mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-30 05:14:54 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			493 lines
		
	
	
		
			21 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			493 lines
		
	
	
		
			21 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2016 The Kubernetes Authors.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| package e2e_federation
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 	"os"
 | |
| 	"reflect"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 	"time"
 | |
| 
 | |
| 	"k8s.io/apimachinery/pkg/api/errors"
 | |
| 	metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
 | |
| 	"k8s.io/apimachinery/pkg/util/intstr"
 | |
| 	"k8s.io/apimachinery/pkg/util/wait"
 | |
| 	fedclientset "k8s.io/kubernetes/federation/client/clientset_generated/federation_clientset"
 | |
| 	"k8s.io/kubernetes/pkg/api/v1"
 | |
| 	"k8s.io/kubernetes/pkg/apis/extensions/v1beta1"
 | |
| 	kubeclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
 | |
| 	"k8s.io/kubernetes/test/e2e/framework"
 | |
| 	fedframework "k8s.io/kubernetes/test/e2e_federation/framework"
 | |
| 
 | |
| 	. "github.com/onsi/ginkgo"
 | |
| 	. "github.com/onsi/gomega"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	MaxRetriesOnFederatedApiserver = 3
 | |
| 	FederatedIngressTimeout        = 120 * time.Second
 | |
| 	FederatedIngressName           = "federated-ingress"
 | |
| 	FederatedIngressServiceName    = "federated-ingress-service"
 | |
| 	FederatedIngressServicePodName = "federated-ingress-service-test-pod"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	// timeout on a single http request.
 | |
| 	reqTimeout = 10 * time.Second
 | |
| )
 | |
| 
 | |
| var _ = framework.KubeDescribe("Federated ingresses [Feature:Federation]", func() {
 | |
| 	f := fedframework.NewDefaultFederatedFramework("federated-ingress")
 | |
| 
 | |
| 	// Create/delete ingress api objects
 | |
| 	// Validate federation apiserver, does not rely on underlying clusters or federation ingress controller.
 | |
| 	Describe("Federated Ingresses [NoCluster]", func() {
 | |
| 		AfterEach(func() {
 | |
| 			nsName := f.FederationNamespace.Name
 | |
| 			// Delete all ingresses.
 | |
| 			deleteAllIngressesOrFail(f.FederationClientset, nsName)
 | |
| 		})
 | |
| 
 | |
| 		It("should be created and deleted successfully", func() {
 | |
| 			fedframework.SkipUnlessFederated(f.ClientSet)
 | |
| 			framework.SkipUnlessProviderIs("gce", "gke") // TODO: Federated ingress is not yet supported on non-GCP platforms.
 | |
| 			nsName := f.FederationNamespace.Name
 | |
| 			ingress := createIngressOrFail(f.FederationClientset, nsName)
 | |
| 			By(fmt.Sprintf("Creation of ingress %q in namespace %q succeeded.  Deleting ingress.", ingress.Name, nsName))
 | |
| 			// Cleanup
 | |
| 			err := f.FederationClientset.Extensions().Ingresses(nsName).Delete(ingress.Name, &metav1.DeleteOptions{})
 | |
| 			framework.ExpectNoError(err, "Error deleting ingress %q in namespace %q", ingress.Name, ingress.Namespace)
 | |
| 			By(fmt.Sprintf("Deletion of ingress %q in namespace %q succeeded.", ingress.Name, nsName))
 | |
| 		})
 | |
| 	})
 | |
| 
 | |
| 	// e2e cases for federation ingress controller
 | |
| 	var _ = Describe("Federated Ingresses", func() {
 | |
| 		var (
 | |
| 			clusters                               map[string]*cluster // All clusters, keyed by cluster name
 | |
| 			primaryClusterName, federationName, ns string
 | |
| 			jig                                    *federationTestJig
 | |
| 		)
 | |
| 
 | |
| 		// register clusters in federation apiserver
 | |
| 		BeforeEach(func() {
 | |
| 			fedframework.SkipUnlessFederated(f.ClientSet)
 | |
| 			framework.SkipUnlessProviderIs("gce", "gke") // TODO: Federated ingress is not yet supported on non-GCP platforms.
