e2e: node: remove kubevirt device plugin

The podresources e2e tests want to exercise the case on which a device
plugin doesn't report topology affinity. The only known device plugin
which had this requirement and didn't depend on specialized hardware
was the kubevirt device plugin, which was however deprecated after
we started using it.

So the e2e tests are now broken, and in any case they can't depend on
unmaintained and liable to be obsolete code.

To unblock the state and preserve some e2e signal, we switch to the
sample device plugin, which is a stub implementation and which is
managed in-tree, so we can maintain it and ensure it fits the e2e test
usecase.

This is however a regression, because e2e tests should try their hardest
to use real devices and avoid any mocking or faking.
The upside is that using a OS-neutral device plugin for the tests enables
us to run on all the supported platform (windows!) so this could allow
us to transition these tests to conformance.

Signed-off-by: Francesco Romani <fromani@redhat.com>
This commit is contained in:
Francesco Romani 2023-02-21 12:55:29 +01:00
parent aa1a0385e2
commit 871201ba64
4 changed files with 40 additions and 122 deletions

View File

@ -87,11 +87,6 @@ func updateImageAllowList(ctx context.Context) {
} else { } else {
e2epod.ImagePrePullList.Insert(gpuDevicePluginImage) e2epod.ImagePrePullList.Insert(gpuDevicePluginImage)
} }
if kubeVirtPluginImage, err := getKubeVirtDevicePluginImage(); err != nil {
klog.Errorln(err)
} else {
e2epod.ImagePrePullList.Insert(kubeVirtPluginImage)
}
if samplePluginImage, err := getSampleDevicePluginImage(); err != nil { if samplePluginImage, err := getSampleDevicePluginImage(); err != nil {
klog.Errorln(err) klog.Errorln(err)
} else { } else {
@ -262,23 +257,3 @@ func getSRIOVDevicePluginImage() (string, error) {
} }
return ds.Spec.Template.Spec.Containers[0].Image, nil return ds.Spec.Template.Spec.Containers[0].Image, nil
} }
// TODO generilize this function with above one
// getKubeVirtDevicePluginImage returns the image of SRIOV device plugin.
func getKubeVirtDevicePluginImage() (string, error) {
data, err := e2etestfiles.Read(KubeVirtDevicePluginDSYAML)
if err != nil {
return "", fmt.Errorf("failed to read the device plugin manifest: %w", err)
}
ds, err := e2emanifest.DaemonSetFromData(data)
if err != nil {
return "", fmt.Errorf("failed to parse the device plugin image: %w", err)
}
if ds == nil {
return "", fmt.Errorf("failed to parse the device plugin image: the extracted DaemonSet is nil")
}
if len(ds.Spec.Template.Spec.Containers) < 1 {
return "", fmt.Errorf("failed to parse the device plugin image: cannot extract the container from YAML")
}
return ds.Spec.Template.Spec.Containers[0].Image, nil
}

