52baf68d50
Signed-off-by: Michał Żyłowski <michal.zylowski@intel.com>
492 lines
21 KiB
Go
492 lines
21 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package e2e_federation
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
"os"
|
|
"reflect"
|
|
"strconv"
|
|
"strings"
|
|
"time"
|
|
|
|
"k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
fedclientset "k8s.io/kubernetes/federation/client/clientset_generated/federation_clientset"
|
|
"k8s.io/kubernetes/pkg/api/v1"
|
|
"k8s.io/kubernetes/pkg/apis/extensions/v1beta1"
|
|
kubeclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
|
|
"k8s.io/kubernetes/pkg/util/intstr"
|
|
"k8s.io/kubernetes/test/e2e/framework"
|
|
fedframework "k8s.io/kubernetes/test/e2e_federation/framework"
|
|
|
|
. "github.com/onsi/ginkgo"
|
|
. "github.com/onsi/gomega"
|
|
)
|
|
|
|
const (
|
|
MaxRetriesOnFederatedApiserver = 3
|
|
FederatedIngressTimeout = 120 * time.Second
|
|
FederatedIngressName = "federated-ingress"
|
|
FederatedIngressServiceName = "federated-ingress-service"
|
|
FederatedIngressServicePodName = "federated-ingress-service-test-pod"
|
|
)
|
|
|
|
const (
|
|
// timeout on a single http request.
|
|
reqTimeout = 10 * time.Second
|
|
)
|
|
|
|
var _ = framework.KubeDescribe("Federated ingresses [Feature:Federation]", func() {
|
|
f := fedframework.NewDefaultFederatedFramework("federated-ingress")
|
|
|
|
// Create/delete ingress api objects
|
|
// Validate federation apiserver, does not rely on underlying clusters or federation ingress controller.
|
|
Describe("Federated Ingresses", func() {
|
|
AfterEach(func() {
|
|
nsName := f.FederationNamespace.Name
|
|
// Delete all ingresses.
|
|
deleteAllIngressesOrFail(f.FederationClientset, nsName)
|
|
})
|
|
|
|
It("should be created and deleted successfully", func() {
|
|
fedframework.SkipUnlessFederated(f.ClientSet)
|
|
framework.SkipUnlessProviderIs("gce", "gke") // TODO: Federated ingress is not yet supported on non-GCP platforms.
|
|
nsName := f.FederationNamespace.Name
|
|
ingress := createIngressOrFail(f.FederationClientset, nsName)
|
|
By(fmt.Sprintf("Creation of ingress %q in namespace %q succeeded. Deleting ingress.", ingress.Name, nsName))
|
|
// Cleanup
|
|
err := f.FederationClientset.Extensions().Ingresses(nsName).Delete(ingress.Name, &metav1.DeleteOptions{})
|
|
framework.ExpectNoError(err, "Error deleting ingress %q in namespace %q", ingress.Name, ingress.Namespace)
|
|
By(fmt.Sprintf("Deletion of ingress %q in namespace %q succeeded.", ingress.Name, nsName))
|
|
})
|
|
})
|
|
|
|
// e2e cases for federation ingress controller
|
|
var _ = Describe("Federated Ingresses", func() {
|
|
var (
|
|
clusters map[string]*cluster // All clusters, keyed by cluster name
|
|
primaryClusterName, federationName, ns string
|
|
jig *federationTestJig
|
|
)
|
|
|
|
// register clusters in federation apiserver
|
|
BeforeEach(func() {
|
|
fedframework.SkipUnlessFederated(f.ClientSet)
|
|
framework.SkipUnlessProviderIs("gce", "gke") // TODO: Federated ingress is not yet supported on non-GCP platforms.
|
|
if federationName = os.Getenv("FEDERATION_NAME"); federationName == "" {
|
|
federationName = DefaultFederationName
|
|
}
|
|
jig = newFederationTestJig(f.FederationClientset)
|
|
clusters = map[string]*cluster{}
|
|
primaryClusterName = registerClusters(clusters, UserAgentName, federationName, f)
|
|
ns = f.FederationNamespace.Name
|
|
})
|
|
|
|
AfterEach(func() {
|
|
// Delete all ingresses.