 | |
| 			if federationName = os.Getenv("FEDERATION_NAME"); federationName == "" {
 | |
| 				federationName = DefaultFederationName
 | |
| 			}
 | |
| 			jig = newFederationTestJig(f.FederationClientset)
 | |
| 			clusters = map[string]*cluster{}
 | |
| 			primaryClusterName = registerClusters(clusters, UserAgentName, federationName, f)
 | |
| 			ns = f.FederationNamespace.Name
 | |
| 		})
 | |
| 
 | |
| 		AfterEach(func() {
 | |
| 			// Delete all ingresses.
 | |
| 			nsName := f.FederationNamespace.Name
 | |
| 			deleteAllIngressesOrFail(f.FederationClientset, nsName)
 | |
| 			unregisterClusters(clusters, f)
 | |
| 		})
 | |
| 
 | |
| 		It("should create and update matching ingresses in underlying clusters", func() {
 | |
| 			ingress := createIngressOrFail(f.FederationClientset, ns)
 | |
| 			// wait for ingress shards being created
 | |
| 			waitForIngressShardsOrFail(ns, ingress, clusters)
 | |
| 			ingress = updateIngressOrFail(f.FederationClientset, ns)
 | |
| 			waitForIngressShardsUpdatedOrFail(ns, ingress, clusters)
 | |
| 		})
 | |
| 
 | |
| 		It("should be deleted from underlying clusters when OrphanDependents is false", func() {
 | |
| 			fedframework.SkipUnlessFederated(f.ClientSet)
 | |
| 			nsName := f.FederationNamespace.Name
 | |
| 			orphanDependents := false
 | |
| 			verifyCascadingDeletionForIngress(f.FederationClientset, clusters, &orphanDependents, nsName)
 | |
| 			By(fmt.Sprintf("Verified that ingresses were deleted from underlying clusters"))
 | |
| 		})
 | |
| 
 | |
| 		It("should not be deleted from underlying clusters when OrphanDependents is true", func() {
 | |
| 			fedframework.SkipUnlessFederated(f.ClientSet)
 | |
| 			nsName := f.FederationNamespace.Name
 | |
| 			orphanDependents := true
 | |
| 			verifyCascadingDeletionForIngress(f.FederationClientset, clusters, &orphanDependents, nsName)
 | |
| 			By(fmt.Sprintf("Verified that ingresses were not deleted from underlying clusters"))
 | |
| 		})
 | |
| 
 | |
| 		It("should not be deleted from underlying clusters when OrphanDependents is nil", func() {
 | |
| 			fedframework.SkipUnlessFederated(f.ClientSet)
 | |
| 			nsName := f.FederationNamespace.Name
 | |
| 			verifyCascadingDeletionForIngress(f.FederationClientset, clusters, nil, nsName)
 | |
| 			By(fmt.Sprintf("Verified that ingresses were not deleted from underlying clusters"))
 | |
| 		})
 | |
| 
 | |
| 		var _ = Describe("Ingress connectivity and DNS", func() {
 | |
| 
 | |
| 			var (
 | |
| 				service *v1.Service
 | |
| 			)
 | |
| 
 | |
| 			BeforeEach(func() {
 | |
| 				fedframework.SkipUnlessFederated(f.ClientSet)
 | |
| 				// create backend pod
 | |
| 				createBackendPodsOrFail(clusters, ns, FederatedIngressServicePodName)
 | |
| 				// create backend service
 | |
| 				service = createServiceOrFail(f.FederationClientset, ns, FederatedIngressServiceName)
 | |
| 				// create ingress object
 | |
| 				jig.ing = createIngressOrFail(f.FederationClientset, ns)
 | |
| 				// wait for services objects sync
 | |
| 				waitForServiceShardsOrFail(ns, service, clusters)
 | |
| 				// wait for ingress objects sync
 | |
| 				waitForIngressShardsOrFail(ns, jig.ing, clusters)
 | |
| 			})
 | |
| 
 | |
| 			AfterEach(func() {
 | |
| 				deleteBackendPodsOrFail(clusters, ns)
 | |
| 				if service != nil {
 | |
| 					deleteServiceOrFail(f.FederationClientset, ns, service.Name, nil)
 | |
| 					cleanupServiceShardsAndProviderResources(ns, service, clusters)
