/* Copyright 2019 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package instancegroups import ( "context" "errors" "strings" "sync" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/autoscaling" "github.com/aws/aws-sdk-go/service/autoscaling/autoscalingiface" "github.com/aws/aws-sdk-go/service/ec2" "github.com/aws/aws-sdk-go/service/ec2/ec2iface" "github.com/stretchr/testify/assert" v1 "k8s.io/api/core/v1" v1meta "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/util/intstr" "k8s.io/client-go/kubernetes" "k8s.io/client-go/kubernetes/fake" testingclient "k8s.io/client-go/testing" "k8s.io/kops/cloudmock/aws/mockautoscaling" kopsapi "k8s.io/kops/pkg/apis/kops" "k8s.io/kops/pkg/cloudinstances" "k8s.io/kops/pkg/validation" "k8s.io/kops/upup/pkg/fi" "k8s.io/kops/upup/pkg/fi/cloudup/awsup" ) const ( cordonPatch = "{\"spec\":{\"unschedulable\":true}}" taintPatch = "{\"spec\":{\"taints\":[{\"effect\":\"PreferNoSchedule\",\"key\":\"kops.k8s.io/scheduled-for-update\"}]}}" ) func getTestSetup() (*RollingUpdateCluster, *awsup.MockAWSCloud) { k8sClient := fake.NewSimpleClientset() mockcloud := awsup.BuildMockAWSCloud("us-east-1", "abc") mockAutoscaling := &mockautoscaling.MockAutoscaling{} mockcloud.MockAutoscaling = mockAutoscaling mockcloud.MockEC2 = mockAutoscaling.GetEC2Shim(mockcloud.MockEC2) cluster := &kopsapi.Cluster{} cluster.Name = "test.k8s.local" c := &RollingUpdateCluster{ Ctx: context.Background(), Cluster: cluster, Cloud: mockcloud, MasterInterval: 1 * time.Millisecond, NodeInterval: 1 * time.Millisecond, BastionInterval: 1 * time.Millisecond, Force: false, K8sClient: k8sClient, ClusterValidator: &successfulClusterValidator{}, FailOnValidate: true, ValidateTickDuration: 1 * time.Millisecond, ValidateSuccessDuration: 5 * time.Millisecond, ValidateCount: 2, } return c, mockcloud } type successfulClusterValidator struct{} func (*successfulClusterValidator) Validate() (*validation.ValidationCluster, error) { return &validation.ValidationCluster{}, nil } type failingClusterValidator struct{} func (*failingClusterValidator) Validate() (*validation.ValidationCluster, error) { return &validation.ValidationCluster{ Failures: []*validation.ValidationError{ { Kind: "testing", Name: "testingfailure", Message: "testing failure", }, }, }, nil } type erroringClusterValidator struct{} func (*erroringClusterValidator) Validate() (*validation.ValidationCluster, error) { return nil, errors.New("testing validation error") } type assertNotCalledClusterValidator struct { T *testing.T } func (v *assertNotCalledClusterValidator) Validate() (*validation.ValidationCluster, error) { v.T.Fatal("validator called unexpectedly") return nil, errors.New("validator called unexpectedly") } func makeGroup(groups map[string]*cloudinstances.CloudInstanceGroup, k8sClient kubernetes.Interface, cloud awsup.AWSCloud, name string, role kopsapi.InstanceGroupRole, count int, needUpdate int) { fakeClient := k8sClient.(*fake.Clientset) groups[name] = &cloudinstances.CloudInstanceGroup{ HumanName: name, InstanceGroup: &kopsapi.InstanceGroup{ ObjectMeta: v1meta.ObjectMeta{ Name: name, }, Spec: kopsapi.InstanceGroupSpec{ Role: role, }, }, Raw: &autoscaling.Group{AutoScalingGroupName: aws.String("asg-" + name)}, } cloud.Autoscaling().CreateAutoScalingGroup(&autoscaling.CreateAutoScalingGroupInput{ AutoScalingGroupName: aws.String(name), DesiredCapacity: aws.Int64(int64(count)), MinSize: aws.Int64(1), MaxSize: aws.Int64(5), }) var instanceIds []*string for i := 0; i < count; i++ { id := name + string(rune('a'+i)) var node *v1.Node if role != kopsapi.InstanceGroupRoleBastion { node = &v1.Node{ ObjectMeta: v1meta.ObjectMeta{Name: id + ".local"}, } _ = fakeClient.Tracker().Add(node) } member := cloudinstances.CloudInstance{ ID: id, Node: node, CloudInstanceGroup: groups[name], } if i < needUpdate { groups[name].NeedUpdate = append(groups[name].NeedUpdate, &member) } else { groups[name].Ready = append(groups[name].Ready, &member) } instanceIds = append(instanceIds, aws.String(id)) } cloud.Autoscaling().AttachInstances(&autoscaling.AttachInstancesInput{ AutoScalingGroupName: aws.String(name), InstanceIds: instanceIds, }) } func getGroups(k8sClient kubernetes.Interface, cloud awsup.AWSCloud) map[string]*cloudinstances.CloudInstanceGroup { groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, k8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 3, 0) makeGroup(groups, k8sClient, cloud, "node-2", kopsapi.InstanceGroupRoleNode, 3, 0) makeGroup(groups, k8sClient, cloud, "master-1", kopsapi.InstanceGroupRoleMaster, 2, 0) makeGroup(groups, k8sClient, cloud, "bastion-1", kopsapi.InstanceGroupRoleBastion, 1, 0) return groups } func getGroupsAllNeedUpdate(k8sClient kubernetes.Interface, cloud awsup.AWSCloud) map[string]*cloudinstances.CloudInstanceGroup { groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, k8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 3, 3) makeGroup(groups, k8sClient, cloud, "node-2", kopsapi.InstanceGroupRoleNode, 3, 3) makeGroup(groups, k8sClient, cloud, "master-1", kopsapi.InstanceGroupRoleMaster, 2, 2) makeGroup(groups, k8sClient, cloud, "bastion-1", kopsapi.InstanceGroupRoleBastion, 1, 1) return groups } func TestRollingUpdateAllNeedUpdate(t *testing.T) { c, cloud := getTestSetup() groups := getGroupsAllNeedUpdate(c.K8sClient, cloud) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") cordoned := "" tainted := map[string]bool{} deleted := map[string]bool{} for _, action := range c.K8sClient.