2016-06-07 09:16:18 +00:00
|
|
|
/*
|
|
|
|
Copyright 2016 The Kubernetes Authors All rights reserved.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package e2e
|
|
|
|
|
|
|
|
import (
|
2016-06-13 10:00:49 +00:00
|
|
|
"fmt"
|
|
|
|
"os"
|
2016-06-07 09:16:18 +00:00
|
|
|
"time"
|
|
|
|
|
|
|
|
"k8s.io/kubernetes/federation/apis/federation"
|
2016-06-14 20:07:02 +00:00
|
|
|
"k8s.io/kubernetes/federation/client/clientset_generated/federation_release_1_3"
|
2016-06-07 09:16:18 +00:00
|
|
|
"k8s.io/kubernetes/pkg/api"
|
2016-06-22 23:47:35 +00:00
|
|
|
"k8s.io/kubernetes/pkg/api/errors"
|
2016-06-07 09:16:18 +00:00
|
|
|
"k8s.io/kubernetes/pkg/api/v1"
|
|
|
|
"k8s.io/kubernetes/pkg/client/clientset_generated/release_1_3"
|
|
|
|
"k8s.io/kubernetes/pkg/client/restclient"
|
|
|
|
"k8s.io/kubernetes/pkg/client/unversioned/clientcmd"
|
|
|
|
clientcmdapi "k8s.io/kubernetes/pkg/client/unversioned/clientcmd/api"
|
|
|
|
"k8s.io/kubernetes/pkg/util/intstr"
|
2016-06-13 10:00:49 +00:00
|
|
|
"k8s.io/kubernetes/pkg/util/wait"
|
2016-06-07 09:16:18 +00:00
|
|
|
"k8s.io/kubernetes/test/e2e/framework"
|
|
|
|
|
|
|
|
. "github.com/onsi/ginkgo"
|
|
|
|
. "github.com/onsi/gomega"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
UserAgentName = "federation-e2e-service-controller"
|
|
|
|
// TODO(madhusudancs): Using the same values as defined in the federated
|
|
|
|
// service controller. Replace it with the values from the e2e framework.
|
|
|
|
KubeAPIQPS = 20.0
|
|
|
|
KubeAPIBurst = 30
|
|
|
|
|
2016-06-17 04:07:39 +00:00
|
|
|
FederatedServiceTimeout = 60 * time.Second
|
2016-06-07 09:16:18 +00:00
|
|
|
|
|
|
|
FederatedServiceName = "federated-service"
|
|
|
|
FederatedServicePod = "federated-service-test-pod"
|
|
|
|
|
2016-06-14 20:14:58 +00:00
|
|
|
DefaultFederationName = "federation"
|
2016-06-17 17:49:23 +00:00
|
|
|
|
|
|
|
// We use this to decide how long to wait for our DNS probes to succeed.
|
|
|
|
DNSTTL = 180 * time.Second
|
2016-06-07 09:16:18 +00:00
|
|
|
)
|
|
|
|
|
2016-06-17 04:07:39 +00:00
|
|
|
var _ = framework.KubeDescribe("[Feature:Federation] Federated Services", func() {
|
2016-06-07 09:16:18 +00:00
|
|
|
var clusterClientSets []*release_1_3.Clientset
|
2016-06-13 10:00:49 +00:00
|
|
|
var federationName string
|
2016-06-07 09:16:18 +00:00
|
|
|
f := framework.NewDefaultFederatedFramework("service")
|
|
|
|
|
|
|
|
BeforeEach(func() {
|
2016-06-13 10:00:49 +00:00
|
|
|
framework.SkipUnlessFederated(f.Client)
|
|
|
|
|
|
|
|
// TODO: Federation API server should be able to answer this.