 | |
| 					service = nil
 | |
| 				} else {
 | |
| 					By("No service to delete. Service is nil")
 | |
| 				}
 | |
| 				if jig.ing != nil {
 | |
| 					deleteIngressOrFail(f.FederationClientset, ns, jig.ing.Name, nil)
 | |
| 					for clusterName, cluster := range clusters {
 | |
| 						deleteClusterIngressOrFail(clusterName, cluster.Clientset, ns, jig.ing.Name)
 | |
| 					}
 | |
| 					jig.ing = nil
 | |
| 				} else {
 | |
| 					By("No ingress to delete. Ingress is nil")
 | |
| 				}
 | |
| 			})
 | |
| 
 | |
| 			PIt("should be able to discover a federated ingress service via DNS", func() {
 | |
| 				// we are about the ingress name
 | |
| 				svcDNSNames := []string{
 | |
| 					fmt.Sprintf("%s.%s", FederatedIngressServiceName, ns),
 | |
| 					fmt.Sprintf("%s.%s.svc.cluster.local.", FederatedIngressServiceName, ns),
 | |
| 					// TODO these two entries are not set yet
 | |
| 					//fmt.Sprintf("%s.%s.%s", FederatedIngressServiceName, ns, federationName),
 | |
| 					//fmt.Sprintf("%s.%s.%s.svc.cluster.local.", FederatedIngressServiceName, ns, federationName),
 | |
| 				}
 | |
| 				// check dns records in underlying cluster
 | |
| 				for i, DNSName := range svcDNSNames {
 | |
| 					discoverService(f, DNSName, true, "federated-ingress-e2e-discovery-pod-"+strconv.Itoa(i))
 | |
| 				}
 | |
| 				// TODO check dns record in global dns server
 | |
| 			})
 | |
| 
 | |
| 			It("should be able to connect to a federated ingress via its load balancer", func() {
 | |
| 				// check the traffic on federation ingress
 | |
| 				jig.waitForFederatedIngress()
 | |
| 			})
 | |
| 
 | |
| 		})
 | |
| 	})
 | |
| })
 | |
| 
 | |
| // Deletes all Ingresses in the given namespace name.
 | |
| func deleteAllIngressesOrFail(clientset *fedclientset.Clientset, nsName string) {
 | |
| 	orphanDependents := false
 | |
| 	err := clientset.Extensions().Ingresses(nsName).DeleteCollection(&metav1.DeleteOptions{OrphanDependents: &orphanDependents}, metav1.ListOptions{})
 | |
| 	Expect(err).NotTo(HaveOccurred(), fmt.Sprintf("Error in deleting ingresses in namespace: %s", nsName))
 | |
| }
 | |
| 
 | |
| /*
 | |
|    equivalent returns true if the two ingress spec are equivalent.
 | |
| */
 | |
| func equivalentIngress(federatedIngress, clusterIngress v1beta1.Ingress) bool {
 | |
| 	return reflect.DeepEqual(clusterIngress.Spec, federatedIngress.Spec)
 | |
| }
 | |
| 
 | |
| // verifyCascadingDeletionForIngress verifies that ingresses are deleted from
 | |
| // underlying clusters when orphan dependents is false and they are not deleted
 | |
| // when orphan dependents is true.
 | |
| func verifyCascadingDeletionForIngress(clientset *fedclientset.Clientset, clusters map[string]*cluster, orphanDependents *bool, nsName string) {
 | |
| 	ingress := createIngressOrFail(clientset, nsName)
 | |
| 	ingressName := ingress.Name
 | |
| 	// Check subclusters if the ingress was created there.
 | |
| 	By(fmt.Sprintf("Waiting for ingress %s to be created in all underlying clusters", ingressName))
 | |
| 	waitForIngressShardsOrFail(nsName, ingress, clusters)
 | |
| 
 | |
| 	By(fmt.Sprintf("Deleting ingress %s", ingressName))
 | |
| 	deleteIngressOrFail(clientset, nsName, ingressName, orphanDependents)
 | |
| 
 | |
| 	By(fmt.Sprintf("Verifying ingresses %s in underlying clusters", ingressName))
 | |
| 	errMessages := []string{}
 | |
| 	// ingress should be present in underlying clusters unless orphanDependents is false.
