200 lines
7.2 KiB
Go
200 lines
7.2 KiB
Go
/*
|
|
*
|
|
* Copyright the Velero contributors.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
* /
|
|
*/
|
|
|
|
package backups
|
|
|
|
import (
|
|
"context"
|
|
"flag"
|
|
"fmt"
|
|
"math/rand"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/google/uuid"
|
|
. "github.com/onsi/ginkgo"
|
|
. "github.com/onsi/gomega"
|
|
|
|
. "github.com/vmware-tanzu/velero/test/e2e"
|
|
. "github.com/vmware-tanzu/velero/test/e2e/util/k8s"
|
|
|
|
. "github.com/vmware-tanzu/velero/test/e2e/util/kibishii"
|
|
. "github.com/vmware-tanzu/velero/test/e2e/util/providers"
|
|
. "github.com/vmware-tanzu/velero/test/e2e/util/velero"
|
|
)
|
|
|
|
type TTL struct {
|
|
testNS string
|
|
backupName string
|
|
restoreName string
|
|
ctx context.Context
|
|
ttl time.Duration
|
|
}
|
|
|
|
func (b *TTL) Init() {
|
|
rand.Seed(time.Now().UnixNano())
|
|
UUIDgen, _ = uuid.NewRandom()
|
|
b.testNS = "backup-ttl-test-" + UUIDgen.String()
|
|
b.backupName = "backup-ttl-test-" + UUIDgen.String()
|
|
b.restoreName = "restore-ttl-test-" + UUIDgen.String()
|
|
b.ctx, _ = context.WithTimeout(context.Background(), time.Duration(time.Hour))
|
|
b.ttl = time.Duration(20 * time.Minute)
|
|
|
|
}
|
|
|
|
func TTLTest() {
|
|
useVolumeSnapshots := true
|
|
test := new(TTL)
|
|
client, err := NewTestClient()
|
|
if err != nil {
|
|
println(err.Error())
|
|
}
|
|
Expect(err).To(Succeed(), "Failed to instantiate cluster client for backup tests")
|
|
|
|
BeforeEach(func() {
|
|
flag.Parse()
|
|
if VeleroCfg.InstallVelero {
|
|
// Make sure GCFrequency is shorter than backup TTL
|
|
VeleroCfg.GCFrequency = "4m0s"
|
|
Expect(VeleroInstall(context.Background(), &VeleroCfg, useVolumeSnapshots)).To(Succeed())
|
|
}
|
|
})
|
|
|
|
AfterEach(func() {
|
|
if VeleroCfg.InstallVelero {
|
|
VeleroCfg.GCFrequency = ""
|
|
if !VeleroCfg.Debug {
|
|
Expect(VeleroUninstall(context.Background(), VeleroCfg.VeleroCLI, VeleroCfg.VeleroNamespace)).To(Succeed())
|
|
Expect(DeleteNamespace(test.ctx, client, test.testNS, false)).To(Succeed(), fmt.Sprintf("Failed to delete the namespace %s", test.testNS))
|
|
}
|
|
}
|
|
})
|
|
|
|
It("Backups in object storage should be synced to a new Velero successfully", func() {
|
|
test.Init()
|
|
By(fmt.Sprintf("Prepare workload as target to backup by creating namespace %s namespace", test.testNS), func() {
|
|
Expect(CreateNamespace(test.ctx, client, test.testNS)).To(Succeed(),
|
|
fmt.Sprintf("Failed to create %s namespace", test.testNS))
|
|
})
|
|
|
|
By("Deploy sample workload of Kibishii", func() {
|
|
Expect(KibishiiPrepareBeforeBackup(test.ctx, client, VeleroCfg.CloudProvider,
|
|
test.testNS, VeleroCfg.RegistryCredentialFile, VeleroCfg.Features,
|
|
VeleroCfg.KibishiiDirectory, useVolumeSnapshots)).To(Succeed())
|
|
})
|
|
|
|
var BackupCfg BackupConfig
|
|
BackupCfg.BackupName = test.backupName
|
|
BackupCfg.Namespace = test.testNS
|
|
BackupCfg.BackupLocation = ""
|
|
BackupCfg.UseVolumeSnapshots = useVolumeSnapshots
|
|
BackupCfg.Selector = ""
|
|
BackupCfg.TTL = test.ttl
|
|
|
|
By(fmt.Sprintf("Backup the workload in %s namespace", test.testNS), func() {
|
|
Expect(VeleroBackupNamespace(test.ctx, VeleroCfg.VeleroCLI, VeleroCfg.VeleroNamespace, BackupCfg)).To(Succeed(), func() string {
|
|
RunDebug(context.Background(), VeleroCfg.VeleroCLI, VeleroCfg.VeleroNamespace, test.backupName, "")
|
|
return "Fail to backup workload"
|
|
})
|
|
})
|
|
|
|
var snapshotCheckPoint SnapshotCheckPoint
|
|
if useVolumeSnapshots {
|
|
if VeleroCfg.CloudProvider == "vsphere" {
|
|
// TODO - remove after upload progress monitoring is implemented
|
|
By("Waiting for vSphere uploads to complete", func() {
|
|
Expect(WaitForVSphereUploadCompletion(test.ctx, time.Hour,
|
|
test.testNS)).To(Succeed())
|
|
})
|
|
}
|
|
snapshotCheckPoint, err = GetSnapshotCheckPoint(client, VeleroCfg, 2, test.testNS, test.backupName, KibishiiPodNameList)
|
|
Expect(err).NotTo(HaveOccurred(), "Fail to get Azure CSI snapshot checkpoint")
|
|
|
|
Expect(SnapshotsShouldBeCreatedInCloud(VeleroCfg.CloudProvider,
|
|
VeleroCfg.CloudCredentialsFile, VeleroCfg.BSLBucket, VeleroCfg.BSLConfig,
|
|
test.backupName, snapshotCheckPoint)).NotTo(HaveOccurred(), "Fail to get Azure CSI snapshot checkpoint")
|
|
}
|
|
|
|
By(fmt.Sprintf("Simulating a disaster by removing namespace %s\n", BackupCfg.BackupName), func() {
|
|
Expect(DeleteNamespace(test.ctx, client, BackupCfg.BackupName, true)).To(Succeed(),
|
|
fmt.Sprintf("Failed to delete namespace %s", BackupCfg.BackupName))
|
|
})
|
|
|
|
if VeleroCfg.CloudProvider == "aws" && useVolumeSnapshots {
|
|
fmt.Println("Waiting 7 minutes to make sure the snapshots are ready...")
