/* Copyright 2014 The Kubernetes Authors All rights reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package e2e import ( "fmt" "io/ioutil" "math/rand" "net/http" "sort" "strconv" "strings" "time" . "github.com/onsi/ginkgo" . "github.com/onsi/gomega" "k8s.io/kubernetes/pkg/api" "k8s.io/kubernetes/pkg/api/errors" client "k8s.io/kubernetes/pkg/client/unversioned" "k8s.io/kubernetes/pkg/fields" "k8s.io/kubernetes/pkg/labels" "k8s.io/kubernetes/pkg/types" "k8s.io/kubernetes/pkg/util" "k8s.io/kubernetes/pkg/util/wait" ) // This should match whatever the default/configured range is var ServiceNodePortRange = util.PortRange{Base: 30000, Size: 2768} var _ = Describe("Services", func() { f := NewFramework("services") var c *client.Client var extraNamespaces []string BeforeEach(func() { var err error c, err = loadClient() Expect(err).NotTo(HaveOccurred()) }) AfterEach(func() { for _, ns := range extraNamespaces { By(fmt.Sprintf("Destroying namespace %v", ns)) if err := deleteNS(c, ns, 5*time.Minute /* namespace deletion timeout */); err != nil { Failf("Couldn't delete namespace %s: %s", ns, err) } } extraNamespaces = nil }) // TODO: We get coverage of TCP/UDP and multi-port services through the DNS test. We should have a simpler test for multi-port TCP here. It("should provide secure master service [Conformance]", func() { _, err := c.Services(api.NamespaceDefault).Get("kubernetes") Expect(err).NotTo(HaveOccurred()) }) It("should serve a basic endpoint from pods [Conformance]", func() { serviceName := "endpoint-test2" ns := f.Namespace.Name labels := map[string]string{ "foo": "bar", "baz": "blah", } By("creating service " + serviceName + " in namespace " + ns) defer func() { err := c.Services(ns).Delete(serviceName) Expect(err).NotTo(HaveOccurred()) }() service := &api.Service{ ObjectMeta: api.ObjectMeta{ Name: serviceName, }, Spec: api.ServiceSpec{ Selector: labels, Ports: []api.ServicePort{{ Port: 80, TargetPort: util.NewIntOrStringFromInt(80), }}, }, } _, err := c.Services(ns).Create(service) Expect(err).NotTo(HaveOccurred()) validateEndpointsOrFail(c, ns, serviceName, PortsByPodName{}) names := map[string]bool{} defer func() { for name := range names { err := c.Pods(ns).Delete(name, nil) Expect(err).NotTo(HaveOccurred()) } }() name1 := "pod1" name2 := "pod2" createPodOrFail(c, ns, name1, labels, []api.ContainerPort{{ContainerPort: 80}}) names[name1] = true validateEndpointsOrFail(c, ns, serviceName, PortsByPodName{name1: {80}}) createPodOrFail(c, ns, name2, labels, []api.ContainerPort{{ContainerPort: 80}}) names[name2] = true validateEndpointsOrFail(c, ns, serviceName, PortsByPodName{name1: {80}, name2: {80}}) deletePodOrFail(c, ns, name1) delete(names, name1) validateEndpointsOrFail(c, ns, serviceName, PortsByPodName{name2: {80}}) deletePodOrFail(c, ns, name2) delete(names, name2) validateEndpointsOrFail(c, ns, serviceName, PortsByPodName{}) }) It("should serve multiport endpoints from pods [Conformance]", func() { // repacking functionality is intentionally not tested here - it's better to test it in an integration test. serviceName := "multi-endpoint-test" ns := f.Namespace.Name defer func() { err := c.Services(ns).Delete(serviceName) Expect(err).NotTo(HaveOccurred()) }() labels := map[string]string{"foo": "bar"} svc1port := "svc1" svc2port := "svc2" By("creating service " + serviceName + " in namespace " + ns) service := &api.Service{ ObjectMeta: api.ObjectMeta{ Name: serviceName, }, Spec: api.ServiceSpec{ Selector: labels, Ports: []api.ServicePort{ { Name: "portname1", Port: 80, TargetPort: util.NewIntOrStringFromString(svc1port), }, { Name: "portname2", Port: 81, TargetPort: util.NewIntOrStringFromString(svc2port), }, }, }, } _, err := c.Services(ns).Create(service) Expect(err).NotTo(HaveOccurred()) port1 := 100 port2 := 101 validateEndpointsOrFail(c, ns, serviceName, PortsByPodName{}) names := map[string]bool{} defer func() { for name := range names { err := c.Pods(ns).Delete(name, nil) Expect(err).NotTo(HaveOccurred()) } }() containerPorts1 := []api.ContainerPort{ { Name: svc1port, ContainerPort: port1, }, } containerPorts2 := []api.ContainerPort{ { Name: svc2port, ContainerPort: port2, }, } podname1 := "pod1" podname2 := "pod2" createPodOrFail(c, ns, podname1, labels, containerPorts1) names[podname1] = true validateEndpointsOrFail(c, ns, serviceName, PortsByPodName{podname1: {port1}}) createPodOrFail(c, ns, podname2, labels, containerPorts2) names[podname2] = true validateEndpointsOrFail(c, ns, serviceName, PortsByPodName{podname1: {port1}, podname2: {port2}}) deletePodOrFail(c, ns, podname1) delete(names, podname1) validateEndpointsOrFail(c, ns, serviceName, PortsByPodName{podname2: {port2}}) deletePodOrFail(c, ns, podname2) delete(names, podname2) validateEndpointsOrFail(c, ns, serviceName, PortsByPodName{}) }) It("should be able to up and down services", func() { // this test uses NodeSSHHosts that does not work if a Node only reports LegacyHostIP SkipUnlessProviderIs(providersWithSSH...) ns := f.Namespace.Name numPods, servicePort := 3, 80 podNames1, svc1IP, err := startServeHostnameService(c, ns, "service1", servicePort, numPods) Expect(err).NotTo(HaveOccurred()) podNames2, svc2IP, err := startServeHostnameService(c, ns, "service2", servicePort, numPods) Expect(err).NotTo(HaveOccurred()) hosts, err := NodeSSHHosts(c) Expect(err).NotTo(HaveOccurred()) if len(hosts) == 0 { Failf("No ssh-able nodes") } host := hosts[0] expectNoError(verifyServeHostnameServiceUp(c, host, podNames1, svc1IP, servicePort)) expectNoError(verifyServeHostnameServiceUp(c, host, podNames2, svc2IP, servicePort)) // Stop service 1 and make sure it is