-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Signed-off-by: danfengl <[email protected]>
- Loading branch information
1 parent
edeec84
commit 78df815
Showing
6 changed files
with
306 additions
and
55 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,154 @@ | ||
/* | ||
Copyright the Velero contributors. | ||
Licensed under the Apache License, Version 2.0 (the "License"); | ||
you may not use this file except in compliance with the License. | ||
You may obtain a copy of the License at | ||
http://www.apache.org/licenses/LICENSE-2.0 | ||
Unless required by applicable law or agreed to in writing, software | ||
distributed under the License is distributed on an "AS IS" BASIS, | ||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
See the License for the specific language governing permissions and | ||
limitations under the License. | ||
*/ | ||
package e2e | ||
|
||
import ( | ||
"context" | ||
"flag" | ||
"fmt" | ||
"strings" | ||
"time" | ||
|
||
"github.com/google/uuid" | ||
. "github.com/onsi/ginkgo" | ||
. "github.com/onsi/gomega" | ||
"github.com/pkg/errors" | ||
) | ||
|
||
const ( | ||
upgradeNamespace = "upgrade-workload" | ||
) | ||
|
||
// Test backup and restore of Kibishi using restic | ||
var _ = Describe("[Upgrade][Restic] Velero tests on cluster using the plugin provider for object storage and Restic for volume backups", backup_upgrade_restore_with_restic) | ||
|
||
var _ = Describe("[Upgrade][Snapshot] Velero tests on cluster using the plugin provider for object storage and snapshots for volume backups", backup_upgrade_restore_with_snapshots) | ||
|
||
func backup_upgrade_restore_with_snapshots() { | ||
backup_upgrade_restore_test(true) | ||
} | ||
|
||
func backup_upgrade_restore_with_restic() { | ||
backup_upgrade_restore_test(false) | ||
} | ||
|
||
func backup_upgrade_restore_test(useVolumeSnapshots bool) { | ||
var ( | ||
backupName, restoreName string | ||
) | ||
|
||
client, err := newTestClient() | ||
Expect(err).To(Succeed(), "Failed to instantiate cluster client for backup tests") | ||
|
||
BeforeEach(func() { | ||
if useVolumeSnapshots && cloudProvider == "kind" { | ||
Skip("Volume snapshots not supported on kind") | ||
} | ||
var err error | ||
flag.Parse() | ||
uuidgen, err = uuid.NewRandom() | ||
Expect(err).To(Succeed()) | ||
if installVelero { | ||
//Set veleroImage and resticHelperImage to blank | ||
//veleroImage and resticHelperImage should be the default value in originalCli | ||
Expect(veleroInstall(context.Background(), upgradeFromCLI, "", "", veleroNamespace, cloudProvider, objectStoreProvider, useVolumeSnapshots, | ||
cloudCredentialsFile, bslBucket, bslPrefix, bslConfig, vslConfig, "", "", registryCredentialFile)).To(Succeed()) | ||
Expect(checkVeleroVersion(context.Background(), upgradeFromCLI, upgradeFromVersion)).To(Succeed()) | ||
} | ||
}) | ||
|
||
AfterEach(func() { | ||
// if installVelero { | ||
// err = veleroUninstall(context.Background(), veleroCLI, veleroNamespace) | ||
// Expect(err).To(Succeed()) | ||
// } | ||
}) | ||
|
||
When("kibishii is the sample workload", func() { | ||
It("should be successfully backed up and restored to the default BackupStorageLocation", func() { | ||
backupName = "backup-" + uuidgen.String() | ||
restoreName = "restore-" + uuidgen.String() | ||
// Even though we are using Velero's CloudProvider plugin for object storage, the kubernetes cluster is running on | ||
// KinD. So use the kind installation for Kibishii. | ||
//veleroImage = veleroImageTemp | ||
Expect(runUpgradeTests(client, veleroImage, cloudProvider, upgradeFromCLI, veleroNamespace, backupName, restoreName, "", useVolumeSnapshots, registryCredentialFile)).To(Succeed(), | ||