|
|
|
|
if federationName = os.Getenv("FEDERATION_NAME"); federationName == "" {
|
2016-06-14 20:14:58 +00:00
|
|
|
federationName = DefaultFederationName
|
2016-06-13 10:00:49 +00:00
|
|
|
}
|
|
|
|
|
2016-06-07 09:16:18 +00:00
|
|
|
contexts := f.GetUnderlyingFederatedContexts()
|
|
|
|
|
|
|
|
for _, context := range contexts {
|
2016-06-17 04:07:39 +00:00
|
|
|
createClusterObjectOrFail(f, &context)
|
2016-06-07 09:16:18 +00:00
|
|
|
}
|
|
|
|
|
2016-06-13 10:00:49 +00:00
|
|
|
var clusterList *federation.ClusterList
|
2016-06-07 09:16:18 +00:00
|
|
|
By("Obtaining a list of all the clusters")
|
2016-06-13 10:00:49 +00:00
|
|
|
if err := wait.PollImmediate(framework.Poll, FederatedServiceTimeout, func() (bool, error) {
|
|
|
|
var err error
|
|
|
|
clusterList, err = f.FederationClientset.Federation().Clusters().List(api.ListOptions{})
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
framework.Logf("%d clusters registered, waiting for %d", len(clusterList.Items), len(contexts))
|
|
|
|
if len(clusterList.Items) == len(contexts) {
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
return false, nil
|
|
|
|
}); err != nil {
|
|
|
|
framework.Failf("Failed to list registered clusters: %+v", err)
|
|
|
|
}
|
2016-06-07 09:16:18 +00:00
|
|
|
|
2016-06-17 04:07:39 +00:00
|
|
|
framework.Logf("Checking that %d clusters are Ready", len(contexts))
|
|
|
|
for _, context := range contexts {
|
|
|
|
clusterIsReadyOrFail(f, &context)
|
|
|
|
}
|
|
|
|
framework.Logf("%d clusters are Ready", len(contexts))
|
|
|
|
|
2016-06-07 09:16:18 +00:00
|
|
|
for _, cluster := range clusterList.Items {
|
|
|
|
framework.Logf("Creating a clientset for the cluster %s", cluster.Name)
|
|
|
|
|
|
|
|
Expect(framework.TestContext.KubeConfig).ToNot(Equal(""), "KubeConfig must be specified to load clusters' client config")
|
|
|
|
kubecfg, err := clientcmd.LoadFromFile(framework.TestContext.KubeConfig)
|
|
|
|
framework.ExpectNoError(err, "error loading KubeConfig: %v", err)
|
|
|
|
|
|
|
|
cfgOverride := &clientcmd.ConfigOverrides{
|
|
|
|
ClusterInfo: clientcmdapi.Cluster{
|
|
|
|
Server: cluster.Spec.ServerAddressByClientCIDRs[0].ServerAddress,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
ccfg := clientcmd.NewNonInteractiveClientConfig(*kubecfg, cluster.Name, cfgOverride, clientcmd.NewDefaultClientConfigLoadingRules())
|
|
|
|
cfg, err := ccfg.ClientConfig()
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
|
|
|
|
cfg.QPS = KubeAPIQPS
|
|
|
|
cfg.Burst = KubeAPIBurst
|
|
|
|
clset := release_1_3.NewForConfigOrDie(restclient.AddUserAgent(cfg, UserAgentName))
|
|
|
|
clusterClientSets = append(clusterClientSets, clset)
|
|
|
|
}
|
2016-06-22 23:47:35 +00:00
|
|
|
|
|
|
|
for i, cs := range clusterClientSets {
|
|
|
|
if _, err := cs.Core().Namespaces().Get(f.Namespace.Name); errors.IsNotFound(err) {
|
|
|
|
ns := &v1.Namespace{
|
|
|
|
ObjectMeta: v1.ObjectMeta{
|
|
|
|
Name: f.Namespace.Name,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if _, err := cs.Core().Namespaces().Create(ns); err != nil {
|
|
|
|
