k3s/scripts/test-helpers

704 lines
18 KiB
Plaintext
Raw Normal View History

2019-11-11 22:18:16 +00:00
#!/bin/bash
# ---
port-used() {
netstat -tuna | grep -q ":$1 "
2019-11-11 22:18:16 +00:00
}
export -f port-used
# ---
get-port() {
2019-11-01 16:48:28 +00:00
local port=0
2019-11-11 22:18:16 +00:00
while
2019-11-01 16:48:28 +00:00
port=$((10000 + RANDOM % 50000))
port-used $port
2019-11-11 22:18:16 +00:00
do continue; done
2019-11-01 16:48:28 +00:00
echo $port
2019-11-11 22:18:16 +00:00
}
export -f get-port
# ---
2019-11-01 16:48:28 +00:00
fetch-kubeconfig() {(
set -e -o pipefail
local num=${1:-1}
local name=$(cat $TEST_DIR/servers/$num/metadata/name)
local port=$(cat $TEST_DIR/servers/$num/metadata/port)
docker cp $name:/etc/rancher/k3s/k3s.yaml - 2>/dev/null | tar -xO 2>/dev/null | sed -e "s/:6443/:$port/g" >$TEST_DIR/servers/$num/kubeconfig.yaml
)}
2019-11-11 22:18:16 +00:00
export -f fetch-kubeconfig
# ---
wait-for-kubeconfig() {
2019-11-01 16:48:28 +00:00
while ! fetch-kubeconfig $1; do
echo 'Waiting for kubeconfig to become available...' >&2
2019-11-11 22:18:16 +00:00
sleep 5
done
}
export -f wait-for-kubeconfig
# ---
count-ready-nodes() {
kubectl get nodes -o json \
| jq '.items[].status.conditions[] | select(.type == "Ready" and .status == "True") | .type' \
| wc -l \
| tr -d '[:space:]'
}
export -f count-ready-nodes
# ---
wait-for-nodes() {
while [[ $(count-ready-nodes) -ne $1 ]]; do
2019-11-01 16:48:28 +00:00
echo 'Waiting for nodes to be ready...' >&2
2019-11-11 22:18:16 +00:00
sleep 5
done
}
export -f wait-for-nodes
# ---
pod-ready() {
kubectl get pods -n kube-system -o json \
| jq ".items[].status | select(.containerStatuses != null) | .containerStatuses[] | select(.name == \"$1\") | .ready" 2>/dev/null
2019-11-11 22:18:16 +00:00
}
export -f pod-ready
# ---
wait-for-services() {
for service in $@; do
while [[ "$(pod-ready $service | sort -u)" != 'true' ]]; do
2019-11-01 16:48:28 +00:00
echo "Waiting for service $service to be ready..." >&2
2019-11-11 22:18:16 +00:00
sleep 5
done
2019-11-01 16:48:28 +00:00
echo "Service $service is ready"
2019-11-11 22:18:16 +00:00
done
}
export -f wait-for-services
# ---
2019-11-01 16:48:28 +00:00
wait-for-db-connection() {
if [ -z "$DB_CONNECTION_TEST" ]; then
echo 'DB_CONNECTION_TEST is not defined' >&2
return 1
fi
while ! $DB_CONNECTION_TEST 2>/dev/null; do
echo 'Waiting for database to become available...' >&2
sleep 5
done
}
export -f wait-for-db-connection
# ---
2019-11-11 22:18:16 +00:00
verify-valid-version() {
2020-01-20 23:01:04 +00:00
docker exec $@ 2>&1 | tee .version.tmp
# check for bad strings in the version output, including '.' in the build metadata
if grep -oiE '.*(dev|head|unknown|fail|refuse|\+[^"]*\.).*' .version.tmp; then
2019-11-11 22:18:16 +00:00
return 1
fi
}
export -f verify-valid-version
# ---
verify-valid-versions() {
verify-valid-version $1 kubectl version
verify-valid-version $1 ctr version
verify-valid-version $1 crictl version
}
export -f verify-valid-versions
# ---
dump-logs() {
2019-11-01 16:48:28 +00:00
local testID=$(basename $TEST_DIR)
echo "#---------------------------------"
