mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-09 03:57:41 +00:00
add federation ingress controller e2e
This commit is contained in:
parent
d84dcaf3fb
commit
85e7f459ca
398
test/e2e/federated-ingress.go
Normal file
398
test/e2e/federated-ingress.go
Normal file
@ -0,0 +1,398 @@
|
||||
/*
|
||||
Copyright 2016 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package e2e
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"os"
|
||||
"reflect"
|
||||
"strconv"
|
||||
"time"
|
||||
"net/http"
|
||||
|
||||
"k8s.io/kubernetes/federation/client/clientset_generated/federation_release_1_4"
|
||||
"k8s.io/kubernetes/pkg/api"
|
||||
"k8s.io/kubernetes/pkg/api/errors"
|
||||
"k8s.io/kubernetes/pkg/api/v1"
|
||||
"k8s.io/kubernetes/pkg/apis/extensions/v1beta1"
|
||||
"k8s.io/kubernetes/pkg/client/clientset_generated/release_1_3"
|
||||
"k8s.io/kubernetes/pkg/util/intstr"
|
||||
"k8s.io/kubernetes/pkg/util/wait"
|
||||
"k8s.io/kubernetes/test/e2e/framework"
|
||||
|
||||
. "github.com/onsi/ginkgo"
|
||||
. "github.com/onsi/gomega"
|
||||
)
|
||||
|
||||
const (
|
||||
FederatedIngressTimeout = 60 * time.Second
|
||||
FederatedIngressName = "federated-ingress"
|
||||
FederatedIngressServiceName = "federated-ingress-service"
|
||||
FederatedIngressServicePodName = "federated-ingress-service-test-pod"
|
||||
)
|
||||
|
||||
var _ = framework.KubeDescribe("Federation ingresses [Feature:Federation]", func() {
|
||||
f := framework.NewDefaultFederatedFramework("federated-ingress")
|
||||
|
||||
// Create/delete ingress api objects
|
||||
// Validate federation apiserver, does not rely on underlying clusters or federation ingress controller.
|
||||
Describe("Ingress objects", func() {
|
||||
AfterEach(func() {
|
||||
framework.SkipUnlessFederated(f.Client)
|
||||
|
||||
nsName := f.FederationNamespace.Name
|
||||
// Delete registered ingresses.
|
||||
ingressList, err := f.FederationClientset_1_4.Extensions().Ingresses(nsName).List(api.ListOptions{})
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
for _, ingress := range ingressList.Items {
|
||||
err := f.FederationClientset_1_4.Extensions().Ingresses(nsName).Delete(ingress.Name, &api.DeleteOptions{})
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
}
|
||||
})
|
||||
|
||||
It("should be created and deleted successfully", func() {
|
||||
framework.SkipUnlessFederated(f.Client)
|
||||
|
||||
nsName := f.FederationNamespace.Name
|
||||
ingress := createIngressOrFail(f.FederationClientset_1_4, nsName)
|
||||
By(fmt.Sprintf("Creation of ingress %q in namespace %q succeeded. Deleting ingress.", ingress.Name, nsName))
|
||||
// Cleanup
|
||||
err := f.FederationClientset_1_4.Extensions().Ingresses(nsName).Delete(ingress.Name, &api.DeleteOptions{})
|
||||
framework.ExpectNoError(err, "Error deleting ingress %q in namespace %q", ingress.Name, ingress.Namespace)
|
||||
By(fmt.Sprintf("Deletion of ingress %q in namespace %q succeeded.", ingress.Name, nsName))
|
||||
})
|
||||
})
|
||||
|
||||
// e2e cases for federation ingress controller
|
||||
var _ = Describe("Federated Ingresses", func() {
|
||||
var (
|
||||
clusters map[string]*cluster // All clusters, keyed by cluster name
|
||||
primaryClusterName, federationName, ns string
|
||||
jig *federationTestJig
|
||||
)
|
||||
|
||||
// register clusters in federation apiserver
|
||||
BeforeEach(func() {
|
||||
framework.SkipUnlessFederated(f.Client)
|
||||
if federationName = os.Getenv("FEDERATION_NAME"); federationName == "" {
|
||||
federationName = DefaultFederationName
|
||||
}
|
||||
jig = newFederationTestJig(f.FederationClientset_1_4)
|
||||
clusters = map[string]*cluster{}
|
||||
primaryClusterName = registerClusters(clusters, UserAgentName, federationName, f)