framework.Logf("Couldn't create the namespace %s in cluster [%d]: %v", f.Namespace.Name, i, err)
|
|
|
|
}
|
|
|
|
framework.Logf("Namespace %s created in cluster [%d]", f.Namespace.Name, i)
|
|
|
|
} else if err != nil {
|
|
|
|
framework.Logf("Couldn't create the namespace %s in cluster [%d]: %v", f.Namespace.Name, i, err)
|
|
|
|
}
|
|
|
|
}
|
2016-06-07 09:16:18 +00:00
|
|
|
})
|
|
|
|
|
2016-06-13 10:00:49 +00:00
|
|
|
AfterEach(func() {
|
|
|
|
framework.SkipUnlessFederated(f.Client)
|
|
|
|
|
2016-06-22 23:47:35 +00:00
|
|
|
for i, cs := range clusterClientSets {
|
|
|
|
if err := cs.Core().Namespaces().Delete(f.Namespace.Name, &api.DeleteOptions{}); err != nil {
|
|
|
|
framework.Failf("Couldn't delete the namespace %s in cluster [%d]: %v", f.Namespace.Name, i, err)
|
|
|
|
}
|
|
|
|
framework.Logf("Namespace %s deleted in cluster [%d]", f.Namespace.Name, i)
|
|
|
|
}
|
|
|
|
|
2016-06-13 10:00:49 +00:00
|
|
|
// Delete the registered clusters in the federation API server.
|
|
|
|
clusterList, err := f.FederationClientset.Federation().Clusters().List(api.ListOptions{})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
for _, cluster := range clusterList.Items {
|
|
|
|
err := f.FederationClientset.Federation().Clusters().Delete(cluster.Name, &api.DeleteOptions{})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
2016-06-16 21:52:12 +00:00
|
|
|
Describe("DNS", func() {
|
|
|
|
BeforeEach(func() {
|
|
|
|
framework.SkipUnlessFederated(f.Client)
|
|
|
|
createService(f.FederationClientset_1_3, clusterClientSets, f.Namespace.Name)
|
|
|
|
})
|
2016-06-07 09:16:18 +00:00
|
|
|
|
2016-06-16 21:52:12 +00:00
|
|
|
It("should be able to discover a federated service", func() {
|
|
|
|
framework.SkipUnlessFederated(f.Client)
|
2016-06-07 09:16:18 +00:00
|
|
|
|
2016-06-16 21:52:12 +00:00
|
|
|
svcDNSNames := []string{
|
|
|
|
FederatedServiceName,
|
|
|
|
fmt.Sprintf("%s.%s", FederatedServiceName, f.Namespace.Name),
|
|
|
|
fmt.Sprintf("%s.%s.svc.cluster.local.", FederatedServiceName, f.Namespace.Name),
|
|
|
|
fmt.Sprintf("%s.%s.%s", FederatedServiceName, f.Namespace.Name, federationName),
|
|
|
|
fmt.Sprintf("%s.%s.%s.svc.cluster.local.", FederatedServiceName, f.Namespace.Name, federationName),
|
|
|
|
}
|
|
|
|
// TODO(mml): This could be much faster. We can launch all the test
|
|
|
|
// pods, perhaps in the BeforeEach, and then just poll until we get
|
|
|
|
// successes/failures from them all.
|
|
|
|
for _, name := range svcDNSNames {
|
2016-06-17 18:39:39 +00:00
|
|
|
discoverService(f, name, true)
|
2016-06-16 21:52:12 +00:00
|
|
|
}
|
|
|
|
})
|
2016-06-13 10:00:49 +00:00
|
|
|
|
2016-06-16 21:52:12 +00:00
|
|
|
Context("non-local federated service", func() {
|
|
|
|
BeforeEach(func() {
|
|
|
|
framework.SkipUnlessFederated(f.Client)
|
|
|
|
|
|
|
|
// Delete a federated service shard in the default e2e Kubernetes cluster.
|
2016-06-17 17:49:45 +00:00
|
|
|
// TODO(mml): This should not work: #27623. We should use a load
|
|
|
|
// balancer with actual back-ends, some of which we delete or disable.
