2014-10-23 00:49:40 +00:00
|
|
|
/*
|
|
|
|
Copyright 2014 Google Inc. All rights reserved.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
// e2e.go runs the e2e test suite. No non-standard package dependencies; call with "go run".
|
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"flag"
|
|
|
|
"fmt"
|
|
|
|
"log"
|
Run e2e tests in deterministic random order
Currently, we run the e2e tests in whatever order readdir happens to
return, which is random on some filesystems, name sorted on others,
create order on others, etc. Eventually, we may want to be
automatically hermetic between e2e tests (especially as we introduce
more resource destructive tests), but until then, it would be useful
if we permute the test order randomly between runs to ensure that
developers don't accidentally rely on a particular order. This
introduces a form of forced hermeticism, since improper state cleanup
from one test may not perturb a given test, but there's probably *a*
test in the suite that the order will perturb, so the RNG will find
that order eventually.
Adds logging of the generated seed, and an --orderseed argument that
can be used to re-run in the same order. Also sorts the pass/fail list
now for easier human reading.
2014-12-07 17:19:17 +00:00
|
|
|
"math/rand"
|
2014-10-23 00:49:40 +00:00
|
|
|
"os"
|
|
|
|
"os/exec"
|
|
|
|
"os/signal"
|
|
|
|
"path"
|
|
|
|
"path/filepath"
|
Run e2e tests in deterministic random order
Currently, we run the e2e tests in whatever order readdir happens to
return, which is random on some filesystems, name sorted on others,
create order on others, etc. Eventually, we may want to be
automatically hermetic between e2e tests (especially as we introduce
more resource destructive tests), but until then, it would be useful
if we permute the test order randomly between runs to ensure that
developers don't accidentally rely on a particular order. This
introduces a form of forced hermeticism, since improper state cleanup
from one test may not perturb a given test, but there's probably *a*
test in the suite that the order will perturb, so the RNG will find
that order eventually.
Adds logging of the generated seed, and an --orderseed argument that
can be used to re-run in the same order. Also sorts the pass/fail list
now for easier human reading.
2014-12-07 17:19:17 +00:00
|
|
|
"sort"
|
2014-10-23 00:49:40 +00:00
|
|
|
"strings"
|
Run e2e tests in deterministic random order
Currently, we run the e2e tests in whatever order readdir happens to
return, which is random on some filesystems, name sorted on others,
create order on others, etc. Eventually, we may want to be
automatically hermetic between e2e tests (especially as we introduce
more resource destructive tests), but until then, it would be useful
if we permute the test order randomly between runs to ensure that
developers don't accidentally rely on a particular order. This
introduces a form of forced hermeticism, since improper state cleanup
from one test may not perturb a given test, but there's probably *a*
test in the suite that the order will perturb, so the RNG will find
that order eventually.
Adds logging of the generated seed, and an --orderseed argument that
can be used to re-run in the same order. Also sorts the pass/fail list
now for easier human reading.
2014-12-07 17:19:17 +00:00
|
|
|
"time"
|
2014-10-23 00:49:40 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2014-11-11 01:46:11 +00:00
|
|
|
isup = flag.Bool("isup", false, "Check to see if the e2e cluster is up, then exit.")
|
|
|
|
build = flag.Bool("build", false, "If true, build a new release. Otherwise, use whatever is there.")
|
|
|
|
up = flag.Bool("up", false, "If true, start the the e2e cluster. If cluster is already up, recreate it.")
|
|
|
|
push = flag.Bool("push", false, "If true, push to e2e cluster. Has no effect if -up is true.")
|
|
|
|
down = flag.Bool("down", false, "If true, tear down the cluster before exiting.")
|
Run e2e tests in deterministic random order
Currently, we run the e2e tests in whatever order readdir happens to
return, which is random on some filesystems, name sorted on others,
create order on others, etc. Eventually, we may want to be
automatically hermetic between e2e tests (especially as we introduce
more resource destructive tests), but until then, it would be useful
if we permute the test order randomly between runs to ensure that
developers don't accidentally rely on a particular order. This
introduces a form of forced hermeticism, since improper state cleanup
from one test may not perturb a given test, but there's probably *a*
test in the suite that the order will perturb, so the RNG will find
that order eventually.
Adds logging of the generated seed, and an --orderseed argument that
can be used to re-run in the same order. Also sorts the pass/fail list
now for easier human reading.
