2015-05-14 01:50:28 +00:00
|
|
|
/*
|
2016-06-03 00:25:58 +00:00
|
|
|
Copyright 2015 The Kubernetes Authors.
|
2015-05-14 01:50:28 +00:00
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2017-07-11 06:44:46 +00:00
|
|
|
package network
|
2015-05-14 01:50:28 +00:00
|
|
|
|
|
|
|
import (
|
2016-12-12 00:14:50 +00:00
|
|
|
"context"
|
2015-05-14 01:50:28 +00:00
|
|
|
"fmt"
|
2015-06-17 00:28:11 +00:00
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
2016-02-02 18:59:54 +00:00
|
|
|
. "github.com/onsi/ginkgo"
|
|
|
|
. "github.com/onsi/gomega"
|
2017-06-22 18:24:23 +00:00
|
|
|
"k8s.io/api/core/v1"
|
2017-01-11 14:09:48 +00:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
2017-01-24 14:35:22 +00:00
|
|
|
"k8s.io/apimachinery/pkg/util/uuid"
|
2017-01-11 14:09:48 +00:00
|
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
2017-06-23 20:56:37 +00:00
|
|
|
clientset "k8s.io/client-go/kubernetes"
|
2017-07-11 01:10:34 +00:00
|
|
|
"k8s.io/kubernetes/pkg/api/testapi"
|
2016-04-07 17:21:31 +00:00
|
|
|
"k8s.io/kubernetes/test/e2e/framework"
|
2017-08-29 08:32:08 +00:00
|
|
|
imageutils "k8s.io/kubernetes/test/utils/image"
|
2015-05-14 01:50:28 +00:00
|
|
|
)
|
|
|
|
|
2016-02-02 18:59:54 +00:00
|
|
|
const dnsTestPodHostName = "dns-querier-1"
|
|
|
|
const dnsTestServiceName = "dns-test-service"
|
|
|
|
|
2017-09-22 05:09:02 +00:00
|
|
|
func createDNSPod(namespace, wheezyProbeCmd, jessieProbeCmd string) *v1.Pod {
|
2016-11-18 20:55:17 +00:00
|
|
|
dnsPod := &v1.Pod{
|
2016-12-03 18:57:26 +00:00
|
|
|
TypeMeta: metav1.TypeMeta{
|
2015-05-28 22:28:17 +00:00
|
|
|
Kind: "Pod",
|
2017-07-11 01:10:34 +00:00
|
|
|
APIVersion: testapi.Groups[v1.GroupName].GroupVersion().String(),
|
2015-05-28 22:28:17 +00:00
|
|
|
},
|
2017-01-17 03:38:19 +00:00
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2016-07-26 15:13:18 +00:00
|
|
|
Name: "dns-test-" + string(uuid.NewUUID()),
|
2015-05-28 22:28:17 +00:00
|
|
|
Namespace: namespace,
|
|
|
|
},
|
2016-11-18 20:55:17 +00:00
|
|
|
Spec: v1.PodSpec{
|
|
|
|
Volumes: []v1.Volume{
|
2015-05-28 22:28:17 +00:00
|
|
|
{
|
|
|
|
Name: "results",
|
2016-11-18 20:55:17 +00:00
|
|
|
VolumeSource: v1.VolumeSource{
|
|
|
|
EmptyDir: &v1.EmptyDirVolumeSource{},
|
2015-05-28 22:28:17 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2016-11-18 20:55:17 +00:00
|
|
|
Containers: []v1.Container{
|
2015-05-28 22:28:17 +00:00
|
|
|
// TODO: Consider scraping logs instead of running a webserver.