(*fake.Clientset).Actions() { switch a := action.(type) { case testingclient.PatchAction: if string(a.GetPatch()) == cordonPatch { assertCordon(t, a) assert.Equal(t, "", cordoned, "at most one node cordoned at a time") assert.True(t, tainted[a.GetName()], "node", a.GetName(), "tainted") cordoned = a.GetName() } else { assertTaint(t, a) assert.Equal(t, "", cordoned, "not tainting while node cordoned") assert.False(t, tainted[a.GetName()], "node", a.GetName(), "already tainted") tainted[a.GetName()] = true } case testingclient.DeleteAction: assert.Equal(t, "nodes", a.GetResource().Resource) assert.Equal(t, cordoned, a.GetName(), "node was cordoned before delete") assert.False(t, deleted[a.GetName()], "node", a.GetName(), "already deleted") if !strings.HasPrefix(a.GetName(), "master-") { assert.True(t, deleted["master-1a.local"], "master-1a was deleted before node", a.GetName()) assert.True(t, deleted["master-1b.local"], "master-1b was deleted before node", a.GetName()) } deleted[a.GetName()] = true cordoned = "" case testingclient.ListAction: // Don't care default: t.Errorf("unexpected action %v", a) } } asgGroups, _ := cloud.Autoscaling().DescribeAutoScalingGroups(&autoscaling.DescribeAutoScalingGroupsInput{}) for _, group := range asgGroups.AutoScalingGroups { assert.Emptyf(t, group.Instances, "Not all instances terminated in group %s", group.AutoScalingGroupName) } } func TestRollingUpdateAllNeedUpdateCloudonly(t *testing.T) { c, cloud := getTestSetup() c.CloudOnly = true c.ClusterValidator = &assertNotCalledClusterValidator{T: t} groups := getGroupsAllNeedUpdate(c.K8sClient, cloud) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assert.Empty(t, c.K8sClient.(*fake.Clientset).Actions()) asgGroups, _ := cloud.Autoscaling().DescribeAutoScalingGroups(&autoscaling.DescribeAutoScalingGroupsInput{}) for _, group := range asgGroups.AutoScalingGroups { assert.Emptyf(t, group.Instances, "Not all instances terminated in group %s", group.AutoScalingGroupName) } } func TestRollingUpdateAllNeedUpdateNoFailOnValidate(t *testing.T) { c, cloud := getTestSetup() c.FailOnValidate = false c.ClusterValidator = &failingClusterValidator{} groups := getGroupsAllNeedUpdate(c.K8sClient, cloud) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") asgGroups, _ := cloud.Autoscaling().DescribeAutoScalingGroups(&autoscaling.DescribeAutoScalingGroupsInput{}) for _, group := range asgGroups.AutoScalingGroups { assert.Emptyf(t, group.Instances, "Not all instances terminated in group %s", group.AutoScalingGroupName) } } func TestRollingUpdateNoneNeedUpdate(t *testing.T) { c, cloud := getTestSetup() groups := getGroups(c.K8sClient, cloud) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assert.Empty(t, c.K8sClient.(*fake.Clientset).Actions()) assertGroupInstanceCount(t, cloud, "node-1", 3) assertGroupInstanceCount(t, cloud, "node-2", 3) assertGroupInstanceCount(t, cloud, "master-1", 2) assertGroupInstanceCount(t, cloud, "bastion-1", 1) } func TestRollingUpdateNoneNeedUpdateWithForce(t *testing.T) { c, cloud := getTestSetup() groups := getGroups(c.K8sClient, cloud) c.Force = true err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") asgGroups, _ := cloud.Autoscaling().DescribeAutoScalingGroups(&autoscaling.DescribeAutoScalingGroupsInput{}) for _, group := range asgGroups.AutoScalingGroups { assert.Emptyf(t, group.Instances, "Not all instances terminated in group %s", group.AutoScalingGroupName) } } func TestRollingUpdateEmptyGroup(t *testing.T) { c, cloud := getTestSetup() groups := make(map[string]*cloudinstances.CloudInstanceGroup) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 3) assertGroupInstanceCount(t, cloud, "node-2", 3) assertGroupInstanceCount(t, cloud, "master-1", 2) assertGroupInstanceCount(t, cloud, "bastion-1", 1) } func TestRollingUpdateUnknownRole(t *testing.T) { c, cloud := getTestSetup() groups := getGroups(c.K8sClient, cloud) groups["node-1"].InstanceGroup.Spec.Role = "Unknown" err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.Error(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 3) assertGroupInstanceCount(t, cloud, "node-2", 3) assertGroupInstanceCount(t, cloud, "master-1", 2) assertGroupInstanceCount(t, cloud, "bastion-1", 1) } func TestRollingUpdateAllNeedUpdateFailsValidation(t *testing.T) { c, cloud := getTestSetup() c.ClusterValidator = &failingClusterValidator{} groups := getGroupsAllNeedUpdate(c.K8sClient, cloud) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.Error(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 3) assertGroupInstanceCount(t, cloud, "node-2", 3) assertGroupInstanceCount(t, cloud, "master-1", 2) assertGroupInstanceCount(t, cloud, "bastion-1", 0) } func TestRollingUpdateAllNeedUpdateErrorsValidation(t *testing.T) { c, cloud := getTestSetup() c.ClusterValidator = &erroringClusterValidator{} groups := getGroupsAllNeedUpdate(c.K8sClient, cloud) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.Error(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 3) assertGroupInstanceCount(t, cloud, "node-2", 3) assertGroupInstanceCount(t, cloud, "master-1", 2) assertGroupInstanceCount(t, cloud, "bastion-1", 0) } func TestRollingUpdateNodes1NeedsUpdateFailsValidation(t *testing.T) { c, cloud := getTestSetup() c.ClusterValidator = &failingClusterValidator{} groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 3, 3) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.Error(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 3) } func TestRollingUpdateNodes1NeedsUpdateErrorsValidation(t *testing.T) { c, cloud := getTestSetup() c.ClusterValidator = &erroringClusterValidator{} groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 3, 3) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.Error(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 3) } type failAfterOneNodeClusterValidator struct { Cloud awsup.AWSCloud Group string ReturnError bool } func (v *failAfterOneNodeClusterValidator) Validate() (*validation.ValidationCluster, error) { asgGroups, _ := v.Cloud.Autoscaling().DescribeAutoScalingGroups(&autoscaling.DescribeAutoScalingGroupsInput{ AutoScalingGroupNames: []*string{aws.String(v.Group)}, }) for _, group := range asgGroups.AutoScalingGroups { if int64(len(group.Instances)) < *group.DesiredCapacity { if v.ReturnError { return nil, errors.New("testing validation error") } return &validation.ValidationCluster{ Failures: []*validation.ValidationError{ { Kind: "testing", Name: "testingfailure", Message: "testing failure", }, }, }, nil } } return &validation.ValidationCluster{}, nil } func TestRollingUpdateClusterFailsValidationAfterOneMaster(t *testing.T) { c, cloud := getTestSetup() c.ClusterValidator = &failAfterOneNodeClusterValidator{ Cloud: cloud, Group: "master-1", ReturnError: false, } groups := getGroupsAllNeedUpdate(c.K8sClient, cloud) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.Error(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 3) assertGroupInstanceCount(t, cloud, "node-2", 3) assertGroupInstanceCount(t, cloud, "master-1", 1) assertGroupInstanceCount(t, cloud, "bastion-1", 0) } func TestRollingUpdateClusterErrorsValidationAfterOneMaster(t *testing.T) { c, cloud := getTestSetup() c.ClusterValidator = &failAfterOneNodeClusterValidator{ Cloud: cloud, Group: "master-1", ReturnError: true, } groups := getGroupsAllNeedUpdate(c.K8sClient, cloud) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.Error(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 3) assertGroupInstanceCount(t, cloud, "node-2", 3) assertGroupInstanceCount(t, cloud, "master-1", 1) assertGroupInstanceCount(t, cloud, "bastion-1", 0) } func TestRollingUpdateClusterFailsValidationAfterOneNode(t *testing.T) { c, cloud := getTestSetup() c.ClusterValidator = &failAfterOneNodeClusterValidator{ Cloud: cloud, Group: "node-1", ReturnError: false, } groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 3, 3) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.Error(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 2) } func TestRollingUpdateClusterErrorsValidationAfterOneNode(t *testing.T) { c, cloud := getTestSetup() c.ClusterValidator = &failAfterOneNodeClusterValidator{ Cloud: cloud, Group: "node-1", ReturnError: true, } groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 3, 3) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.Error(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 2) } type flappingClusterValidator struct { T *testing.T Cloud awsup.AWSCloud invocationCount int } func (v *flappingClusterValidator) Validate() (*validation.ValidationCluster, error) { asgGroups, _ := v.Cloud.Autoscaling().DescribeAutoScalingGroups(&autoscaling.DescribeAutoScalingGroupsInput{ AutoScalingGroupNames: []*string{aws.String("master-1")}, }) for _, group := range asgGroups.AutoScalingGroups { switch len(group.Instances) { case 1: return &validation.ValidationCluster{}, nil case 0: assert.GreaterOrEqual(v.T, v.invocationCount, 7, "validator invocation count") } } v.invocationCount++ switch v.invocationCount { case 1, 3, 5: return &validation.ValidationCluster{ Failures: []*validation.ValidationError{ { Kind: "testing", Name: "testingfailure", Message: "testing failure", }, }, }, nil } return &validation.ValidationCluster{}, nil } func TestRollingUpdateFlappingValidation(t *testing.T) { c, cloud := getTestSetup() // This should only take a few milliseconds, // but we have to pad to allow for random delays (e.g. GC) // TODO: Replace with a virtual clock? c.ValidationTimeout = 1 * time.Second c.ClusterValidator = &flappingClusterValidator{ T: t, Cloud: cloud, } groups := getGroupsAllNeedUpdate(c.K8sClient, cloud) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 0) assertGroupInstanceCount(t, cloud, "node-2", 0) assertGroupInstanceCount(t, cloud, "master-1", 0) assertGroupInstanceCount(t, cloud, "bastion-1", 0) } type failThreeTimesClusterValidator struct { invocationCount int } func (v *failThreeTimesClusterValidator) Validate() (*validation.ValidationCluster, error) { v.invocationCount++ if v.invocationCount <= 3 { return &validation.ValidationCluster{ Failures: []*validation.ValidationError{ { Kind: "testing", Name: "testingfailure", Message: "testing failure", }, }, }, nil } return &validation.ValidationCluster{}, nil } func TestRollingUpdateValidatesAfterBastion(t *testing.T) { c, cloud := getTestSetup() // This should only take a few milliseconds, // but we have to pad to allow for random delays (e.g. GC) // TODO: Replace with a virtual clock? c.ValidationTimeout = 1 * time.Second c.ClusterValidator = &failThreeTimesClusterValidator{} groups := getGroupsAllNeedUpdate(c.K8sClient, cloud) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 0) assertGroupInstanceCount(t, cloud, "node-2", 0) assertGroupInstanceCount(t, cloud, "master-1", 0) assertGroupInstanceCount(t, cloud, "bastion-1", 0) } func addNeedsUpdateAnnotation(group *cloudinstances.CloudInstanceGroup, node string) { for _, igm := range group.Ready { if igm.ID == node { if igm.Node.Annotations == nil { igm.Node.Annotations = map[string]string{} } igm.Node.Annotations["kops.k8s.io/needs-update"] = "somevalue" return } } for _, igm := range group.NeedUpdate { if igm.ID == node { if igm.Node.Annotations == nil { igm.Node.Annotations = map[string]string{} } igm.Node.Annotations["kops.k8s.io/needs-update"] = "somevalue" return } } panic("did not find node " + node) } func TestAddAnnotatedNodesToNeedsUpdate(t *testing.T) { c, cloud := getTestSetup() groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "master-1", kopsapi.InstanceGroupRoleMaster, 2, 1) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 2, 1) makeGroup(groups, c.K8sClient, cloud, "node-2", kopsapi.InstanceGroupRoleNode, 2, 1) addNeedsUpdateAnnotation(groups["node-1"], "node-1b") addNeedsUpdateAnnotation(groups["node-2"], "node-2a") addNeedsUpdateAnnotation(groups["master-1"], "master-1b") err := c.AdjustNeedUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "AddAnnotatedNodesToGroups") assertGroupNeedUpdate(t, groups, "node-1", "node-1a", "node-1b") assertGroupNeedUpdate(t, groups, "node-2", "node-2a") assertGroupNeedUpdate(t, groups, "master-1", "master-1a", "master-1b") } func TestAddAnnotatedNodesToNeedsUpdateCloudonly(t *testing.T) { c, cloud := getTestSetup() groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "master-1", kopsapi.InstanceGroupRoleMaster, 2, 1) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 2, 1) makeGroup(groups, c.K8sClient, cloud, "node-2", kopsapi.InstanceGroupRoleNode, 2, 1) addNeedsUpdateAnnotation(groups["node-1"], "node-1b") addNeedsUpdateAnnotation(groups["node-2"], "node-2a") addNeedsUpdateAnnotation(groups["master-1"], "master-1b") c.CloudOnly = true c.ClusterValidator = &assertNotCalledClusterValidator{T: t} err := c.AdjustNeedUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "AddAnnotatedNodesToGroups") assertGroupNeedUpdate(t, groups, "node-1", "node-1a", "node-1b") assertGroupNeedUpdate(t, groups, "node-2", "node-2a") assertGroupNeedUpdate(t, groups, "master-1", "master-1a", "master-1b") } func TestAddAnnotatedNodesToNeedsUpdateNodesMissing(t *testing.T) { c, cloud := getTestSetup() groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 2, 1) groups["node-1"].Ready[0].Node = nil groups["node-1"].NeedUpdate[0].Node = nil err := c.AdjustNeedUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "AddAnnotatedNodesToGroups") } func assertGroupNeedUpdate(t *testing.T, groups map[string]*cloudinstances.CloudInstanceGroup, groupName string, nodes ...string) { notFound := map[string]bool{} for _, node := range nodes { notFound[node] = true } for _, node := range groups[groupName].NeedUpdate { if notFound[node.ID] { notFound[node.ID] = false } else { t.Errorf("node %s of group %s is unexpectedly in NeedUpdate", node.ID, groupName) } } for nodeID, v := range notFound { if v { t.Errorf("node %s of group %s is missing from NeedUpdate", nodeID, groupName) } } } func TestRollingUpdateTaintAllButOneNeedUpdate(t *testing.T) { c, cloud := getTestSetup() groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 3, 2) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") cordoned := "" tainted := map[string]bool{} deleted := map[string]bool{} for _, action := range c.K8sClient.