e2e

package
v1.32.1 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Dec 4, 2024 License: Apache-2.0 Imports: 71 Imported by: 2

Documentation

Overview

Package e2e contains supporting infrastructure for end-to-end integration testing driven by the tests in cmd/e2e-test.

Test should be written with a Sandbox:

func TestExample(t *testing.T) {
  for _, tc := range []struct{
    ...
  }{
    ...
  }{
    tc := tc // avoid variable capture
    Framework.RunWithSandbox(t, func(t *testing.T, s *e2e.Sandbox) {
      t.Parallel()
      // Test code...
    })
  }
}

The Sandbox will handle resource isolation and reclamation.

Index

Constants

View Source
const (
	ILBSubnetPurpose = "INTERNAL_HTTPS_LOAD_BALANCER"
	ILBSubnetName    = "ilb-subnet-ingress-e2e"
	PSCSubnetPurpose = "PRIVATE_SERVICE_CONNECT"
	PSCSubnetName    = "psc-nat-subnet"
)

Variables

View Source
var ErrSubnetExists = fmt.Errorf("ILB subnet in region already exists")
View Source
var Scheme = runtime.NewScheme()

Scheme is the default instance of runtime.Scheme to which types in the Kubernetes API are already registered. This is needed for ConfigMap search.

Functions

func CheckDeletedNegCRs added in v1.10.0

func CheckDeletedNegCRs(s *Sandbox, negName, port string) (bool, error)

CheckDeletedNegCRs verifies that the provided neg list does not have negs that are associated with the provided neg attributes

func CheckDeployment added in v1.7.0

func CheckDeployment(deployment *apps.Deployment) error

CheckDeployment checks if the given deployment is in a stable state.

func CheckDistinctResponseHost added in v1.7.0

func CheckDistinctResponseHost(vip string, expectDistinctHosts int, tolerateTransientError bool) error

CheckDistinctResponseHost issue GET call to the vip for 100 times, parse the responses and calculate the number of distinct backends.

func CheckEchoServerResponse added in v1.7.0

func CheckEchoServerResponse(vip string) (app.ResponseBody, error)

CheckEchoServerResponse issue a GET call to the vip and return the ResponseBody.

func CheckForAnyFinalizer added in v1.9.0

func CheckForAnyFinalizer(ing *networkingv1.Ingress) error

CheckForAnyFinalizer asserts that an ingress finalizer exists on Ingress.

func CheckGCLB added in v1.6.0

func CheckGCLB(gclb *fuzz.GCLB, numForwardingRules int, numBackendServices int) error

CheckGCLB whitebox testing is OK.

func CheckNEGEndpointIPs added in v1.24.0

func CheckNEGEndpointIPs(ctx context.Context, c cloud.Cloud, negName string, zones []string, expectToContainEndpoints []string) error

CheckNEGEndpointIPs checks if the input NEG only contains the expected endpoint IPs.

func CheckNEGInitializedCondition added in v1.32.0

func CheckNEGInitializedCondition(svcNEG negv1beta1.ServiceNetworkEndpointGroup) error

func CheckNameInNegStatus added in v1.10.0

func CheckNameInNegStatus(svc *v1.Service, expectedNegAttrs map[string]string) (annotations.NegStatus, error)

CheckNameInNegStatus checks if the NEG Status annotation is present and in the expected state The parameter expectedNegAttrs will map a port to a neg name. If the neg name is empty, CheckNameInNegStatus expects that the name is autogenerated and will check it

func CheckNegAnnotations added in v1.24.0

func CheckNegAnnotations(negs map[meta.Key]*fuzz.NetworkEndpoints, expectAnnotations map[string]string) error

CheckNegAnnotations checks if the network endpoints in the NEGs has the expected annotations

func CheckNegCRs added in v1.10.0

func CheckNegCRs(svc *v1.Service, svcNegs *negv1beta1.ServiceNetworkEndpointGroupList, expectedNegAttrs map[string]string) error