|
|
|
|
{
|
|
|
|
Name: "webserver",
|
2017-08-29 08:32:08 +00:00
|
|
|
Image: imageutils.GetE2EImage(imageutils.TestWebserver),
|
2016-11-18 20:55:17 +00:00
|
|
|
Ports: []v1.ContainerPort{
|
2015-05-28 22:28:17 +00:00
|
|
|
{
|
|
|
|
Name: "http",
|
|
|
|
ContainerPort: 80,
|
|
|
|
},
|
|
|
|
},
|
2016-11-18 20:55:17 +00:00
|
|
|
VolumeMounts: []v1.VolumeMount{
|
2015-05-28 22:28:17 +00:00
|
|
|
{
|
|
|
|
Name: "results",
|
|
|
|
MountPath: "/results",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "querier",
|
2017-08-29 08:32:08 +00:00
|
|
|
Image: imageutils.GetE2EImage(imageutils.Dnsutils),
|
2015-06-23 23:36:06 +00:00
|
|
|
Command: []string{"sh", "-c", wheezyProbeCmd},
|
2016-11-18 20:55:17 +00:00
|
|
|
VolumeMounts: []v1.VolumeMount{
|
2015-06-23 23:36:06 +00:00
|
|
|
{
|
|
|
|
Name: "results",
|
|
|
|
MountPath: "/results",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "jessie-querier",
|
2017-08-29 08:32:08 +00:00
|
|
|
Image: imageutils.GetE2EImage(imageutils.JessieDnsutils),
|
2015-06-23 23:36:06 +00:00
|
|
|
Command: []string{"sh", "-c", jessieProbeCmd},
|
2016-11-18 20:55:17 +00:00
|
|
|
VolumeMounts: []v1.VolumeMount{
|
2015-05-28 22:28:17 +00:00
|
|
|
{
|
|
|
|
Name: "results",
|
|
|
|
MountPath: "/results",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2016-04-14 17:45:29 +00:00
|
|
|
|
2017-04-06 07:32:21 +00:00
|
|
|
dnsPod.Spec.Hostname = dnsTestPodHostName
|
|
|
|
dnsPod.Spec.Subdomain = dnsTestServiceName
|
|
|
|
|
2016-04-14 17:45:29 +00:00
|
|
|
return dnsPod
|
2015-05-28 22:28:17 +00:00
|
|
|
}
|
|
|
|
|
2016-05-23 22:09:30 +00:00
|
|
|
func createProbeCommand(namesToResolve []string, hostEntries []string, ptrLookupIP string, fileNamePrefix, namespace string) (string, []string) {
|
2015-05-28 22:28:17 +00:00
|
|
|
fileNames := make([]string, 0, len(namesToResolve)*2)
|
|
|
|
probeCmd := "for i in `seq 1 600`; do "
|
|
|
|
for _, name := range namesToResolve {
|
|
|
|
// Resolve by TCP and UDP DNS. Use $$(...) because $(...) is
|
|
|
|
// expanded by kubernetes (though this won't expand so should
|
|
|
|
// remain a literal, safe > sorry).
|
|
|
|
lookup := "A"
|
|
|
|
if strings.HasPrefix(name, "_") {
|
|
|
|
lookup = "SRV"
|
|
|
|
}
|
2015-06-23 23:36:06 +00:00
|
|
|
fileName := fmt.Sprintf("%s_udp@%s", fileNamePrefix, name)
|
2015-05-28 22:28:17 +00:00
|
|
|
fileNames = append(fileNames, fileName)
|
|
|
|
probeCmd += fmt.Sprintf(`test -n "$$(dig +notcp +noall +answer +search %s %s)" && echo OK > /results/%s;`, name, lookup, fileName)
|
2015-06-23 23:36:06 +00:00
|
|
|
fileName = fmt.Sprintf("%s_tcp@%s", fileNamePrefix, name)
|
2015-05-28 22:28:17 +00:00
|
|
|
fileNames = append(fileNames, fileName)
|
|
|
|
probeCmd += fmt.Sprintf(`test -n "$$(dig +tcp +noall +answer +search %s %s)" && echo OK > /results/%s;`, name, lookup, fileName)
|
|
|
|
}
|
2016-02-02 18:59:54 +00:00
|
|
|
|
|
|
|
for _, name := range hostEntries {
|
|
|
|
fileName := fmt.Sprintf("%s_hosts@%s", fileNamePrefix, name)
|
|
|
|
fileNames = append(fileNames, fileName)
|
|
|
|
probeCmd += fmt.Sprintf(`test -n "$$(getent hosts %s)" && echo OK > /results/%s;`, name, fileName)
|
|
|
|
}
|
|
|
|
|
|
|
|
podARecByUDPFileName := fmt.Sprintf("%s_udp@PodARecord", fileNamePrefix)
|
|
|
|
podARecByTCPFileName := fmt.Sprintf("%s_tcp@PodARecord", fileNamePrefix)
|
|
|
|
probeCmd += fmt.Sprintf(`podARec=$$(hostname -i| awk -F. '{print $$1"-"$$2"-"$$3"-"$$4".%s.pod.cluster.local"}');`, namespace)
|
|
|
|
probeCmd += fmt.Sprintf(`test -n "$$(dig +notcp +noall +answer +search $${podARec} A)" && echo OK > /results/%s;`, podARecByUDPFileName)
|
|
|
|
probeCmd += fmt.Sprintf(`test -n "$$(dig +tcp +noall +answer +search $${podARec} A)" && echo OK > /results/%s;`, podARecByTCPFileName)
|
|
|
|
fileNames = append(fileNames, podARecByUDPFileName)
|
|
|
|
fileNames = append(fileNames, podARecByTCPFileName)
|
|
|
|
|
2016-05-23 22:09:30 +00:00
|
|
|
if len(ptrLookupIP) > 0 {
|
|
|
|
ptrLookup := fmt.Sprintf("%s.in-addr.arpa.", strings.Join(reverseArray(strings.Split(ptrLookupIP, ".")), "."))
