mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-29 22:46:12 +00:00
Bundle GCI mounter w/ node tests and plumb --mounter-path through test args to the Kubelet for node tests
This commit is contained in:
parent
33ebe1f18b
commit
6fdb20480f
@ -114,6 +114,8 @@ type NodeTestContextType struct {
|
|||||||
PrepullImages bool
|
PrepullImages bool
|
||||||
// RuntimeIntegrationType indicates how runtime is integrated with Kubelet. This is mainly used for CRI validation test.
|
// RuntimeIntegrationType indicates how runtime is integrated with Kubelet. This is mainly used for CRI validation test.
|
||||||
RuntimeIntegrationType string
|
RuntimeIntegrationType string
|
||||||
|
// MounterPath is the path to the program to run to perform a mount
|
||||||
|
MounterPath string
|
||||||
}
|
}
|
||||||
|
|
||||||
type CloudConfig struct {
|
type CloudConfig struct {
|
||||||
@ -209,6 +211,7 @@ func RegisterNodeFlags() {
|
|||||||
flag.StringVar(&TestContext.ManifestPath, "manifest-path", "", "The path to the static pod manifest file.")
|
flag.StringVar(&TestContext.ManifestPath, "manifest-path", "", "The path to the static pod manifest file.")
|
||||||
flag.BoolVar(&TestContext.PrepullImages, "prepull-images", true, "If true, prepull images so image pull failures do not cause test failures.")
|
flag.BoolVar(&TestContext.PrepullImages, "prepull-images", true, "If true, prepull images so image pull failures do not cause test failures.")
|
||||||
flag.StringVar(&TestContext.RuntimeIntegrationType, "runtime-integration-type", "", "Choose the integration path for the container runtime, mainly used for CRI validation.")
|
flag.StringVar(&TestContext.RuntimeIntegrationType, "runtime-integration-type", "", "Choose the integration path for the container runtime, mainly used for CRI validation.")
|
||||||
|
flag.StringVar(&TestContext.MounterPath, "mounter-path", "", "Path of mounter binary. Leave empty to use the default mount.")
|
||||||
}
|
}
|
||||||
|
|
||||||
// overwriteFlagsWithViperConfig finds and writes values to flags using viper as input.
|
// overwriteFlagsWithViperConfig finds and writes values to flags using viper as input.
|
||||||
|
@ -38,7 +38,7 @@ var buildTargets = []string{
|
|||||||
|
|
||||||
func BuildGo() error {
|
func BuildGo() error {
|
||||||
glog.Infof("Building k8s binaries...")
|
glog.Infof("Building k8s binaries...")
|
||||||
k8sRoot, err := getK8sRootDir()
|
k8sRoot, err := GetK8sRootDir()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to locate kubernetes root directory %v.", err)
|
return fmt.Errorf("failed to locate kubernetes root directory %v.", err)
|
||||||
}
|
}
|
||||||
@ -87,7 +87,7 @@ func getK8sBin(bin string) (string, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// TODO: Dedup / merge this with comparable utilities in e2e/util.go
|
// TODO: Dedup / merge this with comparable utilities in e2e/util.go
|
||||||
func getK8sRootDir() (string, error) {
|
func GetK8sRootDir() (string, error) {
|
||||||
// Get the directory of the current executable
|
// Get the directory of the current executable
|
||||||
_, testExec, _, _ := runtime.Caller(0)
|
_, testExec, _, _ := runtime.Caller(0)
|
||||||
path := filepath.Dir(testExec)
|
path := filepath.Dir(testExec)
|
||||||
@ -102,7 +102,7 @@ func getK8sRootDir() (string, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func GetK8sBuildOutputDir() (string, error) {
|
func GetK8sBuildOutputDir() (string, error) {
|
||||||
k8sRoot, err := getK8sRootDir()
|
k8sRoot, err := GetK8sRootDir()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
@ -113,8 +113,34 @@ func CreateTestArchive() (string, error) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Include the GCI mounter in the deployed tarball
|
||||||
|
k8sDir, err := build.GetK8sRootDir()
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("Could not find K8s root dir! Err: %v", err)
|
||||||
|
}
|
||||||
|
localSource := "cluster/gce/gci/mounter/mounter"
|
||||||
|
source := filepath.Join(k8sDir, localSource)
|
||||||
|
|
||||||
|
// Require the GCI mounter script, we want to make sure the remote test runner stays up to date if the mounter file moves
|
||||||
|
if _, err := os.Stat(source); err != nil {
|
||||||
|
return "", fmt.Errorf("Could not find GCI mounter script at %q! If this script has been (re)moved, please update the e2e node remote test runner accordingly! Err: %v", source, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
bindir := "cluster/gce/gci/mounter"
|
||||||
|
bin := "mounter"
|
||||||
|
destdir := filepath.Join(tardir, bindir)
|
||||||
|
dest := filepath.Join(destdir, bin)
|
||||||
|
out, err := exec.Command("mkdir", "-p", filepath.Join(tardir, bindir)).CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("failed to create directory %q for GCI mounter script. Err: %v. Output:\n%s", destdir, err, out)
|
||||||
|
}
|
||||||
|
out, err = exec.Command("cp", source, dest).CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("failed to copy GCI mounter script to the archive bin. Err: %v. Output:\n%s", err, out)
|
||||||
|
}
|
||||||
|
|
||||||
// Build the tar
|
// Build the tar
|
||||||
out, err := exec.Command("tar", "-zcvf", archiveName, "-C", tardir, ".").CombinedOutput()
|
out, err = exec.Command("tar", "-zcvf", archiveName, "-C", tardir, ".").CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", fmt.Errorf("failed to build tar %v. Output:\n%s", err, out)
|
return "", fmt.Errorf("failed to build tar %v. Output:\n%s", err, out)
|
||||||
}
|
}
|
||||||
@ -213,6 +239,44 @@ func RunRemote(archive string, host string, cleanup bool, junitFilePrefix string
|
|||||||
// Exit failure with the error
|
// Exit failure with the error
|
||||||
return "", false, err
|
return "", false, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// If we are testing on a GCI node, we chmod 544 the mounter and specify a different mounter path in the test args.
|
||||||
|
// We do this here because the local var `tmp` tells us which /tmp/gcloud-e2e-%d is relevant to the current test run.
|
||||||
|
|
||||||
|
// Determine if the GCI mounter script exists locally.
|
||||||
|
k8sDir, err := build.GetK8sRootDir()
|
||||||
|
if err != nil {
|
||||||
|
return "", false, fmt.Errorf("Could not find K8s root dir! Err: %v", err)
|
||||||
|
}
|
||||||
|
localSource := "cluster/gce/gci/mounter/mounter"
|
||||||
|
source := filepath.Join(k8sDir, localSource)
|
||||||
|
|
||||||
|
// Require the GCI mounter script, we want to make sure the remote test runner stays up to date if the mounter file moves
|
||||||
|
if _, err = os.Stat(source); err != nil {
|
||||||
|
return "", false, fmt.Errorf("Could not find GCI mounter script at %q! If this script has been (re)moved, please update the e2e node remote test runner accordingly! Err: %v", source, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Determine if tests will run on a GCI node.
|
||||||
|
output, err = RunSshCommand("ssh", GetHostnameOrIp(host), "--", "sh", "-c", "'cat /etc/os-release'")
|
||||||
|
if err != nil {
|
||||||
|
glog.Errorf("Issue detecting node's OS via node's /etc/os-release. Err: %v, Output:\n%s", err, output)
|
||||||
|
return "", false, fmt.Errorf("Issue detecting node's OS via node's /etc/os-release. Err: %v, Output:\n%s", err, output)
|
||||||
|
}
|
||||||
|
if strings.Contains(output, "ID=gci") {
|
||||||
|
glog.Infof("GCI node and GCI mounter both detected, modifying --mounter-path accordingly")
|
||||||
|
|
||||||
|
// Note this implicitly requires the script to be where we expect in the tarball, so if that location changes the error
|
||||||
|
// here will tell us to update the remote test runner.
|
||||||
|
mounterPath := filepath.Join(tmp, "cluster/gce/gci/mounter/mounter")
|
||||||
|
output, err = RunSshCommand("ssh", GetHostnameOrIp(host), "--", "sh", "-c", fmt.Sprintf("'chmod 544 %s'", mounterPath))
|
||||||
|
if err != nil {
|
||||||
|
glog.Errorf("Unable to chmod 544 GCI mounter script. Err: %v, Output:\n%s", err, output)
|
||||||
|
return "", false, err
|
||||||
|
}
|
||||||
|
// Insert args at beginning of testArgs, so any values from command line take precedence
|
||||||
|
testArgs = fmt.Sprintf("--mounter-path=%s ", mounterPath) + testArgs
|
||||||
|
}
|
||||||
|
|
||||||
// Run the tests
|
// Run the tests
|
||||||
cmd = getSshCommand(" && ",
|
cmd = getSshCommand(" && ",
|
||||||
fmt.Sprintf("cd %s", tmp),
|
fmt.Sprintf("cd %s", tmp),
|
||||||
|
@ -211,7 +211,9 @@ func (e *E2EServices) startKubelet() (*server, error) {
|
|||||||
"--eviction-pressure-transition-period", "30s",
|
"--eviction-pressure-transition-period", "30s",
|
||||||
"--feature-gates", framework.TestContext.FeatureGates,
|
"--feature-gates", framework.TestContext.FeatureGates,
|
||||||
"--v", LOG_VERBOSITY_LEVEL, "--logtostderr",
|
"--v", LOG_VERBOSITY_LEVEL, "--logtostderr",
|
||||||
|
"--mounter-path", framework.TestContext.MounterPath,
|
||||||
)
|
)
|
||||||
|
|
||||||
if framework.TestContext.RuntimeIntegrationType != "" {
|
if framework.TestContext.RuntimeIntegrationType != "" {
|
||||||
cmdArgs = append(cmdArgs, "--experimental-runtime-integration-type",
|
cmdArgs = append(cmdArgs, "--experimental-runtime-integration-type",
|
||||||
framework.TestContext.RuntimeIntegrationType) // Whether to use experimental cri integration.
|
framework.TestContext.RuntimeIntegrationType) // Whether to use experimental cri integration.
|
||||||
|
Loading…
Reference in New Issue
Block a user