CheckNegCRs will check that the provided neg cr list have negs with the expected neg attributes and the "Initialized" condition set to true.

func CheckNegFinalizer added in v1.10.0

func CheckNegFinalizer(svcNeg negv1beta1.ServiceNetworkEndpointGroup) error

CheckNegFinalizer asserts that only the Neg finalizer exists on NEG CR.

func CheckNegOwnerRef added in v1.10.0

func CheckNegOwnerRef(svc *v1.Service, svcNeg negv1beta1.ServiceNetworkEndpointGroup) error

CheckNegOwnerRef verifies the owner reference on the provided neg cr point to the given service

func CheckNegStatus added in v1.7.0

func CheckNegStatus(svc *v1.Service, expectSvcPorts []string) (annotations.NegStatus, error)

CheckNegStatus checks if the NEG Status annotation is presented and in the expected state

func CheckNegs added in v1.7.0

func CheckNegs(negs map[meta.Key]*fuzz.NetworkEndpoints, expectHealthy bool, expectCount int) error

CheckNegs checks if the network endpoints in the NEGs is in expected state

func CheckServiceAttachment added in v1.11.0

func CheckServiceAttachment(sa *fuzz.ServiceAttachment, cr *sav1.ServiceAttachment) (string, error)

CheckServiceAttachment verifies that the CR spec matches the GCE Service Attachment configuration and that the CR's Status was properly populated

func CheckServiceAttachmentCRDeletion added in v1.11.0

func CheckServiceAttachmentCRDeletion(s *Sandbox, saName string) bool

CheckServiceAttachmentCRDeletion verifies that the CR does not exist

func CheckServiceAttachmentFinalizer added in v1.11.0

func CheckServiceAttachmentFinalizer(cr *sav1.ServiceAttachment) error

CheckServiceAttachmentFinalizer verifies that the CR has the ServiceAttachment Finalizer

func CheckServiceAttachmentForwardingRule added in v1.11.0

func CheckServiceAttachmentForwardingRule(s *Sandbox, c cloud.Cloud, cr *sav1.ServiceAttachment) error

CheckServiceAttachmentForwardingRule verifies that the forwarding rule used in the GCE Service Attachment creation is the same one created by the Service referenced in the CR

func CheckSvcEvents added in v1.11.0

func CheckSvcEvents(s *Sandbox, svcName, msgType, message string, ignoreMessages ...string) (bool, error)

CheckSvcEvents checks to see if the service has an event with the provided msgType and message

func CheckV1Finalizer added in v1.9.0

func CheckV1Finalizer(ing *networkingv1.Ingress) error

CheckV1Finalizer asserts that only v1 finalizer exists on Ingress.

func CheckV2Finalizer added in v1.9.0

func CheckV2Finalizer(ing *networkingv1.Ingress) error

CheckV2Finalizer asserts that only v2 finalizer exists on Ingress.

func CreateEchoService

func CreateEchoService(s *Sandbox, name string, annotations map[string]string) (*v1.Service, error)

CreateEchoService creates the pod and service serving echoheaders Todo: (shance) remove this and replace uses with EnsureEchoService()

func CreateEchoServiceWithOS added in v1.9.0

func CreateEchoServiceWithOS(s *Sandbox, name string, annotations map[string]string, os OS) (*v1.Service, error)

CreateEchoServiceWithOS creates the pod and service serving echoheaders Todo: (shance) remove this and replace uses with EnsureEchoService()

func CreateILBSubnet added in v1.8.0

func CreateILBSubnet(s *Sandbox) error

CreateILBSubnet creates the ILB subnet

func CreateNegCR added in v1.10.0

func CreateNegCR(s *Sandbox, negName string, servicePort string) error

CreateNegCR creates a neg cr with the provided neg name and service port. The neg cr created will not be a valid one and is expected to be GC'd by the controller

func CreatePorterDeployment added in v1.9.0

func CreatePorterDeployment(s *Sandbox, name string, replicas int32, version string) error

CreatePorterDeployment creates a Deployment with porter image.