|
|
|
|
ptrRecByUDPFileName := fmt.Sprintf("%s_udp@PTR", ptrLookupIP)
|
|
|
|
ptrRecByTCPFileName := fmt.Sprintf("%s_tcp@PTR", ptrLookupIP)
|
|
|
|
probeCmd += fmt.Sprintf(`test -n "$$(dig +notcp +noall +answer +search %s PTR)" && echo OK > /results/%s;`, ptrLookup, ptrRecByUDPFileName)
|
|
|
|
probeCmd += fmt.Sprintf(`test -n "$$(dig +tcp +noall +answer +search %s PTR)" && echo OK > /results/%s;`, ptrLookup, ptrRecByTCPFileName)
|
|
|
|
fileNames = append(fileNames, ptrRecByUDPFileName)
|
|
|
|
fileNames = append(fileNames, ptrRecByTCPFileName)
|
|
|
|
}
|
|
|
|
|
2015-05-28 22:28:17 +00:00
|
|
|
probeCmd += "sleep 1; done"
|
|
|
|
return probeCmd, fileNames
|
|
|
|
}
|
|
|
|
|
2016-08-22 20:43:20 +00:00
|
|
|
// createTargetedProbeCommand returns a command line that performs a DNS lookup for a specific record type
|
|
|
|
func createTargetedProbeCommand(nameToResolve string, lookup string, fileNamePrefix string) (string, string) {
|
|
|
|
fileName := fmt.Sprintf("%s_udp@%s", fileNamePrefix, nameToResolve)
|
|
|
|
probeCmd := fmt.Sprintf("dig +short +tries=12 +norecurse %s %s > /results/%s", nameToResolve, lookup, fileName)
|
|
|
|
return probeCmd, fileName
|
|
|
|
}
|
|
|
|
|
2016-11-18 20:55:17 +00:00
|
|
|
func assertFilesExist(fileNames []string, fileDir string, pod *v1.Pod, client clientset.Interface) {
|
2016-08-22 20:43:20 +00:00
|
|
|
assertFilesContain(fileNames, fileDir, pod, client, false, "")
|
|
|
|
}
|
|
|
|
|
2016-11-18 20:55:17 +00:00
|
|
|
func assertFilesContain(fileNames []string, fileDir string, pod *v1.Pod, client clientset.Interface, check bool, expected string) {
|
2015-05-28 22:28:17 +00:00
|
|
|
var failed []string
|
|
|
|
|
2017-03-20 14:28:06 +00:00
|
|
|
framework.ExpectNoError(wait.Poll(time.Second*10, time.Second*600, func() (bool, error) {
|
2015-05-28 22:28:17 +00:00
|
|
|
failed = []string{}
|
2016-12-12 00:14:50 +00:00
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), framework.SingleCallTimeout)
|
|
|
|
defer cancel()
|
|
|
|
|
2015-05-28 22:28:17 +00:00
|
|
|
for _, fileName := range fileNames {
|
2017-11-03 09:14:30 +00:00
|
|
|
contents, err := client.CoreV1().RESTClient().Get().
|
|
|
|
Context(ctx).
|
|
|
|
Namespace(pod.Namespace).
|
|
|
|
Resource("pods").
|
|
|
|
SubResource("proxy").
|
|
|
|
Name(pod.Name).
|
|
|
|
Suffix(fileDir, fileName).