|
|
time.Sleep(7 * time.Minute)
|
|
}
|
|
|
|
By(fmt.Sprintf("Restore %s", test.testNS), func() {
|
|
Expect(VeleroRestore(test.ctx, VeleroCfg.VeleroCLI,
|
|
VeleroCfg.VeleroNamespace, test.restoreName, test.backupName)).To(Succeed(), func() string {
|
|
RunDebug(test.ctx, VeleroCfg.VeleroCLI,
|
|
VeleroCfg.VeleroNamespace, "", test.restoreName)
|
|
return "Fail to restore workload"
|
|
})
|
|
})
|
|
|
|
By("Associated Restores should be created", func() {
|
|
Expect(ObjectsShouldBeInBucket(VeleroCfg.CloudProvider,
|
|
VeleroCfg.CloudCredentialsFile, VeleroCfg.BSLBucket,
|
|
VeleroCfg.BSLPrefix, VeleroCfg.BSLConfig, test.restoreName,
|
|
RestoreObjectsPrefix)).NotTo(HaveOccurred(), "Fail to get restore object")
|
|
|
|
})
|
|
|
|
By("Check TTL was set correctly", func() {
|
|
ttl, err := GetBackupTTL(test.ctx, VeleroCfg.VeleroNamespace, test.backupName)
|
|
Expect(err).NotTo(HaveOccurred(), "Fail to get Azure CSI snapshot checkpoint")
|
|
t, _ := time.ParseDuration(strings.ReplaceAll(ttl, "'", ""))
|
|
fmt.Println(t.Round(time.Minute).String())
|
|
Expect(t).To(Equal(test.ttl))
|
|
})
|
|
|
|
By(fmt.Sprintf("Waiting %s minutes for removing backup ralated resources by GC", test.ttl.String()), func() {
|
|
time.Sleep(test.ttl)
|
|
})
|
|
|
|
By("Check if backups are deleted by GC", func() {
|
|
Expect(WaitBackupDeleted(test.ctx, VeleroCfg.VeleroCLI, test.backupName, time.Minute*10)).To(Succeed(), fmt.Sprintf("Backup %s was not deleted by GC", test.backupName))
|
|
})
|
|
|
|
By("Backup file from cloud object storage should be deleted", func() {
|
|
Expect(ObjectsShouldNotBeInBucket(VeleroCfg.CloudProvider,
|
|
VeleroCfg.CloudCredentialsFile, VeleroCfg.BSLBucket,
|
|
VeleroCfg.BSLPrefix, VeleroCfg.BSLConfig, test.backupName,
|
|
BackupObjectsPrefix, 5)).NotTo(HaveOccurred(), "Fail to get Azure CSI snapshot checkpoint")
|
|
})
|
|
|
|
By("PersistentVolume snapshots should be deleted", func() {
|
|
if useVolumeSnapshots {
|
|
Expect(SnapshotsShouldNotExistInCloud(VeleroCfg.CloudProvider,
|
|
VeleroCfg.CloudCredentialsFile, VeleroCfg.BSLBucket, VeleroCfg.BSLConfig,
|
|
test.backupName, snapshotCheckPoint)).NotTo(HaveOccurred(), "Fail to get Azure CSI snapshot checkpoint")
|
|
}
|
|
})
|
|
|
|
By("Associated Restores should be deleted", func() {
|
|
Expect(ObjectsShouldNotBeInBucket(VeleroCfg.CloudProvider,
|
|
VeleroCfg.CloudCredentialsFile, VeleroCfg.BSLBucket,
|
|
VeleroCfg.BSLPrefix, VeleroCfg.BSLConfig, test.restoreName,
|
|
RestoreObjectsPrefix, 5)).NotTo(HaveOccurred(), "Fail to get restore object")
|
|
|
|
})
|
|
})
|
|
}
|