|
||||
ns = f.Namespace.Name
|
||||
})
|
||||
|
||||
AfterEach(func() {
|
||||
unregisterClusters(clusters, f)
|
||||
})
|
||||
|
||||
It("should create and update matching ingresses in underlying clusters", func() {
|
||||
framework.SkipUnlessFederated(f.Client)
|
||||
ingress := createIngressOrFail(f.FederationClientset_1_4, f.Namespace.Name)
|
||||
defer func() { // Cleanup
|
||||
By(fmt.Sprintf("Deleting ingress %q in namespace %q", ingress.Name, f.Namespace.Name))
|
||||
err := f.FederationClientset_1_4.Ingresses(f.Namespace.Name).Delete(ingress.Name, &api.DeleteOptions{})
|
||||
framework.ExpectNoError(err, "Error deleting ingress %q in namespace %q", ingress.Name, f.Namespace.Name)
|
||||
}()
|
||||
// wait for ingress shards being created
|
||||
waitForIngressShardsOrFail(f.Namespace.Name, ingress, clusters)
|
||||
ingress = updateIngressOrFail(f.FederationClientset_1_4, f.Namespace.Name)
|
||||
waitForIngressShardsUpdatedOrFail(f.Namespace.Name, ingress, clusters)
|
||||
})
|
||||
|
||||
var _ = Describe("Ingress connectivity and DNS", func() {
|
||||
|
||||
var (
|
||||
service *v1.Service
|
||||
)
|
||||
|
||||
BeforeEach(func() {
|
||||
framework.SkipUnlessFederated(f.Client)
|
||||
// create backend pod
|
||||
createBackendPodsOrFail(clusters, f.Namespace.Name, FederatedIngressServicePodName)
|
||||
// create backend service
|
||||
service = createServiceOrFail(f.FederationClientset_1_4, f.Namespace.Name, FederatedIngressServiceName)
|
||||
// create ingress object
|
||||
jig.ing = createIngressOrFail(f.FederationClientset_1_4, f.Namespace.Name)
|
||||
// wait for services objects sync
|
||||
waitForServiceShardsOrFail(f.Namespace.Name, service, clusters)
|
||||
// wait for ingress objects sync
|
||||
waitForIngressShardsOrFail(f.Namespace.Name, jig.ing, clusters)
|
||||
})
|
||||
|
||||
AfterEach(func() {
|
||||
framework.SkipUnlessFederated(f.Client)
|
||||
deleteBackendPodsOrFail(clusters, f.Namespace.Name)
|
||||
if service != nil {
|
||||
deleteServiceOrFail(f.FederationClientset_1_4, f.Namespace.Name, service.Name)
|
||||
service = nil
|
||||
} else {
|
||||
By("No service to delete. Service is nil")
|
||||
}
|
||||
if jig.ing != nil {
|
||||
deleteIngressOrFail(f.FederationClientset_1_4, f.Namespace.Name, jig.ing.Name)
|
||||
jig.ing = nil
|
||||
} else {
|
||||
By("No ingress to delete. Ingress is nil")
|
||||
}
|
||||
})
|
||||
|
||||
It("should be able to discover a federated ingress service", func() {
|
||||
framework.SkipUnlessFederated(f.Client)
|
||||
// we are about the ingress name
|
||||
svcDNSNames := []string{
|
||||
FederatedIngressServiceName,
|
||||
fmt.Sprintf("%s.%s", FederatedIngressServiceName, f.Namespace.Name),
|
||||
fmt.Sprintf("%s.%s.svc.cluster.local.", FederatedIngressServiceName, f.Namespace.Name),
|
||||
// TODO these two entries are not set yet
|
||||
//fmt.Sprintf("%s.%s.%s", FederatedIngressServiceName, f.Namespace.Name, federationName),
|
||||
//fmt.Sprintf("%s.%s.%s.svc.cluster.local.", FederatedIngressServiceName, f.Namespace.Name, federationName),
|
||||
}
|
||||
// check dns records in underlying cluster
|
||||
for i, DNSName := range svcDNSNames {
|
||||
discoverService(f, DNSName, true, "federated-ingress-e2e-discovery-pod-"+strconv.Itoa(i))
|
||||
}
|
||||
// TODO check dns record in global dns server
|
||||
|
||||
// check the traffic on federation ingress
|
||||
jig.waitForFederatedIngress()
|
||||
})
|
||||
|
||||
})
|
||||
})
|
||||
})
|
||||
|
||||
/*
|
||||
equivalent returns true if the two ingresss are equivalent. Fields which are expected to differ between
|
||||
federated ingresss and the underlying cluster ingresss (e.g. ClusterIP, LoadBalancerIP etc) are ignored.