gone. expectNoError(stopServeHostnameService(c, ns, "service1")) expectNoError(verifyServeHostnameServiceDown(c, host, svc1IP, servicePort)) expectNoError(verifyServeHostnameServiceUp(c, host, podNames2, svc2IP, servicePort)) // Start another service and verify both are up. podNames3, svc3IP, err := startServeHostnameService(c, ns, "service3", servicePort, numPods) Expect(err).NotTo(HaveOccurred()) if svc2IP == svc3IP { Failf("VIPs conflict: %v", svc2IP) } expectNoError(verifyServeHostnameServiceUp(c, host, podNames2, svc2IP, servicePort)) expectNoError(verifyServeHostnameServiceUp(c, host, podNames3, svc3IP, servicePort)) expectNoError(stopServeHostnameService(c, ns, "service2")) expectNoError(stopServeHostnameService(c, ns, "service3")) }) It("should work after restarting kube-proxy", func() { SkipUnlessProviderIs("gce", "gke") ns := f.Namespace.Name numPods, servicePort := 3, 80 svc1 := "service1" svc2 := "service2" defer func() { expectNoError(stopServeHostnameService(c, ns, svc1)) }() podNames1, svc1IP, err := startServeHostnameService(c, ns, svc1, servicePort, numPods) Expect(err).NotTo(HaveOccurred()) defer func() { expectNoError(stopServeHostnameService(c, ns, svc2)) }() podNames2, svc2IP, err := startServeHostnameService(c, ns, svc2, servicePort, numPods) Expect(err).NotTo(HaveOccurred()) if svc1IP == svc2IP { Failf("VIPs conflict: %v", svc1IP) } hosts, err := NodeSSHHosts(c) Expect(err).NotTo(HaveOccurred()) if len(hosts) == 0 { Failf("No ssh-able nodes") } host := hosts[0] expectNoError(verifyServeHostnameServiceUp(c, host, podNames1, svc1IP, servicePort)) expectNoError(verifyServeHostnameServiceUp(c, host, podNames2, svc2IP, servicePort)) By("Restarting kube-proxy") if err := restartKubeProxy(host); err != nil { Failf("error restarting kube-proxy: %v", err) } expectNoError(verifyServeHostnameServiceUp(c, host, podNames1, svc1IP, servicePort)) expectNoError(verifyServeHostnameServiceUp(c, host, podNames2, svc2IP, servicePort)) By("Removing iptable rules") _, _, code, err := SSH(` sudo iptables -t nat -F KUBE-SERVICES || true; sudo iptables -t nat -F KUBE-PORTALS-HOST || true; sudo iptables -t nat -F KUBE-PORTALS-CONTAINER || true`, host, testContext.Provider) if err != nil || code != 0 { Failf("couldn't remove iptable rules: %v (code %v)", err, code) } expectNoError(verifyServeHostnameServiceUp(c, host, podNames1, svc1IP, servicePort)) expectNoError(verifyServeHostnameServiceUp(c, host, podNames2, svc2IP, servicePort)) }) It("should work after restarting apiserver", func() { // TODO: restartApiserver doesn't work in GKE - fix it and reenable this test. SkipUnlessProviderIs("gce") ns := f.Namespace.Name numPods, servicePort := 3, 80 defer func() { expectNoError(stopServeHostnameService(c, ns, "service1")) }() podNames1, svc1IP, err := startServeHostnameService(c, ns, "service1", servicePort, numPods) hosts, err := NodeSSHHosts(c) Expect(err).NotTo(HaveOccurred()) if len(hosts) == 0 { Failf("No ssh-able nodes") } host := hosts[0] expectNoError(verifyServeHostnameServiceUp(c, host, podNames1, svc1IP, servicePort)) // Restart apiserver if err := restartApiserver(); err != nil { Failf("error restarting apiserver: %v", err) } if err := waitForApiserverUp(c); err != nil { Failf("error while waiting for apiserver up: %v", err) } expectNoError(verifyServeHostnameServiceUp(c, host, podNames1, svc1IP, servicePort)) // Create a new service and check if it's not reusing IP. defer func() { expectNoError(stopServeHostnameService(c, ns, "service2")) }() podNames2, svc2IP, err := startServeHostnameService(c, ns, "service2", servicePort, numPods) if svc1IP == svc2IP { Failf("VIPs conflict: %v", svc1IP) } expectNoError(verifyServeHostnameServiceUp(c, host, podNames1, svc1IP, servicePort)) expectNoError(verifyServeHostnameServiceUp(c, host, podNames2, svc2IP, servicePort)) }) It("should be able to create a functioning NodePort service", func() { serviceName := "nodeportservice-test" ns := f.Namespace.Name t := NewWebserverTest(c, ns, serviceName) defer func() { defer GinkgoRecover() errs := t.Cleanup() if len(errs) != 0 { Failf("errors in cleanup: %v", errs) } }() service := t.BuildServiceSpec() service.Spec.Type = api.ServiceTypeNodePort By("creating service " + serviceName + " with type=NodePort in namespace " + ns) result, err := c.Services(ns).Create(service) Expect(err).NotTo(HaveOccurred()) defer func(ns, serviceName string) { // clean up when we're done By("deleting service " + serviceName + " in namespace " + ns) err := c.Services(ns).Delete(serviceName) Expect(err).NotTo(HaveOccurred()) }(ns, serviceName) if len(result.Spec.Ports) != 1 { Failf("got unexpected number (%d) of Ports for NodePort service: %v", len(result.Spec.Ports), result) } nodePort := result.Spec.Ports[0].NodePort if nodePort == 0 { Failf("got unexpected nodePort (%d) on Ports[0] for NodePort service: %v", nodePort, result) } if !ServiceNodePortRange.Contains(nodePort) { Failf("got unexpected (out-of-range) port for NodePort service: %v", result) } By("creating pod to be part of service " + serviceName) t.CreateWebserverRC(1) By("hitting the pod through the service's NodePort") ip := pickNodeIP(c) testReachable(ip, nodePort) // this test uses NodeSSHHosts that does not work if a Node only reports LegacyHostIP if providerIs(providersWithSSH...) { hosts, err := NodeSSHHosts(c) if err != nil { Expect(err).NotTo(HaveOccurred()) } cmd := fmt.Sprintf(`test -n "$(ss -ant46 'sport = :%d' | tail -n +2 | grep LISTEN)"`, nodePort) _, _, code, err := SSH(cmd, hosts[0], testContext.Provider) if code != 0 { Failf("expected node port (%d) to be in use", nodePort) } } }) It("should be able to change the type and nodeport settings of a service", func() { // requires cloud load-balancer support SkipUnlessProviderIs("gce", "gke", "aws") serviceName := "mutability-service-test" t := NewWebserverTest(f.Client, f.Namespace.Name, serviceName) defer func() { defer GinkgoRecover() errs := t.Cleanup() if len(errs) != 0 { Failf("errors in cleanup: %v", errs) } }() service := t.BuildServiceSpec() By("creating service " + serviceName + " with type unspecified in namespace " + t.Namespace) service, err := t.CreateService(service) Expect(err).NotTo(HaveOccurred()) if service.Spec.Type != api.ServiceTypeClusterIP { Failf("got unexpected Spec.Type for default service: %v", service) } if len(service.Spec.Ports) != 1 { Failf("got unexpected len(Spec.Ports) for default service: %v", service) } port := service.Spec.Ports[0] if port.NodePort != 0 { Failf("got unexpected Spec.Ports[0].nodePort for default service: %v", service) } if len(service.Status.LoadBalancer.Ingress) != 0 { Failf("got unexpected len(Status.LoadBalancer.Ingress) for default service: %v", service) } By("creating pod to be part of service " + t.ServiceName) t.CreateWebserverRC(1) By("changing service " + serviceName + " to type=NodePort") service, err = updateService(f.Client, f.Namespace.Name, serviceName, func(s *api.Service) { s.Spec.Type = api.ServiceTypeNodePort }) Expect(err).NotTo(HaveOccurred()) if service.Spec.Type != api.ServiceTypeNodePort { Failf("got unexpected Spec.Type for NodePort service: %v", service) } if len(service.Spec.Ports) != 1 { Failf("got unexpected len(Spec.Ports) for NodePort service: %v", service) } port = service.Spec.Ports[0] if port.NodePort == 0 { Failf("got unexpected Spec.Ports[0].nodePort for NodePort service: %v", service) } if !ServiceNodePortRange.Contains(port.NodePort) { Failf("got unexpected (out-of-range) port for NodePort service: %v", service) } if len(service.Status.LoadBalancer.Ingress) != 0 { Failf("got unexpected len(Status.LoadBalancer.Ingress) for NodePort service: %v", service) } By("hitting the pod through the service's NodePort") ip := pickNodeIP(f.Client) nodePort1 := port.NodePort // Save for later! testReachable(ip, nodePort1) By("changing service " + serviceName + " to type=LoadBalancer") service, err = updateService(f.Client, f.Namespace.Name, serviceName, func(s *api.Service) { s.Spec.Type = api.ServiceTypeLoadBalancer }) Expect(err).NotTo(HaveOccurred()) // Wait for the load balancer to be created asynchronously service, err = waitForLoadBalancerIngress(f.Client, serviceName, f.Namespace.Name) Expect(err).NotTo(HaveOccurred()) if service.Spec.Type != api.ServiceTypeLoadBalancer { Failf("got unexpected Spec.Type for LoadBalancer service: %v", service) } if len(service.Spec.Ports) != 1 { Failf("got unexpected len(Spec.Ports) for LoadBalancer service: %v", service) } port = service.Spec.Ports[0] if port.NodePort != nodePort1 { Failf("got unexpected Spec.Ports[0].nodePort for LoadBalancer service: %v", service) } if len(service.Status.LoadBalancer.Ingress) != 1 { Failf("got unexpected len(Status.LoadBalancer.Ingress) for LoadBalancer service: %v", service) } ingress1 := service.Status.LoadBalancer.Ingress[0] if ingress1.IP == "" && ingress1.Hostname == "" { Failf("got unexpected Status.LoadBalancer.Ingress[0] for LoadBalancer service: %v", service) } By("hitting the pod through the service's NodePort") ip = pickNodeIP(f.Client) testReachable(ip, nodePort1) By("hitting the pod through the service's LoadBalancer") testLoadBalancerReachable(ingress1, 80) By("changing service " + serviceName + " update NodePort") nodePort2 := nodePort1 - 1 if !ServiceNodePortRange.Contains(nodePort2) { //Check for (unlikely) assignment at bottom of range nodePort2 = nodePort1 + 1 } service, err = updateService(f.Client, f.Namespace.Name, serviceName, func(s *api.Service) { s.Spec.Ports[0].NodePort = nodePort2 }) Expect(err).NotTo(HaveOccurred()) if service.Spec.Type != api.ServiceTypeLoadBalancer { Failf("got unexpected Spec.Type for updated-NodePort service: %v", service) } if len(service.Spec.Ports) != 1 { Failf("got unexpected len(Spec.Ports) for updated-NodePort service: %v", service) } port = service.Spec.Ports[0] if port.NodePort != nodePort2 { Failf("got unexpected Spec.Ports[0].nodePort for NodePort service: %v", service) } if len(service.Status.LoadBalancer.Ingress) != 1 { Failf("got unexpected len(Status.LoadBalancer.Ingress) for NodePort service: %v", service) } By("hitting the pod through the service's updated NodePort") testReachable(ip, nodePort2) By("checking the old NodePort is closed") testNotReachable(ip, nodePort1) By("hitting the pod through the service's LoadBalancer") i := 1 for start := time.Now(); time.Since(start) < podStartTimeout; time.Sleep(3 * time.Second) { service, err = waitForLoadBalancerIngress(f.Client, serviceName, f.Namespace.Name) Expect(err).NotTo(HaveOccurred()) ingress2 := service.Status.LoadBalancer.Ingress[0] if testLoadBalancerReachableInTime(ingress2, 80, 5*time.Second) { break } if i%5 == 0 { Logf("Waiting for load-balancer changes (%v elapsed, will retry)", time.Since(start)) } i++ } By("changing service " + serviceName + " back to type=ClusterIP") service, err = updateService(f.Client, f.Namespace.Name, serviceName, func(s *api.Service) { s.Spec.Type = api.ServiceTypeClusterIP s.Spec.Ports[0].NodePort = 0 }) Expect(err).NotTo(HaveOccurred()) if len(service.Status.LoadBalancer.Ingress) != 0 { Failf("got unexpected len(Status.LoadBalancer.Ingress) for NodePort service: %v", service) } if service.Spec.Type != api.ServiceTypeClusterIP { Failf("got unexpected Spec.Type for back-to-ClusterIP service: %v", service) } if len(service.Spec.Ports) != 1 { Failf("got unexpected len(Spec.Ports) for back-to-ClusterIP service: %v", service) } port = service.Spec.Ports[0] if port.NodePort != 0 { Failf("got unexpected Spec.Ports[0].nodePort for back-to-ClusterIP service: %v", service) } // Wait