2017-02-01 00:45:59 +00:00
|
|
|
/*
|
|
|
|
Copyright 2015 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package e2e
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"path"
|
|
|
|
"sync"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/golang/glog"
|
|
|
|
"github.com/onsi/ginkgo"
|
|
|
|
"github.com/onsi/ginkgo/config"
|
|
|
|
"github.com/onsi/ginkgo/reporters"
|
|
|
|
"github.com/onsi/gomega"
|
|
|
|
|
2017-02-03 13:41:32 +00:00
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
2017-02-01 00:45:59 +00:00
|
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
|
|
runtimeutils "k8s.io/apimachinery/pkg/util/runtime"
|
|
|
|
utilyaml "k8s.io/apimachinery/pkg/util/yaml"
|
|
|
|
federationapi "k8s.io/kubernetes/federation/apis/federation/v1beta1"
|
|
|
|
"k8s.io/kubernetes/pkg/api"
|
|
|
|
"k8s.io/kubernetes/pkg/api/v1"
|
|
|
|
"k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
|
|
|
gcecloud "k8s.io/kubernetes/pkg/cloudprovider/providers/gce"
|
|
|
|
"k8s.io/kubernetes/pkg/util/logs"
|
|
|
|
commontest "k8s.io/kubernetes/test/e2e/common"
|
|
|
|
"k8s.io/kubernetes/test/e2e/framework"
|
|
|
|
"k8s.io/kubernetes/test/e2e/generated"
|
2017-02-03 13:41:32 +00:00
|
|
|
federationtest "k8s.io/kubernetes/test/e2e_federation"
|
2017-02-01 00:45:59 +00:00
|
|
|
testutils "k8s.io/kubernetes/test/utils"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
// imagePrePullingTimeout is the time we wait for the e2e-image-puller
|
|
|
|
// static pods to pull the list of seeded images. If they don't pull
|
|
|
|
// images within this time we simply log their output and carry on
|
|
|
|
// with the tests.
|
|
|
|
imagePrePullingTimeout = 5 * time.Minute
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
cloudConfig = &framework.TestContext.CloudConfig
|
|
|
|
)
|
|
|
|
|
|
|
|
// setupProviderConfig validates and sets up cloudConfig based on framework.TestContext.Provider.
|
|
|
|
func setupProviderConfig() error {
|
|
|
|
switch framework.TestContext.Provider {
|
|
|
|
case "":
|
|
|
|
glog.Info("The --provider flag is not set. Treating as a conformance test. Some tests may not be run.")
|
|
|
|
|
|
|
|
case "gce", "gke":
|
|
|
|
var err error
|
|
|
|
framework.Logf("Fetching cloud provider for %q\r\n", framework.TestContext.Provider)
|
|
|
|
zone := framework.TestContext.CloudConfig.Zone
|
|
|
|
region, err := gcecloud.GetGCERegion(zone)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("error parsing GCE/GKE region from zone %q: %v", zone, err)
|
|
|
|
}
|
|
|
|
managedZones := []string{zone} // Only single-zone for now
|
|
|
|
cloudConfig.Provider, err = gcecloud.CreateGCECloud(framework.TestContext.CloudConfig.ProjectID, region, zone, managedZones, "" /* networkUrl */, nil /* nodeTags */, "" /* nodeInstancePerfix */, nil /* tokenSource */, false /* useMetadataServer */)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error building GCE/GKE provider: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
case "aws":
|
|
|
|
if cloudConfig.Zone == "" {
|
|
|
|
return fmt.Errorf("gce-zone must be specified for AWS")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// There are certain operations we only want to run once per overall test invocation
|
|
|
|
// (such as deleting old namespaces, or verifying that all system pods are running.
|
|
|
|
// Because of the way Ginkgo runs tests in parallel, we must use SynchronizedBeforeSuite
|
|
|
|
// to ensure that these operations only run on the first parallel Ginkgo node.