echo "#- Begin: logs for run ($testID)"
echo
local server=$(cat $TEST_DIR/servers/1/metadata/name)
docker exec $server kubectl get pods -A -o wide >$TEST_DIR/logs/kubectl-get-pods.txt
docker exec $server kubectl get nodes -o wide >$TEST_DIR/logs/kubectl-get-nodes.txt
docker exec $server kubectl describe pods -A >$TEST_DIR/logs/kubectl-describe-pods.txt
2019-11-01 16:48:28 +00:00
for node in $TEST_DIR/*/*; do
[ -d "$node" ] || continue
local name=$(cat $node/metadata/name 2>/dev/null)
[ "$name" ] || continue
mkdir -p $node/logs
local hostname=$(docker exec $name hostname)
2019-11-01 16:48:28 +00:00
docker logs $name >$node/logs/system.log 2>&1
if [[ ! -z "$hostname" && $name == k3s-* ]]; then
docker exec $server kubectl describe node/$hostname >$node/logs/kubectl-describe-node.txt
docker cp $name:/var/lib/rancher/k3s/agent/containerd/containerd.log $node/logs/containerd.log 2>/dev/null
docker exec $name crictl pods >$node/logs/crictl-pods.txt
docker exec $name crictl ps -a >$node/logs/crictl-ps.txt
docker exec $name crictl ps -a -o json >$node/metadata/crictl-ps.json
for container in $(jq -r '.containers[].id' <$node/metadata/crictl-ps.json); do
local cname=$(jq -r '.containers[] | select(.id == "'$container'") | .metadata.name' <$node/metadata/crictl-ps.json)
docker exec $name crictl logs $container >$node/logs/$cname-$container.log 2>&1
done
fi
if [ "$1" == "skip-output" ]; then
continue
fi
2019-11-01 16:48:28 +00:00
for log in $node/logs/*.log; do
echo
echo "#- Tail: $log"
tail -5 $log
echo "#- Done: $log"
echo
done
2019-11-11 22:18:16 +00:00
done
if [ "$1" == "skip-output" ]; then
return
fi
for txt in $TEST_DIR/logs/*.txt $TEST_DIR/*/*/logs/*.txt; do
echo
echo "#- Cat: $txt"
cat $txt
echo "#- Done: $txt"
echo
done
2019-11-01 16:48:28 +00:00
echo
echo "#- Finish: logs for run ($testID)"
echo "#---------------------------------"
echo
./scripts/log-upload $TEST_DIR
2019-11-11 22:18:16 +00:00
}
export -f dump-logs
# ---
retrieve-sonobuoy-logs() {
2019-11-01 16:48:28 +00:00
local status=passed
local code=0
local testStatus=$(sonobuoy status 2>&1)
cat <<< $testStatus
2019-11-01 16:48:28 +00:00
if ! grep -q -E '\s+e2e\s+complete\s+passed\s+' <<< $testStatus; then
2019-11-11 22:18:16 +00:00
status=failed
2019-11-01 16:48:28 +00:00
code=1
fi
mkdir -p $TEST_DIR/sonobuoy
sonobuoy retrieve $TEST_DIR/sonobuoy 2>/dev/null || true
local logTarball=$TEST_DIR/sonobuoy/*_sonobuoy_*.tar.gz
if [ -f $logTarball ]; then
tar -xz -f $logTarball -C $TEST_DIR/sonobuoy
rm $logTarball
else
rm -rf $TEST_DIR/sonobuoy
2019-11-11 22:18:16 +00:00
fi
2019-11-01 16:48:28 +00:00
local e2eLog=$TEST_DIR/sonobuoy/plugins/e2e/results/global/e2e.log
if [ ! -s $e2eLog ]; then
2019-11-11 22:18:16 +00:00
return 1
fi
2019-11-01 16:48:28 +00:00
if [ -n "$LOG_OUTPUT" ]; then
cp $e2eLog $(sed -e "s/-STATUS-/-$status-/g" <<< "$LOG_OUTPUT")
2019-11-11 22:18:16 +00:00
fi
tail -11 $e2eLog
2019-11-01 16:48:28 +00:00
awk '/^Summarizing .* Failures?:$/,0' $e2eLog
return $code
2019-11-11 22:18:16 +00:00
}
export -f retrieve-sonobuoy-logs
# ---
test-wait() {
wait $1 || echo "test wait exit code $?"