|
2016-06-16 21:52:12 +00:00
|
|
|
err := f.Clientset_1_3.Core().Services(f.Namespace.Name).Delete(FederatedServiceName, &api.DeleteOptions{})
|
|
|
|
Expect(err).NotTo(HaveOccurred())
|
|
|
|
waitForFederatedServiceShard(f.Clientset_1_3, f.Namespace.Name, nil, 0)
|
|
|
|
})
|
|
|
|
|
|
|
|
It("should be able to discover a non-local federated service", func() {
|
|
|
|
framework.SkipUnlessFederated(f.Client)
|
|
|
|
|
|
|
|
svcDNSNames := []string{
|
|
|
|
fmt.Sprintf("%s.%s.%s", FederatedServiceName, f.Namespace.Name, federationName),
|
|
|
|
fmt.Sprintf("%s.%s.%s.svc.cluster.local.", FederatedServiceName, f.Namespace.Name, federationName),
|
|
|
|
}
|
|
|
|
for _, name := range svcDNSNames {
|
2016-06-17 18:39:39 +00:00
|
|
|
discoverService(f, name, true)
|
2016-06-16 21:52:12 +00:00
|
|
|
}
|
|
|
|
|
2016-06-17 18:38:53 +00:00
|
|
|
// TODO(mml): This currently takes 9 minutes. Consider reducing the
|
|
|
|
// TTL and/or running the pods in parallel.
|
|
|
|
Context("[Slow]", func() {
|
2016-06-16 21:52:12 +00:00
|
|
|
localSvcDNSNames := []string{
|
|
|
|
FederatedServiceName,
|
|
|
|
fmt.Sprintf("%s.%s", FederatedServiceName, f.Namespace.Name),
|
|
|
|
fmt.Sprintf("%s.%s.svc.cluster.local.", FederatedServiceName, f.Namespace.Name),
|
|
|
|
}
|
|
|
|
for _, name := range localSvcDNSNames {
|
|
|
|
discoverService(f, name, false)
|
|
|
|
}
|
2016-06-17 18:38:53 +00:00
|
|
|
})
|
2016-06-16 21:52:12 +00:00
|
|
|
})
|
|
|
|
})
|
2016-06-07 09:16:18 +00:00
|
|
|
})
|
|
|
|
})
|
|
|
|
|
2016-06-13 10:00:49 +00:00
|
|
|
// waitForFederatedServiceShard waits until the number of shards of a given federated
|
|
|
|
// service reaches the expected value, i.e. numSvcs in the given individual Kubernetes
|
|
|
|
// cluster. If the shard count, i.e. numSvcs is expected to be at least one, then
|
|
|
|
// it also checks if the first shard's name and spec matches that of the given service.
|
2016-06-14 20:07:02 +00:00
|
|
|
func waitForFederatedServiceShard(cs *release_1_3.Clientset, namespace string, service *v1.Service, numSvcs int) {
|
2016-06-07 09:16:18 +00:00
|
|
|
By("Fetching a federated service shard")
|
|
|
|
var clSvcList *v1.ServiceList
|
2016-06-13 10:00:49 +00:00
|
|
|
if err := wait.PollImmediate(framework.Poll, FederatedServiceTimeout, func() (bool, error) {
|
2016-06-07 09:16:18 +00:00
|
|
|
var err error
|
|
|
|
clSvcList, err = cs.Core().Services(namespace).List(api.ListOptions{})
|
2016-06-13 10:00:49 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
2016-06-07 09:16:18 +00:00
|
|
|
n := len(clSvcList.Items)
|
|
|
|
if n == numSvcs {
|
2016-06-13 10:00:49 +00:00
|
|
|
return true, nil
|
2016-06-07 09:16:18 +00:00
|
|
|
}
|
2016-06-13 10:00:49 +00:00
|
|
|
framework.Logf("%d services found, waiting for %d, trying again in %s", n, numSvcs, framework.Poll)
|
|
|
|
return false, nil
|
|
|
|
}); err != nil {
|
|
|
|
framework.Failf("Failed to list registered clusters: %+v", err)
|
2016-06-07 09:16:18 +00:00
|
|
|
}
|
|
|
|
|
2016-06-13 10:00:49 +00:00
|
|
|
if numSvcs > 0 && service != nil {
|
2016-06-07 09:16:18 +00:00
|
|
|
// Renaming for clarity/readability
|
|
|
|
clSvc := clSvcList.Items[0]
|
2016-06-15 20:20:05 +00:00
|
|
|
|
|
|
|
// The federation service has no cluster IP. Clear any cluster IP before
|
|
|
|
// comparison.