|
|
nsName := f.FederationNamespace.Name
|
|
deleteAllIngressesOrFail(f.FederationClientset, nsName)
|
|
unregisterClusters(clusters, f)
|
|
})
|
|
|
|
It("should create and update matching ingresses in underlying clusters", func() {
|
|
ingress := createIngressOrFail(f.FederationClientset, ns)
|
|
// wait for ingress shards being created
|
|
waitForIngressShardsOrFail(ns, ingress, clusters)
|
|
ingress = updateIngressOrFail(f.FederationClientset, ns)
|
|
waitForIngressShardsUpdatedOrFail(ns, ingress, clusters)
|
|
})
|
|
|
|
It("should be deleted from underlying clusters when OrphanDependents is false", func() {
|
|
fedframework.SkipUnlessFederated(f.ClientSet)
|
|
nsName := f.FederationNamespace.Name
|
|
orphanDependents := false
|
|
verifyCascadingDeletionForIngress(f.FederationClientset, clusters, &orphanDependents, nsName)
|
|
By(fmt.Sprintf("Verified that ingresses were deleted from underlying clusters"))
|
|
})
|
|
|
|
It("should not be deleted from underlying clusters when OrphanDependents is true", func() {
|
|
fedframework.SkipUnlessFederated(f.ClientSet)
|
|
nsName := f.FederationNamespace.Name
|
|
orphanDependents := true
|
|
verifyCascadingDeletionForIngress(f.FederationClientset, clusters, &orphanDependents, nsName)
|
|
By(fmt.Sprintf("Verified that ingresses were not deleted from underlying clusters"))
|
|
})
|
|
|
|
It("should not be deleted from underlying clusters when OrphanDependents is nil", func() {
|
|
fedframework.SkipUnlessFederated(f.ClientSet)
|
|
nsName := f.FederationNamespace.Name
|
|
verifyCascadingDeletionForIngress(f.FederationClientset, clusters, nil, nsName)
|
|
By(fmt.Sprintf("Verified that ingresses were not deleted from underlying clusters"))
|
|
})
|
|
|
|
var _ = Describe("Ingress connectivity and DNS", func() {
|
|
|
|
var (
|
|
service *v1.Service
|
|
)
|
|
|
|
BeforeEach(func() {
|
|
fedframework.SkipUnlessFederated(f.ClientSet)
|
|
// create backend pod
|
|
createBackendPodsOrFail(clusters, ns, FederatedIngressServicePodName)
|
|
// create backend service
|
|
service = createServiceOrFail(f.FederationClientset, ns, FederatedIngressServiceName)
|
|
// create ingress object
|
|
jig.ing = createIngressOrFail(f.FederationClientset, ns)
|
|
// wait for services objects sync
|
|
waitForServiceShardsOrFail(ns, service, clusters)
|
|
// wait for ingress objects sync
|
|
waitForIngressShardsOrFail(ns, jig.ing, clusters)
|
|
})
|
|
|
|
AfterEach(func() {
|
|
deleteBackendPodsOrFail(clusters, ns)
|
|
if service != nil {
|
|
deleteServiceOrFail(f.FederationClientset, ns, service.Name, nil)
|
|
cleanupServiceShardsAndProviderResources(ns, service, clusters)
|
|
service = nil
|
|
} else {
|
|
By("No service to delete. Service is nil")
|
|
}
|
|
if jig.ing != nil {
|
|
deleteIngressOrFail(f.FederationClientset, ns, jig.ing.Name, nil)
|
|
for clusterName, cluster := range clusters {
|
|
deleteClusterIngressOrFail(clusterName, cluster.Clientset, ns, jig.ing.Name)
|
|
}
|
|
jig.ing = nil
|
|
} else {
|
|
By("No ingress to delete. Ingress is nil")
|
|
}
|
|
})
|
|
|
|
PIt("should be able to discover a federated ingress service via DNS", func() {
|
|
// we are about the ingress name
|
|
svcDNSNames := []string{
|
|
fmt.Sprintf("%s.%s", FederatedIngressServiceName, ns),
|
|
fmt.Sprintf("%s.%s.svc.cluster.local.", FederatedIngressServiceName, ns),
|
|
// TODO these two entries are not set yet
|
|
//fmt.Sprintf("%s.%s.%s", FederatedIngressServiceName, ns, federationName),
|
|
//fmt.Sprintf("%s.%s.%s.svc.cluster.local.", FederatedIngressServiceName, ns, federationName),
|
|
}
|
|
// check dns records in underlying cluster
|
|
for i, DNSName := range svcDNSNames {
|
|
discoverService(f, DNSName, true, "federated-ingress-e2e-discovery-pod-"+strconv.Itoa(i))
|
|
}
|
|
// TODO check dns record in global dns server
|
|
})
|
|
|
|
It("should be able to connect to a federated ingress via its load balancer", func() {
|
|
// check the traffic on federation ingress
|
|
jig.waitForFederatedIngress()
|
|
})
|
|
|
|
})
|
|
})
|
|
})
|
|
|
|
// Deletes all Ingresses in the given namespace name.