 | |
| 	shouldExist := orphanDependents == nil || *orphanDependents == true
 | |
| 	for clusterName, clusterClientset := range clusters {
 | |
| 		_, err := clusterClientset.Extensions().Ingresses(nsName).Get(ingressName, metav1.GetOptions{})
 | |
| 		if shouldExist && errors.IsNotFound(err) {
 | |
| 			errMessages = append(errMessages, fmt.Sprintf("unexpected NotFound error for ingress %s in cluster %s, expected ingress to exist", ingressName, clusterName))
 | |
| 		} else if !shouldExist && !errors.IsNotFound(err) {
 | |
| 			errMessages = append(errMessages, fmt.Sprintf("expected NotFound error for ingress %s in cluster %s, got error: %v", ingressName, clusterName, err))
 | |
| 		}
 | |
| 	}
 | |
| 	if len(errMessages) != 0 {
 | |
| 		framework.Failf("%s", strings.Join(errMessages, "; "))
 | |
| 	}
 | |
| }
 | |
| 
 | |
| /*
 | |
|    waitForIngressOrFail waits until a ingress is either present or absent in the cluster specified by clientset.
 | |
|    If the condition is not met within timout, it fails the calling test.
 | |
| */
 | |
| func waitForIngressOrFail(clientset *kubeclientset.Clientset, namespace string, ingress *v1beta1.Ingress, present bool, timeout time.Duration) {
 | |
| 	By(fmt.Sprintf("Fetching a federated ingress shard of ingress %q in namespace %q from cluster", ingress.Name, namespace))
 | |
| 	var clusterIngress *v1beta1.Ingress
 | |
| 	err := wait.PollImmediate(framework.Poll, timeout, func() (bool, error) {
 | |
| 		clusterIngress, err := clientset.Ingresses(namespace).Get(ingress.Name, metav1.GetOptions{})
 | |
| 		if (!present) && errors.IsNotFound(err) { // We want it gone, and it's gone.
 | |
| 			By(fmt.Sprintf("Success: shard of federated ingress %q in namespace %q in cluster is absent", ingress.Name, namespace))
 | |
| 			return true, nil // Success
 | |
| 		}
 | |
| 		if present && err == nil { // We want it present, and the Get succeeded, so we're all good.
 | |
| 			By(fmt.Sprintf("Success: shard of federated ingress %q in namespace %q in cluster is present", ingress.Name, namespace))
 | |
| 			return true, nil // Success
 | |
| 		}
 | |
| 		By(fmt.Sprintf("Ingress %q in namespace %q in cluster.  Found: %v, waiting for Found: %v, trying again in %s (err=%v)", ingress.Name, namespace, clusterIngress != nil && err == nil, present, framework.Poll, err))
 | |
| 		return false, nil
 | |
| 	})
 | |
| 	framework.ExpectNoError(err, "Failed to verify ingress %q in namespace %q in cluster: Present=%v", ingress.Name, namespace, present)
 | |
| 
 | |
| 	if present && clusterIngress != nil {
 | |
| 		Expect(equivalentIngress(*clusterIngress, *ingress))
 | |
| 	}
 | |
| }
 | |
| 
 | |
| /*
 | |
|    waitForIngressShardsOrFail waits for the ingress to appear in all clusters
 | |
| */
 | |
| func waitForIngressShardsOrFail(namespace string, ingress *v1beta1.Ingress, clusters map[string]*cluster) {
 | |
| 	framework.Logf("Waiting for ingress %q in %d clusters", ingress.Name, len(clusters))
 | |
| 	for _, c := range clusters {
 | |
| 		waitForIngressOrFail(c.Clientset, namespace, ingress, true, FederatedIngressTimeout)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| /*
 | |
|    waitForIngressShardsUpdatedOrFail waits for the ingress to be updated in all clusters
 | |
| */
 | |
| func waitForIngressShardsUpdatedOrFail(namespace string, ingress *v1beta1.Ingress, clusters map[string]*cluster) {
 | |
| 	framework.Logf("Waiting for ingress %q in %d clusters", ingress.Name, len(clusters))
 | |
| 	for _, c := range clusters {
 | |
| 		waitForIngressUpdateOrFail(c.Clientset, namespace, ingress, FederatedIngressTimeout)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| /*
 | |
|    waitForIngressUpdateOrFail waits until a ingress is updated in the specified cluster with same spec of federated ingress.