View File

@ -18,7 +18,6 @@ package e2enode
import ( import (
"context" "context"
"errors"
"fmt" "fmt"
"os" "os"
"strings" "strings"
@ -49,6 +48,10 @@ import (
e2etestfiles "k8s.io/kubernetes/test/e2e/framework/testfiles" e2etestfiles "k8s.io/kubernetes/test/e2e/framework/testfiles"
) )
const (
defaultTopologyUnawareResourceName = "example.com/resource"
)
type podDesc struct { type podDesc struct {
podName string podName string
cntName string cntName string
@ -234,10 +237,10 @@ func matchPodDescWithResources(expected []podDesc, found podResMap) error {
return fmt.Errorf("pod %q container %q expected no resources, got %v", podReq.podName, podReq.cntName, devs) return fmt.Errorf("pod %q container %q expected no resources, got %v", podReq.podName, podReq.cntName, devs)
} }
} }
if cnts, ok := found[KubeVirtResourceName]; ok { if cnts, ok := found[defaultTopologyUnawareResourceName]; ok {
for _, cnt := range cnts { for _, cnt := range cnts {
for _, cd := range cnt.GetDevices() { for _, cd := range cnt.GetDevices() {
if cd.ResourceName != KubeVirtResourceName { if cd.ResourceName != defaultTopologyUnawareResourceName {
continue continue
} }
if cd.Topology != nil { if cd.Topology != nil {
@ -739,14 +742,7 @@ var _ = SIGDescribe("POD Resources [Serial] [Feature:PodResources][NodeFeature:P
}) })
}) })
ginkgo.Context("with KubeVirt device plugin, which reports resources w/o hardware topology", func() { ginkgo.Context("with a topology-unaware device plugin, which reports resources w/o hardware topology", func() {
ginkgo.BeforeEach(func() {
_, err := os.Stat("/dev/kvm")
if errors.Is(err, os.ErrNotExist) {
e2eskipper.Skipf("KubeVirt device plugin could work only in kvm based environment")
}
})
ginkgo.Context("with CPU manager Static policy", func() { ginkgo.Context("with CPU manager Static policy", func() {
ginkgo.BeforeEach(func(ctx context.Context) { ginkgo.BeforeEach(func(ctx context.Context) {
// this is a very rough check. We just want to rule out system that does NOT have enough resources // this is a very rough check. We just want to rule out system that does NOT have enough resources
@ -772,10 +768,10 @@ var _ = SIGDescribe("POD Resources [Serial] [Feature:PodResources][NodeFeature:P
}) })
ginkgo.It("should return proper podresources the same as before the restart of kubelet", func(ctx context.Context) { ginkgo.It("should return proper podresources the same as before the restart of kubelet", func(ctx context.Context) {
dpPod := setupKubeVirtDevicePluginOrFail(ctx, f) dpPod := setupSampleDevicePluginOrFail(ctx, f)
ginkgo.DeferCleanup(teardownKubeVirtDevicePluginOrFail, f, dpPod) ginkgo.DeferCleanup(teardownSampleDevicePluginOrFail, f, dpPod)
waitForKubeVirtResources(ctx, f, dpPod) waitForTopologyUnawareResources(ctx, f)
endpoint, err := util.LocalEndpoint(defaultPodResourcesPath, podresources.Socket) endpoint, err := util.LocalEndpoint(defaultPodResourcesPath, podresources.Socket)
framework.ExpectNoError(err) framework.ExpectNoError(err)
@ -784,22 +780,21 @@ var _ = SIGDescribe("POD Resources [Serial] [Feature:PodResources][NodeFeature:P
framework.ExpectNoError(err) framework.ExpectNoError(err)
defer conn.Close() defer conn.Close()
ginkgo.By("checking List and resources kubevirt resource should be without topology") ginkgo.By("checking List and resources topology unaware resource should be without topology")
allocatableResponse, _ := cli.GetAllocatableResources(ctx, &kubeletpodresourcesv1.AllocatableResourcesRequest{}) allocatableResponse, _ := cli.GetAllocatableResources(ctx, &kubeletpodresourcesv1.AllocatableResourcesRequest{})
for _, dev := range allocatableResponse.GetDevices() { for _, dev := range allocatableResponse.GetDevices() {
if dev.ResourceName != KubeVirtResourceName { if dev.ResourceName != defaultTopologyUnawareResourceName {
continue continue
} }
framework.ExpectEqual(dev.Topology == nil, true, "Topology is expected to be empty for kubevirt resources") framework.ExpectEqual(dev.Topology == nil, true, "Topology is expected to be empty for topology unaware resources")
} }
// Run pod which requires KubeVirtResourceName
desc := podDesc{ desc := podDesc{
podName: "pod-01", podName: "pod-01",
cntName: "cnt-01", cntName: "cnt-01",
resourceName: KubeVirtResourceName, resourceName: defaultTopologyUnawareResourceName,
resourceAmount: 1, resourceAmount: 1,
cpuRequest: 1000, cpuRequest: 1000,
} }
@ -894,41 +889,41 @@ func getOnlineCPUs() (cpuset.CPUSet, error) {
return cpuset.Parse(strings.TrimSpace(string(onlineCPUList))) return cpuset.Parse(strings.TrimSpace(string(onlineCPUList)))
} }
func setupKubeVirtDevicePluginOrFail(ctx context.Context, f *framework.Framework) *v1.Pod { func setupSampleDevicePluginOrFail(ctx context.Context, f *framework.Framework) *v1.Pod {