|
|
|
|
Do().Raw()
|
|
|
|
|
2015-12-16 19:18:47 +00:00
|
|
|
if err != nil {
|
2016-12-12 00:14:50 +00:00
|
|
|
if ctx.Err() != nil {
|
|
|
|
framework.Failf("Unable to read %s from pod %s: %v", fileName, pod.Name, err)
|
|
|
|
} else {
|
|
|
|
framework.Logf("Unable to read %s from pod %s: %v", fileName, pod.Name, err)
|
|
|
|
}
|
2015-05-28 22:28:17 +00:00
|
|
|
failed = append(failed, fileName)
|
2016-08-22 20:43:20 +00:00
|
|
|
} else if check && strings.TrimSpace(string(contents)) != expected {
|
|
|
|
framework.Logf("File %s from pod %s contains '%s' instead of '%s'", fileName, pod.Name, string(contents), expected)
|
|
|
|
failed = append(failed, fileName)
|
2015-05-28 22:28:17 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if len(failed) == 0 {
|
|
|
|
return true, nil
|
|
|
|
}
|
2016-04-07 17:21:31 +00:00
|
|
|
framework.Logf("Lookups using %s failed for: %v\n", pod.Name, failed)
|
2015-05-28 22:28:17 +00:00
|
|
|
return false, nil
|
|
|
|
}))
|
|
|
|
Expect(len(failed)).To(Equal(0))
|
|
|
|
}
|
|
|
|
|
2016-11-18 20:55:17 +00:00
|
|
|
func validateDNSResults(f *framework.Framework, pod *v1.Pod, fileNames []string) {
|
2015-06-23 23:36:06 +00:00
|
|
|
By("submitting the pod to kubernetes")
|
2017-10-25 15:54:32 +00:00
|
|
|
podClient := f.ClientSet.CoreV1().Pods(f.Namespace.Name)
|
2015-06-23 23:36:06 +00:00
|
|
|
defer func() {
|
|
|
|
By("deleting the pod")
|
|
|
|
defer GinkgoRecover()
|
2017-01-24 15:38:21 +00:00
|
|
|
podClient.Delete(pod.Name, metav1.NewDeleteOptions(0))
|
2015-06-23 23:36:06 +00:00
|
|
|
}()
|
|
|
|
if _, err := podClient.Create(pod); err != nil {
|
2016-04-07 17:21:31 +00:00
|
|
|
framework.Failf("Failed to create %s pod: %v", pod.Name, err)
|
2015-06-23 23:36:06 +00:00
|
|
|
}
|
|
|
|
|
2016-04-07 17:21:31 +00:00
|
|
|
framework.ExpectNoError(f.WaitForPodRunning(pod.Name))
|
2015-06-23 23:36:06 +00:00
|
|
|
|
|
|
|
By("retrieving the pod")
|
2016-12-07 14:40:26 +00:00
|
|
|
pod, err := podClient.Get(pod.Name, metav1.GetOptions{})
|
2015-06-23 23:36:06 +00:00
|
|
|
if err != nil {
|
2016-04-07 17:21:31 +00:00
|
|
|
framework.Failf("Failed to get pod %s: %v", pod.Name, err)
|
2015-06-23 23:36:06 +00:00
|
|
|
}
|
|
|
|
// Try to find results for each expected name.
|
2016-08-22 20:43:20 +00:00
|
|
|
By("looking for the results for each expected name from probers")
|
2016-10-18 13:00:38 +00:00
|
|
|
assertFilesExist(fileNames, "results", pod, f.ClientSet)
|
2015-06-23 23:36:06 +00:00
|
|
|
|
|
|
|
// TODO: probe from the host, too.
|
|
|
|
|
2016-04-07 17:21:31 +00:00
|
|
|
framework.Logf("DNS probes using %s succeeded\n", pod.Name)
|
2015-06-23 23:36:06 +00:00
|
|
|
}
|
|
|
|
|
2016-11-18 20:55:17 +00:00
|
|
|
func validateTargetedProbeOutput(f *framework.Framework, pod *v1.Pod, fileNames []string, value string) {
|
2016-08-22 20:43:20 +00:00
|
|
|
By("submitting the pod to kubernetes")
|
2017-10-25 15:54:32 +00:00
|
|
|
podClient := f.ClientSet.CoreV1().Pods(f.Namespace.Name)
|
2016-08-22 20:43:20 +00:00
|
|
|
defer func() {
|
|
|
|
By("deleting the pod")
|
|
|
|
defer GinkgoRecover()
|
2017-01-24 15:38:21 +00:00
|
|
|
podClient.Delete(pod.Name, metav1.NewDeleteOptions(0))
|
2016-08-22 20:43:20 +00:00
|
|
|
}()
|
|
|
|
if _, err := podClient.Create(pod); err != nil {
|
|
|
|
framework.Failf("Failed to create %s pod: %v", pod.Name, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
framework.ExpectNoError(f.WaitForPodRunning(pod.Name))
|
|
|
|
|
|
|
|
By("retrieving the pod")
|
2016-12-07 14:40:26 +00:00
|
|
|
pod, err := podClient.Get(pod.Name, metav1.GetOptions{})
|
2016-08-22 20:43:20 +00:00
|
|
|
if err != nil {
|
|
|
|
framework.Failf("Failed to get pod %s: %v", pod.Name, err)
|
|
|
|
}
|
|
|
|
// Try to find the expected value for each expected name.