local delay=15
sleep $delay
while sonobuoy status | grep -q -E ' +e2e +running +'; do
sleep $delay
done
sleep $delay
if sonobuoy status | grep -q -E ' +e2e +complete +passed +'; then
return 0
fi
return 1
}
export -f test-wait
# ---
2019-11-11 22:18:16 +00:00
sonobuoy-test() {
2019-11-01 16:48:28 +00:00
if [ "$ARCH" = 'arm' ]; then
echo "Aborting sonobuoy tests, images not available for $ARCH"
return 0
fi
echo 'Starting sonobuoy tests'
sonobuoy run \
--config=scripts/sonobuoy-config.json \
--plugin-env=e2e.E2E_USE_GO_RUNNER=true \
--kubernetes-version=${VERSION_K8S} \
--wait=90 \
$@ &
2019-11-01 16:48:28 +00:00
local sonobuoyPID=$!
local code=0
time timeout --foreground 60m bash -c test-wait $sonobuoyPID || code=$?
echo "Sonobuoy finished with code $code"
2019-11-11 22:18:16 +00:00
retrieve-sonobuoy-logs
2019-11-01 16:48:28 +00:00
return $code
2019-11-11 22:18:16 +00:00
}
export -f sonobuoy-test
# ---
2019-11-01 16:48:28 +00:00
test-cleanup() {
local code=$?
set +e -x
2019-11-01 16:48:28 +00:00
echo 'Cleaning up...'
trap - EXIT INT TERM
if has-function test-post-hook; then
echo 'Running post-hook'
test-post-hook $code
code=$?
fi
2019-11-01 16:48:28 +00:00
if [[ $code -ne 0 ]]; then
dump-logs
fi
for name in $TEST_DIR/*/*/metadata/name; do
[ -f "$name" ] || continue
local container=$(cat $name)
echo "Removing container $container"
docker rm -f -v $container
2019-11-01 16:48:28 +00:00
done
echo
2019-11-01 16:48:28 +00:00
if [ "$TEST_CLEANUP" = true ]; then
echo "Removing test directory $TEST_DIR"
rm -rf $TEST_DIR
2019-11-01 16:48:28 +00:00
fi
[ -f "$PROVISION_LOCK" ] && rm $PROVISION_LOCK
2019-11-01 16:48:28 +00:00
echo -n "Test $(basename $TEST_DIR) "
if [ $code -eq 0 ]; then
echo "passed."
else
echo "failed."
fi
echo
exit $code
}
export -f test-cleanup
# ---
test-setup() {
export TEST_DIR=$(mktemp -d '/tmp/XXXXXX')
trap test-cleanup EXIT INT TERM
mkdir -p $TEST_DIR/metadata
if [ "$LABEL" ]; then
exec > >(awk "{ printf \"[\033[36m${LABEL}\033[m] %s\n\", \$0; fflush() }") \
2> >(awk "{ printf \"[\033[35m${LABEL}\033[m] %s\n\", \$0; fflush() }" >&2)
2019-11-01 16:48:28 +00:00
echo "$LABEL" >$TEST_DIR/metadata/label
fi
mkdir -p $TEST_DIR/logs
exec > >(tee -a $TEST_DIR/logs/test.log) \
2> >(tee -a $TEST_DIR/logs/test.log >&2)
if [ -z "$K3S_IMAGE" ]; then
. ./scripts/version.sh
TAG=${TAG:-${VERSION_TAG}${SUFFIX}}
REPO=${REPO:-rancher}
IMAGE_NAME=${IMAGE_NAME:-k3s}
export K3S_IMAGE=${REPO}/${IMAGE_NAME}:${TAG}
fi
if [ -z "$K3S_IMAGE" ]; then
echo 'K3S_IMAGE environment variable should be defined'
return 1
fi
SERVER_MINOR=$(awk -F. '{print $2}' <<<${K3S_IMAGE_SERVER:-$K3S_IMAGE})
AGENT_MINOR=$(awk -F. '{print $2}' <<<${K3S_IMAGE_AGENT:-$K3S_IMAGE})
if [ $NUM_AGENTS -gt 0 ] && [ $AGENT_MINOR -gt $SERVER_MINOR ]; then
echo "Agent minor version cannot be higher than server - not supported by Kubernetes version skew policy"
exit 0
fi
2019-11-01 16:48:28 +00:00
echo ${RANDOM}${RANDOM}${RANDOM} >$TEST_DIR/metadata/secret
}
export -f test-setup
# ---
gen-certs() {(
set -e -x
#umask 077