2014-12-07 17:19:17 +00:00
|
|
|
orderseed = flag.Int64("orderseed", 0, "If non-zero, seed of random test shuffle order. (Otherwise random.)")
|
2014-11-11 01:46:11 +00:00
|
|
|
test = flag.Bool("test", false, "Run all tests in hack/e2e-suite.")
|
|
|
|
tests = flag.String("tests", "", "Run only tests in hack/e2e-suite matching this glob. Ignored if -test is set.")
|
|
|
|
root = flag.String("root", absOrDie(filepath.Clean(filepath.Join(path.Base(os.Args[0]), ".."))), "Root directory of kubernetes repository.")
|
|
|
|
verbose = flag.Bool("v", false, "If true, print all command output.")
|
2014-11-25 18:28:43 +00:00
|
|
|
trace_bash = flag.Bool("trace-bash", false, "If true, pass -x to bash to trace all bash commands")
|
2014-11-11 01:46:11 +00:00
|
|
|
checkVersionSkew = flag.Bool("check_version_skew", true, ""+
|
|
|
|
"By default, verify that client and server have exact version match. "+
|
|
|
|
"You can explicitly set to false if you're, e.g., testing client changes "+
|
|
|
|
"for which the server version doesn't make a difference.")
|
2014-11-08 00:14:29 +00:00
|
|
|
|
|
|
|
cfgCmd = flag.String("cfg", "", "If nonempty, pass this as an argument, and call kubecfg. Implies -v.")
|
|
|
|
ctlCmd = flag.String("ctl", "", "If nonempty, pass this as an argument, and call kubectl. Implies -v. (-test, -cfg, -ctl are mutually exclusive)")
|
2014-10-23 00:49:40 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var signals = make(chan os.Signal, 100)
|
|
|
|
|
|
|
|
func absOrDie(path string) string {
|
|
|
|
out, err := filepath.Abs(path)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
return out
|
|
|
|
}
|
|
|
|
|
|
|
|
func main() {
|
|
|
|
flag.Parse()
|
|
|
|
signal.Notify(signals, os.Interrupt)
|
|
|
|
|
2014-10-23 21:47:30 +00:00
|
|
|
if *test {
|
|
|
|
*tests = "*"
|
|
|
|
}
|
|
|
|
|
|
|
|
if *isup {
|
|
|
|
status := 1
|
2014-12-07 23:29:30 +00:00
|
|
|
if IsUp() {
|
2014-10-23 21:47:30 +00:00
|
|
|
status = 0
|
|
|
|
log.Printf("Cluster is UP")
|
|
|
|
} else {
|
|
|
|
log.Printf("Cluster is DOWN")
|
|
|
|
}
|
|
|
|
os.Exit(status)
|
|
|
|
}
|
|
|
|
|
2014-10-23 00:49:40 +00:00
|
|
|
if *build {
|
2014-10-28 19:37:03 +00:00
|
|
|
if !runBash("build-release", `test-build-release`) {
|
2014-10-23 00:49:40 +00:00
|
|
|
log.Fatal("Error building. Aborting.")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if *up {
|
|
|
|
if !Up() {
|
|
|
|
log.Fatal("Error starting e2e cluster. Aborting.")
|
|
|
|
}
|
|
|
|
} else if *push {
|
|
|
|
if !runBash("push", path.Join(*root, "/cluster/kube-push.sh")) {
|
|
|
|
log.Fatal("Error pushing e2e cluster. Aborting.")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-11-08 00:14:29 +00:00
|
|
|
failure := false
|
|
|
|
switch {
|
|
|
|
case *cfgCmd != "":
|
|
|
|
failure = !runBash("'kubecfg "+*cfgCmd+"'", "$KUBECFG "+*cfgCmd)
|
|
|
|
case *ctlCmd != "":
|
2014-11-11 01:46:11 +00:00
|
|
|
failure = !runBash("'kubectl "+*ctlCmd+"'", "$KUBECTL "+*ctlCmd)
|
2014-11-08 00:14:29 +00:00
|
|
|
case *tests != "":
|
|
|
|
failed, passed := Test()
|
|
|
|
log.Printf("Passed tests: %v", passed)
|
|
|
|
log.Printf("Failed tests: %v", failed)
|
|
|
|
failure = len(failed) > 0
|
2014-10-23 00:49:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if *down {
|
|
|
|
TearDown()
|
|
|
|
}
|
|
|
|
|
2014-11-08 00:14:29 +00:00
|
|
|
if failure {
|
2014-10-23 00:49:40 +00:00
|
|
|
os.Exit(1)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TearDown() {
|
|
|
|
runBash("teardown", "test-teardown")
|
|
|
|
}
|
|
|
|
|
|
|
|
func Up() bool {
|
|
|
|
if !tryUp() {
|
|
|
|
log.Printf("kube-up failed; will tear down and retry. (Possibly your cluster was in some partially created state?)")