for the load balancer to be destroyed asynchronously service, err = waitForLoadBalancerDestroy(f.Client, serviceName, f.Namespace.Name) Expect(err).NotTo(HaveOccurred()) if len(service.Status.LoadBalancer.Ingress) != 0 { Failf("got unexpected len(Status.LoadBalancer.Ingress) for back-to-ClusterIP service: %v", service) } By("checking the NodePort is closed") ip = pickNodeIP(f.Client) testNotReachable(ip, nodePort2) By("checking the LoadBalancer is closed") testLoadBalancerNotReachable(ingress1, 80) }) It("should prevent NodePort collisions", func() { baseName := "nodeport-collision-" serviceName1 := baseName + "1" serviceName2 := baseName + "2" ns := f.Namespace.Name t := NewWebserverTest(c, ns, serviceName1) defer func() { defer GinkgoRecover() errs := t.Cleanup() if len(errs) != 0 { Failf("errors in cleanup: %v", errs) } }() By("creating service " + serviceName1 + " with type NodePort in namespace " + ns) service := t.BuildServiceSpec() service.Spec.Type = api.ServiceTypeNodePort result, err := t.CreateService(service) Expect(err).NotTo(HaveOccurred()) if result.Spec.Type != api.ServiceTypeNodePort { Failf("got unexpected Spec.Type for new service: %v", result) } if len(result.Spec.Ports) != 1 { Failf("got unexpected len(Spec.Ports) for new service: %v", result) } port := result.Spec.Ports[0] if port.NodePort == 0 { Failf("got unexpected Spec.Ports[0].nodePort for new service: %v", result) } By("creating service " + serviceName2 + " with conflicting NodePort") service2 := t.BuildServiceSpec() service2.Name = serviceName2 service2.Spec.Type = api.ServiceTypeNodePort service2.Spec.Ports[0].NodePort = port.NodePort result2, err := t.CreateService(service2) if err == nil { Failf("Created service with conflicting NodePort: %v", result2) } expectedErr := fmt.Sprintf("Service \"%s\" is invalid: spec.ports[0].nodePort: invalid value '%d', Details: provided port is already allocated", serviceName2, port.NodePort) Expect(fmt.Sprintf("%v", err)).To(Equal(expectedErr)) By("deleting service " + serviceName1 + " to release NodePort") err = t.DeleteService(serviceName1) Expect(err).NotTo(HaveOccurred()) By("creating service " + serviceName2 + " with no-longer-conflicting NodePort") _, err = t.CreateService(service2) Expect(err).NotTo(HaveOccurred()) }) It("should check NodePort out-of-range", func() { serviceName := "nodeport-range-test" ns := f.Namespace.Name t := NewWebserverTest(c, ns, serviceName) defer func() { defer GinkgoRecover() errs := t.Cleanup() if len(errs) != 0 { Failf("errors in cleanup: %v", errs) } }() service := t.BuildServiceSpec() service.Spec.Type = api.ServiceTypeNodePort By("creating service " + serviceName + " with type NodePort in namespace " + ns) service, err := t.CreateService(service) Expect(err).NotTo(HaveOccurred()) if service.Spec.Type != api.ServiceTypeNodePort { Failf("got unexpected Spec.Type for new service: %v", service) } if len(service.Spec.Ports) != 1 { Failf("got unexpected len(Spec.Ports) for new service: %v", service) } port := service.Spec.Ports[0] if port.NodePort == 0 { Failf("got unexpected Spec.Ports[0].nodePort for new service: %v", service) } if !ServiceNodePortRange.Contains(port.NodePort) { Failf("got unexpected (out-of-range) port for new service: %v", service) } outOfRangeNodePort := 0 for { outOfRangeNodePort = 1 + rand.Intn(65535) if !ServiceNodePortRange.Contains(outOfRangeNodePort) { break } } By(fmt.Sprintf("changing service "+serviceName+" to out-of-range NodePort %d", outOfRangeNodePort)) result, err := updateService(c, ns, serviceName, func(s *api.Service) { s.Spec.Ports[0].NodePort = outOfRangeNodePort }) if err == nil { Failf("failed to prevent update of service with out-of-range NodePort: %v", result) } expectedErr := fmt.Sprintf("Service \"%s\" is invalid: spec.ports[0].nodePort: invalid value '%d', Details: provided port is not in the valid range", serviceName, outOfRangeNodePort) Expect(fmt.Sprintf("%v", err)).To(Equal(expectedErr)) By("deleting original service " + serviceName) err = t.DeleteService(serviceName) Expect(err).NotTo(HaveOccurred()) By(fmt.Sprintf("creating service "+serviceName+" with out-of-range NodePort %d", outOfRangeNodePort)) service = t.BuildServiceSpec() service.Spec.Type = api.ServiceTypeNodePort service.Spec.Ports[0].NodePort = outOfRangeNodePort service, err = t.CreateService(service) if err == nil { Failf("failed to prevent create of service with out-of-range NodePort (%d): %v", outOfRangeNodePort, service) } Expect(fmt.Sprintf("%v", err)).To(Equal(expectedErr)) }) It("should release NodePorts on delete", func() { serviceName := "nodeport-reuse" ns := f.Namespace.Name t := NewWebserverTest(c, ns, serviceName) defer func() { defer GinkgoRecover() errs := t.Cleanup() if len(errs) != 0 { Failf("errors in cleanup: %v", errs) } }() service := t.BuildServiceSpec() service.Spec.Type = api.ServiceTypeNodePort By("creating service " + serviceName + " with type NodePort in namespace " + ns) service, err := t.CreateService(service) Expect(err).NotTo(HaveOccurred()) if service.Spec.Type != api.ServiceTypeNodePort { Failf("got unexpected Spec.Type for new service: %v", service) } if len(service.Spec.Ports) != 1 { Failf("got unexpected len(Spec.Ports) for new service: %v", service) } port := service.Spec.Ports[0] if port.NodePort == 0 { Failf("got unexpected Spec.Ports[0].nodePort for new service: %v", service) } if !ServiceNodePortRange.Contains(port.NodePort) { Failf("got unexpected (out-of-range) port for new service: %v", service) } nodePort := port.NodePort By("deleting original service " + serviceName) err = t.DeleteService(serviceName) Expect(err).NotTo(HaveOccurred()) // this test uses NodeSSHHosts that does not work if a Node only reports LegacyHostIP