local opensslConfig=$(pwd)/scripts/test-certs-openssl.cnf
local subject="/C=US/ST=AZ/L=Tempe/O=Rancher/OU=DevOps/DC=com/DC=rancher"
local caDir=$TEST_DIR/db-ca
[ -d $caDir ] && rm -rf $caDir
mkdir -p $caDir
cd $caDir
mkdir -p private certs newcerts crl
touch index.txt
echo '01' > serial
openssl req \
-config $opensslConfig \
-new -x509 \
-nodes \
-subj $subject \
-extensions v3_ca \
-keyout private/ca.key \
-out certs/ca.crt
openssl req \
-config $opensslConfig \
-new \
-nodes \
-subj $subject"/CN=server" \
-keyout private/db.key \
-out db.csr
openssl ca \
-config $opensslConfig \
-batch \
-extensions db_server \
-keyfile private/ca.key \
-cert certs/ca.crt \
-out certs/db.crt \
-infiles db.csr
openssl req \
-config $opensslConfig \
-new \
-nodes \
-subj $subject"/CN=client" \
-keyout private/client.key \
-out client.csr
openssl ca \
-config $opensslConfig \
-batch \
-extensions db_client \
-keyfile private/ca.key \
-cert certs/ca.crt \
-out certs/client.crt \
-infiles client.csr
)}
export -f gen-certs
# ---
inc-count() {(
shopt -s extglob
local count=$(exec 2>/dev/null; ls -1d $TEST_DIR/$1/+([0-9]) | xargs -n1 basename | sort -n -r | head -1)
count=$((count+1))
mkdir -p $TEST_DIR/$1/$count/metadata
echo $count
)}
export -f inc-count
# ---
has-function() {
[[ ! -z "$1" && $(type -t $1) == "function" ]]
} 2> /dev/null
export -f has-function
# ---
2019-11-01 16:48:28 +00:00
run-function() {
has-function $1 || return 0
2019-11-01 16:48:28 +00:00
$@
}
export -f run-function
# ---
provision-server() {
local count=$(inc-count servers)
local testID=$(basename $TEST_DIR)
local name=$(echo "k3s-server-$count-$testID" | tee $TEST_DIR/servers/$count/metadata/name)
local port=$(timeout --foreground 5s bash -c get-port | tee $TEST_DIR/servers/$count/metadata/port)
local SERVER_INSTANCE_ARGS="SERVER_${count}_ARGS"
run-function server-pre-hook $count
docker run \
-d --name $name \
--privileged \
-v $TEST_DIR/db-ca/:/db-ca \
-p 127.0.0.1:$port:6443 \
-p 6443 \
-e K3S_TOKEN=$(cat $TEST_DIR/metadata/secret) \
-e K3S_DEBUG=true \
${REGISTRY_CLUSTER_ARGS:-} \
${K3S_IMAGE_SERVER:-$K3S_IMAGE} server $ARGS $SERVER_ARGS ${!SERVER_INSTANCE_ARGS}
2019-11-01 16:48:28 +00:00
local ip=$(docker inspect --format '{{ .NetworkSettings.IPAddress }}' $name | tee $TEST_DIR/servers/$count/metadata/ip)
local url=$(echo "https://$ip:6443" | tee $TEST_DIR/servers/$count/metadata/url)
echo "Started $name @ $url"
run-function server-post-hook $count
}
export -f provision-server
# ---
provision-agent() {
local K3S_URL=${K3S_URL:-"$(cat $TEST_DIR/servers/1/metadata/url)"}
local count=$(inc-count agents)
local testID=$(basename $TEST_DIR)
local name=$(echo "k3s-agent-$count-$testID" | tee $TEST_DIR/agents/$count/metadata/name)
local AGENT_INSTANCE_ARGS="AGENT_${count}_ARGS"
run-function agent-pre-hook $count
docker run \
-d --name $name \
--privileged \
-e K3S_TOKEN=$(cat $TEST_DIR/metadata/secret) \
-e K3S_URL=$K3S_URL \
${REGISTRY_CLUSTER_ARGS:-} \
${K3S_IMAGE_AGENT:-$K3S_IMAGE} agent $ARGS $AGENT_ARGS ${!AGENT_INSTANCE_ARGS}