|
|
|
|
By("looking for the results for each expected name from probers")
|
2016-10-18 13:00:38 +00:00
|
|
|
assertFilesContain(fileNames, "results", pod, f.ClientSet, true, value)
|
2016-08-22 20:43:20 +00:00
|
|
|
|
|
|
|
framework.Logf("DNS probes using %s succeeded\n", pod.Name)
|
|
|
|
}
|
|
|
|
|
2016-05-23 22:09:30 +00:00
|
|
|
func reverseArray(arr []string) []string {
|
|
|
|
for i := 0; i < len(arr)/2; i++ {
|
|
|
|
j := len(arr) - i - 1
|
|
|
|
arr[i], arr[j] = arr[j], arr[i]
|
|
|
|
}
|
|
|
|
return arr
|
|
|
|
}
|
|
|
|
|
2017-07-24 09:43:54 +00:00
|
|
|
var _ = SIGDescribe("DNS", func() {
|
2016-04-07 17:21:31 +00:00
|
|
|
f := framework.NewDefaultFramework("dns")
|
2015-05-22 20:03:01 +00:00
|
|
|
|
2017-11-01 15:58:56 +00:00
|
|
|
/*
|
|
|
|
Testname: dns-for-clusters
|
|
|
|
Description: Make sure that DNS can resolve the names of clusters.
|
|
|
|
*/
|
2017-10-26 17:46:09 +00:00
|
|
|
framework.ConformanceIt("should provide DNS for the cluster ", func() {
|
2015-05-14 01:50:28 +00:00
|
|
|
// All the names we need to be able to resolve.
|
|
|
|
// TODO: Spin up a separate test service and test that dns works for that service.
|
|
|
|
namesToResolve := []string{
|
2015-05-29 00:49:58 +00:00
|
|
|
"kubernetes.default",
|
|
|
|
"kubernetes.default.svc",
|
|
|
|
"kubernetes.default.svc.cluster.local",
|
2015-05-14 01:50:28 +00:00
|
|
|
}
|
2015-05-20 18:11:02 +00:00
|
|
|
// Added due to #8512. This is critical for GCE and GKE deployments.
|
2016-04-07 17:21:31 +00:00
|
|
|
if framework.ProviderIs("gce", "gke") {
|
2017-04-29 14:35:17 +00:00
|
|
|
namesToResolve = append(namesToResolve, "google.com")
|
2015-05-20 18:11:02 +00:00
|
|
|
namesToResolve = append(namesToResolve, "metadata")
|
|
|
|
}
|
2016-04-14 17:45:29 +00:00
|
|
|
hostFQDN := fmt.Sprintf("%s.%s.%s.svc.cluster.local", dnsTestPodHostName, dnsTestServiceName, f.Namespace.Name)
|
|
|
|
hostEntries := []string{hostFQDN, dnsTestPodHostName}
|
2016-05-23 22:09:30 +00:00
|
|
|
wheezyProbeCmd, wheezyFileNames := createProbeCommand(namesToResolve, hostEntries, "", "wheezy", f.Namespace.Name)
|
|
|
|
jessieProbeCmd, jessieFileNames := createProbeCommand(namesToResolve, hostEntries, "", "jessie", f.Namespace.Name)
|
2016-08-22 20:43:20 +00:00
|
|
|
By("Running these commands on wheezy: " + wheezyProbeCmd + "\n")
|
|
|
|
By("Running these commands on jessie: " + jessieProbeCmd + "\n")
|
2015-05-14 01:50:28 +00:00
|
|
|
|
|
|
|
// Run a pod which probes DNS and exposes the results by HTTP.
|
|
|
|
By("creating a pod to probe DNS")
|
2017-09-22 05:09:02 +00:00
|
|
|
pod := createDNSPod(f.Namespace.Name, wheezyProbeCmd, jessieProbeCmd)
|
2015-06-23 23:36:06 +00:00
|
|
|
validateDNSResults(f, pod, append(wheezyFileNames, jessieFileNames...))