(*fake.Clientset).Actions() { switch a := action.(type) { case testingclient.PatchAction: if string(a.GetPatch()) == cordonPatch { assertCordon(t, a) assert.Equal(t, "", cordoned, "at most one node cordoned at a time") cordoned = a.GetName() } else { assertTaint(t, a) assert.False(t, tainted[a.GetName()], "node", a.GetName(), "already tainted") tainted[a.GetName()] = true } case testingclient.DeleteAction: assert.Equal(t, "nodes", a.GetResource().Resource) assert.Equal(t, cordoned, a.GetName(), "node was cordoned before delete") assert.Len(t, tainted, 2, "all nodes tainted before any delete") assert.False(t, deleted[a.GetName()], "node", a.GetName(), "already deleted") deleted[a.GetName()] = true cordoned = "" case testingclient.ListAction: // Don't care default: t.Errorf("unexpected action %v", a) } } assertGroupInstanceCount(t, cloud, "node-1", 1) } func TestRollingUpdateMaxSurgeIgnoredForMaster(t *testing.T) { c, cloud := getTestSetup() two := intstr.FromInt(2) c.Cluster.Spec.RollingUpdate = &kopsapi.RollingUpdate{ MaxSurge: &two, } groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "master-1", kopsapi.InstanceGroupRoleMaster, 3, 2) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") cordoned := "" tainted := map[string]bool{} deleted := map[string]bool{} for _, action := range c.K8sClient.(*fake.Clientset).Actions() { switch a := action.(type) { case testingclient.PatchAction: if string(a.GetPatch()) == cordonPatch { assertCordon(t, a) assert.Equal(t, "", cordoned, "at most one node cordoned at a time") assert.True(t, tainted[a.GetName()], "node", a.GetName(), "tainted") cordoned = a.GetName() } else { assertTaint(t, a) assert.Equal(t, "", cordoned, "not tainting while node cordoned") assert.False(t, tainted[a.GetName()], "node", a.GetName(), "already tainted") tainted[a.GetName()] = true } case testingclient.DeleteAction: assert.Equal(t, "nodes", a.GetResource().Resource) assert.Equal(t, cordoned, a.GetName(), "node was cordoned before delete") assert.False(t, deleted[a.GetName()], "node", a.GetName(), "already deleted") deleted[a.GetName()] = true cordoned = "" case testingclient.ListAction: // Don't care default: t.Errorf("unexpected action %v", a) } } assertGroupInstanceCount(t, cloud, "master-1", 1) } func TestRollingUpdateDisabled(t *testing.T) { c, cloud := getTestSetup() c.CloudOnly = true c.Cluster.Spec.RollingUpdate = &kopsapi.RollingUpdate{ DrainAndTerminate: fi.Bool(false), } groups := getGroupsAllNeedUpdate(c.K8sClient, cloud) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 3) assertGroupInstanceCount(t, cloud, "node-2", 3) assertGroupInstanceCount(t, cloud, "master-1", 2) assertGroupInstanceCount(t, cloud, "bastion-1", 1) } type disabledSurgeTest struct { autoscalingiface.AutoScalingAPI t *testing.T mutex sync.Mutex numDetached int } func (m *disabledSurgeTest) DetachInstances(input *autoscaling.DetachInstancesInput) (*autoscaling.DetachInstancesOutput, error) { m.mutex.Lock() defer m.mutex.Unlock() for _, id := range input.InstanceIds { assert.NotContains(m.t, *id, "master") m.numDetached++ } return &autoscaling.DetachInstancesOutput{}, nil } func TestRollingUpdateDisabledSurge(t *testing.T) { c, cloud := getTestSetup() disabledSurgeTest := &disabledSurgeTest{ AutoScalingAPI: cloud.MockAutoscaling, t: t, } cloud.MockAutoscaling = disabledSurgeTest cloud.MockEC2 = &ec2IgnoreTags{EC2API: cloud.MockEC2} one := intstr.FromInt(1) c.Cluster.Spec.RollingUpdate = &kopsapi.RollingUpdate{ DrainAndTerminate: fi.Bool(false), MaxSurge: &one, } groups := getGroupsAllNeedUpdate(c.K8sClient, cloud) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 3) assertGroupInstanceCount(t, cloud, "node-2", 3) assertGroupInstanceCount(t, cloud, "master-1", 2) assertGroupInstanceCount(t, cloud, "bastion-1", 1) assert.Equal(t, 3, disabledSurgeTest.numDetached) } // The concurrent update tests attempt to induce the following expected update sequence: // // (Only for surging "all need update" test, to verify the toe-dipping behavior) // Request validate (8) --> // <-- validated // Detach instance --> // Request validate (7) --> // <-- validated // Detach instance --> // (end only for surging "all need update" tests) // (Only for surging "all but one need update" test) // Request validate (7) --> // <-- validated // Detach instance --> // Detach instance --> // (end only for surging "all but one need update" test) // (Only for non-surging "all need update" tests, to verify the toe-dipping behavior) // Request validate (7) --> // <-- validated // Request terminate 1 node (7) --> // <-- 1 node terminated, 6 left // (end only for non-surging "all need update" tests) // Request validate (6) --> // <-- validated // Request terminate 2 nodes (6,5) --> // <-- 1 node terminated (5), 5 left // Request validate (4) --> // <-- 1 node terminated (6), 4 left // <-- validated // Request terminate 2 nodes (4,3) --> // <-- 1 node terminated (3), 3 left // Request validate (2) --> // <-- validated // Request terminate 1 node (2) --> // <-- 1 node terminated (2), 2 left // Request validate (1) --> // <-- 1 node terminated (4), 1 left // <-- validated // Request terminate 1 node (1) --> // <-- 1 node terminated, 0 left // Request validate (0) --> // <-- validated type concurrentTest struct { ec2iface.EC2API t *testing.T mutex sync.Mutex surge int terminationRequestsLeft int previousValidation int validationChan chan bool terminationChan chan bool detached map[string]bool } func (c *concurrentTest) Validate() (*validation.ValidationCluster, error) { c.mutex.Lock() defer c.mutex.Unlock() if len(c.detached) < c.surge { assert.Greater(c.t, c.previousValidation, 7, "previous validation") c.previousValidation-- return &validation.ValidationCluster{}, nil } terminationRequestsLeft := c.terminationRequestsLeft switch terminationRequestsLeft { case 7, 6, 0: assert.Equal(c.t, terminationRequestsLeft+1, c.previousValidation, "previous validation") case 5, 3: c.t.Errorf("unexpected call to Validate with %d termination requests left", terminationRequestsLeft) case 4: assert.Equal(c.t, 6, c.previousValidation, "previous validation") select { case c.terminationChan <- true: default: c.t.Error("terminationChan is full") } c.mutex.Unlock() select { case <-c.validationChan: case <-time.After(1 * time.Second): c.t.Error("timed out reading from validationChan") } c.mutex.Lock() case 2: assert.Equal(c.t, 4, c.previousValidation, "previous validation") case 1: assert.Equal(c.t, 2, c.previousValidation, "previous validation") select { case c.terminationChan <- true: default: c.t.Error("terminationChan is full") } c.mutex.Unlock() select { case <-c.validationChan: case <-time.After(1 * time.Second): c.t.Error("timed out reading from validationChan") } c.mutex.Lock() } c.previousValidation = terminationRequestsLeft return &validation.ValidationCluster{}, nil } func (c *concurrentTest) TerminateInstances(input *ec2.TerminateInstancesInput) (*ec2.TerminateInstancesOutput, error) { if input.DryRun != nil && *input.DryRun { return &ec2.TerminateInstancesOutput{}, nil } c.mutex.Lock() defer c.mutex.Unlock() for _, id := range input.InstanceIds { assert.Equal(c.t, c.surge, len(c.detached), "Number of detached instances") if c.detached[*id] { assert.LessOrEqual(c.t, c.terminationRequestsLeft, c.surge, "Deleting detached instances last") } terminationRequestsLeft := c.terminationRequestsLeft c.terminationRequestsLeft-- switch terminationRequestsLeft { case 7, 2, 1: assert.Equal(c.t, terminationRequestsLeft, c.previousValidation, "previous validation") case 6, 4: assert.Equal(c.t, terminationRequestsLeft, c.previousValidation, "previous validation") c.mutex.Unlock() select { case <-c.terminationChan: case <-time.After(1 * time.Second): c.t.Error("timed out reading from terminationChan") } c.mutex.Lock() go c.delayThenWakeValidation() case 5, 3: assert.Equal(c.t, terminationRequestsLeft+1, c.previousValidation, "previous validation") } } return c.EC2API.TerminateInstances(input) } const postTerminationValidationDelay = 100 * time.Millisecond // NodeInterval plus some func (c *concurrentTest) delayThenWakeValidation() { time.Sleep(postTerminationValidationDelay) select { case c.validationChan <- true: default: c.t.Error("validationChan is full") } } func (c *concurrentTest) AssertComplete() { c.mutex.Lock() defer c.mutex.Unlock() assert.Equal(c.t, 0, c.previousValidation, "last validation") } func newConcurrentTest(t *testing.T, cloud *awsup.MockAWSCloud, numSurge int, allNeedUpdate bool) *concurrentTest { test := concurrentTest{ EC2API: cloud.MockEC2, t: t, surge: numSurge, terminationRequestsLeft: 6, validationChan: make(chan bool), terminationChan: make(chan bool), detached: map[string]bool{}, } if numSurge == 0 && allNeedUpdate { test.terminationRequestsLeft = 7 } if numSurge == 0 { test.previousValidation = test.terminationRequestsLeft + 1 } else if allNeedUpdate { test.previousValidation = 9 } else { test.previousValidation = 8 } return &test } func TestRollingUpdateMaxUnavailableAllNeedUpdate(t *testing.T) { c, cloud := getTestSetup() concurrentTest := newConcurrentTest(t, cloud, 0, true) c.ValidateCount = 1 c.ClusterValidator = concurrentTest cloud.MockEC2 = concurrentTest two := intstr.FromInt(2) c.Cluster.Spec.RollingUpdate = &kopsapi.RollingUpdate{ MaxUnavailable: &two, } groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 7, 7) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 0) concurrentTest.AssertComplete() } func