"Failed to successfully backup and restore Kibishii namespace") | ||
}) | ||
}) | ||
} | ||
|
||
// runKibishiiTests runs kibishii tests on the provider. | ||
func runUpgradeTests(client testClient, toVeleroImage, providerName, upgradeFromCLI, veleroNamespace, backupName, restoreName, backupLocation string, | ||
useVolumeSnapshots bool, registryCredentialFile string) error { | ||
oneHourTimeout, _ := context.WithTimeout(context.Background(), time.Minute*60) | ||
if err := kibishiiPrepareBeforeBackup(oneHourTimeout, client, providerName, upgradeNamespace, registryCredentialFile); err != nil { | ||
return errors.Wrapf(err, "Failed to install and prepare data for kibishii %s", upgradeNamespace) | ||
} | ||
|
||
defer func() { | ||
if err := deleteNamespace(oneHourTimeout, client, upgradeNamespace, true); err != nil { | ||
fmt.Println(errors.Wrapf(err, "failed to delete the namespace %q", upgradeNamespace)) | ||
} | ||
}() | ||
|
||
if err := veleroBackupNamespace(oneHourTimeout, upgradeFromCLI, veleroNamespace, backupName, upgradeNamespace, backupLocation, useVolumeSnapshots); err != nil { | ||
veleroBackupLogs(oneHourTimeout, upgradeFromCLI, veleroNamespace, backupName) | ||
return errors.Wrapf(err, "Failed to backup kibishii namespace %s", upgradeNamespace) | ||
} | ||
|
||
if providerName == "vsphere" && useVolumeSnapshots { | ||
// Wait for uploads started by the Velero Plug-in for vSphere to complete | ||
// TODO - remove after upload progress monitoring is implemented | ||
fmt.Println("Waiting for vSphere uploads to complete") | ||
if err := waitForVSphereUploadCompletion(oneHourTimeout, time.Hour, upgradeNamespace); err != nil { | ||
return errors.Wrapf(err, "Error waiting for uploads to complete") | ||
} | ||
} | ||
fmt.Printf("Simulating a disaster by removing namespace %s\n", upgradeNamespace) | ||
if err := deleteNamespace(oneHourTimeout, client, upgradeNamespace, true); err != nil { | ||
return errors.Wrapf(err, "failed to delete namespace %s", upgradeNamespace) | ||
} | ||
var targetCli string | ||
var err error | ||
main_tag := "main" | ||
upgradeToVersion := veleroImage[strings.Index(toVeleroImage, ":")+1:] | ||
if upgradeToVersion == main_tag { | ||
targetCli = veleroCLI | ||
} else { | ||
targetCli, err = installVeleroCLI(upgradeToVersion) | ||
if err != nil { | ||
return errors.Wrapf(err, "Fail to install velero CLI.") | ||
} | ||
} | ||
if err := veleroInstall(context.Background(), targetCli, toVeleroImage, resticHelperImage, veleroNamespace, cloudProvider, objectStoreProvider, useVolumeSnapshots, | ||
cloudCredentialsFile, bslBucket, bslPrefix, bslConfig, vslConfig, crdsVersion, "", registryCredentialFile); err != nil { | ||
return errors.Wrapf(err, "Failed to install velero from image %s", toVeleroImage) | ||
} | ||
if err := checkVeleroVersion(context.Background(), targetCli, upgradeToVersion); err != nil { | ||
return errors.Wrapf(err, "Velero install version mismatch.") | ||
} | ||
if err := veleroRestore(oneHourTimeout, targetCli, veleroNamespace, restoreName, backupName); err != nil { | ||
veleroRestoreLogs(oneHourTimeout, targetCli, veleroNamespace, restoreName) | ||
return errors.Wrapf(err, "Restore %s failed from backup %s", restoreName, backupName) | ||
} | ||
|
||
if err := kibishiiVerifyAfterRestore(client, upgradeNamespace, oneHourTimeout); err != nil { | ||
return errors.Wrapf(err, "Error verifying kibishii after restore") | ||
} | ||
|
||
fmt.Printf("kibishii test completed successfully\n") | ||
return nil | ||
} |
Oops, something went wrong.