|
||||
*/
|
||||
func equivalentIngress(federatedIngress, clusterIngress v1beta1.Ingress) bool {
|
||||
return reflect.DeepEqual(clusterIngress.Spec, federatedIngress.Spec)
|
||||
}
|
||||
|
||||
/*
|
||||
waitForIngressOrFail waits until a ingress is either present or absent in the cluster specified by clientset.
|
||||
If the condition is not met within timout, it fails the calling test.
|
||||
*/
|
||||
func waitForIngressOrFail(clientset *release_1_3.Clientset, namespace string, ingress *v1beta1.Ingress, present bool, timeout time.Duration) {
|
||||
By(fmt.Sprintf("Fetching a federated ingress shard of ingress %q in namespace %q from cluster", ingress.Name, namespace))
|
||||
var clusterIngress *v1beta1.Ingress
|
||||
err := wait.PollImmediate(framework.Poll, timeout, func() (bool, error) {
|
||||
clusterIngress, err := clientset.Ingresses(namespace).Get(ingress.Name)
|
||||
if (!present) && errors.IsNotFound(err) { // We want it gone, and it's gone.
|
||||
By(fmt.Sprintf("Success: shard of federated ingress %q in namespace %q in cluster is absent", ingress.Name, namespace))
|
||||
return true, nil // Success
|
||||
}
|
||||
if present && err == nil { // We want it present, and the Get succeeded, so we're all good.
|
||||
By(fmt.Sprintf("Success: shard of federated ingress %q in namespace %q in cluster is present", ingress.Name, namespace))
|
||||
return true, nil // Success
|
||||
}
|
||||
By(fmt.Sprintf("Ingress %q in namespace %q in cluster. Found: %v, waiting for Found: %v, trying again in %s (err=%v)", ingress.Name, namespace, clusterIngress != nil && err == nil, present, framework.Poll, err))
|
||||
return false, nil
|
||||
})
|
||||
framework.ExpectNoError(err, "Failed to verify ingress %q in namespace %q in cluster: Present=%v", ingress.Name, namespace, present)
|
||||
|
||||
if present && clusterIngress != nil {
|
||||
Expect(equivalentIngress(*clusterIngress, *ingress))
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
waitForIngressShardsOrFail waits for the ingress to appear in all clusters
|
||||
*/
|
||||
func waitForIngressShardsOrFail(namespace string, ingress *v1beta1.Ingress, clusters map[string]*cluster) {
|
||||
framework.Logf("Waiting for ingress %q in %d clusters", ingress.Name, len(clusters))
|
||||
for _, c := range clusters {
|
||||
waitForIngressOrFail(c.Clientset, namespace, ingress, true, FederatedIngressTimeout)
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
waitForIngressShardsOrFail waits for the ingress to appear in all clusters
|
||||
*/
|
||||
func waitForIngressShardsUpdatedOrFail(namespace string, ingress *v1beta1.Ingress, clusters map[string]*cluster) {
|
||||
framework.Logf("Waiting for ingress %q in %d clusters", ingress.Name, len(clusters))
|
||||
for _, c := range clusters {
|
||||
waitForIngressUpdateOrFail(c.Clientset, namespace, ingress, FederatedIngressTimeout)
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
waitForIngressOrFail waits until a ingress is either present or absent in the cluster specified by clientset.
|
||||
If the condition is not met within timout, it fails the calling test.
