mirror of https://github.com/k3s-io/k3s
175 lines
5.8 KiB
Go
175 lines
5.8 KiB
Go
/*
|
|
Copyright 2014 Google Inc. All rights reserved.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package e2e
|
|
|
|
import (
|
|
"fmt"
|
|
"math/rand"
|
|
"path/filepath"
|
|
"strconv"
|
|
"time"
|
|
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/api"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/client"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/client/clientcmd"
|
|
"github.com/GoogleCloudPlatform/kubernetes/pkg/clientauth"
|
|
. "github.com/onsi/ginkgo"
|
|
. "github.com/onsi/gomega"
|
|
)
|
|
|
|
const (
|
|
// Initial pod start can be delayed O(minutes) by slow docker pulls
|
|
// TODO: Make this 30 seconds once #4566 is resolved.
|
|
podStartTimeout = 5 * time.Minute
|
|
)
|
|
|
|
type testContextType struct {
|
|
kubeConfig string
|
|
authConfig string
|
|
certDir string
|
|
host string
|
|
repoRoot string
|
|
provider string
|
|
gceConfig GCEConfig
|
|
}
|
|
|
|
var testContext testContextType
|
|
|
|
func Logf(format string, a ...interface{}) {
|
|
fmt.Fprintf(GinkgoWriter, "INFO: "+format+"\n", a...)
|
|
}
|
|
|
|
func Failf(format string, a ...interface{}) {
|
|
Fail(fmt.Sprintf(format, a...), 1)
|
|
}
|
|
|
|
type podCondition func(pod *api.Pod) (bool, error)
|
|
|
|
func waitForPodCondition(c *client.Client, ns, podName, desc string, condition podCondition) error {
|
|
By(fmt.Sprintf("waiting up to %v for pod %s status to be %s", podStartTimeout, podName, desc))
|
|
for start := time.Now(); time.Since(start) < podStartTimeout; time.Sleep(5 * time.Second) {
|
|
pod, err := c.Pods(ns).Get(podName)
|
|
if err != nil {
|
|
Logf("Get pod failed, ignoring for 5s: %v", err)
|
|
continue
|
|
}
|
|
done, err := condition(pod)
|
|
if done {
|
|
return err
|
|
}
|
|
Logf("Waiting for pod %s status to be %q (found %q) (%.2f seconds)", podName, desc, pod.Status.Phase, time.Since(start).Seconds())
|
|
}
|
|
return fmt.Errorf("gave up waiting for pod %s to be %s after %.2f seconds", podName, desc, podStartTimeout.Seconds())
|
|
}
|
|
|
|
func waitForPodRunning(c *client.Client, podName string) error {
|
|
return waitForPodCondition(c, api.NamespaceDefault, podName, "running", func(pod *api.Pod) (bool, error) {
|
|
return (pod.Status.Phase == api.PodRunning), nil
|
|
})
|
|
}
|
|
|
|
// waitForPodNotPending returns an error if it took too long for the pod to go out of pending state.
|
|
func waitForPodNotPending(c *client.Client, ns, podName string) error {
|
|
return waitForPodCondition(c, ns, podName, "!pending", func(pod *api.Pod) (bool, error) {
|
|
if pod.Status.Phase != api.PodPending {
|
|
Logf("Saw pod %s in namespace %s out of pending state (found %q)", podName, ns, pod.Status.Phase)
|
|
return true, nil
|
|
}
|
|
return false, nil
|
|
})
|
|
}
|
|
|
|
// waitForPodSuccess returns nil if the pod reached state success, or an error if it reached failure or ran too long.
|
|
func waitForPodSuccess(c *client.Client, podName string, contName string) error {
|
|
return waitForPodCondition(c, api.NamespaceDefault, podName, "success or failure", func(pod *api.Pod) (bool, error) {
|
|
// Cannot use pod.Status.Phase == api.PodSucceeded/api.PodFailed due to #2632
|
|
ci, ok := pod.Status.Info[contName]
|
|
if !ok {
|
|
Logf("No Status.Info for container %s in pod %s yet", contName, podName)
|
|
} else {
|
|
if ci.State.Termination != nil {
|
|
if ci.State.Termination.ExitCode == 0 {
|
|
By("Saw pod success")
|
|
return true, nil
|
|
} else {
|
|
return true, fmt.Errorf("pod %s terminated with failure: %+v", podName, ci.State.Termination)
|
|
}
|
|
Logf("Waiting for pod %q status to be success or failure", podName)
|
|
} else {
|
|
Logf("Nil State.Termination for container %s in pod %s so far", contName, podName)
|
|
}
|
|
}
|
|
return false, nil
|
|
})
|
|
}
|
|
|
|
func loadConfig() (*client.Config, error) {
|
|
switch {
|
|
case testContext.kubeConfig != "":
|
|
fmt.Printf(">>> testContext.kubeConfig: %s\n", testContext.kubeConfig)
|
|
c, err := clientcmd.LoadFromFile(testContext.kubeConfig)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error loading kubeConfig: %v", err.Error())
|
|
}
|
|
return clientcmd.NewDefaultClientConfig(*c, &clientcmd.ConfigOverrides{}).ClientConfig()
|
|
case testContext.authConfig != "":
|
|
config := &client.Config{
|
|
Host: testContext.host,
|
|
}
|
|
info, err := clientauth.LoadFromFile(testContext.authConfig)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error loading authConfig: %v", err.Error())
|
|
}
|
|
// If the certificate directory is provided, set the cert paths to be there.
|
|
if testContext.certDir != "" {
|
|
Logf("Expecting certs in %v.", testContext.certDir)
|
|
info.CAFile = filepath.Join(testContext.certDir, "ca.crt")
|
|
info.CertFile = filepath.Join(testContext.certDir, "kubecfg.crt")
|
|
info.KeyFile = filepath.Join(testContext.certDir, "kubecfg.key")
|
|
}
|
|
mergedConfig, err := info.MergeWithConfig(*config)
|
|
return &mergedConfig, err
|
|
default:
|
|
return nil, fmt.Errorf("either kubeConfig or authConfig must be specified to load client config")
|
|
}
|
|
}
|
|
|
|
func loadClient() (*client.Client, error) {
|
|
config, err := loadConfig()
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error creating client: %v", err.Error())
|
|
}
|
|
c, err := client.New(config)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error creating client: %v", err.Error())
|
|
}
|
|
return c, nil
|
|
}
|
|
|
|
// TODO: Allow service names to have the same form as names
|
|
// for pods and replication controllers so we don't
|
|
// need to use such a function and can instead
|
|
// use the UUID utilty function.
|
|
func randomSuffix() string {
|
|
r := rand.New(rand.NewSource(time.Now().UnixNano()))
|
|
return strconv.Itoa(r.Int() % 10000)
|
|
}
|
|
|
|
func expectNoError(err error, explain ...interface{}) {
|
|
ExpectWithOffset(1, err).NotTo(HaveOccurred(), explain...)
|
|
}
|