 | |
|    If the condition is not met within timeout, it fails the calling test.
 | |
| */
 | |
| func waitForIngressUpdateOrFail(clientset *kubeclientset.Clientset, namespace string, ingress *v1beta1.Ingress, timeout time.Duration) {
 | |
| 	By(fmt.Sprintf("Fetching a federated ingress shard of ingress %q in namespace %q from cluster", ingress.Name, namespace))
 | |
| 	err := wait.PollImmediate(framework.Poll, timeout, func() (bool, error) {
 | |
| 		clusterIngress, err := clientset.Ingresses(namespace).Get(ingress.Name, metav1.GetOptions{})
 | |
| 		if err == nil { // We want it present, and the Get succeeded, so we're all good.
 | |
| 			if equivalentIngress(*clusterIngress, *ingress) {
 | |
| 				By(fmt.Sprintf("Success: shard of federated ingress %q in namespace %q in cluster is updated", ingress.Name, namespace))
 | |
| 				return true, nil
 | |
| 			}
 | |
| 			By(fmt.Sprintf("Ingress %q in namespace %q in cluster, waiting for service being updated, trying again in %s (err=%v)", ingress.Name, namespace, framework.Poll, err))
 | |
| 			return false, nil
 | |
| 		}
 | |
| 		By(fmt.Sprintf("Ingress %q in namespace %q in cluster, waiting for service being updated, trying again in %s (err=%v)", ingress.Name, namespace, framework.Poll, err))
 | |
| 		return false, nil
 | |
| 	})
 | |
| 	framework.ExpectNoError(err, "Failed to verify ingress %q in namespace %q in cluster", ingress.Name, namespace)
 | |
| }
 | |
| 
 | |
| /*
 | |
|    waitForIngressShardsGoneOrFail waits for the ingress to disappear in all clusters
 | |
| */
 | |
| func waitForIngressShardsGoneOrFail(namespace string, ingress *v1beta1.Ingress, clusters map[string]*cluster) {
 | |
| 	framework.Logf("Waiting for ingress %q in %d clusters", ingress.Name, len(clusters))
 | |
| 	for _, c := range clusters {
 | |
| 		waitForIngressOrFail(c.Clientset, namespace, ingress, false, FederatedIngressTimeout)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func deleteIngressOrFail(clientset *fedclientset.Clientset, namespace string, ingressName string, orphanDependents *bool) {
 | |
| 	if clientset == nil || len(namespace) == 0 || len(ingressName) == 0 {
 | |
| 		Fail(fmt.Sprintf("Internal error: invalid parameters passed to deleteIngressOrFail: clientset: %v, namespace: %v, ingress: %v", clientset, namespace, ingressName))
 | |
| 	}
 | |
| 	err := clientset.Ingresses(namespace).Delete(ingressName, &metav1.DeleteOptions{OrphanDependents: orphanDependents})
 | |
| 	framework.ExpectNoError(err, "Error deleting ingress %q from namespace %q", ingressName, namespace)
 | |
| 	// Wait for the ingress to be deleted.