func CreatePorterService added in v1.9.0

func CreatePorterService(s *Sandbox, name string) error

CreatePorterService creates a service that refers to Porter pods.

func CreateSecret

func CreateSecret(s *Sandbox, name string, data map[string][]byte) (*v1.Secret, error)

CreateSecret creates a secret from the given data.

func CreateSubnet added in v1.11.0

func CreateSubnet(s *Sandbox, subnetName, purpose string) error

CreateSubnet creates a subnet with the provided name and purpose

func DeleteConfigMap added in v1.9.0

func DeleteConfigMap(s *Sandbox, namespace, name string) error

DeleteConfigMap deletes the namespace:name ConfigMap

func DeleteDestinationRule added in v1.9.0

func DeleteDestinationRule(s *Sandbox, namespace, name string) error

DeleteDestinationRule deletes the namespace:name DestinationRule.

func DeleteGCPAddress added in v1.6.0

func DeleteGCPAddress(s *Sandbox, name string, region string) error

DeleteGCPAddress deletes a global static IP address with the given name.

func DeleteNegCR added in v1.10.0

func DeleteNegCR(s *Sandbox, negName string) error

DeleteNegCR sends a deletion request for the neg cr with the provided negName in the sandbox's namespace

func DeleteSecret added in v1.6.0

func DeleteSecret(s *Sandbox, name string) error

DeleteSecret deletes a secret.

func DeleteService added in v1.17.0

func DeleteService(s *Sandbox, svcName string) error

DeleteService deletes the K8s service

func DeleteServiceAttachment added in v1.11.0

func DeleteServiceAttachment(s *Sandbox, saName string) error

DeleteServiceAttachment ensures a ServiceAttachment resource

func DeleteSubnet added in v1.11.0

func DeleteSubnet(s *Sandbox, name string) error

DeleteSubnet deletes the subnet

func EnsureConfigMap added in v1.9.0

func EnsureConfigMap(s *Sandbox, namespace, name string, data map[string]string) error

EnsureConfigMap ensures the namespace:name ConfigMap Data field, create if the target not exist.

func EnsureCustomEndpointSlice added in v1.24.0

func EnsureCustomEndpointSlice(s *Sandbox, svc *v1.Service, name string, pods []v1.Pod, modify func(endpointslice *discoveryv1.EndpointSlice)) (*discoveryv1.EndpointSlice, error)

EnsureCustomEndpointSlice ensures that a custom endpoint slice with the given modification is set up. The endpoint slice uses the given list of pods as endpoints.

func EnsureEchoDeployment added in v1.7.0

func EnsureEchoDeployment(s *Sandbox, name string, numReplicas int32, modify func(deployment *apps.Deployment)) error

EnsureEchoDeployment ensures that the Echo deployment with the given description is set up

func EnsureEchoDeploymentOS added in v1.21.0

func EnsureEchoDeploymentOS(s *Sandbox, name string, numReplicas int32, modify func(deployment *apps.Deployment), os OS) error

EnsureEchoDeploymentOS ensures that the Echo deployment with the given description is set up for Linux or Windows OS.

func EnsureEchoService added in v1.6.0

func EnsureEchoService(s *Sandbox, name string, annotations map[string]string, svcType v1.ServiceType, numReplicas int32) (*v1.Service, error)

EnsureEchoService that the Echo service with the given description is set up

func EnsureEchoServiceOS added in v1.21.0

func EnsureEchoServiceOS(s *Sandbox, name string, annotations map[string]string, svcType v1.ServiceType, numReplicas int32, os OS) (*v1.Service, error)

EnsureEchoServiceOS ensures that the Echo service with the given description is set up for Linux or Windows OS.

func EnsureEchoServiceWithPodLabels added in v1.24.0

func EnsureEchoServiceWithPodLabels(s *Sandbox, name string, annotations map[string]string, svcType v1.ServiceType, numReplicas int32, podLabels map[string]string) (*v1.Service, error)

func EnsureFrontendConfig added in v1.11.0

func EnsureFrontendConfig(s *Sandbox, fc *frontendconfig.FrontendConfig) (*frontendconfig.FrontendConfig, error)

