworkObjectDefinitionError):
332             kubernetes.NetworkObject(args='args', plugin='plugin')
333
334     @mock.patch.object(kubernetes_utils, 'get_custom_resource_definition')
335     def test_crd(self, mock_get_crd):
336         mock_crd = mock.Mock()
337         mock_get_crd.return_value = mock_crd
338         net_obj = copy.deepcopy(self.net_obj)
339         self.assertEqual(mock_crd, net_obj.crd)
340
341     def test_template(self):
342         net_obj = copy.deepcopy(self.net_obj)
343         expected = {'apiVersion': 'group.com/v2',
344                     'kind': kubernetes.NetworkObject.KIND,
345                     'metadata': {
346                         'name': 'fake_name'},
347                     'plugin': 'fake_plugin',
348                     'args': 'fake_args'}
349         crd = mock.Mock()
350         crd.spec.group = 'group.com'
351         crd.spec.version = 'v2'
352         net_obj._crd = crd
353         self.assertEqual(expected, net_obj.template)
354
355     def test_group(self):
356         net_obj = copy.deepcopy(self.net_obj)
357         net_obj._crd = mock.Mock()
358         net_obj._crd.spec.group = 'fake_group'
359         self.assertEqual('fake_group', net_obj.group)
360
361     def test_version(self):
362         net_obj = copy.deepcopy(self.net_obj)
363         net_obj._crd = mock.Mock()
364         net_obj._crd.spec.version = 'version_4'
365         self.assertEqual('version_4', net_obj.version)
366
367     def test_plural(self):
368         net_obj = copy.deepcopy(self.net_obj)
369         net_obj._crd = mock.Mock()
370         net_obj._crd.spec.names.plural = 'name_ending_in_s'
371         self.assertEqual('name_ending_in_s', net_obj.plural)
372
373     def test_scope(self):
374         net_obj = copy.deepcopy(self.net_obj)
375         net_obj._crd = mock.Mock()
376         net_obj._crd.spec.scope = 'Cluster'
377         self.assertEqual('Cluster', net_obj.scope)
378
379     @mock.patch.object(kubernetes_utils, 'create_network')
380     def test_create(self, mock_create_network):
381         net_obj = copy.deepcopy(self.net_obj)
382         net_obj._scope = 'scope'
383         net_obj._group = 'group'
384         net_obj._version = 'version'
385         net_obj._plural = 'plural'
386         net_obj._template = 'template'
387         net_obj.create()
388         mock_create_network.assert_called_once_with(
389             'scope', 'group', 'version', 'plural', 'template')
390
391     @mock.patch.object(kubernetes_utils, 'delete_network')
392     def test_delete(self, mock_delete_network):
393         net_obj = copy.deepcopy(self.net_obj)
394         net_obj._scope = 'scope'
395         net_obj._group = 'group'
396         net_obj._version = 'version'
397         net_obj._plural = 'plural'
398         net_obj._name = 'name'
399         net_obj.delete()
400         mock_delete_network.assert_called_once_with(
401             'scope', 'group', 'version', 'plural', 'name')
402
403
404 class ServiceNodePortObjectTestCase(base.BaseUnitTestCase):
405
406     def test__init(self):
407         with mock.patch.object(kubernetes.ServiceNodePortObject, '_add_port') \
408                 as mock_add_port:
409             kubernetes.ServiceNodePortObject('fake_name',
410                                              node_ports=[{'port': 80}])
411
412         mock_add_port.assert_has_calls([mock.call(22, protocol='TCP'),
413                                         mock.call(80)])
414
415     def test__add_port(self):
416         nodeport_object = kubernetes.ServiceNodePortObject('fake_name')
417         port_ssh = {'port': 22,
418                     'protocol': 'TCP',}
419         port_definition = {'port': 80,
420                            'protocol': 'TCP',
421                            'name': 'web',
422                            'targetPort': 10080,
423                            'nodePort': 30080}
424         port = copy.deepcopy(port_definition)
425         port.pop('port')
426         nodeport_object._add_port(80, **port)
427         self.assertEqual([port_ssh, port_definition],
428                          nodeport_object.template['spec']['ports'])
429
430     @mock.patch.object(kubernetes_utils, 'create_service')
431     def test_create(self, mock_create_service):
432         nodeport_object = kubernetes.ServiceNodePortObject('fake_name')
433         nodeport_object.template = 'fake_template'
434         nodeport_object.create()
435         mock_create_service.assert_called_once_with('fake_template')
436
437     @mock.patch.object(kubernetes_utils, 'delete_service')
438     def test_delete(self, mock_delete_service):
439         nodeport_object = kubernetes.ServiceNodePortObject('fake_name')
440         nodeport_object.delete()
441         mock_delete_service.assert_called_once_with('fake_name-service')