|
|
|
|
clSvc.Spec.ClusterIP = ""
|
|
|
|
|
2016-06-07 09:16:18 +00:00
|
|
|
Expect(clSvc.Name).To(Equal(service.Name))
|
2016-06-17 04:07:39 +00:00
|
|
|
// Some fields are expected to be different, so make them the same before checking equality.
|
|
|
|
clSvc.Spec.ClusterIP = service.Spec.ClusterIP
|
|
|
|
clSvc.Spec.ExternalIPs = service.Spec.ExternalIPs
|
|
|
|
clSvc.Spec.DeprecatedPublicIPs = service.Spec.DeprecatedPublicIPs
|
|
|
|
clSvc.Spec.LoadBalancerIP = service.Spec.LoadBalancerIP
|
|
|
|
clSvc.Spec.LoadBalancerSourceRanges = service.Spec.LoadBalancerSourceRanges
|
2016-06-07 09:16:18 +00:00
|
|
|
Expect(clSvc.Spec).To(Equal(service.Spec))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-14 20:07:02 +00:00
|
|
|
func createService(fcs *federation_release_1_3.Clientset, clusterClientSets []*release_1_3.Clientset, namespace string) {
|
2016-06-16 21:52:12 +00:00
|
|
|
By(fmt.Sprintf("Creating federated service %q in namespace %q", FederatedServiceName, namespace))
|
|
|
|
|
2016-06-07 09:16:18 +00:00
|
|
|
labels := map[string]string{
|
|
|
|
"foo": "bar",
|
|
|
|
}
|
|
|
|
|
|
|
|
svc1port := "svc1"
|
|
|
|
svc2port := "svc2"
|
|
|
|
|
2016-06-14 20:07:02 +00:00
|
|
|
service := &v1.Service{
|
|
|
|
ObjectMeta: v1.ObjectMeta{
|
2016-06-07 09:16:18 +00:00
|
|
|
Name: FederatedServiceName,
|
|
|
|
},
|
2016-06-14 20:07:02 +00:00
|
|
|
Spec: v1.ServiceSpec{
|
2016-06-07 09:16:18 +00:00
|
|
|
Selector: labels,
|
2016-06-14 20:07:02 +00:00
|
|
|
Ports: []v1.ServicePort{
|
2016-06-07 09:16:18 +00:00
|
|
|
{
|
|
|
|
Name: "portname1",
|
|
|
|
Port: 80,
|
|
|
|
TargetPort: intstr.FromString(svc1port),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
Name: "portname2",
|
|
|
|
Port: 81,
|
|
|
|
TargetPort: intstr.FromString(svc2port),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
2016-06-14 20:07:02 +00:00
|
|
|
nservice, err := fcs.Core().Services(namespace).Create(service)
|
2016-06-17 04:07:39 +00:00
|
|
|
framework.Logf("Trying to create service %q in namespace %q", service.ObjectMeta.Name, service.ObjectMeta.Namespace)
|
|
|
|
Expect(err).NotTo(HaveOccurred(), fmt.Sprintf("creating service %s: %+v", service.Name, err))
|
2016-06-07 09:16:18 +00:00
|
|
|
for _, cs := range clusterClientSets {
|
2016-06-14 20:07:02 +00:00
|
|
|
waitForFederatedServiceShard(cs, namespace, nservice, 1)
|
2016-06-07 09:16:18 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-17 18:39:39 +00:00
|
|
|
func podExitCodeDetector(f *framework.Framework, name string, code int32) func() error {
|
2016-06-16 21:52:12 +00:00
|
|
|
// If we ever get any container logs, stash them here.
