1
0
mirror of https://github.com/rancher/rke.git synced 2025-04-27 11:21:08 +00:00

Remove k8s unit test

This commit is contained in:
galal-hussein 2017-12-13 21:37:35 +02:00
parent e58d7685da
commit 9775641430
3 changed files with 0 additions and 168 deletions

0
build/bin/.gitkeep Normal file
View File

View File

@ -1,86 +0,0 @@
package k8s
import (
"testing"
check "gopkg.in/check.v1"
"k8s.io/api/core/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/kubernetes"
)
const (
KubeConfigPath = "/etc/kubernetes/ssl/kubeconfig"
ConfigMapName = "testconfigmap"
ConfigYaml = `---
foo: bar
test: test123`
SecretFile = `secret123`
SecretName = "secret"
)
type KubernetesOperationsTestSuite struct {
kubeClient *kubernetes.Clientset
}
func Test(t *testing.T) {
check.TestingT(t)
}
var _ = check.Suite(&KubernetesOperationsTestSuite{})
func (k *KubernetesOperationsTestSuite) SetUpSuite(c *check.C) {
var err error
k.kubeClient, err = NewClient(KubeConfigPath)
meta := metav1.ObjectMeta{Name: metav1.NamespaceSystem}
ns := &v1.Namespace{
ObjectMeta: meta,
}
if _, err = k.kubeClient.CoreV1().Namespaces().Create(ns); err != nil {
c.Fatalf("Failed to set up test suite: %v", err)
}
}
func (k *KubernetesOperationsTestSuite) TestSaveConfig(c *check.C) {
var err error
if err != nil {
c.Fatalf("Failed to initialize kubernetes client")
}
// Make sure that config yaml file can be stored as a config map
err = UpdateConfigMap(k.kubeClient, []byte(ConfigYaml), ConfigMapName)
if err != nil {
c.Fatalf("Failed to store config map %s: %v", ConfigMapName, err)
}
cfgMap, err := GetConfigMap(k.kubeClient, ConfigMapName)
if err != nil {
c.Fatalf("Failed to fetch config map %s: %v", ConfigMapName, err)
}
if cfgMap.Data[ConfigMapName] != ConfigYaml {
c.Fatalf("Failed to verify the config map %s: %v", ConfigMapName, err)
}
}
func (k *KubernetesOperationsTestSuite) TestSaveSecret(c *check.C) {
var err error
if err != nil {
c.Fatalf("Failed to initialize kubernetes client")
}
err = UpdateSecret(k.kubeClient, SecretName, []byte(SecretFile), SecretName)
if err != nil {
c.Fatalf("Failed to store secret %s: %v", SecretName, err)
}
secret, err := GetSecret(k.kubeClient, SecretName)
if err != nil {
c.Fatalf("Failed to fetch secret %s: %v", SecretName, err)
}
if string(secret.Data[SecretName]) != SecretFile {
c.Fatalf("Failed to verify the secret %s: %v", SecretName, err)
}
}

View File

@ -1,92 +1,10 @@
#!/bin/bash
set -e
cleanup()
{
local exit=$?
kill $PID || true
wait $PID || true
exit $exit
}
cd $(dirname $0)/..
echo Running tests
export SOCK=/var/run/dind.sock
export DOCKER_HOST=unix://${SOCK}
export CATTLE_DOCKER_USE_BOOT2DOCKER=true
export INCLUSTER_CONFIG=false
ip link set dev eth0 mtu 1300
if grep overlay /proc/filesystems; then
STORAGE=overlay
else
STORAGE=aufs
fi
docker daemon -s $STORAGE -D -H $DOCKER_HOST >/tmp/docker.log 2>&1 &
PID=$!
trap cleanup EXIT
sleep 1
IDS=$(docker ps -qa)
if [ -n "$IDS" ]; then
docker kill $(docker ps -qa) || true
docker rm -fv $(docker ps -qa) || true
fi
export ARCH=amd64 K8S_VERSION=v1.2.4
docker run -d \
--volume=/:/rootfs:ro \
--volume=/sys:/sys:rw \
--volume=/var/lib/docker/:/var/lib/docker:rw \
--volume=/var/lib/kubelet/:/var/lib/kubelet:rw \
--volume=/var/run:/var/run:rw \
--volume=/var/run/dind.sock:/var/run/docker.sock:rw \
--net=host \
--pid=host \
--privileged \
gcr.io/google_containers/hyperkube-${ARCH}:${K8S_VERSION} \
/hyperkube kubelet \
--hostname-override=127.0.0.1 \
--api-servers=http://localhost:8080 \
--config=/etc/kubernetes/manifests \
--cluster-dns=10.0.0.10 \
--cluster-domain=cluster.local \
--allow-privileged --v=2
docker ps -a
echo "Waiting for kubernetes"
until $(curl --output /dev/null --silent --fail http://localhost:8080/api/v1/services); do
printf '.'
sleep 5
done
mkdir -p /etc/kubernetes/ssl
cat > /etc/kubernetes/ssl/kubeconfig << EOF
apiVersion: v1
kind: Config
clusters:
- cluster:
api-version: v1
insecure-skip-tls-verify: true
server: "http://localhost:8080"
name: "Default"
contexts:
- context:
cluster: "Default"
user: "Default"
name: "Default"
current-context: "Default"
users:
- name: "Default"
user:
token: "test"
EOF
PACKAGES=". $(find -name '*.go' | xargs -I{} dirname {} | cut -f2 -d/ | sort -u | grep -Ev '(^\.$|.git|.trash-cache|vendor|bin)' | sed -e 's!^!./!' -e 's!$!/...!')"
[ "${ARCH}" == "amd64" ] && RACE=-race