TestRollingUpdateMaxUnavailableAllButOneNeedUpdate(t *testing.T) { c, cloud := getTestSetup() concurrentTest := newConcurrentTest(t, cloud, 0, false) c.ValidateCount = 1 c.ClusterValidator = concurrentTest cloud.MockEC2 = concurrentTest two := intstr.FromInt(2) c.Cluster.Spec.RollingUpdate = &kopsapi.RollingUpdate{ MaxUnavailable: &two, } groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 7, 6) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 1) concurrentTest.AssertComplete() } func TestRollingUpdateMaxUnavailableAllNeedUpdateMaster(t *testing.T) { c, cloud := getTestSetup() concurrentTest := newConcurrentTest(t, cloud, 0, true) c.ValidateCount = 1 c.ClusterValidator = concurrentTest cloud.MockEC2 = concurrentTest two := intstr.FromInt(2) c.Cluster.Spec.RollingUpdate = &kopsapi.RollingUpdate{ MaxUnavailable: &two, } groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "master-1", kopsapi.InstanceGroupRoleMaster, 7, 7) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "master-1", 0) concurrentTest.AssertComplete() } type concurrentTestAutoscaling struct { autoscalingiface.AutoScalingAPI ConcurrentTest *concurrentTest } func (m *concurrentTestAutoscaling) DetachInstances(input *autoscaling.DetachInstancesInput) (*autoscaling.DetachInstancesOutput, error) { m.ConcurrentTest.mutex.Lock() defer m.ConcurrentTest.mutex.Unlock() assert.Equal(m.ConcurrentTest.t, "node-1", *input.AutoScalingGroupName) assert.False(m.ConcurrentTest.t, *input.ShouldDecrementDesiredCapacity) for _, id := range input.InstanceIds { assert.Less(m.ConcurrentTest.t, len(m.ConcurrentTest.detached), m.ConcurrentTest.surge, "Number of detached instances") assert.False(m.ConcurrentTest.t, m.ConcurrentTest.detached[*id], *id+" already detached") m.ConcurrentTest.detached[*id] = true } return &autoscaling.DetachInstancesOutput{}, nil } type ec2IgnoreTags struct { ec2iface.EC2API } // CreateTags ignores tagging of instances done by the AWS fi.Cloud implementation of DetachInstance() func (e *ec2IgnoreTags) CreateTags(*ec2.CreateTagsInput) (*ec2.CreateTagsOutput, error) { return &ec2.CreateTagsOutput{}, nil } func TestRollingUpdateMaxSurgeAllNeedUpdate(t *testing.T) { c, cloud := getTestSetup() concurrentTest := newConcurrentTest(t, cloud, 2, true) c.ValidateCount = 1 c.ClusterValidator = concurrentTest cloud.MockAutoscaling = &concurrentTestAutoscaling{ AutoScalingAPI: cloud.MockAutoscaling, ConcurrentTest: concurrentTest, } cloud.MockEC2 = &ec2IgnoreTags{EC2API: concurrentTest} two := intstr.FromInt(2) c.Cluster.Spec.RollingUpdate = &kopsapi.RollingUpdate{ MaxSurge: &two, } groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 6, 6) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 0) concurrentTest.AssertComplete() } func TestRollingUpdateMaxSurgeAllButOneNeedUpdate(t *testing.T) { c, cloud := getTestSetup() concurrentTest := newConcurrentTest(t, cloud, 2, false) c.ValidateCount = 1 c.ClusterValidator = concurrentTest cloud.MockAutoscaling = &concurrentTestAutoscaling{ AutoScalingAPI: cloud.MockAutoscaling, ConcurrentTest: concurrentTest, } cloud.MockEC2 = &ec2IgnoreTags{EC2API: concurrentTest} two := intstr.FromInt(2) c.Cluster.Spec.RollingUpdate = &kopsapi.RollingUpdate{ MaxSurge: &two, } groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 7, 6) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 1) concurrentTest.AssertComplete() } type countDetach struct { autoscalingiface.AutoScalingAPI Count int } func (c *countDetach) DetachInstances(input *autoscaling.DetachInstancesInput) (*autoscaling.DetachInstancesOutput, error) { c.Count += len(input.InstanceIds) return &autoscaling.DetachInstancesOutput{}, nil } func TestRollingUpdateMaxSurgeGreaterThanNeedUpdate(t *testing.T) { c, cloud := getTestSetup() countDetach := &countDetach{AutoScalingAPI: cloud.MockAutoscaling} cloud.MockAutoscaling = countDetach cloud.MockEC2 = &ec2IgnoreTags{EC2API: cloud.MockEC2} ten := intstr.FromInt(10) c.Cluster.Spec.RollingUpdate = &kopsapi.RollingUpdate{ MaxSurge: &ten, } groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 3, 2) err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 1) assert.Equal(t, 2, countDetach.Count) } // Request validate (1) --> // <-- validated // Detach instance --> // Request validate (2) --> // <-- validated // Detach instance --> // Request validate (3) --> // <-- validated // Request terminate 3 nodes --> // <-- 3 nodes terminated, 1 left // Request validate (4) --> // <-- validated // Request terminate 1 node --> // <-- 1 node terminated, 0 left // Request validate (5) --> // <-- validated type alreadyDetachedTest struct { ec2iface.EC2API t *testing.T mutex sync.Mutex terminationRequestsLeft int numValidations int detached map[string]bool } func (t *alreadyDetachedTest) Validate() (*validation.ValidationCluster, error) { t.mutex.Lock() defer t.mutex.Unlock() t.numValidations++ switch t.numValidations { case 1, 2, 3: assert.Equal(t.t, t.numValidations, len(t.detached), "numnber of detached instances") case 4: t.mutex.Unlock() time.Sleep(postTerminationValidationDelay) t.mutex.Lock() assert.Equal(t.t, 1, t.terminationRequestsLeft, "terminations left") case 5: assert.Equal(t.t, 0, t.terminationRequestsLeft, "terminations left") case 6: t.t.Error("unexpected sixth call to Validate") } return &validation.ValidationCluster{}, nil } func (t *alreadyDetachedTest) TerminateInstances(input *ec2.TerminateInstancesInput) (*ec2.TerminateInstancesOutput, error) { if input.DryRun != nil && *input.DryRun { return &ec2.TerminateInstancesOutput{}, nil } t.mutex.Lock() defer t.mutex.Unlock() for _, id := range input.InstanceIds { assert.Equal(t.t, 3, len(t.detached), "Number of detached instances") assert.GreaterOrEqual(t.t, t.numValidations, 3, "Number of previous validations") if t.terminationRequestsLeft == 1 { assert.True(t.t, t.detached[*id], "Last deleted instance %q was detached", *id) } t.terminationRequestsLeft-- } return t.EC2API.TerminateInstances(input) } type alreadyDetachedTestAutoscaling struct { autoscalingiface.AutoScalingAPI AlreadyDetachedTest *alreadyDetachedTest } func (m *alreadyDetachedTestAutoscaling) DetachInstances(input *autoscaling.DetachInstancesInput) (*autoscaling.DetachInstancesOutput, error) { m.AlreadyDetachedTest.mutex.Lock() defer m.AlreadyDetachedTest.mutex.Unlock() for _, id := range input.InstanceIds { assert.Less(m.AlreadyDetachedTest.t, len(m.AlreadyDetachedTest.detached), 3, "Number of detached instances") assert.False(m.AlreadyDetachedTest.t, m.AlreadyDetachedTest.detached[*id], *id+" already detached") m.AlreadyDetachedTest.detached[*id] = true } return &autoscaling.DetachInstancesOutput{}, nil } func TestRollingUpdateMaxSurgeAllNeedUpdateOneAlreadyDetached(t *testing.T) { c, cloud := getTestSetup() alreadyDetachedTest := &alreadyDetachedTest{ EC2API: cloud.MockEC2, t: t, terminationRequestsLeft: 4, detached: map[string]bool{}, } c.ValidateCount = 1 c.ClusterValidator = alreadyDetachedTest cloud.MockAutoscaling = &alreadyDetachedTestAutoscaling{ AutoScalingAPI: cloud.MockAutoscaling, AlreadyDetachedTest: alreadyDetachedTest, } cloud.MockEC2 = &ec2IgnoreTags{EC2API: alreadyDetachedTest} three := intstr.FromInt(3) c.Cluster.Spec.RollingUpdate = &kopsapi.RollingUpdate{ MaxSurge: &three, } groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 4, 4) alreadyDetachedTest.detached[groups["node-1"].NeedUpdate[3].ID] = true groups["node-1"].NeedUpdate[3].Status = cloudinstances.CloudInstanceStatusDetached err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 0) assert.Equal(t, 5, alreadyDetachedTest.numValidations, "Number of validations") } func TestRollingUpdateMaxSurgeAllNeedUpdateMaxAlreadyDetached(t *testing.T) { c, cloud := getTestSetup() // Should behave the same as TestRollingUpdateMaxUnavailableAllNeedUpdate concurrentTest := newConcurrentTest(t, cloud, 0, true) c.ValidateCount = 1 c.ClusterValidator = concurrentTest cloud.MockEC2 = concurrentTest two := intstr.FromInt(2) c.Cluster.Spec.RollingUpdate = &kopsapi.RollingUpdate{ MaxSurge: &two, } groups := make(map[string]*cloudinstances.CloudInstanceGroup) makeGroup(groups, c.K8sClient, cloud, "node-1", kopsapi.InstanceGroupRoleNode, 7, 7) groups["node-1"].NeedUpdate[0].Status = cloudinstances.CloudInstanceStatusNeedsUpdate groups["node-1"].NeedUpdate[1].Status = cloudinstances.CloudInstanceStatusDetached groups["node-1"].NeedUpdate[2].Status = cloudinstances.CloudInstanceStatusNeedsUpdate groups["node-1"].NeedUpdate[3].Status = cloudinstances.CloudInstanceStatusDetached groups["node-1"].NeedUpdate[4].Status = cloudinstances.CloudInstanceStatusNeedsUpdate groups["node-1"].NeedUpdate[5].Status = cloudinstances.CloudInstanceStatusNeedsUpdate groups["node-1"].NeedUpdate[6].Status = cloudinstances.CloudInstanceStatusNeedsUpdate // TODO verify those are the last two instances terminated err := c.RollingUpdate(groups, &kopsapi.InstanceGroupList{}) assert.NoError(t, err, "rolling update") assertGroupInstanceCount(t, cloud, "node-1", 0) concurrentTest.AssertComplete() } func assertCordon(t *testing.T, action testingclient.PatchAction) { assert.Equal(t, "nodes", action.GetResource().Resource) assert.Equal(t, cordonPatch, string(action.GetPatch())) } func assertTaint(t *testing.T, action testingclient.PatchAction) { assert.Equal(t, "nodes", action.GetResource().Resource) assert.Equal(t, taintPatch, string(action.GetPatch())) } func assertGroupInstanceCount(t *testing.T, cloud awsup.AWSCloud, groupName string, expected int) { asgGroups, _ := cloud.Autoscaling().DescribeAutoScalingGroups(&autoscaling.DescribeAutoScalingGroupsInput{ AutoScalingGroupNames: []*string{aws.String(groupName)}, }) for _, group := range asgGroups.AutoScalingGroups { assert.Lenf(t, group.Instances, expected, "%s instances", groupName) } }