|
|
func deleteAllIngressesOrFail(clientset *fedclientset.Clientset, nsName string) {
|
|
orphanDependents := false
|
|
err := clientset.Extensions().Ingresses(nsName).DeleteCollection(&metav1.DeleteOptions{OrphanDependents: &orphanDependents}, metav1.ListOptions{})
|
|
Expect(err).NotTo(HaveOccurred(), fmt.Sprintf("Error in deleting ingresses in namespace: %s", nsName))
|
|
}
|
|
|
|
/*
|
|
equivalent returns true if the two ingress spec are equivalent.
|
|
*/
|
|
func equivalentIngress(federatedIngress, clusterIngress v1beta1.Ingress) bool {
|
|
return reflect.DeepEqual(clusterIngress.Spec, federatedIngress.Spec)
|
|
}
|
|
|
|
// verifyCascadingDeletionForIngress verifies that ingresses are deleted from
|
|
// underlying clusters when orphan dependents is false and they are not deleted
|
|
// when orphan dependents is true.
|
|
func verifyCascadingDeletionForIngress(clientset *fedclientset.Clientset, clusters map[string]*cluster, orphanDependents *bool, nsName string) {
|
|
ingress := createIngressOrFail(clientset, nsName)
|
|
ingressName := ingress.Name
|
|
// Check subclusters if the ingress was created there.
|
|
By(fmt.Sprintf("Waiting for ingress %s to be created in all underlying clusters", ingressName))
|
|
waitForIngressShardsOrFail(nsName, ingress, clusters)
|
|
|
|
By(fmt.Sprintf("Deleting ingress %s", ingressName))
|
|
deleteIngressOrFail(clientset, nsName, ingressName, orphanDependents)
|
|
|
|
By(fmt.Sprintf("Verifying ingresses %s in underlying clusters", ingressName))
|
|
errMessages := []string{}
|
|
// ingress should be present in underlying clusters unless orphanDependents is false.
|
|
shouldExist := orphanDependents == nil || *orphanDependents == true
|
|
for clusterName, clusterClientset := range clusters {
|
|
_, err := clusterClientset.Extensions().Ingresses(nsName).Get(ingressName, metav1.GetOptions{})
|
|
if shouldExist && errors.IsNotFound(err) {
|
|
errMessages = append(errMessages, fmt.Sprintf("unexpected NotFound error for ingress %s in cluster %s, expected ingress to exist", ingressName, clusterName))
|
|
} else if !shouldExist && !errors.IsNotFound(err) {
|
|
errMessages = append(errMessages, fmt.Sprintf("expected NotFound error for ingress %s in cluster %s, got error: %v", ingressName, clusterName, err))
|
|
}
|
|
}
|
|
if len(errMessages) != 0 {
|
|
framework.Failf("%s", strings.Join(errMessages, "; "))
|
|
}
|
|
}
|
|
|
|
/*
|
|
waitForIngressOrFail waits until a ingress is either present or absent in the cluster specified by clientset.
|
|
If the condition is not met within timout, it fails the calling test.
|
|
*/
|
|
func waitForIngressOrFail(clientset *kubeclientset.Clientset, namespace string, ingress *v1beta1.Ingress, present bool, timeout time.Duration) {
|
|
By(fmt.Sprintf("Fetching a federated ingress shard of ingress %q in namespace %q from cluster", ingress.Name, namespace))
|
|
var clusterIngress *v1beta1.Ingress
|
|
err := wait.PollImmediate(framework.Poll, timeout, func() (bool, error) {
|
|
clusterIngress, err := clientset.Ingresses(namespace).Get(ingress.Name, metav1.GetOptions{})
|
|
if (!present) && errors.IsNotFound(err) { // We want it gone, and it's gone.
|
|
By(fmt.Sprintf("Success: shard of federated ingress %q in namespace %q in cluster is absent", ingress.Name, namespace))
|
|
return true, nil // Success
|
|
}
|
|
if present && err == nil { // We want it present, and the Get succeeded, so we're all good.