|
2015-05-14 01:50:28 +00:00
|
|
|
})
|
2015-06-22 21:14:54 +00:00
|
|
|
|
2017-11-01 15:58:56 +00:00
|
|
|
/*
|
|
|
|
Testname: dns-for-services
|
|
|
|
Description: Make sure that DNS can resolve the names of services.
|
|
|
|
*/
|
2017-10-26 17:46:09 +00:00
|
|
|
framework.ConformanceIt("should provide DNS for services ", func() {
|
2015-05-22 20:58:18 +00:00
|
|
|
// Create a test headless service.
|
|
|
|
By("Creating a test headless service")
|
|
|
|
testServiceSelector := map[string]string{
|
|
|
|
"dns-test": "true",
|
|
|
|
}
|
2017-05-25 09:18:42 +00:00
|
|
|
headlessService := framework.CreateServiceSpec(dnsTestServiceName, "", true, testServiceSelector)
|
2017-10-25 15:54:32 +00:00
|
|
|
_, err := f.ClientSet.CoreV1().Services(f.Namespace.Name).Create(headlessService)
|
2015-05-22 20:58:18 +00:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
defer func() {
|
|
|
|
By("deleting the test headless service")
|
|
|
|
defer GinkgoRecover()
|
2017-10-25 15:54:32 +00:00
|
|
|
f.ClientSet.CoreV1().Services(f.Namespace.Name).Delete(headlessService.Name, nil)
|
2015-05-28 22:28:17 +00:00
|
|
|
}()
|
|
|
|
|
2017-05-25 09:18:42 +00:00
|
|
|
regularService := framework.CreateServiceSpec("test-service-2", "", false, testServiceSelector)
|
2017-10-25 15:54:32 +00:00
|
|
|
regularService, err = f.ClientSet.CoreV1().Services(f.Namespace.Name).Create(regularService)
|
2015-05-28 22:28:17 +00:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
defer func() {
|
|
|
|
By("deleting the test service")
|
|
|
|
defer GinkgoRecover()
|
2017-10-25 15:54:32 +00:00
|
|
|
f.ClientSet.CoreV1().Services(f.Namespace.Name).Delete(regularService.Name, nil)
|
2015-05-22 20:58:18 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
// All the names we need to be able to resolve.
|
|
|
|
// TODO: Create more endpoints and ensure that multiple A records are returned
|
|
|
|
// for headless service.
|
|
|
|
namesToResolve := []string{
|
2015-05-28 22:28:17 +00:00
|
|
|
fmt.Sprintf("%s", headlessService.Name),
|
|
|
|
fmt.Sprintf("%s.%s", headlessService.Name, f.Namespace.Name),
|
|
|
|
fmt.Sprintf("%s.%s.svc", headlessService.Name, f.Namespace.Name),
|
|
|
|
fmt.Sprintf("_http._tcp.%s.%s.svc", headlessService.Name, f.Namespace.Name),
|
|
|
|
fmt.Sprintf("_http._tcp.%s.%s.svc", regularService.Name, f.Namespace.Name),
|
2015-05-22 20:58:18 +00:00
|
|
|
}
|
|
|
|
|
2016-05-23 22:09:30 +00:00
|
|
|
wheezyProbeCmd, wheezyFileNames := createProbeCommand(namesToResolve, nil, regularService.Spec.ClusterIP, "wheezy", f.Namespace.Name)
|
|
|
|
jessieProbeCmd, jessieFileNames := createProbeCommand(namesToResolve, nil, regularService.Spec.ClusterIP, "jessie", f.Namespace.Name)
|
2016-08-22 20:43:20 +00:00
|
|
|
By("Running these commands on wheezy: " + wheezyProbeCmd + "\n")
|
|
|
|
By("Running these commands on jessie: " + jessieProbeCmd + "\n")
|
2015-06-23 23:36:06 +00:00
|
|
|
|
2015-05-22 20:58:18 +00:00
|
|
|
// Run a pod which probes DNS and exposes the results by HTTP.
|
|
|
|
By("creating a pod to probe DNS")
|
2017-09-22 05:09:02 +00:00
|
|
|
pod := createDNSPod(f.Namespace.Name, wheezyProbeCmd, jessieProbeCmd)
|
2015-05-28 22:28:17 +00:00
|
|
|
pod.ObjectMeta.Labels = testServiceSelector
|
2015-05-22 20:58:18 +00:00
|
|
|
|
2015-06-23 23:36:06 +00:00
|
|
|
validateDNSResults(f, pod, append(wheezyFileNames, jessieFileNames...))