TODO(shance) add frontendconfig CRUD

func EnsureIngress added in v1.6.0

func EnsureIngress(s *Sandbox, ing *networkingv1.Ingress) (*networkingv1.Ingress, error)

EnsureIngress creates a new Ingress or updates an existing one.

func EnsurePorterDestinationRule added in v1.9.0

func EnsurePorterDestinationRule(s *Sandbox, name, svcName string, versions []string) error

EnsurePorterDestinationRule ensures the namespace:name DestinationRule.

func EnsureServiceAttachment added in v1.11.0

func EnsureServiceAttachment(s *Sandbox, saName, svcName, subnetName string) (*sav1.ServiceAttachment, error)

EnsureServiceAttachment ensures a ServiceAttachment resource

func GetConfigMap added in v1.9.0

func GetConfigMap(s *Sandbox, namespace, name string) (map[string]string, error)

GetConfigMap gets ConfigMap and returns the Data field.

func IsRfc1918Addr added in v1.7.0

func IsRfc1918Addr(addr string) bool

IsRfc1918Addr returns true if the address supplied is an RFC1918 address

func ListPods added in v1.24.0

func ListPods(s *Sandbox) (*v1.PodList, error)

ListPods lists all pods in the sandbox namespace.

func NewCloud

func NewCloud(project, GceEndpointOverride string) (cloud.Cloud, error)

NewCloud creates a new cloud for the given project.

func NewGCPAddress added in v1.6.0

func NewGCPAddress(s *Sandbox, name string, region string) error

NewGCPAddress reserves a global static IP address with the given name.

func NewGCPRegionalExternalAddress added in v1.26.0

func NewGCPRegionalExternalAddress(s *Sandbox, name string, region string) error

func NoopModify added in v1.7.0

func NoopModify(*apps.Deployment)

NoopModify does not modify the input deployment

func SpreadPodAcrossZones added in v1.7.0

func SpreadPodAcrossZones(deployment *apps.Deployment)

SpreadPodAcrossZones sets pod anti affinity rules to try to spread pods across zones

func Truncate added in v1.11.0

func Truncate(key string) string

Truncate truncates a gce resource name if it exceeds 62 chars This function is based on the one in pkg/namer/namer.go

func UpgradeTestWaitForIngress added in v1.9.0

func UpgradeTestWaitForIngress(s *Sandbox, ing *networkingv1.Ingress, options *WaitForIngressOptions) (*networkingv1.Ingress, error)

UpgradeTestWaitForIngress waits for ingress to stabilize and set sandbox status to stable. Note that this is used only for upgrade tests.

func WaitConfigMapEvents added in v1.9.0

func WaitConfigMapEvents(s *Sandbox, namespace, name string, msgs []string, timeout time.Duration) error

WaitConfigMapEvents waits the msgs messages present for namespace:name ConfigMap until timeout.

func WaitDestinationRuleAnnotation added in v1.9.0

func WaitDestinationRuleAnnotation(s *Sandbox, namespace, name string, negCount int, timeout time.Duration) (*annotations.DestinationRuleNEGStatus, error)

WaitDestinationRuleAnnotation waits until the DestinationRule NEG annotation count equal to negCount.

func WaitForDistinctHosts added in v1.7.0

func WaitForDistinctHosts(ctx context.Context, vip string, expectDistinctHosts int, tolerateTransientError bool) error

WaitForDistinctHosts waits util

func WaitForEchoDeploymentStable added in v1.7.0

func WaitForEchoDeploymentStable(s *Sandbox, name string) error

WaitForEchoDeploymentStable waits until the deployment's readyReplicas, availableReplicas and updatedReplicas are equal to replicas.

func WaitForFinalizer added in v1.8.0

func WaitForFinalizer(s *Sandbox, ing *networkingv1.Ingress) (*networkingv1.Ingress, error)

WaitForFinalizer waits for Finalizer to be added. Note that this is used only for upgrade tests.