|
|
By(fmt.Sprintf("Success: shard of federated ingress %q in namespace %q in cluster is present", ingress.Name, namespace))
|
|
return true, nil // Success
|
|
}
|
|
By(fmt.Sprintf("Ingress %q in namespace %q in cluster. Found: %v, waiting for Found: %v, trying again in %s (err=%v)", ingress.Name, namespace, clusterIngress != nil && err == nil, present, framework.Poll, err))
|
|
return false, nil
|
|
})
|
|
framework.ExpectNoError(err, "Failed to verify ingress %q in namespace %q in cluster: Present=%v", ingress.Name, namespace, present)
|
|
|
|
if present && clusterIngress != nil {
|
|
Expect(equivalentIngress(*clusterIngress, *ingress))
|
|
}
|
|
}
|
|
|
|
/*
|
|
waitForIngressShardsOrFail waits for the ingress to appear in all clusters
|
|
*/
|
|
func waitForIngressShardsOrFail(namespace string, ingress *v1beta1.Ingress, clusters map[string]*cluster) {
|
|
framework.Logf("Waiting for ingress %q in %d clusters", ingress.Name, len(clusters))
|
|
for _, c := range clusters {
|
|
waitForIngressOrFail(c.Clientset, namespace, ingress, true, FederatedIngressTimeout)
|
|
}
|
|
}
|
|
|
|
/*
|
|
waitForIngressShardsUpdatedOrFail waits for the ingress to be updated in all clusters
|
|
*/
|
|
func waitForIngressShardsUpdatedOrFail(namespace string, ingress *v1beta1.Ingress, clusters map[string]*cluster) {
|
|
framework.Logf("Waiting for ingress %q in %d clusters", ingress.Name, len(clusters))
|
|
for _, c := range clusters {
|
|
waitForIngressUpdateOrFail(c.Clientset, namespace, ingress, FederatedIngressTimeout)
|
|
}
|
|
}
|
|
|
|
/*
|
|
waitForIngressUpdateOrFail waits until a ingress is updated in the specified cluster with same spec of federated ingress.
|
|
If the condition is not met within timeout, it fails the calling test.
|
|
*/
|
|
func waitForIngressUpdateOrFail(clientset *kubeclientset.Clientset, namespace string, ingress *v1beta1.Ingress, timeout time.Duration) {
|
|
By(fmt.Sprintf("Fetching a federated ingress shard of ingress %q in namespace %q from cluster", ingress.Name, namespace))
|
|
err := wait.PollImmediate(framework.Poll, timeout, func() (bool, error) {
|
|
clusterIngress, err := clientset.Ingresses(namespace).Get(ingress.Name, metav1.GetOptions{})
|
|
if err == nil { // We want it present, and the Get succeeded, so we're all good.
|
|
if equivalentIngress(*clusterIngress, *ingress) {
|
|
By(fmt.Sprintf("Success: shard of federated ingress %q in namespace %q in cluster is updated", ingress.Name, namespace))
|
|
return true, nil
|
|
}
|
|
By(fmt.Sprintf("Ingress %q in namespace %q in cluster, waiting for service being updated, trying again in %s (err=%v)", ingress.Name, namespace, framework.Poll, err))
|
|
return false, nil
|
|
}
|
|
By(fmt.Sprintf("Ingress %q in namespace %q in cluster, waiting for service being updated, trying again in %s (err=%v)", ingress.Name, namespace, framework.Poll, err))
|
|
return false, nil
|
|
})
|
|
framework.ExpectNoError(err, "Failed to verify ingress %q in namespace %q in cluster", ingress.Name, namespace)
|
|
}
|
|
|
|
/*
|
|
waitForIngressShardsGoneOrFail waits for the ingress to disappear in all clusters
|
|
*/
|
|
func waitForIngressShardsGoneOrFail(namespace string, ingress *v1beta1.Ingress, clusters map[string]*cluster) {
|
|
framework.Logf("Waiting for ingress %q in %d clusters", ingress.Name, len(clusters))
|
|
for _, c := range clusters {
|
|
waitForIngressOrFail(c.Clientset, namespace, ingress, false, FederatedIngressTimeout)
|
|
}
|
|
}
|
|
|
|
func deleteIngressOrFail(clientset *fedclientset.Clientset, namespace string, ingressName string, orphanDependents *bool) {
|
|
if clientset == nil || len(namespace) == 0 || len(ingressName) == 0 {
|
|
Fail(fmt.Sprintf("Internal error: invalid parameters passed to deleteIngressOrFail: clientset: %v, namespace: %v, ingress: %v", clientset, namespace, ingressName))
|
|
}
|
|
err := clientset.Ingresses(namespace).Delete(ingressName, &metav1.DeleteOptions{OrphanDependents: orphanDependents})
|
|
framework.ExpectNoError(err, "Error deleting ingress %q from namespace %q", ingressName, namespace)
|
|
// Wait for the ingress to be deleted.
