-
Notifications
You must be signed in to change notification settings - Fork 38
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
skip testing create CapacityReservation case if CreateCapacityReservation failed
- Loading branch information
Showing
6 changed files
with
401 additions
and
46 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,266 @@ | ||
package capi | ||
|
||
import ( | ||
"context" | ||
"fmt" | ||
|
||
. "github.com/onsi/ginkgo/v2" | ||
. "github.com/onsi/gomega" | ||
configv1 "github.com/openshift/api/config/v1" | ||
mapiv1 "github.com/openshift/api/machine/v1beta1" | ||
"github.com/openshift/cluster-api-actuator-pkg/pkg/framework" | ||
"github.com/openshift/cluster-api-actuator-pkg/pkg/framework/gatherer" | ||
capiinfrastructurev1beta2resourcebuilder "github.com/openshift/cluster-api-actuator-pkg/testutils/resourcebuilder/cluster-api/infrastructure/v1beta2" | ||
corev1 "k8s.io/api/core/v1" | ||
awsv1 "sigs.k8s.io/cluster-api-provider-aws/v2/api/v1beta2" | ||
clusterv1 "sigs.k8s.io/cluster-api/api/v1beta1" | ||
|
||
"sigs.k8s.io/controller-runtime/pkg/client/config" | ||
|
||
"sigs.k8s.io/controller-runtime/pkg/client" | ||
yaml "sigs.k8s.io/yaml" | ||
) | ||
|
||
const ( | ||
awsMachineTemplateName = "aws-machine-template" | ||
infrastructureName = "cluster" | ||
infraAPIVersion = "infrastructure.cluster.x-k8s.io/v1beta1" | ||
) | ||
|
||
var ( | ||
cl client.Client | ||
ctx = context.Background() | ||
platform configv1.PlatformType | ||
clusterName string | ||
oc *gatherer.CLI | ||
) | ||
|
||
var _ = Describe("Cluster API AWS MachineSet", framework.LabelCAPI, framework.LabelDisruptive, Ordered, func() { | ||
var ( | ||
awsMachineTemplate *awsv1.AWSMachineTemplate | ||
machineSetParams framework.CAPIMachineSetParams | ||
machineSet *clusterv1.MachineSet | ||
mapiDefaultProviderSpec *mapiv1.AWSMachineProviderConfig | ||
deleted bool | ||
err error | ||
) | ||
|
||
BeforeAll(func() { | ||
cfg, err := config.GetConfig() | ||
Expect(err).ToNot(HaveOccurred(), "Failed to GetConfig") | ||
|
||
cl, err = client.New(cfg, client.Options{}) | ||
Expect(err).ToNot(HaveOccurred(), "Failed to create Kubernetes client for test") | ||
|
||
infra := &configv1.Infrastructure{} | ||
infraName := client.ObjectKey{ | ||
Name: infrastructureName, | ||
} | ||
Expect(cl.Get(ctx, infraName, infra)).To(Succeed(), "Failed to get cluster infrastructure object") | ||
Expect(infra.Status.PlatformStatus).ToNot(BeNil(), "expected the infrastructure Status.PlatformStatus to not be nil") | ||
clusterName = infra.Status.InfrastructureName | ||
platform = infra.Status.PlatformStatus.Type | ||
if platform != configv1.AWSPlatformType { | ||
Skip("Skipping AWS E2E tests") | ||
} | ||
oc, _ = framework.NewCLI() | ||
framework.SkipIfNotTechPreviewNoUpgrade(oc, cl) | ||
_, mapiDefaultProviderSpec = getDefaultAWSMAPIProviderSpec(cl) | ||
machineSetParams = framework.NewCAPIMachineSetParams( | ||
"aws-machineset", | ||
clusterName, | ||
mapiDefaultProviderSpec.Placement.AvailabilityZone, | ||
1, | ||
corev1.ObjectReference{ | ||
Kind: "AWSMachineTemplate", | ||
APIVersion: infraAPIVersion, | ||
Name: awsMachineTemplateName, | ||
}, | ||
) | ||
framework.CreateCoreCluster(ctx, cl, clusterName, "AWSCluster") | ||
}) | ||
|
||
BeforeEach(func() { | ||
deleted = false | ||
}) | ||
|
||
AfterEach(func() { | ||
if platform != configv1.AWSPlatformType { | ||
// Because AfterEach always runs, even when tests are skipped, we have to | ||
// explicitly skip it here for other platforms. | ||
Skip("Skipping AWS E2E tests") | ||
} | ||
if !deleted { | ||
framework.DeleteCAPIMachineSets(ctx, cl, machineSet) | ||
framework.WaitForCAPIMachineSetsDeleted(ctx, cl, machineSet) | ||
framework.DeleteObjects(ctx, cl, awsMachineTemplate) | ||
} | ||
}) | ||
|
||
//huliu-OCP-51071 - [CAPI] Create machineset with CAPI on aws | ||