if providerIs(providersWithSSH...) { hosts, err := NodeSSHHosts(c) if err != nil { Expect(err).NotTo(HaveOccurred()) } cmd := fmt.Sprintf(`test -n "$(ss -ant46 'sport = :%d' | tail -n +2 | grep LISTEN)"`, nodePort) _, _, code, err := SSH(cmd, hosts[0], testContext.Provider) if code == 0 { Failf("expected node port (%d) to not be in use", nodePort) } } By(fmt.Sprintf("creating service "+serviceName+" with same NodePort %d", nodePort)) service = t.BuildServiceSpec() service.Spec.Type = api.ServiceTypeNodePort service.Spec.Ports[0].NodePort = nodePort service, err = t.CreateService(service) Expect(err).NotTo(HaveOccurred()) }) // This test hits several load-balancer cases because LB turnup is slow. It("should serve identically named services in different namespaces on different load-balancers", func() { // requires ExternalLoadBalancer SkipUnlessProviderIs("gce", "gke", "aws") ns1 := f.Namespace.Name By("Building a second namespace api object") namespacePtr, err := createTestingNS("services", c) Expect(err).NotTo(HaveOccurred()) ns2 := namespacePtr.Name extraNamespaces = append(extraNamespaces, ns2) serviceName := "test-svc" servicePort := 9376 By("creating service " + serviceName + " with load balancer in namespace " + ns1) t1 := NewWebserverTest(c, ns1, serviceName) svc1 := t1.BuildServiceSpec() svc1.Spec.Type = api.ServiceTypeLoadBalancer svc1.Spec.Ports[0].Port = servicePort svc1.Spec.Ports[0].TargetPort = util.NewIntOrStringFromInt(80) _, err = t1.CreateService(svc1) Expect(err).NotTo(HaveOccurred()) By("creating pod to be part of service " + serviceName + " in namespace " + ns1) t1.CreateWebserverRC(1) loadBalancerIP := "" if providerIs("gce", "gke") { By("creating a static IP") rand.Seed(time.Now().UTC().UnixNano()) staticIPName := fmt.Sprintf("e2e-external-lb-test-%d", rand.Intn(65535)) loadBalancerIP, err = createGCEStaticIP(staticIPName) Expect(err).NotTo(HaveOccurred()) defer func() { // Release GCE static IP - this is not kube-managed and will not be automatically released. deleteGCEStaticIP(staticIPName) }() } By("creating service " + serviceName + " with load balancer in namespace " + ns2) t2 := NewWebserverTest(c, ns2, serviceName) svc2 := t2.BuildServiceSpec() svc2.Spec.Type = api.ServiceTypeLoadBalancer svc2.Spec.Ports[0].Port = servicePort svc2.Spec.Ports[0].TargetPort = util.NewIntOrStringFromInt(80) svc2.Spec.LoadBalancerIP = loadBalancerIP _, err = t2.CreateService(svc2) Expect(err).NotTo(HaveOccurred()) By("creating pod to be part of service " + serviceName + " in namespace " + ns2) t2.CreateWebserverRC(2) ingressPoints := []string{} svcs := []*api.Service{svc1, svc2} for _, svc := range svcs { namespace := svc.Namespace lbip := svc.Spec.LoadBalancerIP // Wait for the load balancer to be created asynchronously, which is // currently indicated by ingress point(s) being added to the status. result, err := waitForLoadBalancerIngress(c, serviceName, namespace) Expect(err).NotTo(HaveOccurred()) if len(result.Status.LoadBalancer.Ingress) != 1 { Failf("got unexpected number (%v) of ingress points for externally load balanced service: %v", result.Status.LoadBalancer.Ingress, result) } ingress := result.Status.LoadBalancer.Ingress[0] if len(result.Spec.Ports) != 1 { Failf("got unexpected len(Spec.Ports) for LoadBalancer service: %v", result) } if lbip != "" { Expect(ingress.IP).To(Equal(lbip)) } port := result.Spec.Ports[0] if port.NodePort == 0 { Failf("got unexpected Spec.Ports[0].nodePort for LoadBalancer service: %v", result) } if !ServiceNodePortRange.Contains(port.NodePort) { Failf("got unexpected (out-of-range) port for LoadBalancer service: %v", result) } ing := result.Status.LoadBalancer.Ingress[0].IP if ing == "" { ing = result.Status.LoadBalancer.Ingress[0].Hostname } ingressPoints = append(ingressPoints, ing) // Save 'em to check uniqueness By("hitting the pod through the service's NodePort") testReachable(pickNodeIP(c), port.NodePort) By("hitting the pod through the service's external load balancer") testLoadBalancerReachable(ingress, servicePort) } validateUniqueOrFail(ingressPoints) }) }) // updateService fetches a service, calls the update function on it, // and then attempts to send the updated service. It retries up to 2 // times in the face of timeouts and conflicts. func updateService(c *client.Client, namespace, serviceName string, update func(*api.Service)) (*api.Service, error) { var service *api.Service var err error for i := 0; i < 3; i++ { service, err = c.Services(namespace).Get(serviceName) if err != nil { return service, err } update(service) service, err = c.Services(namespace).Update(service) if !errors.IsConflict(err) && !errors.IsServerTimeout(err) { return service, err } } return service, err } func waitForLoadBalancerIngress(c *client.Client, serviceName, namespace string) (*api.Service, error) { // TODO: once support ticket 21807001 is resolved, reduce this timeout back to something reasonable const timeout = 20 * time.Minute var service *api.Service By(fmt.Sprintf("waiting up to %v for service %s in namespace %s to have a LoadBalancer ingress point", timeout, serviceName, namespace)) i := 1 for start := time.Now(); time.Since(start) < timeout; time.Sleep(3 * time.Second) { service, err := c.Services(namespace).Get(serviceName) if err != nil { Logf("Get service failed, ignoring for 5s: %v", err) continue } if len(service.Status.LoadBalancer.Ingress) > 0 { return service, nil } if i%5 == 0 { Logf("Waiting for service %s in namespace %s to have a LoadBalancer ingress point (%v)", serviceName, namespace, time.Since(start)) } i++ } return service, fmt.Errorf("service %s in namespace %s doesn't have a LoadBalancer ingress point after %.2f seconds", serviceName, namespace, timeout.Seconds()) } func