|
2015-05-22 20:58:18 +00:00
|
|
|
})
|
|
|
|
|
2017-09-22 05:09:02 +00:00
|
|
|
It("should provide DNS for pods for Hostname and Subdomain", func() {
|
2016-03-14 20:08:01 +00:00
|
|
|
// Create a test headless service.
|
|
|
|
By("Creating a test headless service")
|
|
|
|
testServiceSelector := map[string]string{
|
|
|
|
"dns-test-hostname-attribute": "true",
|
|
|
|
}
|
|
|
|
serviceName := "dns-test-service-2"
|
|
|
|
podHostname := "dns-querier-2"
|
2017-05-25 09:18:42 +00:00
|
|
|
headlessService := framework.CreateServiceSpec(serviceName, "", true, testServiceSelector)
|
2017-10-25 15:54:32 +00:00
|
|
|
_, err := f.ClientSet.CoreV1().Services(f.Namespace.Name).Create(headlessService)
|
2016-03-14 20:08:01 +00:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
defer func() {
|
|
|
|
By("deleting the test headless service")
|
|
|
|
defer GinkgoRecover()
|
2017-10-25 15:54:32 +00:00
|
|
|
f.ClientSet.CoreV1().Services(f.Namespace.Name).Delete(headlessService.Name, nil)
|
2016-03-14 20:08:01 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
hostFQDN := fmt.Sprintf("%s.%s.%s.svc.cluster.local", podHostname, serviceName, f.Namespace.Name)
|
2016-04-14 17:45:29 +00:00
|
|
|
hostNames := []string{hostFQDN, podHostname}
|
|
|
|
namesToResolve := []string{hostFQDN}
|
2016-05-23 22:09:30 +00:00
|
|
|
wheezyProbeCmd, wheezyFileNames := createProbeCommand(namesToResolve, hostNames, "", "wheezy", f.Namespace.Name)
|
|
|
|
jessieProbeCmd, jessieFileNames := createProbeCommand(namesToResolve, hostNames, "", "jessie", f.Namespace.Name)
|
2016-08-22 20:43:20 +00:00
|
|
|
By("Running these commands on wheezy: " + wheezyProbeCmd + "\n")
|
|
|
|
By("Running these commands on jessie: " + jessieProbeCmd + "\n")
|
2016-03-14 20:08:01 +00:00
|
|
|
|
|
|
|
// Run a pod which probes DNS and exposes the results by HTTP.
|
|
|
|
By("creating a pod to probe DNS")
|
2017-09-22 05:09:02 +00:00
|
|
|
pod1 := createDNSPod(f.Namespace.Name, wheezyProbeCmd, jessieProbeCmd)
|
2016-03-14 20:08:01 +00:00
|
|
|
pod1.ObjectMeta.Labels = testServiceSelector
|
2017-04-06 07:32:21 +00:00
|
|
|
pod1.Spec.Hostname = podHostname
|
|
|
|
pod1.Spec.Subdomain = serviceName
|
2016-03-14 20:08:01 +00:00
|
|
|
|
|
|
|
validateDNSResults(f, pod1, append(wheezyFileNames, jessieFileNames...))
|
|
|
|
})
|
2016-08-22 20:43:20 +00:00
|
|
|
|
|
|
|
It("should provide DNS for ExternalName services", func() {
|
|
|
|
// Create a test ExternalName service.
|
|
|
|
By("Creating a test externalName service")
|
|
|
|
serviceName := "dns-test-service-3"
|
2017-05-25 09:18:42 +00:00
|
|
|
externalNameService := framework.CreateServiceSpec(serviceName, "foo.example.com", false, nil)
|
2017-10-25 15:54:32 +00:00
|
|
|
_, err := f.ClientSet.CoreV1().Services(f.Namespace.Name).Create(externalNameService)
|
2016-08-22 20:43:20 +00:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
defer func() {
|
|
|
|
By("deleting the test externalName service")
|
|
|
|
defer GinkgoRecover()
|
2017-10-25 15:54:32 +00:00
|
|
|
f.ClientSet.CoreV1().Services(f.Namespace.Name).Delete(externalNameService.Name, nil)
|
2016-08-22 20:43:20 +00:00
|
|
|
}()
|
|
|
|
|
|
|
|
hostFQDN := fmt.Sprintf("%s.%s.svc.cluster.local", serviceName, f.Namespace.Name)
|
|
|
|
wheezyProbeCmd, wheezyFileName := createTargetedProbeCommand(hostFQDN, "CNAME", "wheezy")
|
|
|
|
jessieProbeCmd, jessieFileName := createTargetedProbeCommand(hostFQDN, "CNAME", "jessie")
|
|
|
|
By("Running these commands on wheezy: " + wheezyProbeCmd + "\n")
|
|
|
|
By("Running these commands on jessie: " + jessieProbeCmd + "\n")
|
|
|
|
|
|
|
|
// Run a pod which probes DNS and exposes the results by HTTP.