|
|
|
|
TearDown()
|
|
|
|
return tryUp()
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2014-12-07 23:29:30 +00:00
|
|
|
// Is the e2e cluster up?
|
|
|
|
func IsUp() bool {
|
|
|
|
return runBash("get status", `$KUBECFG -server_version`)
|
|
|
|
}
|
|
|
|
|
2014-10-23 00:49:40 +00:00
|
|
|
func tryUp() bool {
|
|
|
|
return runBash("up", path.Join(*root, "/cluster/kube-up.sh; test-setup;"))
|
|
|
|
}
|
|
|
|
|
Run e2e tests in deterministic random order
Currently, we run the e2e tests in whatever order readdir happens to
return, which is random on some filesystems, name sorted on others,
create order on others, etc. Eventually, we may want to be
automatically hermetic between e2e tests (especially as we introduce
more resource destructive tests), but until then, it would be useful
if we permute the test order randomly between runs to ensure that
developers don't accidentally rely on a particular order. This
introduces a form of forced hermeticism, since improper state cleanup
from one test may not perturb a given test, but there's probably *a*
test in the suite that the order will perturb, so the RNG will find
that order eventually.
Adds logging of the generated seed, and an --orderseed argument that
can be used to re-run in the same order. Also sorts the pass/fail list
now for easier human reading.
2014-12-07 17:19:17 +00:00
|
|
|
// Fisher-Yates shuffle using the given RNG r
|
|
|
|
func shuffleStrings(strings []string, r *rand.Rand) {
|
|
|
|
for i := len(strings) - 1; i > 0; i-- {
|
|
|
|
j := r.Intn(i + 1)
|
|
|
|
strings[i], strings[j] = strings[j], strings[i]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-23 00:49:40 +00:00
|
|
|
func Test() (failed, passed []string) {
|
2014-11-14 01:03:06 +00:00
|
|
|
defer runBashUntil("watchEvents", "$KUBECTL --watch-only get events")()
|
2014-12-07 23:29:30 +00:00
|
|
|
|
|
|
|
if !IsUp() {
|
|
|
|
log.Fatal("Testing requested, but e2e cluster not up!")
|
|
|
|
}
|
|
|
|
|
2014-10-23 00:49:40 +00:00
|
|
|
// run tests!
|
|
|
|
dir, err := os.Open(filepath.Join(*root, "hack", "e2e-suite"))
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal("Couldn't open e2e-suite dir")
|
|
|
|
}
|
|
|
|
defer dir.Close()
|
|
|
|
names, err := dir.Readdirnames(0)
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal("Couldn't read names in e2e-suite dir")
|
|
|
|
}
|
|
|
|
|
Run e2e tests in deterministic random order
Currently, we run the e2e tests in whatever order readdir happens to
return, which is random on some filesystems, name sorted on others,
create order on others, etc. Eventually, we may want to be
automatically hermetic between e2e tests (especially as we introduce
more resource destructive tests), but until then, it would be useful
if we permute the test order randomly between runs to ensure that
developers don't accidentally rely on a particular order. This
introduces a form of forced hermeticism, since improper state cleanup
from one test may not perturb a given test, but there's probably *a*
test in the suite that the order will perturb, so the RNG will find
that order eventually.
Adds logging of the generated seed, and an --orderseed argument that
can be used to re-run in the same order. Also sorts the pass/fail list
now for easier human reading.
2014-12-07 17:19:17 +00:00
|
|
|
toRun := make([]string, 0, len(names))
|
2014-10-23 00:49:40 +00:00
|
|
|
for i := range names {
|
|
|
|
name := names[i]
|
|
|
|
if name == "." || name == ".." {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if match, err := path.Match(*tests, name); !match && err == nil {
|
|
|
|
continue
|
|
|
|
}
|
Run e2e tests in deterministic random order
Currently, we run the e2e tests in whatever order readdir happens to
return, which is random on some filesystems, name sorted on others,
create order on others, etc. Eventually, we may want to be
automatically hermetic between e2e tests (especially as we introduce
more resource destructive tests), but until then, it would be useful
if we permute the test order randomly between runs to ensure that
developers don't accidentally rely on a particular order. This
introduces a form of forced hermeticism, since improper state cleanup
from one test may not perturb a given test, but there's probably *a*
test in the suite that the order will perturb, so the RNG will find
that order eventually.