|
|
|
|
logs := ""
|
|
|
|
|
|
|
|
logerr := func(err error) error {
|
|
|
|
if err == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
if logs == "" {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return fmt.Errorf("%s (%v)", logs, err)
|
2016-06-13 10:00:49 +00:00
|
|
|
}
|
2016-06-16 21:52:12 +00:00
|
|
|
|
2016-06-17 18:39:39 +00:00
|
|
|
return func() error {
|
|
|
|
pod, err := f.Client.Pods(f.Namespace.Name).Get(name)
|
2016-06-16 21:52:12 +00:00
|
|
|
if err != nil {
|
|
|
|
return logerr(err)
|
|
|
|
}
|
|
|
|
if len(pod.Status.ContainerStatuses) < 1 {
|
|
|
|
return logerr(fmt.Errorf("no container statuses"))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Best effort attempt to grab pod logs for debugging
|
2016-06-17 18:39:39 +00:00
|
|
|
logs, err = framework.GetPodLogs(f.Client, f.Namespace.Name, name, pod.Spec.Containers[0].Name)
|
2016-06-16 21:52:12 +00:00
|
|
|
if err != nil {
|
|
|
|
framework.Logf("Cannot fetch pod logs: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
status := pod.Status.ContainerStatuses[0]
|
|
|
|
if status.State.Terminated == nil {
|
|
|
|
return logerr(fmt.Errorf("container is not in terminated state"))
|
|
|
|
}
|
2016-06-17 18:39:39 +00:00
|
|
|
if status.State.Terminated.ExitCode == code {
|
2016-06-16 21:52:12 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return logerr(fmt.Errorf("exited %d", status.State.Terminated.ExitCode))
|
2016-06-17 18:39:39 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func discoverService(f *framework.Framework, name string, exists bool) {
|
|
|
|
command := []string{"sh", "-c", fmt.Sprintf("until nslookup '%s'; do sleep 1; done", name)}
|
|
|
|
By(fmt.Sprintf("Looking up %q", name))
|
|
|
|
|
|
|
|
pod := &api.Pod{
|
|
|
|
ObjectMeta: api.ObjectMeta{
|
|
|
|
Name: FederatedServicePod,
|
|
|
|
Labels: map[string]string{"name": FederatedServicePod},
|
|
|
|
},
|
|
|
|
Spec: api.PodSpec{
|
|
|
|
Containers: []api.Container{
|
|
|
|
{
|
|
|
|
Name: "federated-service-discovery-container",
|
|
|
|
Image: "gcr.io/google_containers/busybox:1.24",
|
|
|
|
Command: command,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
RestartPolicy: api.RestartPolicyOnFailure,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err := f.Client.Pods(f.Namespace.Name).Create(pod)
|
2016-06-17 18:41:36 +00:00
|
|
|
Expect(err).NotTo(HaveOccurred(), "Trying to create pod to run %q", command)
|
|
|
|
defer f.Client.Pods(f.Namespace.Name).Delete(FederatedServicePod, api.NewDeleteOptions(0))
|
2016-06-17 18:39:39 +00:00
|
|
|
|
|
|
|
if exists {
|
|
|
|
// TODO(mml): Eventually check the IP address is correct, too.
|
|
|
|
Eventually(podExitCodeDetector(f, FederatedServicePod, 0), DNSTTL, time.Second*2).
|
|
|
|
Should(BeNil(), "%q should exit 0, but it never did", command)
|
|
|
|
} else {
|
|
|
|
Consistently(podExitCodeDetector(f, FederatedServicePod, 0), DNSTTL, time.Second*2).
|
|
|
|
ShouldNot(BeNil(), "%q should never exit 0, but it did", command)
|
|
|
|
}
|
2016-06-07 09:16:18 +00:00
|
|
|
}
|