func WaitForFinalizerDeletion added in v1.7.0

func WaitForFinalizerDeletion(ctx context.Context, g *fuzz.GCLB, s *Sandbox, ingName string, options *fuzz.GCLBDeleteOptions) error

WaitForFinalizerDeletion waits for gclb resources to be deleted and the finalizer attached to the Ingress resource to be removed.

func WaitForFrontendResourceDeletion added in v1.9.0

func WaitForFrontendResourceDeletion(ctx context.Context, c cloud.Cloud, g *fuzz.GCLB, options *fuzz.GCLBDeleteOptions) error

WaitForFrontendResourceDeletion waits for frontend resources associated with the GLBC to be deleted for given protocol.

func WaitForGCLBDeletion

func WaitForGCLBDeletion(ctx context.Context, c cloud.Cloud, g *fuzz.GCLB, options *fuzz.GCLBDeleteOptions) error

WaitForGCLBDeletion waits for the resources associated with the GLBC to be deleted.

func WaitForHTTPResourceAnnotations added in v1.9.0

func WaitForHTTPResourceAnnotations(s *Sandbox, ing *networkingv1.Ingress) (*networkingv1.Ingress, error)

WaitForHTTPResourceAnnotations waits for http forwarding rule annotation to be added on ingress. This is to handle a special case where ingress updates from https only to http or both http and https enabled. Turns out port 80 on ingress VIP is accessible even when http forwarding rule and target proxy do not exist. So, ingress validator thinks that http load balancer is configured when https only configuration exists. TODO(smatti): Remove this when the above issue is fixed.

func WaitForIngress

WaitForIngress to stabilize. We expect the ingress to be unreachable at first as LB is still programming itself (i.e 404's / 502's)

func WaitForIngressDeletion

func WaitForIngressDeletion(ctx context.Context, g *fuzz.GCLB, s *Sandbox, ing *networkingv1.Ingress, options *fuzz.GCLBDeleteOptions) error

WaitForIngressDeletion deletes the given ingress and waits for the resources associated with it to be deleted.

func WaitForNEGDeletion added in v1.6.0

func WaitForNEGDeletion(ctx context.Context, c cloud.Cloud, g *fuzz.GCLB, options *fuzz.GCLBDeleteOptions) error

WaitForNEGDeletion waits for all NEGs associated with a GCLB to be deleted via GC

func WaitForNegCRs added in v1.10.0

func WaitForNegCRs(s *Sandbox, serviceName string, expectedNegs map[string]string) (annotations.NegStatus, error)

WaitForNegCRs waits up to the gclbDeletionTimeout for neg crs that have the configurations in expectedNegs, and are owned by the given service name, otherwise returns an error. The parameter expectedNegs maps a port to an expected neg name or an empty string for a generated name.

func WaitForNegStatus added in v1.7.0

func WaitForNegStatus(s *Sandbox, name string, expectSvcPorts []string, noPresentTest bool) (*annotations.NegStatus, error)

WaitForNegStatus waits util the neg status on the service got to expected state. if noPresentTest set to true, WaitForNegStatus makes sure no NEG annotation is added until timeout(5 mins).

func WaitForNegs added in v1.7.0

func WaitForNegs(ctx context.Context, c cloud.Cloud, negName string, zones []string, expectHealthy bool, expectCount int) error

WaitForNegs waits until the input NEG got into the expect states.

func WaitForRedirectURLMapDeletion added in v1.11.0

func WaitForRedirectURLMapDeletion(ctx context.Context, c cloud.Cloud, g *fuzz.GCLB) error

func WaitForServiceAttachment added in v1.11.0

func WaitForServiceAttachment(s *Sandbox, saName string) (string, error)

WaitForServiceAttachment waits until the gce service attachment corresponding to the provided CR name is created and properly configured

func WaitForServiceAttachmentDeletion added in v1.11.0

func WaitForServiceAttachmentDeletion(s *Sandbox, saName, gceSAURL string) error

WaitForServiceAttachmentDeletion waits until the Service Attachment CR and resource in GCE has been deleted.