 | |
| 	err = wait.Poll(framework.Poll, wait.ForeverTestTimeout, func() (bool, error) {
 | |
| 		_, err := clientset.Extensions().Ingresses(namespace).Get(ingressName, metav1.GetOptions{})
 | |
| 		if err != nil && errors.IsNotFound(err) {
 | |
| 			return true, nil
 | |
| 		}
 | |
| 		return false, err
 | |
| 	})
 | |
| 	if err != nil {
 | |
| 		framework.Failf("Error in deleting ingress %s: %v", ingressName, err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // TODO: quinton: This is largely a cut 'n paste of the above.  Yuck! Refactor as soon as we have a common interface implmented by both fedclientset.Clientset and kubeclientset.Clientset
 | |
| func deleteClusterIngressOrFail(clusterName string, clientset *kubeclientset.Clientset, namespace string, ingressName string) {
 | |
| 	if clientset == nil || len(namespace) == 0 || len(ingressName) == 0 {
 | |
| 		Fail(fmt.Sprintf("Internal error: invalid parameters passed to deleteClusterIngressOrFail: cluster: %q, clientset: %v, namespace: %v, ingress: %v", clusterName, clientset, namespace, ingressName))
 | |
| 	}
 | |
| 	err := clientset.Ingresses(namespace).Delete(ingressName, metav1.NewDeleteOptions(0))
 | |
| 	framework.ExpectNoError(err, "Error deleting cluster ingress %q/%q from cluster %q", namespace, ingressName, clusterName)
 | |
| }
 | |
| 
 | |
| func createIngressOrFail(clientset *fedclientset.Clientset, namespace string) *v1beta1.Ingress {
 | |
| 	if clientset == nil || len(namespace) == 0 {
 | |
| 		Fail(fmt.Sprintf("Internal error: invalid parameters passed to createIngressOrFail: clientset: %v, namespace: %v", clientset, namespace))
 | |
| 	}
 | |
| 	By(fmt.Sprintf("Creating federated ingress %q in namespace %q", FederatedIngressName, namespace))
 | |
| 
 | |
| 	ingress := &v1beta1.Ingress{
 | |
| 		ObjectMeta: metav1.ObjectMeta{
 | |
| 			Name: FederatedIngressName,
 | |
| 		},
 | |
| 		Spec: v1beta1.IngressSpec{
 | |
| 			Backend: &v1beta1.IngressBackend{
 | |
| 				ServiceName: "testingress-service",
 | |
| 				ServicePort: intstr.FromInt(80),
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	newIng, err := clientset.Extensions().Ingresses(namespace).Create(ingress)
 | |
| 	framework.ExpectNoError(err, "Creating ingress %q in namespace %q", ingress.Name, namespace)
 | |
| 	By(fmt.Sprintf("Successfully created federated ingress %q in namespace %q", FederatedIngressName, namespace))
 | |
| 	return newIng
 | |
| }
 | |
| 
 | |
| func updateIngressOrFail(clientset *fedclientset.Clientset, namespace string) (newIng *v1beta1.Ingress) {
 | |
| 	var err error
 | |
| 	if clientset == nil || len(namespace) == 0 {
 | |
| 		Fail(fmt.Sprintf("Internal error: invalid parameters passed to createIngressOrFail: clientset: %v, namespace: %v", clientset, namespace))
 | |
| 	}
 | |
| 	ingress := &v1beta1.Ingress{
 | |
| 		ObjectMeta: metav1.ObjectMeta{
 | |
| 			Name: FederatedIngressName,
 | |
| 		},
 | |
| 		Spec: v1beta1.IngressSpec{
 | |
| 			Backend: &v1beta1.IngressBackend{
 | |
| 				ServiceName: "updated-testingress-service",
 | |
| 				ServicePort: intstr.FromInt(80),
 | |
| 			},
 | |
| 		},
 | |
| 	}
 | |
| 
 | |
| 	err = waitForFederatedIngressExists(clientset, namespace, FederatedIngressName, FederatedIngressTimeout)
 | |
| 	if err != nil {
 | |
| 		framework.Failf("failed to get ingress %q: %v", FederatedIngressName, err)
 | |
| 	}
 | |
| 	for i := 0; i < MaxRetriesOnFederatedApiserver; i++ {
 | |
| 		newIng, err = clientset.Extensions().Ingresses(namespace).Update(ingress)
 | |
| 		if err == nil {
 | |
| 			framework.DescribeIng(namespace)
 | |
| 			return newIng
 | |
| 		}
 | |
| 		if !errors.IsConflict(err) && !errors.IsServerTimeout(err) {
 | |
| 			framework.Failf("failed to update ingress %q: %v", FederatedIngressName, err)
 | |
| 		}
 | |
| 	}
 | |
| 	framework.Failf("too many retries updating ingress %q", FederatedIngressName)
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| func (j *federationTestJig) waitForFederatedIngress() {
 | |
| 	// Wait for the loadbalancer IP.