e2enode.WaitForNodeToBeReady(ctx, f.ClientSet, framework.TestContext.NodeName, 5*time.Minute) e2enode.WaitForNodeToBeReady(ctx, f.ClientSet, framework.TestContext.NodeName, 5*time.Minute)
dp := getKubeVirtDevicePluginPod() dp := getSampleDevicePluginPod()
dp.Spec.NodeName = framework.TestContext.NodeName dp.Spec.NodeName = framework.TestContext.NodeName
ginkgo.By("Create KubeVirt device plugin pod") ginkgo.By("Create the sample device plugin pod")
dpPod, err := f.ClientSet.CoreV1().Pods(metav1.NamespaceSystem).Create(ctx, dp, metav1.CreateOptions{}) dpPod = e2epod.NewPodClient(f).CreateSync(ctx, dp)
framework.ExpectNoError(err)
if err = e2epod.WaitForPodCondition(ctx, f.ClientSet, metav1.NamespaceSystem, dp.Name, "Ready", 120*time.Second, testutils.PodRunningReady); err != nil { err := e2epod.WaitForPodCondition(ctx, f.ClientSet, dpPod.Namespace, dpPod.Name, "Ready", 120*time.Second, testutils.PodRunningReady)
framework.Logf("KubeVirt Pod %v took too long to enter running/ready: %v", dp.Name, err) if err != nil {
framework.Logf("Sample Device Pod %v took too long to enter running/ready: %v", dp.Name, err)
} }
framework.ExpectNoError(err) framework.ExpectNoError(err)
return dpPod return dpPod
} }
func teardownKubeVirtDevicePluginOrFail(ctx context.Context, f *framework.Framework, pod *v1.Pod) { func teardownSampleDevicePluginOrFail(ctx context.Context, f *framework.Framework, pod *v1.Pod) {
gp := int64(0) gp := int64(0)
deleteOptions := metav1.DeleteOptions{ deleteOptions := metav1.DeleteOptions{
GracePeriodSeconds: &gp, GracePeriodSeconds: &gp,
} }
ginkgo.By(fmt.Sprintf("Delete KubeVirt device plugin pod %s/%s", pod.Namespace, pod.Name)) ginkgo.By(fmt.Sprintf("Delete sample device plugin pod %s/%s", pod.Namespace, pod.Name))
err := f.ClientSet.CoreV1().Pods(pod.Namespace).Delete(ctx, pod.Name, deleteOptions) err := f.ClientSet.CoreV1().Pods(pod.Namespace).Delete(ctx, pod.Name, deleteOptions)
framework.ExpectNoError(err) framework.ExpectNoError(err)
waitForAllContainerRemoval(ctx, pod.Name, pod.Namespace) waitForAllContainerRemoval(ctx, pod.Name, pod.Namespace)
} }
func findKubeVirtResource(node *v1.Node) int64 { func findTopologyUnawareResource(node *v1.Node) int64 {
framework.Logf("Node status allocatable: %v", node.Status.Allocatable) framework.Logf("Node status allocatable: %v", node.Status.Allocatable)
for key, val := range node.Status.Allocatable { for key, val := range node.Status.Allocatable {
if string(key) == KubeVirtResourceName { if string(key) == defaultTopologyUnawareResourceName {
v := val.Value() v := val.Value()
if v > 0 { if v > 0 {
return v return v
@ -938,34 +933,37 @@ func findKubeVirtResource(node *v1.Node) int64 {
return 0 return 0
} }
func waitForKubeVirtResources(ctx context.Context, f *framework.Framework, pod *v1.Pod) { func waitForTopologyUnawareResources(ctx context.Context, f *framework.Framework, pod *v1.Pod) {
ginkgo.By("Waiting for kubevirt resources to become available on the local node") ginkgo.By(fmt.Sprintf("Waiting for %q resources to become available on the local node", defaultTopologyUnawareResourceName))
gomega.Eventually(ctx, func(ctx context.Context) bool { gomega.Eventually(ctx, func(ctx context.Context) bool {
node := getLocalNode(ctx, f) node := getLocalNode(ctx, f)
kubeVirtResourceAmount := findKubeVirtResource(node) resourceAmount := findTopologyUnawareResource(node)
return kubeVirtResourceAmount != 0 return resourceAmount != 0
}, 2*time.Minute, framework.Poll).Should(gomega.BeTrue()) }, 2*time.Minute, framework.Poll).Should(gomega.BeTrue())
} }
// getKubeVirtDevicePluginPod returns the Device Plugin pod for kube resources in e2e tests. // getSampleDevicePluginPod returns the Sample Device Plugin pod to be used e2e tests.
func getKubeVirtDevicePluginPod() *v1.Pod { func getSampleDevicePluginPod() *v1.Pod {
data, err := e2etestfiles.Read(KubeVirtDevicePluginDSYAML) data, err := e2etestfiles.Read(SampleDevicePluginDSYAML)
if err != nil { if err != nil {
framework.Fail(err.Error()) framework.Fail(err.Error())
} }
ds := readDaemonSetV1OrDie(data) ds := readDaemonSetV1OrDie(data)
p := &v1.Pod{ dp := &v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: KubeVirtDevicePluginName, Name: sampleDevicePluginName,
Namespace: metav1.NamespaceSystem,
}, },
Spec: ds.Spec.Template.Spec, Spec: ds.Spec.Template.Spec,
} }
for i := range dp.Spec.Containers[0].Env {
if dp.Spec.Containers[0].Env[i].Name == envVarNamePluginSockDir {
dp.Spec.Containers[0].Env[i].Value = pluginSockDir
}
}
return p return dp
} }
func getPodResourcesMetrics(ctx context.Context) (e2emetrics.KubeletMetrics, error) { func getPodResourcesMetrics(ctx context.Context) (e2emetrics.KubeletMetrics, error) {

