mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-31 13:50:01 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			119 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			119 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2016 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package remote
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"path/filepath"
 | |
| 
 | |
| 	"k8s.io/klog/v2"
 | |
| )
 | |
| 
 | |
| // utils.go contains functions used across test suites.
 | |
| 
 | |
| const (
 | |
| 	cniVersion       = "v0.8.7"
 | |
| 	cniArch          = "amd64"
 | |
| 	cniDirectory     = "cni/bin" // The CNI tarball places binaries under directory under "cni/bin".
 | |
| 	cniConfDirectory = "cni/net.d"
 | |
| 	cniURL           = "https://storage.googleapis.com/k8s-artifacts-cni/release/" + cniVersion + "/" + "cni-plugins-linux-" + cniArch + "-" + cniVersion + ".tgz"
 | |
| )
 | |
| 
 | |
| const cniConfig = `{
 | |
|   "name": "mynet",
 | |
|   "type": "bridge",
 | |
|   "bridge": "mynet0",
 | |
|   "isDefaultGateway": true,
 | |
|   "forceAddress": false,
 | |
|   "ipMasq": true,
 | |
|   "hairpinMode": true,
 | |
|   "ipam": {
 | |
|     "type": "host-local",
 | |
|     "subnet": "10.10.0.0/16"
 | |
|   }
 | |
| }
 | |
| `
 | |
| 
 | |
| // Install the cni plugin and add basic bridge configuration to the
 | |
| // configuration directory.
 | |
| func setupCNI(host, workspace string) error {
 | |
| 	klog.V(2).Infof("Install CNI on %q", host)
 | |
| 	cniPath := filepath.Join(workspace, cniDirectory)
 | |
| 	cmd := getSSHCommand(" ; ",
 | |
| 		fmt.Sprintf("mkdir -p %s", cniPath),
 | |
| 		fmt.Sprintf("curl -s -L %s | tar -xz -C %s", cniURL, cniPath),
 | |
| 	)
 | |
| 	if output, err := SSH(host, "sh", "-c", cmd); err != nil {
 | |
| 		return fmt.Errorf("failed to install cni plugin on %q: %v output: %q", host, err, output)
 | |
| 	}
 | |
| 
 | |
| 	// The added CNI network config is not needed for kubenet. It is only
 | |
| 	// used when testing the CNI network plugin, but is added in both cases
 | |
| 	// for consistency and simplicity.
 | |
| 	klog.V(2).Infof("Adding CNI configuration on %q", host)
 | |
| 	cniConfigPath := filepath.Join(workspace, cniConfDirectory)
 | |
| 	cmd = getSSHCommand(" ; ",
 | |
| 		fmt.Sprintf("mkdir -p %s", cniConfigPath),
 | |
| 		fmt.Sprintf("echo %s > %s", quote(cniConfig), filepath.Join(cniConfigPath, "mynet.conf")),
 | |
| 	)
 | |
| 	if output, err := SSH(host, "sh", "-c", cmd); err != nil {
 | |
| 		return fmt.Errorf("failed to write cni configuration on %q: %v output: %q", host, err, output)
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // configureFirewall configures iptable firewall rules.
 | |
| func configureFirewall(host string) error {
 | |
| 	klog.V(2).Infof("Configure iptables firewall rules on %q", host)
 | |
| 
 | |
| 	// Since the goal is to enable connectivity without taking into account current rule,
 | |
| 	// we can just prepend the accept rules directly without any check
 | |
| 	cmd := getSSHCommand("&&",
 | |
| 		"iptables -I INPUT 1 -w -p tcp -j ACCEPT",
 | |
| 		"iptables -I INPUT 1 -w -p udp -j ACCEPT",
 | |
| 		"iptables -I INPUT 1 -w -p icmp -j ACCEPT",
 | |
| 		"iptables -I FORWARD 1 -w -p tcp -j ACCEPT",
 | |
| 		"iptables -I FORWARD 1 -w -p udp -j ACCEPT",
 | |
| 		"iptables -I FORWARD 1 -w -p icmp -j ACCEPT",
 | |
| 	)
 | |
| 	output, err := SSH(host, "sh", "-c", cmd)
 | |
| 	if err != nil {
 | |
| 		return fmt.Errorf("failed to configured firewall on %q: %v output: %v", host, err, output)
 | |
| 	}
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // cleanupNodeProcesses kills all running node processes may conflict with the test.
 | |
| func cleanupNodeProcesses(host string) {
 | |
| 	klog.V(2).Infof("Killing any existing node processes on %q", host)
 | |
| 	cmd := getSSHCommand(" ; ",
 | |
| 		"pkill kubelet",
 | |
| 		"pkill kube-apiserver",
 | |
| 		"pkill etcd",
 | |
| 		"pkill e2e_node.test",
 | |
| 	)
 | |
| 	// No need to log an error if pkill fails since pkill will fail if the commands are not running.
 | |
| 	// If we are unable to stop existing running k8s processes, we should see messages in the kubelet/apiserver/etcd
 | |
| 	// logs about failing to bind the required ports.
 | |
| 	SSH(host, "sh", "-c", cmd)
 | |
| }
 | |
| 
 | |
| // Quotes a shell literal so it can be nested within another shell scope.
 | |
| func quote(s string) string {
 | |
| 	return fmt.Sprintf("'\"'\"'%s'\"'\"'", s)
 | |
| }
 |