 | |
| 	address, err := waitForFederatedIngressAddress(j.client, j.ing.Namespace, j.ing.Name, framework.LoadBalancerPollTimeout)
 | |
| 	if err != nil {
 | |
| 		framework.Failf("Ingress failed to acquire an IP address within %v", framework.LoadBalancerPollTimeout)
 | |
| 	}
 | |
| 	j.address = address
 | |
| 	framework.Logf("Found address %v for ingress %v", j.address, j.ing.Name)
 | |
| 	timeoutClient := &http.Client{Timeout: reqTimeout}
 | |
| 
 | |
| 	// Check that all rules respond to a simple GET.
 | |
| 	for _, rules := range j.ing.Spec.Rules {
 | |
| 		proto := "http"
 | |
| 		for _, p := range rules.IngressRuleValue.HTTP.Paths {
 | |
| 			route := fmt.Sprintf("%v://%v%v", proto, address, p.Path)
 | |
| 			framework.Logf("Testing route %v host %v with simple GET", route, rules.Host)
 | |
| 			framework.ExpectNoError(framework.PollURL(route, rules.Host, framework.LoadBalancerPollTimeout, framework.LoadBalancerPollInterval, timeoutClient, false))
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| type federationTestJig struct {
 | |
| 	// TODO add TLS check later
 | |
| 	rootCAs map[string][]byte
 | |
| 	address string
 | |
| 	ing     *v1beta1.Ingress
 | |
| 	client  *fedclientset.Clientset
 | |
| }
 | |
| 
 | |
| func newFederationTestJig(c *fedclientset.Clientset) *federationTestJig {
 | |
| 	return &federationTestJig{client: c, rootCAs: map[string][]byte{}}
 | |
| }
 | |
| 
 | |
| // WaitForFederatedIngressAddress waits for the Ingress to acquire an address.
 | |
| func waitForFederatedIngressAddress(c *fedclientset.Clientset, ns, ingName string, timeout time.Duration) (string, error) {
 | |
| 	var address string
 | |
| 	err := wait.PollImmediate(10*time.Second, timeout, func() (bool, error) {
 | |
| 		ipOrNameList, err := getFederatedIngressAddress(c, ns, ingName)
 | |
| 		if err != nil || len(ipOrNameList) == 0 {
 | |
| 			framework.Logf("Waiting for Ingress %v to acquire IP, error %v", ingName, err)
 | |
| 			return false, nil
 | |
| 		}
 | |
| 		address = ipOrNameList[0]
 | |
| 		return true, nil
 | |
| 	})
 | |
| 	return address, err
 | |
| }
 | |
| 
 | |
| // waitForFederatedIngressExists waits for the Ingress object exists.
 | |
| func waitForFederatedIngressExists(c *fedclientset.Clientset, ns, ingName string, timeout time.Duration) error {
 | |
| 	err := wait.PollImmediate(10*time.Second, timeout, func() (bool, error) {
 | |
| 		_, err := c.Extensions().Ingresses(ns).Get(ingName, metav1.GetOptions{})
 | |
| 		if err != nil {
 | |
| 			framework.Logf("Waiting for Ingress %v, error %v", ingName, err)
 | |
| 			return false, nil
 | |
| 		}
 | |
| 		return true, nil
 | |
| 	})
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // getFederatedIngressAddress returns the ips/hostnames associated with the Ingress.
 | |
| func getFederatedIngressAddress(client *fedclientset.Clientset, ns, name string) ([]string, error) {
 | |
| 	ing, err := client.Extensions().Ingresses(ns).Get(name, metav1.GetOptions{})
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 	addresses := []string{}
 | |
| 	for _, a := range ing.Status.LoadBalancer.Ingress {
 | |
| 		if a.IP != "" {
 | |
| 			addresses = append(addresses, a.IP)
 | |
| 		}
 | |
| 		if a.Hostname != "" {
 | |
| 			addresses = append(addresses, a.Hostname)
 | |
| 		}
 | |
| 	}
 | |
| 	return addresses, nil
 | |
| }
 |