It("should be able to run a machine with a default provider spec", func() { | ||
awsMachineTemplate = newAWSMachineTemplate(mapiDefaultProviderSpec) | ||
if err = cl.Create(ctx, awsMachineTemplate); err != nil { | ||
Expect(err).ToNot(HaveOccurred(), "Failed to create awsmachinetemplate") | ||
} | ||
machineSetParams = framework.UpdateCAPIMachineSetName("aws-machineset-51071", machineSetParams) | ||
machineSet, err = framework.CreateCAPIMachineSet(ctx, cl, machineSetParams) | ||
Expect(err).ToNot(HaveOccurred(), "Failed to create CAPI machineset") | ||
framework.WaitForCAPIMachinesRunning(ctx, cl, machineSet.Name) | ||
}) | ||
|
||
//huliu-OCP-75395 - [CAPI] AWS Placement group support. | ||
It("should be able to run a machine with cluster placement group", func() { | ||
awsClient := framework.NewAwsClient(framework.GetCredentialsFromCluster(oc)) | ||
placementGroupName := clusterName + "pgcluster" | ||
placementGroupID, err := awsClient.CreatePlacementGroup(placementGroupName, "cluster") | ||
Expect(err).ToNot(HaveOccurred(), "Failed to create placementgroup") | ||
Expect(placementGroupID).ToNot(Equal(""), "expected the placementGroupID to not be empty string") | ||
defer func() { | ||
framework.DeleteCAPIMachineSets(ctx, cl, machineSet) | ||
framework.WaitForCAPIMachineSetsDeleted(ctx, cl, machineSet) | ||
framework.DeleteObjects(ctx, cl, awsMachineTemplate) | ||
deleted = true | ||
_, err = awsClient.DeletePlacementGroup(placementGroupName) | ||
Expect(err).ToNot(HaveOccurred(), "Failed to delete placementgroup") | ||
}() | ||
|
||
awsMachineTemplate = newAWSMachineTemplate(mapiDefaultProviderSpec) | ||
awsMachineTemplate.Spec.Template.Spec.PlacementGroupName = placementGroupName | ||
if err = cl.Create(ctx, awsMachineTemplate); err != nil { | ||
Expect(err).ToNot(HaveOccurred(), "Failed to create awsmachinetemplate") | ||
} | ||
machineSetParams = framework.UpdateCAPIMachineSetName("aws-machineset-75395", machineSetParams) | ||
machineSet, err = framework.CreateCAPIMachineSet(ctx, cl, machineSetParams) | ||
Expect(err).ToNot(HaveOccurred(), "Failed to create CAPI machineset") | ||
framework.WaitForCAPIMachinesRunning(ctx, cl, machineSet.Name) | ||
}) | ||
|
||
//huliu-OCP-75396 - [CAPI] Creating machines using KMS keys from AWS. | ||
It("should be able to run a machine using KMS keys", func() { | ||
awsMachineTemplate = newAWSMachineTemplate(mapiDefaultProviderSpec) | ||
region := mapiDefaultProviderSpec.Placement.Region | ||
if region != "us-east-1" && region != "us-east-2" { | ||
Skip("Region is " + region + ", skip this test scenario because we only created kms key in us-east-1/us-east-2 region") | ||
} | ||
var key string | ||
switch region { | ||
case "us-east-1": | ||
key = "arn:aws:kms:us-east-1:301721915996:key/c471ec83-cfaf-41a2-9241-d9e99c4da344" | ||
case "us-east-2": | ||
key = "arn:aws:kms:us-east-2:301721915996:key/c228ef83-df2c-4151-84c4-d9f39f39a972" | ||
} | ||
awskmsClient := framework.NewAwsKmsClient(framework.GetCredentialsFromCluster(oc)) | ||
_, err = awskmsClient.DescribeKeyByID(key) | ||
if err != nil { | ||
Skip(fmt.Sprintf("Skip because cannot get the key %v", err)) | ||
} | ||
encryptBool := true | ||
awsMachineTemplate.Spec.Template.Spec.NonRootVolumes = []awsv1.Volume{ | ||
{ | ||
DeviceName: "/dev/xvda", | ||
Size: 140, | ||
Type: awsv1.VolumeTypeIO1, | ||
IOPS: 5000, | ||
Encrypted: &encryptBool, | ||
EncryptionKey: key, | ||
}, | ||
} | ||
if err := cl.Create(ctx, awsMachineTemplate); err != nil { | ||
Expect(err).ToNot(HaveOccurred(), "Failed to create awsmachinetemplate") | ||
} | ||
machineSetParams = framework.UpdateCAPIMachineSetName("aws-machineset-75396", machineSetParams) | ||
machineSet, err = framework.CreateCAPIMachineSet(ctx, cl, machineSetParams) | ||
Expect(err).ToNot(HaveOccurred(), "Failed to create CAPI machineset") | ||
framework.WaitForCAPIMachinesRunning(ctx, cl, machineSet.Name) | ||