|
||||
*/
|
||||
func waitForIngressUpdateOrFail(clientset *release_1_3.Clientset, namespace string, ingress *v1beta1.Ingress, timeout time.Duration) {
|
||||
By(fmt.Sprintf("Fetching a federated ingress shard of ingress %q in namespace %q from cluster", ingress.Name, namespace))
|
||||
err := wait.PollImmediate(framework.Poll, timeout, func() (bool, error) {
|
||||
clusterIngress, err := clientset.Ingresses(namespace).Get(ingress.Name)
|
||||
if err == nil { // We want it present, and the Get succeeded, so we're all good.
|
||||
if equivalentIngress(*clusterIngress, *ingress) {
|
||||
By(fmt.Sprintf("Success: shard of federated ingress %q in namespace %q in cluster is updated", ingress.Name, namespace))
|
||||
return true, nil
|
||||
}
|
||||
By(fmt.Sprintf("Ingress %q in namespace %q in cluster, waiting for service being updated, trying again in %s (err=%v)", ingress.Name, namespace, framework.Poll, err))
|
||||
return false, nil
|
||||
}
|
||||
By(fmt.Sprintf("Ingress %q in namespace %q in cluster, waiting for service being updated, trying again in %s (err=%v)", ingress.Name, namespace, framework.Poll, err))
|
||||
return false, nil
|
||||
})
|
||||
framework.ExpectNoError(err, "Failed to verify ingress %q in namespace %q in cluster", ingress.Name, namespace)
|
||||
}
|
||||
|
||||
/*
|
||||
waitForIngressShardsGoneOrFail waits for the ingress to disappear in all clusters
|
||||
*/
|
||||
func waitForIngressShardsGoneOrFail(namespace string, ingress *v1beta1.Ingress, clusters map[string]*cluster) {
|
||||
framework.Logf("Waiting for ingress %q in %d clusters", ingress.Name, len(clusters))
|
||||
for _, c := range clusters {
|
||||
waitForIngressOrFail(c.Clientset, namespace, ingress, false, FederatedIngressTimeout)
|
||||
}
|
||||
}
|
||||
|
||||
func deleteIngressOrFail(clientset *federation_release_1_4.Clientset, namespace string, ingressName string) {
|
||||
if clientset == nil || len(namespace) == 0 || len(ingressName) == 0 {
|
||||
Fail(fmt.Sprintf("Internal error: invalid parameters passed to deleteIngressOrFail: clientset: %v, namespace: %v, ingress: %v", clientset, namespace, ingressName))
|
||||
}
|
||||
err := clientset.Ingresses(namespace).Delete(ingressName, api.NewDeleteOptions(0))
|
||||
framework.ExpectNoError(err, "Error deleting ingress %q from namespace %q", ingressName, namespace)
|
||||
}
|
||||
|
||||
func createIngressOrFail(clientset *federation_release_1_4.Clientset, namespace string) *v1beta1.Ingress {
|
||||
if clientset == nil || len(namespace) == 0 {
|
||||
Fail(fmt.Sprintf("Internal error: invalid parameters passed to createIngressOrFail: clientset: %v, namespace: %v", clientset, namespace))
|
||||
}
|
||||
By(fmt.Sprintf("Creating federated ingress %q in namespace %q", FederatedIngressName, namespace))
|
||||
|
||||
ingress := &v1beta1.Ingress{
|
||||
ObjectMeta: v1.ObjectMeta{
|
||||
Name: FederatedIngressName,
|
||||
},
|
||||
Spec: v1beta1.IngressSpec{
|
||||
Backend: &v1beta1.IngressBackend{
|
||||
ServiceName: "testingress-service",
|
||||
ServicePort: intstr.FromInt(80),
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
_, err := clientset.Extensions().Ingresses(namespace).Create(ingress)
|
||||
framework.ExpectNoError(err, "Creating ingress %q in namespace %q", ingress.Name, namespace)
|
||||
By(fmt.Sprintf("Successfully created federated ingress %q in namespace %q", FederatedIngressName, namespace))
|
||||
return ingress
|
||||
}
|
||||
|
||||