waitForLoadBalancerDestroy(c *client.Client, serviceName, namespace string) (*api.Service, error) { // TODO: once support ticket 21807001 is resolved, reduce this timeout back to something reasonable // TODO: this should actually test that the LB was released at the cloud provider const timeout = 10 * time.Minute var service *api.Service By(fmt.Sprintf("waiting up to %v for service %s in namespace %s to have no LoadBalancer ingress points", timeout, serviceName, namespace)) for start := time.Now(); time.Since(start) < timeout; time.Sleep(5 * time.Second) { service, err := c.Services(namespace).Get(serviceName) if err != nil { Logf("Get service failed, ignoring for 5s: %v", err) continue } if len(service.Status.LoadBalancer.Ingress) == 0 { return service, nil } Logf("Waiting for service %s in namespace %s to have no LoadBalancer ingress points (%v)", serviceName, namespace, time.Since(start)) } return service, fmt.Errorf("service %s in namespace %s still has LoadBalancer ingress points after %.2f seconds", serviceName, namespace, timeout.Seconds()) } func validateUniqueOrFail(s []string) { By(fmt.Sprintf("validating unique: %v", s)) sort.Strings(s) var prev string for i, elem := range s { if i > 0 && elem == prev { Fail("duplicate found: " + elem) } prev = elem } } func getContainerPortsByPodUID(endpoints *api.Endpoints) PortsByPodUID { m := PortsByPodUID{} for _, ss := range endpoints.Subsets { for _, port := range ss.Ports { for _, addr := range ss.Addresses { containerPort := port.Port hostPort := port.Port // use endpoint annotations to recover the container port in a Mesos setup // compare contrib/mesos/pkg/service/endpoints_controller.syncService key := fmt.Sprintf("k8s.mesosphere.io/containerPort_%s_%s_%d", port.Protocol, addr.IP, hostPort) mesosContainerPortString := endpoints.Annotations[key] if mesosContainerPortString != "" { var err error containerPort, err = strconv.Atoi(mesosContainerPortString) if err != nil { continue } Logf("Mapped mesos host port %d to container port %d via annotation %s=%s", hostPort, containerPort, key, mesosContainerPortString) } // Logf("Found pod %v, host port %d and container port %d", addr.TargetRef.UID, hostPort, containerPort) if _, ok := m[addr.TargetRef.UID]; !ok { m[addr.TargetRef.UID] = make([]int, 0) } m[addr.TargetRef.UID] = append(m[addr.TargetRef.UID], containerPort) } } } return m } type PortsByPodName map[string][]int type PortsByPodUID map[types.UID][]int func translatePodNameToUIDOrFail(c *client.Client, ns string, expectedEndpoints PortsByPodName) PortsByPodUID { portsByUID := make(PortsByPodUID) for name, portList := range expectedEndpoints { pod, err := c.Pods(ns).Get(name) if err != nil { Failf("failed to get pod %s, that's pretty weird. validation failed: %s", name, err) } portsByUID[pod.ObjectMeta.UID] = portList } // Logf("successfully translated pod names to UIDs: %v -> %v on namespace %s", expectedEndpoints, portsByUID, ns) return portsByUID } func validatePortsOrFail(endpoints PortsByPodUID, expectedEndpoints PortsByPodUID) { if len(endpoints) != len(expectedEndpoints) { // should not happen because we check this condition before Failf("invalid number of endpoints got %v, expected %v", endpoints, expectedEndpoints) } for podUID := range expectedEndpoints { if _, ok := endpoints[podUID]; !ok { Failf("endpoint %v not found", podUID) } if len(endpoints[podUID]) != len(expectedEndpoints[podUID]) { Failf("invalid list of ports for uid %v. Got %v, expected %v", podUID, endpoints[podUID], expectedEndpoints[podUID]) } sort.Ints(endpoints[podUID]) sort.Ints(expectedEndpoints[podUID]) for index := range endpoints[podUID] { if endpoints[podUID][index] != expectedEndpoints[podUID][index] { Failf("invalid list of ports for uid %v. Got %v, expected %v", podUID, endpoints[podUID], expectedEndpoints[podUID]) } } } } func validateEndpointsOrFail(c *client.Client, namespace, serviceName string, expectedEndpoints PortsByPodName) { By(fmt.Sprintf("waiting up to %v for service %s in namespace %s to expose endpoints %v", serviceStartTimeout, serviceName, namespace, expectedEndpoints)) i := 1 for start := time.Now(); time.Since(start) < serviceStartTimeout; time.Sleep(1 * time.Second) { endpoints, err := c.Endpoints(namespace).Get(serviceName) if err != nil { Logf("Get endpoints failed (%v elapsed, ignoring for 5s): %v", time.Since(start), err) continue } // Logf("Found endpoints %v", endpoints) portsByPodUID := getContainerPortsByPodUID(endpoints) // Logf("Found port by pod UID %v", portsByPodUID) expectedPortsByPodUID := translatePodNameToUIDOrFail(c, namespace, expectedEndpoints) if len(portsByPodUID) == len(expectedEndpoints) { validatePortsOrFail(portsByPodUID, expectedPortsByPodUID) Logf("successfully validated that service %s in namespace %s exposes endpoints %v (%v elapsed)", serviceName, namespace, expectedEndpoints, time.Since(start)) return } if i%5 == 0 { Logf("Unexpected endpoints: found %v, expected %v (%v elapsed, will retry)", portsByPodUID, expectedEndpoints, time.Since(start)) } i++ } if pods, err := c.Pods(api.NamespaceAll).List(labels.Everything(), fields.Everything()); err == nil { for _, pod := range pods.Items { Logf("Pod %s\t%s\t%s\t%s", pod.Namespace, pod.Name, pod.Spec.NodeName, pod.DeletionTimestamp) } } else { Logf("Can't list pod debug info: %v", err) } Failf("Timed out waiting for service %s in namespace %s to expose endpoints %v (%v elapsed)", serviceName, namespace, expectedEndpoints, serviceStartTimeout) } func createPodOrFail(c *client.Client, ns, name string, labels map[string]string, containerPorts []api.ContainerPort) { By(fmt.Sprintf("creating pod %s in namespace %s", name, ns)) pod := &api.Pod{ ObjectMeta: api.ObjectMeta{ Name: name, Labels: labels, }, Spec: api.PodSpec{ Containers: []api.Container{ { Name: "test", Image: "beta.gcr.io/google_containers/pause:2.0", Ports: containerPorts, }, }, }, } _, err := c.Pods(ns).Create(pod) Expect(err).NotTo(HaveOccurred()) } func deletePodOrFail(c *client.Client, ns, name string) { By(fmt.Sprintf("deleting pod %s in namespace %s", name, ns)) err := c.Pods(ns).Delete(name, nil) Expect(err).NotTo(HaveOccurred()) } func collectAddresses(nodes *api.NodeList, addressType api.NodeAddressType) []string { ips := []string{} for i := range nodes.Items { item := &nodes.Items[i] for j := range item.Status.Addresses { nodeAddress := &item.Status.Addresses[j] if nodeAddress.Type == addressType { ips = append(ips, nodeAddress.Address) } } } return ips } func getNodePublicIps(c *client.Client) ([]string, error) { nodes, err := c.Nodes().List(labels.Everything(), fields.Everything()) if err != nil { return nil, err } ips := collectAddresses(nodes, api.NodeExternalIP) if len(ips) == 0 { ips = collectAddresses(nodes, api.NodeLegacyHostIP) } return ips, nil } func pickNodeIP(c *client.Client) string { publicIps, err := getNodePublicIps(c) Expect(err).NotTo(HaveOccurred()) if len(publicIps) == 0 { Failf("got unexpected number (%d) of public IPs", len(publicIps)) } ip := publicIps[0] return ip } func testLoadBalancerReachable(ingress api.LoadBalancerIngress, port int) bool { return testLoadBalancerReachableInTime(ingress, port, podStartTimeout) } func testLoadBalancerReachableInTime(ingress api.LoadBalancerIngress, port int, timeout time.Duration) bool { ip := ingress.IP if ip == "" { ip = ingress.Hostname } return testReachableInTime(ip, port, timeout) } func testLoadBalancerNotReachable(ingress api.LoadBalancerIngress, port int) { ip := ingress.IP if ip == "" { ip = ingress.Hostname } testNotReachable(ip, port) } func testReachable(ip string, port int) bool { return testReachableInTime(ip, port, podStartTimeout) } func testReachableInTime(ip string, port int, timeout time.Duration) bool { url := fmt.Sprintf("http://%s:%d", ip, port) if ip == "" { Failf("Got empty IP for reachability check (%s)", url) return false } if port == 0 { Failf("Got port==0 for reachability check (%s)", url) return false } desc := fmt.Sprintf("the url %s to be reachable", url) By(fmt.Sprintf("Waiting up to %v for %s", timeout, desc)) start := time.Now() err := wait.PollImmediate(poll, timeout, func() (bool, error) { resp, err := httpGetNoConnectionPool(url) if err != nil { Logf("Got error waiting for reachability of %s: %v (%v)", url, err, time.Since(start)) return false, nil } defer resp.Body.Close() body, err := ioutil.ReadAll(resp.Body) if err != nil { Logf("Got error reading response from %s: %v", url, err) return false, nil } if resp.StatusCode != 200 { return false, fmt.Errorf("received non-success return status %q trying to access %s; got body: %s", resp.Status, url, string(body)) } if !strings.Contains(string(body), "test-webserver") { return false, fmt.Errorf("received response body without expected substring 'test-webserver': %s", string(body)) } Logf("Successfully reached %v", url) return true, nil }) if err != nil { Expect(err).NotTo(HaveOccurred(), "Error waiting for %s", desc) return false } return true } func testNotReachable(ip string, port int) { url := fmt.Sprintf("http://%s:%d", ip, port) if ip == "" { Failf("Got empty IP for non-reachability check (%s)", url) } if port == 0 { Failf("Got port==0 for non-reachability check (%s)", url) } desc := fmt.Sprintf("the url %s to be *not* reachable", url) By(fmt.Sprintf("Waiting up to %v for %s", podStartTimeout, desc)) err := wait.PollImmediate(poll, podStartTimeout, func() (bool, error) { resp, err := httpGetNoConnectionPool(url) if err != nil { Logf("Successfully waited for %s", desc) return true, nil } defer resp.Body.Close() body, err := ioutil.ReadAll(resp.Body) if err != nil { Logf("Expecting %s to be unreachable but was reachable and got an error reading response: %v", url, err) return false, nil } Logf("Able to reach service %s when should no longer have been reachable, status: %q and body: %s", url, resp.Status, string(body)) return false, nil }) Expect(err).NotTo(HaveOccurred(), "Error waiting for %s", desc) } // Creates a replication controller that serves its hostname and a service on top of it. func startServeHostnameService(c *client.Client, ns, name string, port, replicas int) ([]string, string, error) { podNames := make([]string, replicas) By("creating service " + name + " in namespace " + ns) _, err := c.Services(ns).Create(&api.Service{ ObjectMeta: api.ObjectMeta{ Name: name, }, Spec: api.ServiceSpec{ Ports: []api.ServicePort{{ Port: port, TargetPort: util.NewIntOrStringFromInt(9376), Protocol: "TCP", }}, Selector: map[string]string{ "name": name, }, }, }) if err != nil { return podNames, "", err } var createdPods []*api.Pod maxContainerFailures := 0 config := RCConfig{ Client: c, Image: "gcr.io/google_containers/serve_hostname:1.1", Name: name, Namespace: ns, PollInterval: 3 * time.Second, Timeout: podReadyBeforeTimeout, Replicas: replicas, CreatedPods: &createdPods, MaxContainerFailures: &maxContainerFailures, } err = RunRC(config) if err != nil { return podNames, "", err } if len(createdPods) != replicas { return podNames, "", fmt.Errorf("Incorrect number of running pods: %v", len(createdPods)) } for i := range createdPods { podNames[i] = createdPods[i].ObjectMeta.Name } sort.StringSlice(podNames).Sort() service, err := c.Services(ns).Get(name) if err != nil { return podNames, "", err } if service.Spec.ClusterIP == "" { return podNames, "", fmt.Errorf("Service IP is blank for %v", name) } serviceIP := service.Spec.ClusterIP return podNames, serviceIP, nil } func stopServeHostnameService(c *client.Client, ns, name string) error { if err := DeleteRC(c, ns, name); err != nil { return err } if err := c.Services(ns).Delete(name); err != nil { return err } return nil } func verifyServeHostnameServiceUp(c *client.Client, host string, expectedPods []string, serviceIP string, servicePort int) error { command := fmt.Sprintf( "for i in $(seq 1 %d); do wget -q -T 1 -O - http://%s:%d || true; echo; done", 3*len(expectedPods), serviceIP, servicePort) commands := []string{ // verify service from node fmt.Sprintf(`set -e; %s | sort -n | uniq`, command), // verify service from container fmt.Sprintf(`set -e; sudo docker pull gcr.io/google_containers/busybox > /dev/null; sudo docker run gcr.io/google_containers/busybox sh -c '%v' | sort -n | uniq`, command), } By(fmt.Sprintf("verifying service has %d reachable backends", len(expectedPods))) for _, cmd := range commands { passed := false for start := time.Now(); time.Since(start) < time.Minute; time.Sleep(5) { stdout, _, code, err := SSH(cmd, host, testContext.Provider) if err != nil || code != 0 { Logf("error while SSH-ing to node: %v (code %v)", err, code) } pods := strings.Split(strings.TrimSpace(stdout), "\n") sort.StringSlice(pods).Sort() if api.Semantic.DeepEqual(pods, expectedPods) { passed = true break } Logf("Waiting for expected pods for %s: %v, got: %v", serviceIP, expectedPods, pods) } if !passed { return fmt.Errorf("service verification failed for:\n %s", cmd) } } return nil } func verifyServeHostnameServiceDown(c *client.Client, host string, serviceIP string, servicePort int) error { command := fmt.Sprintf( "curl -s --connect-timeout 2 http://%s:%d && exit 99", serviceIP, servicePort) for start := time.Now(); time.Since(start) < time.Minute; time.Sleep(5 * time.Second) { _, _, code, err := SSH(command, host, testContext.Provider) if err != nil { Logf("error while SSH-ing to node: %v", err) } if code != 99 { return nil } Logf("service still alive - still waiting") } return fmt.Errorf("waiting for service to be down timed out") } // Does an HTTP GET, but does not reuse TCP connections // This masks problems where the iptables rule has changed, but we don't see it // This is intended for relatively quick requests (status checks), so we set a short (5 seconds) timeout func httpGetNoConnectionPool(url string) (*http.Response, error) { tr := &http.Transport{ DisableKeepAlives: true, } client := &http.Client{ Transport: tr, Timeout: 5 * time.Second, } return client.Get(url) } // Simple helper class to avoid too much boilerplate in tests type WebserverTest struct { ServiceName string Namespace string Client *client.Client TestId string Labels map[string]string rcs map[string]bool services map[string]bool name string image string } func NewWebserverTest(client *client.Client, namespace string, serviceName string) *WebserverTest { t := &WebserverTest{} t.Client = client t.Namespace = namespace t.ServiceName = serviceName t.TestId = t.ServiceName + "-" + string(util.NewUUID()) t.Labels = map[string]string{ "testid": t.TestId, } t.rcs = make(map[string]bool) t.services = make(map[string]bool) t.name = "webserver" t.image = "gcr.io/google_containers/test-webserver" return t } // Build default config for a service (which can then be changed) func (t *WebserverTest) BuildServiceSpec() *api.Service { service := &api.Service{ ObjectMeta: api.ObjectMeta{ Name: t.ServiceName, Namespace: t.Namespace, }, Spec: api.ServiceSpec{ Selector: t.Labels, Ports: []api.ServicePort{{ Port: 80, TargetPort: util.NewIntOrStringFromInt(80), }}, }, } return service } // CreateWebserverRC creates rc-backed pods with the well-known webserver // configuration and records it for cleanup. func (t *WebserverTest) CreateWebserverRC(replicas int) *api.ReplicationController { rcSpec := rcByNamePort(t.name, replicas, t.image, 80, t.Labels) rcAct, err := t.createRC(rcSpec) if err != nil { Failf("Failed to create rc %s: %v", rcSpec.Name, err) } if err := verifyPods(t.Client, t.Namespace, t.name, false, replicas); err != nil { Failf("Failed to create %d pods with name %s: %v", replicas, t.name, err) } return rcAct } // createRC creates a replication controller and records it for cleanup. func (t *WebserverTest) createRC(rc *api.ReplicationController) (*api.ReplicationController, error) { rc, err := t.Client.ReplicationControllers(t.Namespace).Create(rc) if err == nil { t.rcs[rc.Name] = true } return rc, err } // Create a service, and record it for cleanup func (t *WebserverTest) CreateService(service *api.Service) (*api.Service, error) { result, err := t.Client.Services(t.Namespace).Create(service) if err == nil { t.services[service.Name] = true } return result, err } // Delete a service, and remove it from the cleanup list func (t *WebserverTest) DeleteService(serviceName string) error { err := t.Client.Services(t.Namespace).Delete(serviceName) if err == nil { delete(t.services, serviceName) } return err } func (t *WebserverTest) Cleanup() []error { var errs []error for rcName := range t.rcs { By("stopping RC " + rcName + " in namespace " + t.Namespace) // First, resize the RC to 0. old, err := t.Client.ReplicationControllers(t.Namespace).Get(rcName) if err != nil { errs = append(errs, err) } old.Spec.Replicas = 0 if _, err := t.Client.ReplicationControllers(t.Namespace).Update(old); err != nil { errs = append(errs, err) } // TODO(mikedanese): Wait. // Then, delete the RC altogether. if err := t.Client.ReplicationControllers(t.Namespace).Delete(rcName); err != nil { errs = append(errs, err) } } for serviceName := range t.services { By("deleting service " + serviceName + " in namespace " + t.Namespace) err := t.Client.Services(t.Namespace).Delete(serviceName) if err != nil { errs = append(errs, err) } } return errs }