}) | ||
}) | ||
|
||
func getDefaultAWSMAPIProviderSpec(cl client.Client) (*mapiv1.MachineSet, *mapiv1.AWSMachineProviderConfig) { | ||
machineSetList := &mapiv1.MachineSetList{} | ||
|
||
Eventually(func() error { | ||
return cl.List(ctx, machineSetList, client.InNamespace(framework.MachineAPINamespace)) | ||
}, framework.WaitShort, framework.RetryShort).Should(Succeed(), "it should be able to list the MAPI machinesets") | ||
|
||
Expect(machineSetList.Items).ToNot(HaveLen(0), "expected the MAPI machinesets to be present") | ||
machineSet := &machineSetList.Items[0] | ||
Expect(machineSet.Spec.Template.Spec.ProviderSpec.Value).ToNot(BeNil(), "expected the MAPI machinesets ProviderSpec value to not be nil") | ||
|
||
providerSpec := &mapiv1.AWSMachineProviderConfig{} | ||
Expect(yaml.Unmarshal(machineSet.Spec.Template.Spec.ProviderSpec.Value.Raw, providerSpec)).To(Succeed(), "it should be able to unmarshal the raw yaml into providerSpec") | ||
|
||
return machineSet, providerSpec | ||
} | ||
|
||
func newAWSMachineTemplate(mapiProviderSpec *mapiv1.AWSMachineProviderConfig) *awsv1.AWSMachineTemplate { | ||
By("Creating AWS machine template") | ||
|
||
Expect(mapiProviderSpec).ToNot(BeNil(), "expected the mapi ProviderSpec to not be nil") | ||
Expect(mapiProviderSpec.IAMInstanceProfile).ToNot(BeNil(), "expected the mapi IAMInstanceProfile to not be nil") | ||
Expect(mapiProviderSpec.IAMInstanceProfile.ID).ToNot(BeNil(), "expected the mapi IAMInstanceProfile.ID to not be nil") | ||
Expect(mapiProviderSpec.InstanceType).ToNot(BeEmpty(), "expected the mapi InstanceType to not be empty") | ||
Expect(mapiProviderSpec.Placement.AvailabilityZone).ToNot(BeEmpty(), "expected the mapi Placement.AvailabilityZone to not be empty") | ||
Expect(mapiProviderSpec.AMI.ID).ToNot(BeNil(), "expected the mapi AMI.ID to not be nil") | ||
Expect(mapiProviderSpec.SecurityGroups).ToNot(HaveLen(0), "expected the mapi SecurityGroups to be present") | ||
Expect(mapiProviderSpec.SecurityGroups[0].Filters).ToNot(HaveLen(0), "expected the mapi SecurityGroups[0].Filters to be present") | ||
Expect(mapiProviderSpec.SecurityGroups[0].Filters[0].Values).ToNot(HaveLen(0), "expected the mapi SecurityGroups[0].Filters[0].Values to be present") | ||
|
||
var subnet awsv1.AWSResourceReference | ||
|
||
if len(mapiProviderSpec.Subnet.Filters) == 0 { | ||
subnet = awsv1.AWSResourceReference{ | ||
ID: mapiProviderSpec.Subnet.ID, | ||
} | ||
} else { | ||
subnet = awsv1.AWSResourceReference{ | ||
Filters: []awsv1.Filter{ | ||
{ | ||
Name: "tag:Name", | ||
Values: mapiProviderSpec.Subnet.Filters[0].Values, | ||
}, | ||
}, | ||
} | ||
} | ||
|
||
uncompressedUserData := true | ||
ami := awsv1.AMIReference{ | ||
ID: mapiProviderSpec.AMI.ID, | ||
} | ||
ignition := &awsv1.Ignition{ | ||
Version: "3.4", | ||
StorageType: awsv1.IgnitionStorageTypeOptionUnencryptedUserData, | ||
} | ||
additionalSecurityGroups := []awsv1.AWSResourceReference{ | ||
{ | ||
Filters: []awsv1.Filter{ | ||
{ | ||
Name: "tag:Name", | ||
Values: mapiProviderSpec.SecurityGroups[0].Filters[0].Values, | ||
}, | ||
}, | ||
}, | ||
{ | ||
Filters: []awsv1.Filter{ | ||
{ | ||
Name: "tag:Name", | ||
Values: mapiProviderSpec.SecurityGroups[1].Filters[0].Values, | ||
}, | ||
}, | ||
}, | ||
} | ||
awsmt := capiinfrastructurev1beta2resourcebuilder. | ||
AWSMachineTemplate(). | ||
WithUncompressedUserData(uncompressedUserData). | ||
WithIAMInstanceProfile(*mapiProviderSpec.IAMInstanceProfile.ID). | ||
WithInstanceType(mapiProviderSpec.InstanceType). | ||
WithAMI(ami). | ||
WithIgnition(ignition). | ||
WithSubnet(&subnet). | ||
WithAdditionalSecurityGroups(additionalSecurityGroups). | ||
WithName(awsMachineTemplateName). | ||
WithNamespace(framework.ClusterAPINamespace). | ||
Build() | ||
|
||
return awsmt | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.