func updateIngressOrFail(clientset *federation_release_1_4.Clientset, namespace string) (newIng *v1beta1.Ingress) {
|
||||
var err error
|
||||
if clientset == nil || len(namespace) == 0 {
|
||||
Fail(fmt.Sprintf("Internal error: invalid parameters passed to createIngressOrFail: clientset: %v, namespace: %v", clientset, namespace))
|
||||
}
|
||||
ingress := &v1beta1.Ingress{
|
||||
ObjectMeta: v1.ObjectMeta{
|
||||
Name: FederatedIngressName,
|
||||
},
|
||||
Spec: v1beta1.IngressSpec{
|
||||
Backend: &v1beta1.IngressBackend{
|
||||
ServiceName: "updated-testingress-service",
|
||||
ServicePort: intstr.FromInt(80),
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
for i := 0; i < 3; i++ {
|
||||
_, err = clientset.Extensions().Ingresses(namespace).Get(FederatedIngressName)
|
||||
if err != nil {
|
||||
framework.Failf("failed to get ingress %q: %v", FederatedIngressName, err)
|
||||
}
|
||||
newIng, err = clientset.Extensions().Ingresses(namespace).Update(ingress)
|
||||
if err == nil {
|
||||
describeIng(namespace)
|
||||
return
|
||||
}
|
||||
if !errors.IsConflict(err) && !errors.IsServerTimeout(err) {
|
||||
framework.Failf("failed to update ingress %q: %v", FederatedIngressName, err)
|
||||
}
|
||||
}
|
||||
framework.Failf("too many retries updating ingress %q", FederatedIngressName)
|
||||
return newIng
|
||||
}
|
||||
|
||||
func (j *federationTestJig) waitForFederatedIngress() {
|
||||
// Wait for the loadbalancer IP.
|
||||
address, err := WaitForFederatedIngressAddress(j.client, j.ing.Namespace, j.ing.Name, lbPollTimeout)
|
||||
if err != nil {
|
||||
framework.Failf("Ingress failed to acquire an IP address within %v", lbPollTimeout)
|
||||
}
|
||||
j.address = address
|
||||
framework.Logf("Found address %v for ingress %v", j.address, j.ing.Name)
|
||||
timeoutClient := &http.Client{Timeout: reqTimeout}
|
||||
|
||||
// Check that all rules respond to a simple GET.
|
||||
for _, rules := range j.ing.Spec.Rules {
|
||||
proto := "http"
|
||||
for _, p := range rules.IngressRuleValue.HTTP.Paths {
|
||||
route := fmt.Sprintf("%v://%v%v", proto, address, p.Path)
|
||||
framework.Logf("Testing route %v host %v with simple GET", route, rules.Host)
|
||||
ExpectNoError(pollURL(route, rules.Host, lbPollTimeout, timeoutClient, false))
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
type federationTestJig struct {
|
||||
// TODO add TLS check later
|
||||
rootCAs map[string][]byte
|
||||
address string
|
||||
ing *v1beta1.Ingress
|
||||
client *federation_release_1_4.Clientset
|
||||
}
|
||||
|
||||
func newFederationTestJig(c *federation_release_1_4.Clientset) *federationTestJig {
|
||||
return &federationTestJig{client: c, rootCAs: map[string][]byte{}}
|
||||
}
|
||||
|
||||
// WaitForFederatedIngressAddress waits for the Ingress to acquire an address.
|
||||
func WaitForFederatedIngressAddress(c *federation_release_1_4.Clientset, ns, ingName string, timeout time.Duration) (string, error) {
|
||||
var address string
|
||||
err := wait.PollImmediate(10*time.Second, timeout, func() (bool, error) {
|
||||
ipOrNameList, err := getFederatedIngressAddress(c, ns, ingName)
|
||||
if err != nil || len(ipOrNameList) == 0 {
|
||||
framework.Logf("Waiting for Ingress %v to acquire IP, error %v", ingName, err)
|
||||
return false, nil
|
||||
}
|
||||
address = ipOrNameList[0]
|
||||
return true, nil
|
||||
})
|
||||
return address, err
|
||||
}
|
||||
|
||||
// getFederatedIngressAddress returns the ips/hostnames associated with the Ingress.