|
|
|
|
//
|
|
|
|
// This function takes two parameters: one function which runs on only the first Ginkgo node,
|
|
|
|
// returning an opaque byte array, and then a second function which runs on all Ginkgo nodes,
|
|
|
|
// accepting the byte array.
|
|
|
|
var _ = ginkgo.SynchronizedBeforeSuite(func() []byte {
|
|
|
|
// Run only on Ginkgo node 1
|
|
|
|
|
|
|
|
if err := setupProviderConfig(); err != nil {
|
|
|
|
framework.Failf("Failed to setup provider config: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
c, err := framework.LoadClientset()
|
|
|
|
if err != nil {
|
|
|
|
glog.Fatal("Error loading client: ", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete any namespaces except default and kube-system. This ensures no
|
|
|
|
// lingering resources are left over from a previous test run.
|
|
|
|
if framework.TestContext.CleanStart {
|
2017-02-03 13:41:32 +00:00
|
|
|
deleted, err := framework.DeleteNamespaces(c, nil /* deleteFilter */, []string{metav1.NamespaceSystem, metav1.NamespaceDefault, federationapi.FederationNamespaceSystem})
|
2017-02-01 00:45:59 +00:00
|
|
|
if err != nil {
|
|
|
|
framework.Failf("Error deleting orphaned namespaces: %v", err)
|
|
|
|
}
|
|
|
|
glog.Infof("Waiting for deletion of the following namespaces: %v", deleted)
|
|
|
|
if err := framework.WaitForNamespacesDeleted(c, deleted, framework.NamespaceCleanupTimeout); err != nil {
|
|
|
|
framework.Failf("Failed to delete orphaned namespaces %v: %v", deleted, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// In large clusters we may get to this point but still have a bunch
|
|
|
|
// of nodes without Routes created. Since this would make a node
|
|
|
|
// unschedulable, we need to wait until all of them are schedulable.
|
|
|
|
framework.ExpectNoError(framework.WaitForAllNodesSchedulable(c, framework.TestContext.NodeSchedulableTimeout))
|
|
|
|
|
|
|
|
// Ensure all pods are running and ready before starting tests (otherwise,
|
|
|
|
// cluster infrastructure pods that are being pulled or started can block
|
|
|
|
// test pods from running, and tests that ensure all pods are running and
|
|
|
|
// ready will fail).
|
|
|
|
podStartupTimeout := framework.TestContext.SystemPodsStartupTimeout
|
2017-02-03 13:41:32 +00:00
|
|
|
if err := framework.WaitForPodsRunningReady(c, metav1.NamespaceSystem, int32(framework.TestContext.MinStartupPods), podStartupTimeout, framework.ImagePullerLabels, true); err != nil {
|
|
|
|
framework.DumpAllNamespaceInfo(c, metav1.NamespaceSystem)
|
|
|
|
framework.LogFailedContainers(c, metav1.NamespaceSystem, framework.Logf)
|
|
|
|
runKubernetesServiceTestContainer(c, metav1.NamespaceDefault)
|
2017-02-01 00:45:59 +00:00
|
|
|
framework.Failf("Error waiting for all pods to be running and ready: %v", err)
|
|
|
|
}
|
|
|
|
|
2017-02-03 13:41:32 +00:00
|
|
|
if err := framework.WaitForPodsSuccess(c, metav1.NamespaceSystem, framework.ImagePullerLabels, imagePrePullingTimeout); err != nil {
|
2017-02-01 00:45:59 +00:00
|
|
|
// There is no guarantee that the image pulling will succeed in 3 minutes
|
|
|
|
// and we don't even run the image puller on all platforms (including GKE).
|
|
|
|
// We wait for it so we get an indication of failures in the logs, and to
|
|
|
|
// maximize benefit of image pre-pulling.