View File

@ -1,28 +0,0 @@
apiVersion: apps/v1
kind: DaemonSet
metadata:
labels:
name: kubevirt-kvm-device-plugin
name: kubevirt-kvm-device-plugin
spec:
selector:
matchLabels:
name: kubevirt-kvm-device-plugin
template:
metadata:
labels:
name: kubevirt-kvm-device-plugin
spec:
containers:
- name: kubevirt-kvm-device-plugin
image: quay.io/kubevirt/device-plugin-kvm
args: ["-v", "3", "-logtostderr"]
securityContext:
privileged: true
volumeMounts:
- name: device-plugin
mountPath: /var/lib/kubelet/device-plugins
volumes:
- name: device-plugin
hostPath:
path: /var/lib/kubelet/device-plugins

View File

@ -1,27 +0,0 @@
/*
Copyright 2021 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package e2enode
const (
KubeVirtDevicePluginDSYAML = "test/e2e_node/testing-manifests/kubevirt-kvm-ds.yaml"
// KubeVirtDevicePluginName is the name of the device plugin pod
KubeVirtDevicePluginName = "kubevirt-device-plugin"
// KubeVirtResourceName is the name of the resource provided by kubevirt device plugin
KubeVirtResourceName = "devices.kubevirt.io/kvm"
)