func WaitForStandaloneNegDeletion added in v1.10.0

func WaitForStandaloneNegDeletion(ctx context.Context, c cloud.Cloud, s *Sandbox, port string, negStatus annotations.NegStatus) error

WaitForStandaloneNegDeletion waits for standalone NEGs and corresponding CR are deleted via GC.

func WaitForSvcNegErrorEvents added in v1.10.0

func WaitForSvcNegErrorEvents(s *Sandbox, svcName string, possibleMessages []string) error

WaitForSvcNegErrorEvents waits for at least one of the possibles messages to be emitted on the namespace:svcName service until timeout

func WhiteboxTest added in v1.9.0

func WhiteboxTest(ing *networkingv1.Ingress, fc *frontendconfigv1beta1.FrontendConfig, cloud cloud.Cloud, region string, s *Sandbox) (*fuzz.GCLB, error)

WhiteboxTest retrieves GCP load-balancer for Ingress VIP and runs the whitebox tests.

Types

type Cert added in v1.6.0

type Cert struct {
	Host string
	Name string
	Type CertType
	// Regional represents if the cert should be created as regional or global
	// Not using composites here to avoid additional possible interference
	Regional bool
	// contains filtered or unexported fields
}

Cert is a convenience type for representing an SSL certificate.

func NewCert added in v1.6.0

func NewCert(name string, host string, typ CertType, regional bool) (*Cert, error)

NewCert returns a cert initialized with data but not yet created in the appropriate environment.

func (*Cert) Create added in v1.6.0

func (c *Cert) Create(s *Sandbox) error

Create creates a cert in its environment.

func (*Cert) Delete added in v1.6.0

func (c *Cert) Delete(s *Sandbox) error

Delete deletes the cert from its environment.

type CertType added in v1.6.0

type CertType int

CertType indicates the intended environment in which this cert is created.

const (
	// GCPCert will be created as an SslCertificate resource in GCP.
	GCPCert CertType = iota
	// K8sCert will be created as a Secret in K8s.
	K8sCert CertType = iota
)

type Framework

type Framework struct {
	RestConfig            *rest.Config
	Clientset             kubernetes.Interface
	DestinationRuleClient dynamic.NamespaceableResourceInterface

	BackendConfigClient  *backendconfigclient.Clientset
	FrontendConfigClient *frontendconfigclient.Clientset
	SvcNegClient         *svcnegclient.Clientset
	SAClient             *adapter.ServiceAttachmentCRUD
	Project              string
	Region               string
	Network              string
	Subnet               string
	Cloud                cloud.Cloud
	Rand                 *rand.Rand

	CreateILBSubnet bool
	// contains filtered or unexported fields
}

Framework is the end-to-end test framework.

func NewFramework

func NewFramework(config *rest.Config, options Options) *Framework

NewFramework returns a new test framework to run.

func (*Framework) CatchSIGINT

func (f *Framework) CatchSIGINT()

CatchSIGINT and cleanup sandboxes when the test is interrupted.

func (*Framework) RunWithSandbox

func (f *Framework) RunWithSandbox(name string, t *testing.T, testFunc func(*testing.T, *Sandbox))

RunWithSandbox runs the testFunc with the Sandbox, taking care of resource cleanup and isolation. This indirectly calls testing.T.Run().

func (*Framework) SanityCheck

func (f *Framework) SanityCheck() error

SanityCheck the test environment before proceeding.

func (*Framework) WithSandbox

func (f *Framework) WithSandbox(testFunc func(*Sandbox) error) error

WithSandbox runs the testFunc with the Sandbox, taking care of resource cleanup and isolation.

type IngressStability added in v1.5.0

type IngressStability string

IngressStability denotes the stabilization status of all Ingresses in a sandbox.