|
|
err = wait.Poll(framework.Poll, wait.ForeverTestTimeout, func() (bool, error) {
|
|
_, err := clientset.Extensions().Ingresses(namespace).Get(ingressName, metav1.GetOptions{})
|
|
if err != nil && errors.IsNotFound(err) {
|
|
return true, nil
|
|
}
|
|
return false, err
|
|
})
|
|
if err != nil {
|
|
framework.Failf("Error in deleting ingress %s: %v", ingressName, err)
|
|
}
|
|
}
|
|
|
|
// TODO: quinton: This is largely a cut 'n paste of the above. Yuck! Refactor as soon as we have a common interface implmented by both fedclientset.Clientset and kubeclientset.Clientset
|
|
func deleteClusterIngressOrFail(clusterName string, clientset *kubeclientset.Clientset, namespace string, ingressName string) {
|
|
if clientset == nil || len(namespace) == 0 || len(ingressName) == 0 {
|
|
Fail(fmt.Sprintf("Internal error: invalid parameters passed to deleteClusterIngressOrFail: cluster: %q, clientset: %v, namespace: %v, ingress: %v", clusterName, clientset, namespace, ingressName))
|
|
}
|
|
err := clientset.Ingresses(namespace).Delete(ingressName, metav1.NewDeleteOptions(0))
|
|
framework.ExpectNoError(err, "Error deleting cluster ingress %q/%q from cluster %q", namespace, ingressName, clusterName)
|
|
}
|
|
|
|
func createIngressOrFail(clientset *fedclientset.Clientset, namespace string) *v1beta1.Ingress {
|
|
if clientset == nil || len(namespace) == 0 {
|
|
Fail(fmt.Sprintf("Internal error: invalid parameters passed to createIngressOrFail: clientset: %v, namespace: %v", clientset, namespace))
|
|
}
|
|
By(fmt.Sprintf("Creating federated ingress %q in namespace %q", FederatedIngressName, namespace))
|
|
|
|
ingress := &v1beta1.Ingress{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: FederatedIngressName,
|
|
},
|
|
Spec: v1beta1.IngressSpec{
|
|
Backend: &v1beta1.IngressBackend{
|
|
ServiceName: "testingress-service",
|
|
ServicePort: intstr.FromInt(80),
|
|
},
|
|
},
|
|
}
|
|
|
|
newIng, err := clientset.Extensions().Ingresses(namespace).Create(ingress)
|
|
framework.ExpectNoError(err, "Creating ingress %q in namespace %q", ingress.Name, namespace)
|
|
By(fmt.Sprintf("Successfully created federated ingress %q in namespace %q", FederatedIngressName, namespace))
|
|
return newIng
|
|
}
|
|
|
|
func updateIngressOrFail(clientset *fedclientset.Clientset, namespace string) (newIng *v1beta1.Ingress) {
|
|
var err error
|
|
if clientset == nil || len(namespace) == 0 {
|
|
Fail(fmt.Sprintf("Internal error: invalid parameters passed to createIngressOrFail: clientset: %v, namespace: %v", clientset, namespace))
|
|
}
|
|
ingress := &v1beta1.Ingress{
|
|
ObjectMeta: metav1.ObjectMeta{
|
|
Name: FederatedIngressName,
|
|
},
|
|
Spec: v1beta1.IngressSpec{
|
|
Backend: &v1beta1.IngressBackend{
|
|
ServiceName: "updated-testingress-service",
|
|
ServicePort: intstr.FromInt(80),
|
|
},
|
|
},
|
|
}
|
|
|
|
err = waitForFederatedIngressExists(clientset, namespace, FederatedIngressName, FederatedIngressTimeout)
|
|
if err != nil {
|
|
framework.Failf("failed to get ingress %q: %v", FederatedIngressName, err)
|
|
}
|
|
for i := 0; i < MaxRetriesOnFederatedApiserver; i++ {
|
|
newIng, err = clientset.Extensions().Ingresses(namespace).Update(ingress)
|
|
if err == nil {
|
|
framework.DescribeIng(namespace)
|
|
return newIng
|
|
}
|
|
if !errors.IsConflict(err) && !errors.IsServerTimeout(err) {
|
|
framework.Failf("failed to update ingress %q: %v", FederatedIngressName, err)
|
|
}
|
|
}
|
|
framework.Failf("too many retries updating ingress %q", FederatedIngressName)
|
|
return nil
|
|
}
|
|
|
|
func (j *federationTestJig) waitForFederatedIngress() {
|
|
// Wait for the loadbalancer IP.