|
||||
func getFederatedIngressAddress(client *federation_release_1_4.Clientset, ns, name string) ([]string, error) {
|
||||
ing, err := client.Extensions().Ingresses(ns).Get(name)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
addresses := []string{}
|
||||
for _, a := range ing.Status.LoadBalancer.Ingress {
|
||||
if a.IP != "" {
|
||||
addresses = append(addresses, a.IP)
|
||||
}
|
||||
if a.Hostname != "" {
|
||||
addresses = append(addresses, a.Hostname)
|
||||
}
|
||||
}
|
||||
return addresses, nil
|
||||
}
|
@ -1,92 +0,0 @@
|
||||
/*
|
||||
Copyright 2016 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package e2e
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
|
||||
. "github.com/onsi/ginkgo"
|
||||
"k8s.io/kubernetes/federation/client/clientset_generated/federation_release_1_4"
|
||||
"k8s.io/kubernetes/pkg/api"
|
||||
"k8s.io/kubernetes/pkg/api/v1"
|
||||
"k8s.io/kubernetes/pkg/apis/extensions/v1beta1"
|
||||
"k8s.io/kubernetes/pkg/util/intstr"
|
||||
"k8s.io/kubernetes/test/e2e/framework"
|
||||
|
||||
. "github.com/onsi/gomega"
|
||||
)
|
||||
|
||||
const (
|
||||
FederationIngressName = "federation-ingress"
|
||||
)
|
||||
|
||||
// Create/delete ingress api objects
|
||||
var _ = framework.KubeDescribe("Federation ingresses [Feature:Federation]", func() {
|
||||
f := framework.NewDefaultFederatedFramework("federation-ingress")
|
||||
|
||||
Describe("Ingress objects", func() {
|
||||
AfterEach(func() {
|
||||
framework.SkipUnlessFederated(f.Client)
|
||||
|
||||
nsName := f.FederationNamespace.Name
|
||||
// Delete registered ingresses.
|
||||
ingressList, err := f.FederationClientset_1_4.Extensions().Ingresses(nsName).List(api.ListOptions{})
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
for _, ingress := range ingressList.Items {
|
||||
err := f.FederationClientset_1_4.Extensions().Ingresses(nsName).Delete(ingress.Name, &api.DeleteOptions{})
|
||||
Expect(err).NotTo(HaveOccurred())
|
||||
}
|
||||
})
|
||||
|
||||
It("should be created and deleted successfully", func() {
|
||||
framework.SkipUnlessFederated(f.Client)
|
||||
|
||||
nsName := f.FederationNamespace.Name
|
||||
ingress := createIngressOrFail(f.FederationClientset_1_4, nsName)
|
||||
By(fmt.Sprintf("Creation of ingress %q in namespace %q succeeded. Deleting ingress.", ingress.Name, nsName))
|
||||
// Cleanup
|
||||
err := f.FederationClientset_1_4.Extensions().Ingresses(nsName).Delete(ingress.Name, &api.DeleteOptions{})
|
||||
framework.ExpectNoError(err, "Error deleting ingress %q in namespace %q", ingress.Name, ingress.Namespace)
|
||||
By(fmt.Sprintf("Deletion of ingress %q in namespace %q succeeded.", ingress.Name, nsName))
|
||||
})
|
||||
|
||||
})
|
||||
})
|
||||
|
||||
func createIngressOrFail(clientset *federation_release_1_4.Clientset, namespace string) *v1beta1.Ingress {
|
||||
if clientset == nil || len(namespace) == 0 {
|
||||
Fail(fmt.Sprintf("Internal error: invalid parameters passed to createIngressOrFail: clientset: %v, namespace: %v", clientset, namespace))
|
||||
}
|
||||
By(fmt.Sprintf("Creating federated ingress %q in namespace %q", FederationIngressName, namespace))
|
||||
|
||||
ingress := &v1beta1.Ingress{
|
||||
ObjectMeta: v1.ObjectMeta{
|
||||
Name: FederationIngressName,
|
||||
},
|
||||
Spec: v1beta1.IngressSpec{
|
||||
Backend: &v1beta1.IngressBackend{
|
||||
ServiceName: "testservice",
|
||||
ServicePort: intstr.FromInt(80),
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
_, err := clientset.Extensions().Ingresses(namespace).Create(ingress)
|
||||
framework.ExpectNoError(err, "Creating ingress %q in namespace %q", ingress.Name, namespace)
|
||||
By(fmt.Sprintf("Successfully created federated ingress %q in namespace %q", FederationIngressName, namespace))
|
||||
return ingress
|
||||
}
|
Loading…
Reference in New Issue
Block a user