Adds logging of the generated seed, and an --orderseed argument that
can be used to re-run in the same order. Also sorts the pass/fail list
now for easier human reading.
2014-12-07 17:19:17 +00:00
|
|
|
if err != nil {
|
|
|
|
log.Fatal("Bad test pattern: %v", tests)
|
|
|
|
}
|
|
|
|
toRun = append(toRun, name)
|
|
|
|
}
|
|
|
|
|
|
|
|
if *orderseed == 0 {
|
|
|
|
// Use low order bits of NanoTime as the default seed. (Using
|
|
|
|
// all the bits makes for a long, very similar looking seed
|
|
|
|
// between runs.)
|
|
|
|
*orderseed = time.Now().UnixNano() & (1<<32 - 1)
|
|
|
|
}
|
|
|
|
sort.Strings(toRun)
|
|
|
|
shuffleStrings(toRun, rand.New(rand.NewSource(*orderseed)))
|
|
|
|
log.Printf("Running tests matching %v shuffled with seed %#x: %v", *tests, *orderseed, toRun)
|
|
|
|
for _, name := range toRun {
|
2014-10-23 00:49:40 +00:00
|
|
|
absName := filepath.Join(*root, "hack", "e2e-suite", name)
|
Run e2e tests in deterministic random order
Currently, we run the e2e tests in whatever order readdir happens to
return, which is random on some filesystems, name sorted on others,
create order on others, etc. Eventually, we may want to be
automatically hermetic between e2e tests (especially as we introduce
more resource destructive tests), but until then, it would be useful
if we permute the test order randomly between runs to ensure that
developers don't accidentally rely on a particular order. This
introduces a form of forced hermeticism, since improper state cleanup
from one test may not perturb a given test, but there's probably *a*
test in the suite that the order will perturb, so the RNG will find
that order eventually.
Adds logging of the generated seed, and an --orderseed argument that
can be used to re-run in the same order. Also sorts the pass/fail list
now for easier human reading.
2014-12-07 17:19:17 +00:00
|
|
|
log.Printf("Starting test %v.", name)
|
2014-10-23 00:49:40 +00:00
|
|
|
if runBash(name, absName) {
|
|
|
|
log.Printf("%v passed", name)
|
|
|
|
passed = append(passed, name)
|
|
|
|
} else {
|
|
|
|
log.Printf("%v failed", name)
|
|
|
|
failed = append(failed, name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
Run e2e tests in deterministic random order
Currently, we run the e2e tests in whatever order readdir happens to
return, which is random on some filesystems, name sorted on others,
create order on others, etc. Eventually, we may want to be
automatically hermetic between e2e tests (especially as we introduce
more resource destructive tests), but until then, it would be useful
if we permute the test order randomly between runs to ensure that
developers don't accidentally rely on a particular order. This
introduces a form of forced hermeticism, since improper state cleanup
from one test may not perturb a given test, but there's probably *a*
test in the suite that the order will perturb, so the RNG will find
that order eventually.
Adds logging of the generated seed, and an --orderseed argument that
can be used to re-run in the same order. Also sorts the pass/fail list
now for easier human reading.
2014-12-07 17:19:17 +00:00
|
|
|
sort.Strings(passed)
|
|
|
|
sort.Strings(failed)
|
2014-10-23 00:49:40 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// All nonsense below is temporary until we have go versions of these things.
|
|
|
|
|
|
|
|
func runBash(stepName, bashFragment string) bool {
|
|
|
|
cmd := exec.Command("bash", "-s")
|
2014-11-25 18:28:43 +00:00
|
|
|
if *trace_bash {
|
|
|
|
cmd.Args = append(cmd.Args, "-x")
|
|
|
|
}
|
2014-10-23 00:49:40 +00:00
|
|
|
cmd.Stdin = strings.NewReader(bashWrap(bashFragment))
|
2014-10-28 19:37:03 +00:00
|
|
|
return finishRunning(stepName, cmd)
|
|
|
|
}
|
|
|
|
|
2014-11-14 01:03:06 +00:00
|
|
|
// call the returned anonymous function to stop.
