Skip to main content
Glama
suite_test.go19.9 kB
/* Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package ami_test import ( "encoding/base64" "fmt" "os" "strings" "testing" "time" awssdk "github.com/aws/aws-sdk-go-v2/aws" karpv1 "sigs.k8s.io/karpenter/pkg/apis/v1" v1 "github.com/aws/karpenter-provider-aws/pkg/apis/v1" . "github.com/onsi/ginkgo/v2" . "github.com/onsi/gomega" "github.com/aws/aws-sdk-go-v2/service/ec2" ec2types "github.com/aws/aws-sdk-go-v2/service/ec2/types" "github.com/awslabs/operatorpkg/status" . "github.com/awslabs/operatorpkg/test/expectations" "github.com/samber/lo" corev1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/types" "sigs.k8s.io/controller-runtime/pkg/client" environmentaws "github.com/aws/karpenter-provider-aws/test/pkg/environment/aws" coretest "sigs.k8s.io/karpenter/pkg/test" ) var env *environmentaws.Environment var nodeClass *v1.EC2NodeClass var nodePool *karpv1.NodePool func TestAMI(t *testing.T) { RegisterFailHandler(Fail) BeforeSuite(func() { env = environmentaws.NewEnvironment(t) }) AfterSuite(func() { env.Stop() }) RunSpecs(t, "Ami") } var _ = BeforeEach(func() { env.BeforeEach() nodeClass = env.DefaultEC2NodeClass() nodePool = env.DefaultNodePool(nodeClass) }) var _ = AfterEach(func() { env.Cleanup() }) var _ = AfterEach(func() { env.AfterEach() }) var _ = Describe("AMI", func() { var ssmPath string var customAMI string var deprecatedAMI string BeforeEach(func() { ssmPath = fmt.Sprintf("/aws/service/eks/optimized-ami/%s/amazon-linux-2023/x86_64/standard/recommended/image_id", env.K8sVersion()) customAMI = env.GetAMIBySSMPath(ssmPath) deprecatedAMI = env.GetDeprecatedAMI(customAMI, "AL2023") }) It("should use the AMI defined by the AMI Selector Terms", func() { pod := coretest.Pod() nodeClass.Spec.AMIFamily = lo.ToPtr(v1.AMIFamilyAL2023) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{{ID: customAMI}} env.ExpectCreated(pod, nodeClass, nodePool) env.EventuallyExpectHealthy(pod) env.ExpectCreatedNodeCount("==", 1) env.ExpectInstance(pod.Spec.NodeName).To(HaveField("ImageId", HaveValue(Equal(customAMI)))) }) It("should use the most recent AMI when discovering multiple", func() { // choose an old static image that will definitely have an older creation date oldCustomAMI := env.GetAMIBySSMPath(fmt.Sprintf("/aws/service/eks/optimized-ami/%[1]s/amazon-linux-2023/x86_64/standard/amazon-eks-node-al2023-x86_64-standard-%[1]s-v20250915/image_id", env.K8sVersion())) nodeClass.Spec.AMIFamily = lo.ToPtr(v1.AMIFamilyAL2023) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{ {ID: customAMI}, {ID: oldCustomAMI}, } pod := coretest.Pod() env.ExpectCreated(pod, nodeClass, nodePool) env.EventuallyExpectHealthy(pod) env.ExpectCreatedNodeCount("==", 1) env.ExpectInstance(pod.Spec.NodeName).To(HaveField("ImageId", HaveValue(Equal(customAMI)))) }) It("should support AMI Selector Terms for Name but fail with incorrect owners", func() { output, err := env.EC2API.DescribeImages(env.Context, &ec2.DescribeImagesInput{ ImageIds: []string{customAMI}, }) Expect(err).To(BeNil()) Expect(output.Images).To(HaveLen(1)) nodeClass.Spec.AMIFamily = lo.ToPtr(v1.AMIFamilyAL2023) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{ { Name: *output.Images[0].Name, Owner: "fakeOwnerValue", }, } pod := coretest.Pod() env.ExpectCreated(pod, nodeClass, nodePool) env.ExpectCreatedNodeCount("==", 0) Expect(pod.Spec.NodeName).To(Equal("")) }) It("should support ami selector Name with default owners", func() { output, err := env.EC2API.DescribeImages(env.Context, &ec2.DescribeImagesInput{ ImageIds: []string{customAMI}, }) Expect(err).To(BeNil()) Expect(output.Images).To(HaveLen(1)) nodeClass.Spec.AMIFamily = lo.ToPtr(v1.AMIFamilyAL2023) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{ { Name: *output.Images[0].Name, }, } pod := coretest.Pod() env.ExpectCreated(pod, nodeClass, nodePool) env.EventuallyExpectHealthy(pod) env.ExpectCreatedNodeCount("==", 1) env.ExpectInstance(pod.Spec.NodeName).To(HaveField("ImageId", HaveValue(Equal(customAMI)))) }) It("should support ami selector ids", func() { nodeClass.Spec.AMIFamily = lo.ToPtr(v1.AMIFamilyAL2023) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{ { ID: customAMI, }, } pod := coretest.Pod() env.ExpectCreated(pod, nodeClass, nodePool) env.EventuallyExpectHealthy(pod) env.ExpectCreatedNodeCount("==", 1) env.ExpectInstance(pod.Spec.NodeName).To(HaveField("ImageId", HaveValue(Equal(customAMI)))) }) It("should support ssm parameters by ARN", func() { nodeClass.Spec.AMIFamily = lo.ToPtr(v1.AMIFamilyAL2023) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{ { SSMParameter: fmt.Sprintf("arn:aws:ssm:%s::parameter%s", env.Region, ssmPath), }, } pod := coretest.Pod() env.ExpectCreated(pod, nodeClass, nodePool) env.EventuallyExpectHealthy(pod) env.ExpectCreatedNodeCount("==", 1) env.ExpectInstance(pod.Spec.NodeName).To(HaveField("ImageId", HaveValue(Equal(customAMI)))) }) It("should support launching nodes with a deprecated ami", func() { nodeClass.Spec.AMIFamily = lo.ToPtr(v1.AMIFamilyAL2023) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{ { ID: deprecatedAMI, }, } pod := coretest.Pod() env.ExpectCreated(pod, nodeClass, nodePool) env.EventuallyExpectHealthy(pod) env.ExpectCreatedNodeCount("==", 1) env.ExpectInstance(pod.Spec.NodeName).To(HaveField("ImageId", HaveValue(Equal(deprecatedAMI)))) nc := EventuallyExpectAMIsToExist(nodeClass) Expect(len(nc.Status.AMIs)).To(BeNumerically("==", 1)) Expect(nc.Status.AMIs[0].Deprecated).To(BeTrue()) ExpectStatusConditions(env, env.Client, 1*time.Minute, nodeClass, status.Condition{Type: v1.ConditionTypeAMIsReady, Status: metav1.ConditionTrue}) }) It("should prioritize launch with non-deprecated AMIs", func() { nodeClass.Spec.AMIFamily = lo.ToPtr(v1.AMIFamilyAL2023) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{ { ID: deprecatedAMI, }, { ID: customAMI, }, } pod := coretest.Pod() env.ExpectCreated(pod, nodeClass, nodePool) env.EventuallyExpectHealthy(pod) env.ExpectCreatedNodeCount("==", 1) env.ExpectInstance(pod.Spec.NodeName).To(HaveField("ImageId", HaveValue(Equal(customAMI)))) }) Context("AMIFamily", func() { DescribeTable( "should provision a node using an alias", func(alias string) { if strings.Contains(alias, "al2") && env.K8sMinorVersion() > 32 { Skip("AL2 is not supported on versions > 1.32") } pod := coretest.Pod() nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{{Alias: alias}} env.ExpectCreated(nodeClass, nodePool, pod) env.EventuallyExpectHealthy(pod) env.ExpectCreatedNodeCount("==", 1) }, Entry("AL2023 (latest)", "al2023@latest"), Entry("AL2023 (pinned)", "al2023@v20250116"), Entry("AL2 (latest)", "al2@latest"), Entry("AL2 (pinned)", "al2@v20250116"), Entry("Bottlerocket (latest)", "bottlerocket@latest"), Entry("Bottlerocket (pinned with v prefix)", "bottlerocket@v1.47.0"), Entry("Bottlerocket (pinned without v prefix)", "bottlerocket@1.47.0"), ) It("should support Custom AMIFamily with AMI Selectors", func() { al2023AMI := env.GetAMIBySSMPath(fmt.Sprintf("/aws/service/eks/optimized-ami/%s/amazon-linux-2023/x86_64/standard/recommended/image_id", env.K8sVersion())) nodeClass.Spec.AMIFamily = lo.ToPtr(v1.AMIFamilyCustom) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{{ID: al2023AMI}} rawContent, err := os.ReadFile("testdata/al2023_userdata_input.yaml") Expect(err).ToNot(HaveOccurred()) nodeClass.Spec.UserData = lo.ToPtr(fmt.Sprintf(string(rawContent), env.ClusterName, env.ClusterEndpoint, env.ExpectCABundle())) pod := coretest.Pod() env.ExpectCreated(pod, nodeClass, nodePool) env.EventuallyExpectHealthy(pod) env.ExpectCreatedNodeCount("==", 1) env.ExpectInstance(pod.Spec.NodeName).To(HaveField("ImageId", HaveValue(Equal(al2023AMI)))) }) It("should have the EC2NodeClass status for AMIs using wildcard", func() { nodeClass.Spec.AMIFamily = lo.ToPtr(v1.AMIFamilyAL2023) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{ { Name: "*", }, } env.ExpectCreated(nodeClass) nc := EventuallyExpectAMIsToExist(nodeClass) Expect(len(nc.Status.AMIs)).To(BeNumerically("<", 10)) }) It("should have the EC2NodeClass status for AMIs using tags", func() { nodeClass.Spec.AMIFamily = lo.ToPtr(v1.AMIFamilyAL2023) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{{ID: customAMI}} env.ExpectCreated(nodeClass) nc := EventuallyExpectAMIsToExist(nodeClass) Expect(len(nc.Status.AMIs)).To(BeNumerically("==", 1)) Expect(nc.Status.AMIs[0].ID).To(Equal(customAMI)) ExpectStatusConditions(env, env.Client, 1*time.Minute, nodeClass, status.Condition{Type: v1.ConditionTypeAMIsReady, Status: metav1.ConditionTrue}) ExpectStatusConditions(env, env.Client, 1*time.Minute, nodeClass, status.Condition{Type: status.ConditionReady, Status: metav1.ConditionTrue}) }) It("should have the EC2NodeClass status for AMIs using public ssm parameter ARN", func() { nodeClass.Spec.AMIFamily = lo.ToPtr(v1.AMIFamilyAL2023) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{{SSMParameter: fmt.Sprintf("arn:aws:ssm:%s::parameter%s", env.Region, ssmPath)}} env.ExpectCreated(nodeClass) nc := EventuallyExpectAMIsToExist(nodeClass) Expect(len(nc.Status.AMIs)).To(BeNumerically("==", 1)) Expect(nc.Status.AMIs[0].ID).To(Equal(customAMI)) ExpectStatusConditions(env, env.Client, 1*time.Minute, nodeClass, status.Condition{Type: v1.ConditionTypeAMIsReady, Status: metav1.ConditionTrue}) ExpectStatusConditions(env, env.Client, 1*time.Minute, nodeClass, status.Condition{Type: status.ConditionReady, Status: metav1.ConditionTrue}) }) It("should have ec2nodeClass status as not ready since AMI was not resolved", func() { nodeClass.Spec.AMIFamily = lo.ToPtr(v1.AMIFamilyAL2023) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{{ID: "ami-123"}} env.ExpectCreated(nodeClass) ExpectStatusConditions(env, env.Client, 1*time.Minute, nodeClass, status.Condition{Type: v1.ConditionTypeAMIsReady, Status: metav1.ConditionFalse, Message: "AMISelector did not match any AMIs"}) ExpectStatusConditions(env, env.Client, 1*time.Minute, nodeClass, status.Condition{Type: status.ConditionReady, Status: metav1.ConditionFalse, Message: "ValidationSucceeded=False, AMIsReady=False"}) }) }) Context("UserData", func() { It("should merge UserData contents for AL2 AMIFamily", func() { if env.K8sMinorVersion() > 32 { Skip("AL2 is not supported on versions > 1.32") } content, err := os.ReadFile("testdata/al2_userdata_input.sh") Expect(err).ToNot(HaveOccurred()) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{{Alias: "al2@latest"}} nodeClass.Spec.UserData = awssdk.String(string(content)) nodePool.Spec.Template.Spec.Taints = []corev1.Taint{{Key: "example.com", Value: "value", Effect: "NoExecute"}} nodePool.Spec.Template.Spec.StartupTaints = []corev1.Taint{{Key: "example.com", Value: "value", Effect: "NoSchedule"}} pod := coretest.Pod(coretest.PodOptions{Tolerations: []corev1.Toleration{{Key: "example.com", Operator: corev1.TolerationOpExists}}}) env.ExpectCreated(pod, nodeClass, nodePool) env.EventuallyExpectHealthy(pod) Expect(env.GetNode(pod.Spec.NodeName).Spec.Taints).To(ContainElements( corev1.Taint{Key: "example.com", Value: "value", Effect: "NoExecute"}, corev1.Taint{Key: "example.com", Value: "value", Effect: "NoSchedule"}, )) actualUserData, err := base64.StdEncoding.DecodeString(*getInstanceAttribute(pod.Spec.NodeName, "userData").UserData.Value) Expect(err).ToNot(HaveOccurred()) // Since the node has joined the cluster, we know our bootstrapping was correct. // Just verify if the UserData contains our custom content too, rather than doing a byte-wise comparison. Expect(string(actualUserData)).To(ContainSubstring("Running custom user data script")) Expect(string(actualUserData)).To(ContainSubstring("karpenter.sh/do-not-sync-taints=true")) }) It("should merge non-MIME UserData contents for AL2 AMIFamily", func() { if env.K8sMinorVersion() > 32 { Skip("AL2 is not supported on versions > 1.32") } content, err := os.ReadFile("testdata/al2_no_mime_userdata_input.sh") Expect(err).ToNot(HaveOccurred()) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{{Alias: "al2@latest"}} nodeClass.Spec.UserData = awssdk.String(string(content)) nodePool.Spec.Template.Spec.Taints = []corev1.Taint{{Key: "example.com", Value: "value", Effect: "NoExecute"}} nodePool.Spec.Template.Spec.StartupTaints = []corev1.Taint{{Key: "example.com", Value: "value", Effect: "NoSchedule"}} pod := coretest.Pod(coretest.PodOptions{Tolerations: []corev1.Toleration{{Key: "example.com", Operator: corev1.TolerationOpExists}}}) env.ExpectCreated(pod, nodeClass, nodePool) env.EventuallyExpectHealthy(pod) Expect(env.GetNode(pod.Spec.NodeName).Spec.Taints).To(ContainElements( corev1.Taint{Key: "example.com", Value: "value", Effect: "NoExecute"}, corev1.Taint{Key: "example.com", Value: "value", Effect: "NoSchedule"}, )) actualUserData, err := base64.StdEncoding.DecodeString(*getInstanceAttribute(pod.Spec.NodeName, "userData").UserData.Value) Expect(err).ToNot(HaveOccurred()) // Since the node has joined the cluster, we know our bootstrapping was correct. // Just verify if the UserData contains our custom content too, rather than doing a byte-wise comparison. Expect(string(actualUserData)).To(ContainSubstring("Running custom user data script")) Expect(string(actualUserData)).To(ContainSubstring("karpenter.sh/do-not-sync-taints=true")) }) It("should merge UserData contents for Bottlerocket AMIFamily", func() { content, err := os.ReadFile("testdata/br_userdata_input.sh") Expect(err).ToNot(HaveOccurred()) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{{Alias: "bottlerocket@latest"}} nodeClass.Spec.UserData = awssdk.String(string(content)) nodePool.Spec.Template.Spec.Taints = []corev1.Taint{{Key: "example.com", Value: "value", Effect: "NoExecute"}} nodePool.Spec.Template.Spec.StartupTaints = []corev1.Taint{{Key: "example.com", Value: "value", Effect: "NoSchedule"}} pod := coretest.Pod(coretest.PodOptions{Tolerations: []corev1.Toleration{{Key: "example.com", Operator: corev1.TolerationOpExists}}}) env.ExpectCreated(pod, nodeClass, nodePool) env.EventuallyExpectHealthy(pod) Expect(env.GetNode(pod.Spec.NodeName).Spec.Taints).To(ContainElements( corev1.Taint{Key: "example.com", Value: "value", Effect: "NoExecute"}, corev1.Taint{Key: "example.com", Value: "value", Effect: "NoSchedule"}, )) actualUserData, err := base64.StdEncoding.DecodeString(*getInstanceAttribute(pod.Spec.NodeName, "userData").UserData.Value) Expect(err).ToNot(HaveOccurred()) Expect(string(actualUserData)).To(ContainSubstring("kube-api-qps = 30")) Expect(string(actualUserData)).To(ContainSubstring("'karpenter.sh/do-not-sync-taints' = 'true'")) Expect(string(actualUserData)).To(ContainSubstring("eviction-max-pod-grace-period = 40")) Expect(string(actualUserData)).To(ContainSubstring("[settings.kubernetes.eviction-soft]\n'memory.available' = '100Mi'")) Expect(string(actualUserData)).To(ContainSubstring("[settings.kubernetes.eviction-soft-grace-period]\n'memory.available' = '30s'")) }) // Windows