|
|
|
|
By("creating a pod to probe DNS")
|
2017-09-22 05:09:02 +00:00
|
|
|
pod1 := createDNSPod(f.Namespace.Name, wheezyProbeCmd, jessieProbeCmd)
|
2016-08-22 20:43:20 +00:00
|
|
|
|
|
|
|
validateTargetedProbeOutput(f, pod1, []string{wheezyFileName, jessieFileName}, "foo.example.com.")
|
|
|
|
|
|
|
|
// Test changing the externalName field
|
|
|
|
By("changing the externalName to bar.example.com")
|
2016-12-29 23:35:47 +00:00
|
|
|
_, err = framework.UpdateService(f.ClientSet, f.Namespace.Name, serviceName, func(s *v1.Service) {
|
2016-08-22 20:43:20 +00:00
|
|
|
s.Spec.ExternalName = "bar.example.com"
|
|
|
|
})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
wheezyProbeCmd, wheezyFileName = createTargetedProbeCommand(hostFQDN, "CNAME", "wheezy")
|
|
|
|
jessieProbeCmd, jessieFileName = createTargetedProbeCommand(hostFQDN, "CNAME", "jessie")
|
|
|
|
By("Running these commands on wheezy: " + wheezyProbeCmd + "\n")
|
|
|
|
By("Running these commands on jessie: " + jessieProbeCmd + "\n")
|
|
|
|
|
|
|
|
// Run a pod which probes DNS and exposes the results by HTTP.
|
|
|
|
By("creating a second pod to probe DNS")
|
2017-09-22 05:09:02 +00:00
|
|
|
pod2 := createDNSPod(f.Namespace.Name, wheezyProbeCmd, jessieProbeCmd)
|
2016-08-22 20:43:20 +00:00
|
|
|
|
|
|
|
validateTargetedProbeOutput(f, pod2, []string{wheezyFileName, jessieFileName}, "bar.example.com.")
|
|
|
|
|
|
|
|
// Test changing type from ExternalName to ClusterIP
|
|
|
|
By("changing the service to type=ClusterIP")
|
2016-12-29 23:35:47 +00:00
|
|
|
_, err = framework.UpdateService(f.ClientSet, f.Namespace.Name, serviceName, func(s *v1.Service) {
|
2016-11-18 20:55:17 +00:00
|
|
|
s.Spec.Type = v1.ServiceTypeClusterIP
|
|
|
|
s.Spec.Ports = []v1.ServicePort{
|
2016-08-22 20:43:20 +00:00
|
|
|
{Port: 80, Name: "http", Protocol: "TCP"},
|
|
|
|
}
|
|
|
|
})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
wheezyProbeCmd, wheezyFileName = createTargetedProbeCommand(hostFQDN, "A", "wheezy")
|
|
|
|
jessieProbeCmd, jessieFileName = createTargetedProbeCommand(hostFQDN, "A", "jessie")
|
|
|
|
By("Running these commands on wheezy: " + wheezyProbeCmd + "\n")
|
|
|
|
By("Running these commands on jessie: " + jessieProbeCmd + "\n")
|
|
|
|
|
|
|
|
// Run a pod which probes DNS and exposes the results by HTTP.
|
|
|
|
By("creating a third pod to probe DNS")
|
2017-09-22 05:09:02 +00:00
|
|
|
pod3 := createDNSPod(f.Namespace.Name, wheezyProbeCmd, jessieProbeCmd)
|
2016-08-22 20:43:20 +00:00
|
|
|
|
2017-10-25 15:54:32 +00:00
|
|
|
svc, err := f.ClientSet.CoreV1().Services(f.Namespace.Name).Get(externalNameService.Name, metav1.GetOptions{})
|
2017-09-21 09:05:46 +00:00
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
validateTargetedProbeOutput(f, pod3, []string{wheezyFileName, jessieFileName}, svc.Spec.ClusterIP)
|
2016-08-22 20:43:20 +00:00
|
|
|
})
|
2015-05-14 01:50:28 +00:00
|
|
|
})
|