|
|
|
|
framework.Logf("WARNING: Image pulling pods failed to enter success in %v: %v", imagePrePullingTimeout, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Dump the output of the nethealth containers only once per run
|
|
|
|
if framework.TestContext.DumpLogsOnFailure {
|
|
|
|
framework.Logf("Dumping network health container logs from all nodes")
|
2017-02-03 13:41:32 +00:00
|
|
|
framework.LogContainersInPodsWithLabels(c, metav1.NamespaceSystem, framework.ImagePullerLabels, "nethealth", framework.Logf)
|
2017-02-01 00:45:59 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Reference common test to make the import valid.
|
|
|
|
commontest.CurrentSuite = commontest.E2E
|
|
|
|
|
2017-02-03 13:41:32 +00:00
|
|
|
// Reference federation test to make the import valid.
|
|
|
|
federationtest.FederationSuite = commontest.FederationE2E
|
|
|
|
|
2017-02-01 00:45:59 +00:00
|
|
|
return nil
|
|
|
|
|
|
|
|
}, func(data []byte) {
|
|
|
|
// Run on all Ginkgo nodes
|
|
|
|
|
|
|
|
if cloudConfig.Provider == nil {
|
|
|
|
if err := setupProviderConfig(); err != nil {
|
|
|
|
framework.Failf("Failed to setup provider config: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
type CleanupActionHandle *int
|
|
|
|
|
|
|
|
var cleanupActionsLock sync.Mutex
|
|
|
|
var cleanupActions = map[CleanupActionHandle]func(){}
|
|
|
|
|
|
|
|
// AddCleanupAction installs a function that will be called in the event of the
|
|
|
|
// whole test being terminated. This allows arbitrary pieces of the overall
|
|
|
|
// test to hook into SynchronizedAfterSuite().
|
|
|
|
func AddCleanupAction(fn func()) CleanupActionHandle {
|
|
|
|
p := CleanupActionHandle(new(int))
|
|
|
|
cleanupActionsLock.Lock()
|
|
|
|
defer cleanupActionsLock.Unlock()
|
|
|
|
cleanupActions[p] = fn
|
|
|
|
return p
|
|
|
|
}
|
|
|
|
|
|
|
|
// RemoveCleanupAction removes a function that was installed by
|
|
|
|
// AddCleanupAction.
|
|
|
|
func RemoveCleanupAction(p CleanupActionHandle) {
|
|
|
|
cleanupActionsLock.Lock()
|
|
|
|
defer cleanupActionsLock.Unlock()
|
|
|
|
delete(cleanupActions, p)
|
|
|
|
}
|
|
|
|
|
|
|
|
// RunCleanupActions runs all functions installed by AddCleanupAction. It does
|
|
|
|
// not remove them (see RemoveCleanupAction) but it does run unlocked, so they
|
|
|
|
// may remove themselves.
|
|
|
|
func RunCleanupActions() {
|
|
|
|
list := []func(){}
|
|
|
|
func() {
|
|
|
|
cleanupActionsLock.Lock()
|
|
|
|
defer cleanupActionsLock.Unlock()
|
|
|
|
for _, fn := range cleanupActions {
|
|
|
|
list = append(list, fn)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
// Run unlocked.
|
|
|
|
for _, fn := range list {
|
|
|
|
fn()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Similar to SynchornizedBeforeSuite, we want to run some operations only once (such as collecting cluster logs).
|
|
|
|
// Here, the order of functions is reversed; first, the function which runs everywhere,
|
|
|
|
// and then the function that only runs on the first Ginkgo node.
|
|
|
|
var _ = ginkgo.SynchronizedAfterSuite(func() {
|
|
|
|
// Run on all Ginkgo nodes
|
|
|
|
RunCleanupActions()
|
|
|
|
}, func() {
|
|
|
|
// Run only Ginkgo on node 1
|
|
|
|
if framework.TestContext.ReportDir != "" {
|
|
|
|
framework.CoreDump(framework.TestContext.ReportDir)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// TestE2E checks configuration parameters (specified through flags) and then runs
|
|
|
|
// E2E tests using the Ginkgo runner.
|
|
|
|
// If a "report directory" is specified, one or more JUnit test reports will be
|
|
|
|
// generated in this directory, and cluster logs will also be saved.