|
|
|
|
func runBashUntil(stepName, bashFragment string) func() {
|
|
|
|
cmd := exec.Command("bash", "-s")
|
|
|
|
cmd.Stdin = strings.NewReader(bashWrap(bashFragment))
|
|
|
|
log.Printf("Running in background: %v", stepName)
|
|
|
|
stdout, stderr := bytes.NewBuffer(nil), bytes.NewBuffer(nil)
|
|
|
|
cmd.Stdout, cmd.Stderr = stdout, stderr
|
|
|
|
if err := cmd.Start(); err != nil {
|
|
|
|
log.Printf("Unable to start '%v': '%v'", stepName, err)
|
|
|
|
return func() {}
|
|
|
|
}
|
|
|
|
return func() {
|
|
|
|
cmd.Process.Signal(os.Interrupt)
|
|
|
|
fmt.Printf("%v stdout:\n------\n%v\n------\n", stepName, string(stdout.Bytes()))
|
|
|
|
fmt.Printf("%v stderr:\n------\n%v\n------\n", stepName, string(stderr.Bytes()))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-28 19:37:03 +00:00
|
|
|
func run(stepName, cmdPath string) bool {
|
|
|
|
return finishRunning(stepName, exec.Command(filepath.Join(*root, cmdPath)))
|
|
|
|
}
|
|
|
|
|
|
|
|
func finishRunning(stepName string, cmd *exec.Cmd) bool {
|
|
|
|
log.Printf("Running: %v", stepName)
|
2014-10-23 00:49:40 +00:00
|
|
|
stdout, stderr := bytes.NewBuffer(nil), bytes.NewBuffer(nil)
|
|
|
|
if *verbose {
|
|
|
|
cmd.Stdout = os.Stdout
|
|
|
|
cmd.Stderr = os.Stderr
|
|
|
|
} else {
|
|
|
|
cmd.Stdout = stdout
|
|
|
|
cmd.Stderr = stderr
|
|
|
|
}
|
|
|
|
|
|
|
|
done := make(chan struct{})
|
|
|
|
defer close(done)
|
|
|
|
go func() {
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-done:
|
|
|
|
return
|
|
|
|
case s := <-signals:
|
|
|
|
cmd.Process.Signal(s)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
if err := cmd.Run(); err != nil {
|
|
|
|
log.Printf("Error running %v: %v", stepName, err)
|
|
|
|
if !*verbose {
|
|
|
|
fmt.Printf("stdout:\n------\n%v\n------\n", string(stdout.Bytes()))
|
|
|
|
fmt.Printf("stderr:\n------\n%v\n------\n", string(stderr.Bytes()))
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2014-11-11 01:46:11 +00:00
|
|
|
// returns either "", or a list of args intended for appending with the
|
|
|
|
// kubecfg or kubectl commands (begining with a space).
|
2014-11-12 21:30:53 +00:00
|
|
|
func kubecfgArgs() string {
|
2014-11-11 01:46:11 +00:00
|
|
|
if *checkVersionSkew {
|
|
|
|
return " -expect_version_match"
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2014-11-12 21:30:53 +00:00
|
|
|
// returns either "", or a list of args intended for appending with the
|
|
|
|
// kubectl command (begining with a space).
|
|
|
|
func kubectlArgs() string {
|
|
|
|
if *checkVersionSkew {
|
|
|
|
return " --match-server-version"
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2014-11-11 01:46:11 +00:00
|
|
|
func bashWrap(cmd string) string {
|
|
|
|
return `
|
2014-10-23 00:49:40 +00:00
|
|
|
set -o errexit
|
|
|
|
set -o nounset
|
|
|
|
set -o pipefail
|
|
|
|
|
|
|
|
export KUBE_CONFIG_FILE="config-test.sh"
|
|
|
|
|
|
|
|
# TODO(jbeda): This will break on usage if there is a space in
|
|
|
|
# ${KUBE_ROOT}. Covert to an array? Or an exported function?
|
2014-11-12 21:30:53 +00:00
|
|
|
export KUBECFG="` + *root + `/cluster/kubecfg.sh` + kubecfgArgs() + `"
|
|
|
|
export KUBECTL="` + *root + `/cluster/kubectl.sh` + kubectlArgs() + `"
|
2014-10-23 00:49:40 +00:00
|
|
|
|
|
|
|
source "` + *root + `/cluster/kube-env.sh"
|
|
|
|
source "` + *root + `/cluster/${KUBERNETES_PROVIDER}/util.sh"
|
|
|
|
|
2014-11-11 19:03:07 +00:00
|
|
|
prepare-e2e
|
2014-10-23 00:49:40 +00:00
|
|
|
|
2014-11-11 01:46:11 +00:00
|
|
|
` + cmd + `
|
2014-10-23 00:49:40 +00:00
|
|
|
`
|
|
|
|
}
|