var (
	// Stable indicates an Ingress is stable (i.e consistently serving 200's)
	Stable IngressStability = "Stable"
	// Unstable indicates an Ingress is unstable (i.e serving 404/502's).
	Unstable IngressStability = "Unstable"
)

type OS added in v1.9.0

type OS int
const (
	Linux OS = iota
	Windows
)

type Options

type Options struct {
	Project             string
	Region              string
	Network             string
	Subnet              string
	Seed                int64
	DestroySandboxes    bool
	GceEndpointOverride string
	CreateILBSubnet     bool
}

Options for the test framework.

type Sandbox

type Sandbox struct {
	// Namespace to create resources in. Resources created in this namespace
	// will be deleted with Destroy().
	Namespace string
	// ValidatorEnv for use with the test.
	ValidatorEnv fuzz.ValidatorEnv

	//Rand int that is used to generate the Namespace name
	RandInt int64
	// contains filtered or unexported fields
}

Sandbox represents a sandbox for running tests in a Kubernetes cluster.

func (*Sandbox) Create

func (s *Sandbox) Create() error

Create the sandbox.

func (*Sandbox) Destroy

func (s *Sandbox) Destroy()

Destroy the sandbox and all resources associated with the sandbox.

func (*Sandbox) DumpSandboxInfo added in v1.7.0

func (s *Sandbox) DumpSandboxInfo(t *testing.T)

DumpSandboxInfo dumps information about the sandbox into logs

func (*Sandbox) IstioEnabled added in v1.9.0

func (s *Sandbox) IstioEnabled() bool

IstioEnabled returns true if Istio is enabled for target cluster.

func (*Sandbox) MasterUpgraded added in v1.5.0

func (s *Sandbox) MasterUpgraded() bool

MasterUpgraded checks the config map for whether or not the k8s master has successfully finished upgrading or not

func (*Sandbox) MasterUpgrading added in v1.5.0

func (s *Sandbox) MasterUpgrading() bool

MasterUpgrading checks the config map for whether or not the k8s master has successfully finished upgrading or not

func (*Sandbox) PutStatus added in v1.5.0

func (s *Sandbox) PutStatus(status IngressStability)

PutStatus into the status manager.

type StatusManager added in v1.5.0

type StatusManager struct {
	// contains filtered or unexported fields
}

StatusManager manages the status of sandboxed Ingresses via a ConfigMap. It interacts with the an external framework test portion as follows: 1. StatusManager initializes and creates the ConfigMap status-cm. It listens on updates via informers. 2. e2e test calls StatusManager.putStatus with the Ingress name as key, and Unstable as the status 3. e2e test watches for when Ingress stabilizes, then uses StatusManager to update the Ingress's status to Stable 4. The external framework test reads from ConfigMap status-cm. When it detects that all Ingresses are stable (i.e., no value in the map is Unstable), it starts the MasterUpgrade. 5. When the k8s master finishes upgrading, the framework test writes the timestamp to the master-upgraded key in the ConfigMap 6. The external framework test writes the exit key in the ConfigMap to indicate that the e2e test can exit. 7. The StatusManager loop reads the exit key, then starts shutdown().

func NewStatusManager added in v1.5.0

func NewStatusManager(f *Framework) *StatusManager

NewStatusManager returns a new status manager.

type UpgradeTest added in v1.8.0

type UpgradeTest interface {
	// Name returns the name/description of the test.
	Name() string
	// Init initialized the Upgrade Test.
	Init(t *testing.T, s *Sandbox, framework *Framework) error
	// PreUpgrade runs before master upgrade.
	PreUpgrade() error
	// DuringUpgrade runs during master upgrade.
	DuringUpgrade() error
	// PostUpgrade runs after master upgrade.
	PostUpgrade() error
}

UpgradeTest is an interface for writing generic upgrade test. TODO: add version compatibility into the interface

type WaitForIngressOptions added in v1.5.0

type WaitForIngressOptions struct {
	// ExpectUnreachable is true when we expect the LB to still be
	// programming itself (i.e 404's / 502's)
	ExpectUnreachable bool
}

WaitForIngressOptions holds options dictating how we wait for an ingress to stabilize

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL