mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-19 18:02:01 +00:00
Add test_list command, to enumerate unit and e2e tests.
This uses go/parser and go/ast to analyze all test files in ~1 second. It only recognizes a few simple structures that the tests all have, and modifies a few tests to fit expected structure better. This is part of an effort to ensure all tests have owners, by having a verify check to catch new tests being added without an owner.
This commit is contained in:
parent
cefd680d72
commit
7a573d4d3c
@ -450,15 +450,15 @@ var _ = framework.KubeDescribe("Density", func() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for _, testArg := range densityTests {
|
for _, testArg := range densityTests {
|
||||||
name := fmt.Sprintf("should allow starting %d pods per node", testArg.podsPerNode)
|
feature := "ManualPerformance"
|
||||||
switch testArg.podsPerNode {
|
switch testArg.podsPerNode {
|
||||||
case 30:
|
case 30:
|
||||||
name = "[Feature:Performance] " + name
|
feature = "Performance"
|
||||||
case 95:
|
case 95:
|
||||||
name = "[Feature:HighDensityPerformance]" + name
|
feature = "HighDensityPerformance"
|
||||||
default:
|
|
||||||
name = "[Feature:ManualPerformance] " + name
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
name := fmt.Sprintf("[Feature:%s] should allow starting %d pods per node", feature, testArg.podsPerNode)
|
||||||
itArg := testArg
|
itArg := testArg
|
||||||
It(name, func() {
|
It(name, func() {
|
||||||
podsPerNode := itArg.podsPerNode
|
podsPerNode := itArg.podsPerNode
|
||||||
|
@ -133,12 +133,11 @@ var _ = framework.KubeDescribe("Load capacity", func() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for _, testArg := range loadTests {
|
for _, testArg := range loadTests {
|
||||||
name := fmt.Sprintf("should be able to handle %v pods per node", testArg.podsPerNode)
|
feature := "ManualPerformance"
|
||||||
if testArg.podsPerNode == 30 {
|
if testArg.podsPerNode == 30 {
|
||||||
name = "[Feature:Performance] " + name
|
feature = "Performance"
|
||||||
} else {
|
|
||||||
name = "[Feature:ManualPerformance] " + name
|
|
||||||
}
|
}
|
||||||
|
name := fmt.Sprintf("[Feature:%s] should be able to handle %v pods per node", feature, testArg.podsPerNode)
|
||||||
itArg := testArg
|
itArg := testArg
|
||||||
|
|
||||||
It(name, func() {
|
It(name, func() {
|
||||||
|
@ -43,12 +43,10 @@ var _ = framework.KubeDescribe("Networking IPerf [Experimental] [Slow] [Feature:
|
|||||||
|
|
||||||
// A few simple bandwidth tests which are capped by nodes.
|
// A few simple bandwidth tests which are capped by nodes.
|
||||||
// TODO replace the 1 with the scale option implementation
|
// TODO replace the 1 with the scale option implementation
|
||||||
runClientServerBandwidthMeasurement(f, 1, gceBandwidthBitsEstimate)
|
|
||||||
})
|
|
||||||
|
|
||||||
func runClientServerBandwidthMeasurement(f *framework.Framework, numClient int, maxBandwidthBits int64) {
|
|
||||||
// TODO: Make this a function parameter, once we distribute iperf endpoints, possibly via session affinity.
|
// TODO: Make this a function parameter, once we distribute iperf endpoints, possibly via session affinity.
|
||||||
|
numClient := 1
|
||||||
numServer := 1
|
numServer := 1
|
||||||
|
maxBandwidthBits := gceBandwidthBitsEstimate
|
||||||
|
|
||||||
It(fmt.Sprintf("should transfer ~ 1GB onto the service endpoint %v servers (maximum of %v clients)", numServer, numClient), func() {
|
It(fmt.Sprintf("should transfer ~ 1GB onto the service endpoint %v servers (maximum of %v clients)", numServer, numClient), func() {
|
||||||
nodes := framework.GetReadySchedulableNodesOrDie(f.Client)
|
nodes := framework.GetReadySchedulableNodesOrDie(f.Client)
|
||||||
@ -153,4 +151,4 @@ func runClientServerBandwidthMeasurement(f *framework.Framework, numClient int,
|
|||||||
framework.Logf("%v had bandwidth %v. Ratio to expected (%v) was %f", ipClient, bandwidth, expectedBandwidth, float64(bandwidth)/float64(expectedBandwidth))
|
framework.Logf("%v had bandwidth %v. Ratio to expected (%v) was %f", ipClient, bandwidth, expectedBandwidth, float64(bandwidth)/float64(expectedBandwidth))
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
}
|
})
|
||||||
|
@ -37,11 +37,6 @@ import (
|
|||||||
. "github.com/onsi/gomega"
|
. "github.com/onsi/gomega"
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ = framework.KubeDescribe("Proxy", func() {
|
|
||||||
version := registered.GroupOrDie(api.GroupName).GroupVersion.Version
|
|
||||||
Context("version "+version, func() { proxyContext(version) })
|
|
||||||
})
|
|
||||||
|
|
||||||
const (
|
const (
|
||||||
// Try all the proxy tests this many times (to catch even rare flakes).
|
// Try all the proxy tests this many times (to catch even rare flakes).
|
||||||
proxyAttempts = 20
|
proxyAttempts = 20
|
||||||
@ -53,227 +48,230 @@ const (
|
|||||||
proxyHTTPCallTimeout = 30 * time.Second
|
proxyHTTPCallTimeout = 30 * time.Second
|
||||||
)
|
)
|
||||||
|
|
||||||
func proxyContext(version string) {
|
var _ = framework.KubeDescribe("Proxy", func() {
|
||||||
options := framework.FrameworkOptions{
|
version := registered.GroupOrDie(api.GroupName).GroupVersion.Version
|
||||||
ClientQPS: -1.0,
|
Context("version "+version, func() {
|
||||||
}
|
options := framework.FrameworkOptions{
|
||||||
f := framework.NewFramework("proxy", options, nil)
|
ClientQPS: -1.0,
|
||||||
prefix := "/api/" + version
|
}
|
||||||
|
f := framework.NewFramework("proxy", options, nil)
|
||||||
|
prefix := "/api/" + version
|
||||||
|
|
||||||
// Port here has to be kept in sync with default kubelet port.
|
// Port here has to be kept in sync with default kubelet port.
|
||||||
It("should proxy logs on node with explicit kubelet port [Conformance]", func() { nodeProxyTest(f, prefix+"/proxy/nodes/", ":10250/logs/") })
|
It("should proxy logs on node with explicit kubelet port [Conformance]", func() { nodeProxyTest(f, prefix+"/proxy/nodes/", ":10250/logs/") })
|
||||||
It("should proxy logs on node [Conformance]", func() { nodeProxyTest(f, prefix+"/proxy/nodes/", "/logs/") })
|
It("should proxy logs on node [Conformance]", func() { nodeProxyTest(f, prefix+"/proxy/nodes/", "/logs/") })
|
||||||
It("should proxy to cadvisor", func() { nodeProxyTest(f, prefix+"/proxy/nodes/", ":4194/containers/") })
|
It("should proxy to cadvisor", func() { nodeProxyTest(f, prefix+"/proxy/nodes/", ":4194/containers/") })
|
||||||
|
|
||||||
It("should proxy logs on node with explicit kubelet port using proxy subresource [Conformance]", func() { nodeProxyTest(f, prefix+"/nodes/", ":10250/proxy/logs/") })
|
It("should proxy logs on node with explicit kubelet port using proxy subresource [Conformance]", func() { nodeProxyTest(f, prefix+"/nodes/", ":10250/proxy/logs/") })
|
||||||
It("should proxy logs on node using proxy subresource [Conformance]", func() { nodeProxyTest(f, prefix+"/nodes/", "/proxy/logs/") })
|
It("should proxy logs on node using proxy subresource [Conformance]", func() { nodeProxyTest(f, prefix+"/nodes/", "/proxy/logs/") })
|
||||||
It("should proxy to cadvisor using proxy subresource", func() { nodeProxyTest(f, prefix+"/nodes/", ":4194/proxy/containers/") })
|
It("should proxy to cadvisor using proxy subresource", func() { nodeProxyTest(f, prefix+"/nodes/", ":4194/proxy/containers/") })
|
||||||
|
|
||||||
// using the porter image to serve content, access the content
|
// using the porter image to serve content, access the content
|
||||||
// (of multiple pods?) from multiple (endpoints/services?)
|
// (of multiple pods?) from multiple (endpoints/services?)
|
||||||
It("should proxy through a service and a pod [Conformance]", func() {
|
It("should proxy through a service and a pod [Conformance]", func() {
|
||||||
start := time.Now()
|
start := time.Now()
|
||||||
labels := map[string]string{"proxy-service-target": "true"}
|
labels := map[string]string{"proxy-service-target": "true"}
|
||||||
service, err := f.Client.Services(f.Namespace.Name).Create(&api.Service{
|
service, err := f.Client.Services(f.Namespace.Name).Create(&api.Service{
|
||||||
ObjectMeta: api.ObjectMeta{
|
ObjectMeta: api.ObjectMeta{
|
||||||
GenerateName: "proxy-service-",
|
GenerateName: "proxy-service-",
|
||||||
},
|
},
|
||||||
Spec: api.ServiceSpec{
|
Spec: api.ServiceSpec{
|
||||||
Selector: labels,
|
Selector: labels,
|
||||||
Ports: []api.ServicePort{
|
Ports: []api.ServicePort{
|
||||||
{
|
{
|
||||||
Name: "portname1",
|
Name: "portname1",
|
||||||
Port: 80,
|
Port: 80,
|
||||||
TargetPort: intstr.FromString("dest1"),
|
TargetPort: intstr.FromString("dest1"),
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Name: "portname2",
|
Name: "portname2",
|
||||||
Port: 81,
|
Port: 81,
|
||||||
TargetPort: intstr.FromInt(162),
|
TargetPort: intstr.FromInt(162),
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Name: "tlsportname1",
|
Name: "tlsportname1",
|
||||||
Port: 443,
|
Port: 443,
|
||||||
TargetPort: intstr.FromString("tlsdest1"),
|
TargetPort: intstr.FromString("tlsdest1"),
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Name: "tlsportname2",
|
Name: "tlsportname2",
|
||||||
Port: 444,
|
Port: 444,
|
||||||
TargetPort: intstr.FromInt(462),
|
TargetPort: intstr.FromInt(462),
|
||||||
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
})
|
||||||
})
|
Expect(err).NotTo(HaveOccurred())
|
||||||
Expect(err).NotTo(HaveOccurred())
|
|
||||||
|
|
||||||
// Make an RC with a single pod. The 'porter' image is
|
// Make an RC with a single pod. The 'porter' image is
|
||||||
// a simple server which serves the values of the
|
// a simple server which serves the values of the
|
||||||
// environmental variables below.
|
// environmental variables below.
|
||||||
By("starting an echo server on multiple ports")
|
By("starting an echo server on multiple ports")
|
||||||
pods := []*api.Pod{}
|
pods := []*api.Pod{}
|
||||||
cfg := testutils.RCConfig{
|
cfg := testutils.RCConfig{
|
||||||
Client: f.Client,
|
Client: f.Client,
|
||||||
Image: "gcr.io/google_containers/porter:cd5cb5791ebaa8641955f0e8c2a9bed669b1eaab",
|
Image: "gcr.io/google_containers/porter:cd5cb5791ebaa8641955f0e8c2a9bed669b1eaab",
|
||||||
Name: service.Name,
|
Name: service.Name,
|
||||||
Namespace: f.Namespace.Name,
|
Namespace: f.Namespace.Name,
|
||||||
Replicas: 1,
|
Replicas: 1,
|
||||||
PollInterval: time.Second,
|
PollInterval: time.Second,
|
||||||
Env: map[string]string{
|
Env: map[string]string{
|
||||||
"SERVE_PORT_80": `<a href="/rewriteme">test</a>`,
|
"SERVE_PORT_80": `<a href="/rewriteme">test</a>`,
|
||||||
"SERVE_PORT_1080": `<a href="/rewriteme">test</a>`,
|
"SERVE_PORT_1080": `<a href="/rewriteme">test</a>`,
|
||||||
"SERVE_PORT_160": "foo",
|
"SERVE_PORT_160": "foo",
|
||||||
"SERVE_PORT_162": "bar",
|
"SERVE_PORT_162": "bar",
|
||||||
|
|
||||||
"SERVE_TLS_PORT_443": `<a href="/tlsrewriteme">test</a>`,
|
"SERVE_TLS_PORT_443": `<a href="/tlsrewriteme">test</a>`,
|
||||||
"SERVE_TLS_PORT_460": `tls baz`,
|
"SERVE_TLS_PORT_460": `tls baz`,
|
||||||
"SERVE_TLS_PORT_462": `tls qux`,
|
"SERVE_TLS_PORT_462": `tls qux`,
|
||||||
},
|
|
||||||
Ports: map[string]int{
|
|
||||||
"dest1": 160,
|
|
||||||
"dest2": 162,
|
|
||||||
|
|
||||||
"tlsdest1": 460,
|
|
||||||
"tlsdest2": 462,
|
|
||||||
},
|
|
||||||
ReadinessProbe: &api.Probe{
|
|
||||||
Handler: api.Handler{
|
|
||||||
HTTPGet: &api.HTTPGetAction{
|
|
||||||
Port: intstr.FromInt(80),
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
InitialDelaySeconds: 1,
|
Ports: map[string]int{
|
||||||
TimeoutSeconds: 5,
|
"dest1": 160,
|
||||||
PeriodSeconds: 10,
|
"dest2": 162,
|
||||||
},
|
|
||||||
Labels: labels,
|
|
||||||
CreatedPods: &pods,
|
|
||||||
}
|
|
||||||
Expect(framework.RunRC(cfg)).NotTo(HaveOccurred())
|
|
||||||
defer framework.DeleteRCAndPods(f.Client, f.ClientSet, f.Namespace.Name, cfg.Name)
|
|
||||||
|
|
||||||
Expect(f.WaitForAnEndpoint(service.Name)).NotTo(HaveOccurred())
|
"tlsdest1": 460,
|
||||||
|
"tlsdest2": 462,
|
||||||
|
},
|
||||||
|
ReadinessProbe: &api.Probe{
|
||||||
|
Handler: api.Handler{
|
||||||
|
HTTPGet: &api.HTTPGetAction{
|
||||||
|
Port: intstr.FromInt(80),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
InitialDelaySeconds: 1,
|
||||||
|
TimeoutSeconds: 5,
|
||||||
|
PeriodSeconds: 10,
|
||||||
|
},
|
||||||
|
Labels: labels,
|
||||||
|
CreatedPods: &pods,
|
||||||
|
}
|
||||||
|
Expect(framework.RunRC(cfg)).NotTo(HaveOccurred())
|
||||||
|
defer framework.DeleteRCAndPods(f.Client, f.ClientSet, f.Namespace.Name, cfg.Name)
|
||||||
|
|
||||||
// table constructors
|
Expect(f.WaitForAnEndpoint(service.Name)).NotTo(HaveOccurred())
|
||||||
// Try proxying through the service and directly to through the pod.
|
|
||||||
svcProxyURL := func(scheme, port string) string {
|
|
||||||
return prefix + "/proxy/namespaces/" + f.Namespace.Name + "/services/" + net.JoinSchemeNamePort(scheme, service.Name, port)
|
|
||||||
}
|
|
||||||
subresourceServiceProxyURL := func(scheme, port string) string {
|
|
||||||
return prefix + "/namespaces/" + f.Namespace.Name + "/services/" + net.JoinSchemeNamePort(scheme, service.Name, port) + "/proxy"
|
|
||||||
}
|
|
||||||
podProxyURL := func(scheme, port string) string {
|
|
||||||
return prefix + "/proxy/namespaces/" + f.Namespace.Name + "/pods/" + net.JoinSchemeNamePort(scheme, pods[0].Name, port)
|
|
||||||
}
|
|
||||||
subresourcePodProxyURL := func(scheme, port string) string {
|
|
||||||
return prefix + "/namespaces/" + f.Namespace.Name + "/pods/" + net.JoinSchemeNamePort(scheme, pods[0].Name, port) + "/proxy"
|
|
||||||
}
|
|
||||||
|
|
||||||
// construct the table
|
// table constructors
|
||||||
expectations := map[string]string{
|
// Try proxying through the service and directly to through the pod.
|
||||||
svcProxyURL("", "portname1") + "/": "foo",
|
svcProxyURL := func(scheme, port string) string {
|
||||||
svcProxyURL("", "80") + "/": "foo",
|
return prefix + "/proxy/namespaces/" + f.Namespace.Name + "/services/" + net.JoinSchemeNamePort(scheme, service.Name, port)
|
||||||
svcProxyURL("", "portname2") + "/": "bar",
|
}
|
||||||
svcProxyURL("", "81") + "/": "bar",
|
subresourceServiceProxyURL := func(scheme, port string) string {
|
||||||
|
return prefix + "/namespaces/" + f.Namespace.Name + "/services/" + net.JoinSchemeNamePort(scheme, service.Name, port) + "/proxy"
|
||||||
|
}
|
||||||
|
podProxyURL := func(scheme, port string) string {
|
||||||
|
return prefix + "/proxy/namespaces/" + f.Namespace.Name + "/pods/" + net.JoinSchemeNamePort(scheme, pods[0].Name, port)
|
||||||
|
}
|
||||||
|
subresourcePodProxyURL := func(scheme, port string) string {
|
||||||
|
return prefix + "/namespaces/" + f.Namespace.Name + "/pods/" + net.JoinSchemeNamePort(scheme, pods[0].Name, port) + "/proxy"
|
||||||
|
}
|
||||||
|
|
||||||
svcProxyURL("http", "portname1") + "/": "foo",
|
// construct the table
|
||||||
svcProxyURL("http", "80") + "/": "foo",
|
expectations := map[string]string{
|
||||||
svcProxyURL("http", "portname2") + "/": "bar",
|
svcProxyURL("", "portname1") + "/": "foo",
|
||||||
svcProxyURL("http", "81") + "/": "bar",
|
svcProxyURL("", "80") + "/": "foo",
|
||||||
|
svcProxyURL("", "portname2") + "/": "bar",
|
||||||
|
svcProxyURL("", "81") + "/": "bar",
|
||||||
|
|
||||||
svcProxyURL("https", "tlsportname1") + "/": "tls baz",
|
svcProxyURL("http", "portname1") + "/": "foo",
|
||||||
svcProxyURL("https", "443") + "/": "tls baz",
|
svcProxyURL("http", "80") + "/": "foo",
|
||||||
svcProxyURL("https", "tlsportname2") + "/": "tls qux",
|
svcProxyURL("http", "portname2") + "/": "bar",
|
||||||
svcProxyURL("https", "444") + "/": "tls qux",
|
svcProxyURL("http", "81") + "/": "bar",
|
||||||
|
|
||||||
subresourceServiceProxyURL("", "portname1") + "/": "foo",
|
svcProxyURL("https", "tlsportname1") + "/": "tls baz",
|
||||||
subresourceServiceProxyURL("http", "portname1") + "/": "foo",
|
svcProxyURL("https", "443") + "/": "tls baz",
|
||||||
subresourceServiceProxyURL("", "portname2") + "/": "bar",
|
svcProxyURL("https", "tlsportname2") + "/": "tls qux",
|
||||||
subresourceServiceProxyURL("http", "portname2") + "/": "bar",
|
svcProxyURL("https", "444") + "/": "tls qux",
|
||||||
subresourceServiceProxyURL("https", "tlsportname1") + "/": "tls baz",
|
|
||||||
subresourceServiceProxyURL("https", "tlsportname2") + "/": "tls qux",
|
|
||||||
|
|
||||||
podProxyURL("", "1080") + "/": `<a href="` + podProxyURL("", "1080") + `/rewriteme">test</a>`,
|
subresourceServiceProxyURL("", "portname1") + "/": "foo",
|
||||||
podProxyURL("", "160") + "/": "foo",
|
subresourceServiceProxyURL("http", "portname1") + "/": "foo",
|
||||||
podProxyURL("", "162") + "/": "bar",
|
subresourceServiceProxyURL("", "portname2") + "/": "bar",
|
||||||
|
subresourceServiceProxyURL("http", "portname2") + "/": "bar",
|
||||||
|
subresourceServiceProxyURL("https", "tlsportname1") + "/": "tls baz",
|
||||||
|
subresourceServiceProxyURL("https", "tlsportname2") + "/": "tls qux",
|
||||||
|
|
||||||
podProxyURL("http", "1080") + "/": `<a href="` + podProxyURL("http", "1080") + `/rewriteme">test</a>`,
|
podProxyURL("", "1080") + "/": `<a href="` + podProxyURL("", "1080") + `/rewriteme">test</a>`,
|
||||||
podProxyURL("http", "160") + "/": "foo",
|
podProxyURL("", "160") + "/": "foo",
|
||||||
podProxyURL("http", "162") + "/": "bar",
|
podProxyURL("", "162") + "/": "bar",
|
||||||
|
|
||||||
subresourcePodProxyURL("", "") + "/": `<a href="` + subresourcePodProxyURL("", "") + `/rewriteme">test</a>`,
|
podProxyURL("http", "1080") + "/": `<a href="` + podProxyURL("http", "1080") + `/rewriteme">test</a>`,
|
||||||
subresourcePodProxyURL("", "1080") + "/": `<a href="` + subresourcePodProxyURL("", "1080") + `/rewriteme">test</a>`,
|
podProxyURL("http", "160") + "/": "foo",
|
||||||
subresourcePodProxyURL("http", "1080") + "/": `<a href="` + subresourcePodProxyURL("http", "1080") + `/rewriteme">test</a>`,
|
podProxyURL("http", "162") + "/": "bar",
|
||||||
subresourcePodProxyURL("", "160") + "/": "foo",
|
|
||||||
subresourcePodProxyURL("http", "160") + "/": "foo",
|
|
||||||
subresourcePodProxyURL("", "162") + "/": "bar",
|
|
||||||
subresourcePodProxyURL("http", "162") + "/": "bar",
|
|
||||||
|
|
||||||
subresourcePodProxyURL("https", "443") + "/": `<a href="` + subresourcePodProxyURL("https", "443") + `/tlsrewriteme">test</a>`,
|
subresourcePodProxyURL("", "") + "/": `<a href="` + subresourcePodProxyURL("", "") + `/rewriteme">test</a>`,
|
||||||
subresourcePodProxyURL("https", "460") + "/": "tls baz",
|
subresourcePodProxyURL("", "1080") + "/": `<a href="` + subresourcePodProxyURL("", "1080") + `/rewriteme">test</a>`,
|
||||||
subresourcePodProxyURL("https", "462") + "/": "tls qux",
|
subresourcePodProxyURL("http", "1080") + "/": `<a href="` + subresourcePodProxyURL("http", "1080") + `/rewriteme">test</a>`,
|
||||||
|
subresourcePodProxyURL("", "160") + "/": "foo",
|
||||||
|
subresourcePodProxyURL("http", "160") + "/": "foo",
|
||||||
|
subresourcePodProxyURL("", "162") + "/": "bar",
|
||||||
|
subresourcePodProxyURL("http", "162") + "/": "bar",
|
||||||
|
|
||||||
// TODO: below entries don't work, but I believe we should make them work.
|
subresourcePodProxyURL("https", "443") + "/": `<a href="` + subresourcePodProxyURL("https", "443") + `/tlsrewriteme">test</a>`,
|
||||||
// podPrefix + ":dest1": "foo",
|
subresourcePodProxyURL("https", "460") + "/": "tls baz",
|
||||||
// podPrefix + ":dest2": "bar",
|
subresourcePodProxyURL("https", "462") + "/": "tls qux",
|
||||||
}
|
|
||||||
|
|
||||||
wg := sync.WaitGroup{}
|
// TODO: below entries don't work, but I believe we should make them work.
|
||||||
errs := []string{}
|
// podPrefix + ":dest1": "foo",
|
||||||
errLock := sync.Mutex{}
|
// podPrefix + ":dest2": "bar",
|
||||||
recordError := func(s string) {
|
}
|
||||||
errLock.Lock()
|
|
||||||
defer errLock.Unlock()
|
|
||||||
errs = append(errs, s)
|
|
||||||
}
|
|
||||||
d := time.Since(start)
|
|
||||||
framework.Logf("setup took %v, starting test cases", d)
|
|
||||||
numberTestCases := len(expectations)
|
|
||||||
totalAttempts := numberTestCases * proxyAttempts
|
|
||||||
By(fmt.Sprintf("running %v cases, %v attempts per case, %v total attempts", numberTestCases, proxyAttempts, totalAttempts))
|
|
||||||
|
|
||||||
for i := 0; i < proxyAttempts; i++ {
|
wg := sync.WaitGroup{}
|
||||||
wg.Add(numberTestCases)
|
errs := []string{}
|
||||||
for path, val := range expectations {
|
errLock := sync.Mutex{}
|
||||||
go func(i int, path, val string) {
|
recordError := func(s string) {
|
||||||
defer wg.Done()
|
errLock.Lock()
|
||||||
// this runs the test case
|
defer errLock.Unlock()
|
||||||
body, status, d, err := doProxy(f, path, i)
|
errs = append(errs, s)
|
||||||
|
}
|
||||||
|
d := time.Since(start)
|
||||||
|
framework.Logf("setup took %v, starting test cases", d)
|
||||||
|
numberTestCases := len(expectations)
|
||||||
|
totalAttempts := numberTestCases * proxyAttempts
|
||||||
|
By(fmt.Sprintf("running %v cases, %v attempts per case, %v total attempts", numberTestCases, proxyAttempts, totalAttempts))
|
||||||
|
|
||||||
if err != nil {
|
for i := 0; i < proxyAttempts; i++ {
|
||||||
if serr, ok := err.(*errors.StatusError); ok {
|
wg.Add(numberTestCases)
|
||||||
recordError(fmt.Sprintf("%v (%v; %v): path %v gave status error: %+v",
|
for path, val := range expectations {
|
||||||
i, status, d, path, serr.Status()))
|
go func(i int, path, val string) {
|
||||||
} else {
|
defer wg.Done()
|
||||||
recordError(fmt.Sprintf("%v: path %v gave error: %v", i, path, err))
|
// this runs the test case
|
||||||
|
body, status, d, err := doProxy(f, path, i)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
if serr, ok := err.(*errors.StatusError); ok {
|
||||||
|
recordError(fmt.Sprintf("%v (%v; %v): path %v gave status error: %+v",
|
||||||
|
i, status, d, path, serr.Status()))
|
||||||
|
} else {
|
||||||
|
recordError(fmt.Sprintf("%v: path %v gave error: %v", i, path, err))
|
||||||
|
}
|
||||||
|
return
|
||||||
}
|
}
|
||||||
return
|
if status != http.StatusOK {
|
||||||
}
|
recordError(fmt.Sprintf("%v: path %v gave status: %v", i, path, status))
|
||||||
if status != http.StatusOK {
|
}
|
||||||
recordError(fmt.Sprintf("%v: path %v gave status: %v", i, path, status))
|
if e, a := val, string(body); e != a {
|
||||||
}
|
recordError(fmt.Sprintf("%v: path %v: wanted %v, got %v", i, path, e, a))
|
||||||
if e, a := val, string(body); e != a {
|
}
|
||||||
recordError(fmt.Sprintf("%v: path %v: wanted %v, got %v", i, path, e, a))
|
if d > proxyHTTPCallTimeout {
|
||||||
}
|
recordError(fmt.Sprintf("%v: path %v took %v > %v", i, path, d, proxyHTTPCallTimeout))
|
||||||
if d > proxyHTTPCallTimeout {
|
}
|
||||||
recordError(fmt.Sprintf("%v: path %v took %v > %v", i, path, d, proxyHTTPCallTimeout))
|
}(i, path, val)
|
||||||
}
|
}
|
||||||
}(i, path, val)
|
wg.Wait()
|
||||||
}
|
|
||||||
wg.Wait()
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(errs) != 0 {
|
|
||||||
body, err := f.Client.Pods(f.Namespace.Name).GetLogs(pods[0].Name, &api.PodLogOptions{}).Do().Raw()
|
|
||||||
if err != nil {
|
|
||||||
framework.Logf("Error getting logs for pod %s: %v", pods[0].Name, err)
|
|
||||||
} else {
|
|
||||||
framework.Logf("Pod %s has the following error logs: %s", pods[0].Name, body)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
Fail(strings.Join(errs, "\n"))
|
if len(errs) != 0 {
|
||||||
}
|
body, err := f.Client.Pods(f.Namespace.Name).GetLogs(pods[0].Name, &api.PodLogOptions{}).Do().Raw()
|
||||||
|
if err != nil {
|
||||||
|
framework.Logf("Error getting logs for pod %s: %v", pods[0].Name, err)
|
||||||
|
} else {
|
||||||
|
framework.Logf("Pod %s has the following error logs: %s", pods[0].Name, body)
|
||||||
|
}
|
||||||
|
|
||||||
|
Fail(strings.Join(errs, "\n"))
|
||||||
|
}
|
||||||
|
})
|
||||||
})
|
})
|
||||||
}
|
})
|
||||||
|
|
||||||
func doProxy(f *framework.Framework, path string, i int) (body []byte, statusCode int, d time.Duration, err error) {
|
func doProxy(f *framework.Framework, path string, i int) (body []byte, statusCode int, d time.Duration, err error) {
|
||||||
// About all of the proxy accesses in this file:
|
// About all of the proxy accesses in this file:
|
||||||
|
275
test/list/main.go
Normal file
275
test/list/main.go
Normal file
@ -0,0 +1,275 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2016 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
// list all unit and ginkgo test names that will be run
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"flag"
|
||||||
|
"fmt"
|
||||||
|
"go/ast"
|
||||||
|
"go/parser"
|
||||||
|
"go/token"
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
dumpTree = flag.Bool("dump", false, "print AST")
|
||||||
|
dumpJson = flag.Bool("json", false, "output test list as JSON")
|
||||||
|
warn = flag.Bool("warn", false, "print warnings")
|
||||||
|
)
|
||||||
|
|
||||||
|
type Test struct {
|
||||||
|
Loc string
|
||||||
|
Name string
|
||||||
|
TestName string
|
||||||
|
}
|
||||||
|
|
||||||
|
// collect extracts test metadata from a file.
|
||||||
|
// If src is nil, it reads filename for the code, otherwise it
|
||||||
|
// uses src (which may be a string, byte[], or io.Reader).
|
||||||
|
func collect(filename string, src interface{}) []Test {
|
||||||
|
// Create the AST by parsing src.
|
||||||
|
fset := token.NewFileSet() // positions are relative to fset
|
||||||
|
f, err := parser.ParseFile(fset, filename, src, parser.ParseComments)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if *dumpTree {
|
||||||
|
ast.Print(fset, f)
|
||||||
|
}
|
||||||
|
|
||||||
|
tests := make([]Test, 0)
|
||||||
|
|
||||||
|
ast.Walk(makeWalker("[k8s.io]", fset, &tests), f)
|
||||||
|
|
||||||
|
// Unit tests are much simpler to enumerate!
|
||||||
|
if strings.HasSuffix(filename, "_test.go") {
|
||||||
|
packageName := f.Name.Name
|
||||||
|
dirName, _ := filepath.Split(filename)
|
||||||
|
if filepath.Base(dirName) != packageName && *warn {
|
||||||
|
log.Printf("Warning: strange path/package mismatch %s %s\n", filename, packageName)
|
||||||
|
}
|
||||||
|
testPath := "k8s.io/kubernetes/" + dirName[:len(dirName)-1]
|
||||||
|
for _, decl := range f.Decls {
|
||||||
|
funcdecl, ok := decl.(*ast.FuncDecl)
|
||||||
|
if !ok {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
name := funcdecl.Name.Name
|
||||||
|
if strings.HasPrefix(name, "Test") {
|
||||||
|
tests = append(tests, Test{fset.Position(funcdecl.Pos()).String(), testPath, name})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return tests
|
||||||
|
}
|
||||||
|
|
||||||
|
// funcName converts a selectorExpr with two idents into a string,
|
||||||
|
// x.y -> "x.y"
|
||||||
|
func funcName(n ast.Expr) string {
|
||||||
|
if sel, ok := n.(*ast.SelectorExpr); ok {
|
||||||
|
if x, ok := sel.X.(*ast.Ident); ok {
|
||||||
|
return x.String() + "." + sel.Sel.String()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
// isSprintf returns whether the given node is a call to fmt.Sprintf
|
||||||
|
func isSprintf(n ast.Expr) bool {
|
||||||
|
call, ok := n.(*ast.CallExpr)
|
||||||
|
return ok && funcName(call.Fun) == "fmt.Sprintf" && len(call.Args) != 0
|
||||||
|
}
|
||||||
|
|
||||||
|
type walker struct {
|
||||||
|
path string
|
||||||
|
fset *token.FileSet
|
||||||
|
tests *[]Test
|
||||||
|
vals map[string]string
|
||||||
|
}
|
||||||
|
|
||||||
|
func makeWalker(path string, fset *token.FileSet, tests *[]Test) *walker {
|
||||||
|
return &walker{path, fset, tests, make(map[string]string)}
|
||||||
|
}
|
||||||
|
|
||||||
|
// clone creates a new walker with the given string extending the path.
|
||||||
|
func (w *walker) clone(ext string) *walker {
|
||||||
|
return &walker{w.path + " " + ext, w.fset, w.tests, w.vals}
|
||||||
|
}
|
||||||
|
|
||||||
|
// firstArg attempts to statically determine the value of the first
|
||||||
|
// argument. It only handles strings, and converts any unknown values
|
||||||
|
// (fmt.Sprintf interpolations) into *.
|
||||||
|
func (w *walker) firstArg(n *ast.CallExpr) string {
|
||||||
|
if len(n.Args) == 0 {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
var lit *ast.BasicLit
|
||||||
|
if isSprintf(n.Args[0]) {
|
||||||
|
return w.firstArg(n.Args[0].(*ast.CallExpr))
|
||||||
|
}
|
||||||
|
lit, ok := n.Args[0].(*ast.BasicLit)
|
||||||
|
if ok && lit.Kind == token.STRING {
|
||||||
|
v, err := strconv.Unquote(lit.Value)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
if strings.Contains(v, "%") {
|
||||||
|
v = strings.Replace(v, "%d", "*", -1)
|
||||||
|
v = strings.Replace(v, "%v", "*", -1)
|
||||||
|
v = strings.Replace(v, "%s", "*", -1)
|
||||||
|
}
|
||||||
|
return v
|
||||||
|
}
|
||||||
|
if ident, ok := n.Args[0].(*ast.Ident); ok {
|
||||||
|
if val, ok := w.vals[ident.String()]; ok {
|
||||||
|
return val
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if *warn {
|
||||||
|
log.Printf("Warning: dynamic arg value: %v\n", w.fset.Position(n.Args[0].Pos()))
|
||||||
|
}
|
||||||
|
return "*"
|
||||||
|
}
|
||||||
|
|
||||||
|
// describeName returns the first argument of a function if it's
|
||||||
|
// a Ginkgo-relevant function (Describe/KubeDescribe/Context),
|
||||||
|
// and the empty string otherwise.
|
||||||
|
func (w *walker) describeName(n *ast.CallExpr) string {
|
||||||
|
switch x := n.Fun.(type) {
|
||||||
|
case *ast.SelectorExpr:
|
||||||
|
if x.Sel.Name != "KubeDescribe" {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
case *ast.Ident:
|
||||||
|
if x.Name != "Describe" && x.Name != "Context" {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
return w.firstArg(n)
|
||||||
|
}
|
||||||
|
|
||||||
|
// itName returns the first argument if it's a call to It(), else "".
|
||||||
|
func (w *walker) itName(n *ast.CallExpr) string {
|
||||||
|
if fun, ok := n.Fun.(*ast.Ident); ok && fun.Name == "It" {
|
||||||
|
return w.firstArg(n)
|
||||||
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
// Visit walks the AST, following Ginkgo context and collecting tests.
|
||||||
|
// See the documentation for ast.Walk for more details.
|
||||||
|
func (w *walker) Visit(n ast.Node) ast.Visitor {
|
||||||
|
switch x := n.(type) {
|
||||||
|
case *ast.CallExpr:
|
||||||
|
name := w.describeName(x)
|
||||||
|
if name != "" && len(x.Args) >= 2 {
|
||||||
|
// If calling (Kube)Describe/Context, make a new
|
||||||
|
// walker to recurse with the description added.
|
||||||
|
return w.clone(name)
|
||||||
|
}
|
||||||
|
name = w.itName(x)
|
||||||
|
if name != "" {
|
||||||
|
// We've found an It() call, the full test name
|
||||||
|
// can be determined now.
|
||||||
|
if w.path == "[k8s.io]" && *warn {
|
||||||
|
log.Printf("It without matching Describe: %s\n", w.fset.Position(n.Pos()))
|
||||||
|
}
|
||||||
|
*w.tests = append(*w.tests, Test{w.fset.Position(n.Pos()).String(), w.path, name})
|
||||||
|
return nil // Stop walking
|
||||||
|
}
|
||||||
|
case *ast.AssignStmt:
|
||||||
|
// Attempt to track literals that might be used as
|
||||||
|
// arguments. This analysis is very unsound, and ignores
|
||||||
|
// both scope and program flow, but is sufficient for
|
||||||
|
// our minor use case.
|
||||||
|
ident, ok := x.Lhs[0].(*ast.Ident)
|
||||||
|
if ok {
|
||||||
|
if isSprintf(x.Rhs[0]) {
|
||||||
|
// x := fmt.Sprintf("something", args)
|
||||||
|
w.vals[ident.String()] = w.firstArg(x.Rhs[0].(*ast.CallExpr))
|
||||||
|
}
|
||||||
|
if lit, ok := x.Rhs[0].(*ast.BasicLit); ok && lit.Kind == token.STRING {
|
||||||
|
// x := "a literal string"
|
||||||
|
v, err := strconv.Unquote(lit.Value)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
w.vals[ident.String()] = v
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return w // Continue walking
|
||||||
|
}
|
||||||
|
|
||||||
|
type testList struct {
|
||||||
|
tests []Test
|
||||||
|
}
|
||||||
|
|
||||||
|
// handlePath walks the filesystem recursively, collecting tests
|
||||||
|
// from files with paths *e2e*.go and *_test.go, ignoring third_party
|
||||||
|
// and staging directories.
|
||||||
|
func (t *testList) handlePath(path string, info os.FileInfo, err error) error {
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if strings.Contains(path, "third_party") ||
|
||||||
|
strings.Contains(path, "staging") {
|
||||||
|
return filepath.SkipDir
|
||||||
|
}
|
||||||
|
if strings.HasSuffix(path, ".go") && strings.Contains(path, "e2e") ||
|
||||||
|
strings.HasSuffix(path, "_test.go") {
|
||||||
|
tests := collect(path, nil)
|
||||||
|
t.tests = append(t.tests, tests...)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
flag.Parse()
|
||||||
|
args := flag.Args()
|
||||||
|
if len(args) == 0 {
|
||||||
|
args = append(args, ".")
|
||||||
|
}
|
||||||
|
tests := testList{}
|
||||||
|
for _, arg := range args {
|
||||||
|
err := filepath.Walk(arg, tests.handlePath)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Error walking: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if *dumpJson {
|
||||||
|
json, err := json.Marshal(tests.tests)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatal(err)
|
||||||
|
}
|
||||||
|
fmt.Println(string(json))
|
||||||
|
} else {
|
||||||
|
for _, t := range tests.tests {
|
||||||
|
fmt.Println(t)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
111
test/list/main_test.go
Normal file
111
test/list/main_test.go
Normal file
@ -0,0 +1,111 @@
|
|||||||
|
/*
|
||||||
|
Copyright 2016 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"path/filepath"
|
||||||
|
"reflect"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
var collectCases = []struct {
|
||||||
|
filename string
|
||||||
|
code string
|
||||||
|
output []Test
|
||||||
|
}{
|
||||||
|
// Empty: no tests
|
||||||
|
{"e2e/util_test.go", "", []Test{}},
|
||||||
|
// Go unit test
|
||||||
|
{"test/list/main_test.go", `
|
||||||
|
var num = 3
|
||||||
|
func Helper(x int) { return x / 0 }
|
||||||
|
func TestStuff(t *Testing.T) {
|
||||||
|
}`, []Test{{"test/list/main_test.go:5:1", "k8s.io/kubernetes/test/list", "TestStuff"}},
|
||||||
|
},
|
||||||
|
// Describe + It
|
||||||
|
{"e2e/foo.go", `
|
||||||
|
var _ = Describe("Feature", func() {
|
||||||
|
It("should work properly", func() {})
|
||||||
|
})`, []Test{{"e2e/foo.go:4:2", "[k8s.io] Feature", "should work properly"}},
|
||||||
|
},
|
||||||
|
// KubeDescribe + It
|
||||||
|
{"e2e/foo.go", `
|
||||||
|
var _ = framework.KubeDescribe("Feature", func() {
|
||||||
|
It("should work properly", func() {})
|
||||||
|
})`, []Test{{"e2e/foo.go:4:2", "[k8s.io] Feature", "should work properly"}},
|
||||||
|
},
|
||||||
|
// KubeDescribe + Context + It
|
||||||
|
{"e2e/foo.go", `
|
||||||
|
var _ = framework.KubeDescribe("Feature", func() {
|
||||||
|
Context("when offline", func() {
|
||||||
|
It("should work", func() {})
|
||||||
|
})
|
||||||
|
})`, []Test{{"e2e/foo.go:5:3", "[k8s.io] Feature when offline", "should work"}},
|
||||||
|
},
|
||||||
|
// KubeDescribe + It(Sprintf)
|
||||||
|
{"e2e/foo.go", `
|
||||||
|
var _ = framework.KubeDescribe("Feature", func() {
|
||||||
|
It(fmt.Sprintf("handles %d nodes", num), func() {})
|
||||||
|
})`, []Test{{"e2e/foo.go:4:2", "[k8s.io] Feature", "handles * nodes"}},
|
||||||
|
},
|
||||||
|
// KubeDescribe + Sprintf + It(var)
|
||||||
|
{"e2e/foo.go", `
|
||||||
|
var _ = framework.KubeDescribe("Feature", func() {
|
||||||
|
arg := fmt.Sprintf("does %s and %v at %d", task, desc, num)
|
||||||
|
It(arg, func() {})
|
||||||
|
})`, []Test{{"e2e/foo.go:5:2", "[k8s.io] Feature", "does * and * at *"}},
|
||||||
|
},
|
||||||
|
// KubeDescribe + string + It(var)
|
||||||
|
{"e2e/foo.go", `
|
||||||
|
var _ = framework.KubeDescribe("Feature", func() {
|
||||||
|
arg := "does stuff"
|
||||||
|
It(arg, func() {})
|
||||||
|
})`, []Test{{"e2e/foo.go:5:2", "[k8s.io] Feature", "does stuff"}},
|
||||||
|
},
|
||||||
|
// KubeDescribe + It(unknown)
|
||||||
|
{"e2e/foo.go", `
|
||||||
|
var _ = framework.KubeDescribe("Feature", func() {
|
||||||
|
It(mysteryFunc(), func() {})
|
||||||
|
})`, []Test{{"e2e/foo.go:4:2", "[k8s.io] Feature", "*"}},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCollect(t *testing.T) {
|
||||||
|
for _, test := range collectCases {
|
||||||
|
code := "package test\n" + test.code
|
||||||
|
tests := collect(test.filename, code)
|
||||||
|
if !reflect.DeepEqual(tests, test.output) {
|
||||||
|
t.Errorf("code:\n%s\ngot %v\nwant %v",
|
||||||
|
code, tests, test.output)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestHandlePath(t *testing.T) {
|
||||||
|
tl := testList{}
|
||||||
|
e := errors.New("ex")
|
||||||
|
if tl.handlePath("foo", nil, e) != e {
|
||||||
|
t.Error("handlePath not returning errors")
|
||||||
|
}
|
||||||
|
if tl.handlePath("foo.txt", nil, nil) != nil {
|
||||||
|
t.Error("should skip random files")
|
||||||
|
}
|
||||||
|
if tl.handlePath("third_party/a_test.go", nil, nil) != filepath.SkipDir {
|
||||||
|
t.Error("should skip third_party")
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user