|
|
address, err := waitForFederatedIngressAddress(j.client, j.ing.Namespace, j.ing.Name, framework.LoadBalancerPollTimeout)
|
|
if err != nil {
|
|
framework.Failf("Ingress failed to acquire an IP address within %v", framework.LoadBalancerPollTimeout)
|
|
}
|
|
j.address = address
|
|
framework.Logf("Found address %v for ingress %v", j.address, j.ing.Name)
|
|
timeoutClient := &http.Client{Timeout: reqTimeout}
|
|
|
|
// Check that all rules respond to a simple GET.
|
|
for _, rules := range j.ing.Spec.Rules {
|
|
proto := "http"
|
|
for _, p := range rules.IngressRuleValue.HTTP.Paths {
|
|
route := fmt.Sprintf("%v://%v%v", proto, address, p.Path)
|
|
framework.Logf("Testing route %v host %v with simple GET", route, rules.Host)
|
|
framework.ExpectNoError(framework.PollURL(route, rules.Host, framework.LoadBalancerPollTimeout, framework.LoadBalancerPollInterval, timeoutClient, false))
|
|
}
|
|
}
|
|
}
|
|
|
|
type federationTestJig struct {
|
|
// TODO add TLS check later
|
|
rootCAs map[string][]byte
|
|
address string
|
|
ing *v1beta1.Ingress
|
|
client *fedclientset.Clientset
|
|
}
|
|
|
|
func newFederationTestJig(c *fedclientset.Clientset) *federationTestJig {
|
|
return &federationTestJig{client: c, rootCAs: map[string][]byte{}}
|
|
}
|
|
|
|
// WaitForFederatedIngressAddress waits for the Ingress to acquire an address.
|
|
func waitForFederatedIngressAddress(c *fedclientset.Clientset, ns, ingName string, timeout time.Duration) (string, error) {
|
|
var address string
|
|
err := wait.PollImmediate(10*time.Second, timeout, func() (bool, error) {
|
|
ipOrNameList, err := getFederatedIngressAddress(c, ns, ingName)
|
|
if err != nil || len(ipOrNameList) == 0 {
|
|
framework.Logf("Waiting for Ingress %v to acquire IP, error %v", ingName, err)
|
|
return false, nil
|
|
}
|
|
address = ipOrNameList[0]
|
|
return true, nil
|
|
})
|
|
return address, err
|
|
}
|
|
|
|
// waitForFederatedIngressExists waits for the Ingress object exists.
|
|
func waitForFederatedIngressExists(c *fedclientset.Clientset, ns, ingName string, timeout time.Duration) error {
|
|
err := wait.PollImmediate(10*time.Second, timeout, func() (bool, error) {
|
|
_, err := c.Extensions().Ingresses(ns).Get(ingName, metav1.GetOptions{})
|
|
if err != nil {
|
|
framework.Logf("Waiting for Ingress %v, error %v", ingName, err)
|
|
return false, nil
|
|
}
|
|
return true, nil
|
|
})
|
|
return err
|
|
}
|
|
|
|
// getFederatedIngressAddress returns the ips/hostnames associated with the Ingress.
|
|
func getFederatedIngressAddress(client *fedclientset.Clientset, ns, name string) ([]string, error) {
|
|
ing, err := client.Extensions().Ingresses(ns).Get(name, metav1.GetOptions{})
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
addresses := []string{}
|
|
for _, a := range ing.Status.LoadBalancer.Ingress {
|
|
if a.IP != "" {
|
|
addresses = append(addresses, a.IP)
|
|
}
|
|
if a.Hostname != "" {
|
|
addresses = append(addresses, a.Hostname)
|
|
}
|
|
}
|
|
return addresses, nil
|
|
}
|