tests are can flake due to the instance types that are used in testing. // The VPC Resource controller will need to support the instance types that are used. // If the instance type is not supported by the controller resource `vpc.amazonaws.com/PrivateIPv4Address` will not register. // Issue: https://github.com/aws/karpenter-provider-aws/issues/4472 // See: https://github.com/aws/amazon-vpc-resource-controller-k8s/blob/master/pkg/aws/vpc/limits.go It("should merge UserData contents for Windows AMIFamily", func() { env.ExpectWindowsIPAMEnabled() DeferCleanup(func() { env.ExpectWindowsIPAMDisabled() }) content, err := os.ReadFile("testdata/windows_userdata_input.ps1") Expect(err).ToNot(HaveOccurred()) nodeClass.Spec.AMISelectorTerms = []v1.AMISelectorTerm{{Alias: "windows2022@latest"}} nodeClass.Spec.UserData = awssdk.String(string(content)) nodePool.Spec.Template.Spec.Taints = []corev1.Taint{{Key: "example.com", Value: "value", Effect: "NoExecute"}} nodePool.Spec.Template.Spec.StartupTaints = []corev1.Taint{{Key: "example.com", Value: "value", Effect: "NoSchedule"}} nodePool = coretest.ReplaceRequirements(nodePool, karpv1.NodeSelectorRequirementWithMinValues{ NodeSelectorRequirement: corev1.NodeSelectorRequirement{ Key: corev1.LabelOSStable, Operator: corev1.NodeSelectorOpIn, Values: []string{string(corev1.Windows)}, }, }, ) pod := coretest.Pod(coretest.PodOptions{ Image: environmentaws.WindowsDefaultImage, NodeSelector: map[string]string{ corev1.LabelOSStable: string(corev1.Windows), corev1.LabelWindowsBuild: "10.0.20348", }, Tolerations: []corev1.Toleration{{Key: "example.com", Operator: corev1.TolerationOpExists}}, }) env.ExpectCreated(pod, nodeClass, nodePool) env.EventuallyExpectHealthyWithTimeout(time.Minute*15, pod) // Wait 15 minutes because Windows nodes/containers take longer to spin up Expect(env.GetNode(pod.Spec.NodeName).Spec.Taints).To(ContainElements( corev1.Taint{Key: "example.com", Value: "value", Effect: "NoExecute"}, corev1.Taint{Key: "example.com", Value: "value", Effect: "NoSchedule"}, )) actualUserData, err := base64.StdEncoding.DecodeString(*getInstanceAttribute(pod.Spec.NodeName, "userData").UserData.Value) Expect(err).ToNot(HaveOccurred()) Expect(string(actualUserData)).To(ContainSubstring("Write-Host \"Running custom user data script\"")) Expect(string(actualUserData)).To(ContainSubstring("[string]$EKSBootstrapScriptFile = \"$env:ProgramFiles\\Amazon\\EKS\\Start-EKSBootstrap.ps1\"")) Expect(string(actualUserData)).To(ContainSubstring("karpenter.sh/do-not-sync-taints=true")) }) }) }) //nolint:unparam func getInstanceAttribute(nodeName string, attribute string) *ec2.DescribeInstanceAttributeOutput { var node corev1.Node Expect(env.Client.Get(env.Context, types.NamespacedName{Name: nodeName}, &node)).To(Succeed()) providerIDSplit := strings.Split(node.Spec.ProviderID, "/") instanceID := providerIDSplit[len(providerIDSplit)-1] instanceAttribute, err := env.EC2API.DescribeInstanceAttribute(env.Context, &ec2.DescribeInstanceAttributeInput{ InstanceId: awssdk.String(instanceID), Attribute: ec2types.InstanceAttributeName(attribute), }) Expect(err).ToNot(HaveOccurred()) return instanceAttribute } func EventuallyExpectAMIsToExist(nodeClass *v1.EC2NodeClass) *v1.EC2NodeClass { nc := &v1.EC2NodeClass{} Eventually(func(g Gomega) { g.Expect(env.Client.Get(env, client.ObjectKeyFromObject(nodeClass), nc)).To(Succeed()) g.Expect(nc.Status.AMIs).ToNot(BeNil()) }).WithTimeout(30 * time.Second).Should(Succeed()) return nc }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/mengfwan/test-mcp-glama'

If you have feedback or need assistance with the MCP directory API, please join our Discord server