|
|
|
|
// This function is called on each Ginkgo node in parallel mode.
|
|
|
|
func RunE2ETests(t *testing.T) {
|
|
|
|
runtimeutils.ReallyCrash = true
|
|
|
|
logs.InitLogs()
|
|
|
|
defer logs.FlushLogs()
|
|
|
|
|
|
|
|
gomega.RegisterFailHandler(ginkgo.Fail)
|
|
|
|
// Disable skipped tests unless they are explicitly requested.
|
|
|
|
if config.GinkgoConfig.FocusString == "" && config.GinkgoConfig.SkipString == "" {
|
|
|
|
config.GinkgoConfig.SkipString = `\[Flaky\]|\[Feature:.+\]`
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run tests through the Ginkgo runner with output to console + JUnit for Jenkins
|
|
|
|
var r []ginkgo.Reporter
|
|
|
|
if framework.TestContext.ReportDir != "" {
|
|
|
|
// TODO: we should probably only be trying to create this directory once
|
|
|
|
// rather than once-per-Ginkgo-node.
|
|
|
|
if err := os.MkdirAll(framework.TestContext.ReportDir, 0755); err != nil {
|
|
|
|
glog.Errorf("Failed creating report directory: %v", err)
|
|
|
|
} else {
|
|
|
|
r = append(r, reporters.NewJUnitReporter(path.Join(framework.TestContext.ReportDir, fmt.Sprintf("junit_%v%02d.xml", framework.TestContext.ReportPrefix, config.GinkgoConfig.ParallelNode))))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
glog.Infof("Starting e2e run %q on Ginkgo node %d", framework.RunId, config.GinkgoConfig.ParallelNode)
|
|
|
|
|
|
|
|
ginkgo.RunSpecsWithDefaultAndCustomReporters(t, "Kubernetes e2e suite", r)
|
|
|
|
}
|
|
|
|
|
|
|
|
func podFromManifest(filename string) (*v1.Pod, error) {
|
|
|
|
var pod v1.Pod
|
|
|
|
framework.Logf("Parsing pod from %v", filename)
|
|
|
|
data := generated.ReadOrDie(filename)
|
|
|
|
json, err := utilyaml.ToJSON(data)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := runtime.DecodeInto(api.Codecs.UniversalDecoder(), json, &pod); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return &pod, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run a test container to try and contact the Kubernetes api-server from a pod, wait for it
|
|
|
|
// to flip to Ready, log its output and delete it.
|
|
|
|
func runKubernetesServiceTestContainer(c clientset.Interface, ns string) {
|
|
|
|
path := "test/images/clusterapi-tester/pod.yaml"
|
|
|
|
p, err := podFromManifest(path)
|
|
|
|
if err != nil {
|
|
|
|
framework.Logf("Failed to parse clusterapi-tester from manifest %v: %v", path, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
p.Namespace = ns
|
|
|
|
if _, err := c.Core().Pods(ns).Create(p); err != nil {
|
|
|
|
framework.Logf("Failed to create %v: %v", p.Name, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
if err := c.Core().Pods(ns).Delete(p.Name, nil); err != nil {
|
|
|
|
framework.Logf("Failed to delete pod %v: %v", p.Name, err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
timeout := 5 * time.Minute
|
|
|
|
if err := framework.WaitForPodCondition(c, ns, p.Name, "clusterapi-tester", timeout, testutils.PodRunningReady); err != nil {
|
|
|
|
framework.Logf("Pod %v took longer than %v to enter running/ready: %v", p.Name, timeout, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
logs, err := framework.GetPodLogs(c, ns, p.Name, p.Spec.Containers[0].Name)
|
|
|
|
if err != nil {
|
|
|
|
framework.Logf("Failed to retrieve logs from %v: %v", p.Name, err)
|
|
|
|
} else {
|
|
|
|
framework.Logf("Output of clusterapi-tester:\n%v", logs)
|
|
|
|
}
|
|
|
|
}
|