2019-11-01 16:48:28 +00:00
echo "Started $name"
run-function agent-post-hook $count
}
export -f provision-agent
# ---
provision-cluster() {
run-function cluster-pre-hook
if [ "${ENABLE_REGISTRY}" == 'true' ]; then
provision-registry-proxy
fi
2019-11-01 16:48:28 +00:00
for i in $(seq 1 $NUM_SERVERS); do
provision-server
timeout --foreground 120s bash -c "wait-for-kubeconfig $i"
2019-11-01 16:48:28 +00:00
done
export KUBECONFIG=$TEST_DIR/servers/1/kubeconfig.yaml
if [ $NUM_AGENTS -gt 0 ]; then
for _ in $(seq 1 $NUM_AGENTS); do
provision-agent
done
fi
[ -f "$PROVISION_LOCK" ] && rm $PROVISION_LOCK
timeout --foreground 2m bash -c "wait-for-nodes $(( NUM_SERVERS + NUM_AGENTS ))"
timeout --foreground 4m bash -c "wait-for-services $WAIT_SERVICES"
2019-11-01 16:48:28 +00:00
run-function cluster-post-hook
}
export -f provision-cluster
# ---
provision-registry-proxy() {
set -e -o pipefail
2022-04-15 16:41:40 +00:00
local image="docker.io/library/registry:2.8.1"
local prefix="docker-registry-"
local registries="docker.io:registry-1.docker.io k8s.gcr.io gcr.io quay.io ghcr.io"
local registries_yaml="$TEST_DIR/registries.yaml"
echo "mirrors:" > $registries_yaml
for registry in $registries; do
IFS=: read registry_name registry_endpoint <<< $registry
if [ -z "$registry_endpoint" ]; then
registry_endpoint=$registry_name
fi
local name="registry_${registry_name//./_}"
local status=$(docker inspect $name --format '{{ .State.Status }} {{ .Config.Image }} {{ (index .HostConfig.PortBindings "5000/tcp" 0).HostPort }}' 2>/dev/null || true)
read state_status config_image hostport <<< $status
if [ "$state_status" != "running" ] || [ "$config_image" != "$image" ]; then
hostport=$(timeout --foreground 5s bash -c get-port)
docker rm --force $name 2>/dev/null || true
docker run \
-d --name $name \
-p 0.0.0.0:$hostport:5000 \
-v "registry-cache:/var/lib/registry" \
-e "REGISTRY_HTTP_SECRET=shared-secret" \
-e "REGISTRY_PROXY_REMOTEURL=https://$registry_endpoint" \
-e "REGISTRY_STORAGE_CACHE_BLOBDESCRIPTOR=inmemory" \
-e "REGISTRY_STORAGE_FILESYSTEM_ROOTDIRECTORY=/var/lib/registry/$registry_name" \
$image
fi
echo -e " $registry_name:\n endpoint:\n - http://172.17.0.1:$hostport" >> $registries_yaml
done
echo "Using registry mirror with cluster registries.yaml:"
cat $registries_yaml
export REGISTRY_CLUSTER_ARGS="-v $registries_yaml:/etc/rancher/k3s/registries.yaml"
}
export -f provision-registry-proxy
# ---
early-exit() {
printf "\033[33m$1\033[m\n"
exit $2
}
export -f early-exit
# ---
2019-11-01 16:48:28 +00:00
run-test() {
local delay=15
(
set +x
while [ $(count-running-tests) -ge ${MAX_CONCURRENT_TESTS:-4} ]; do
sleep $delay
done
)
2019-11-01 16:48:28 +00:00
export PROVISION_LOCK=$(mktemp)
./scripts/test-runner $@ &
pids+=($!)
2019-11-01 16:48:28 +00:00
(
set +x
# busy-wait on the provisioning lock before imposing a final inter-test delay
2019-11-01 16:48:28 +00:00
while [ -f "$PROVISION_LOCK" ]; do
sleep 1
done
sleep $delay
2019-11-01 16:48:28 +00:00
)
}
export -f run-test
# ---
cleanup-test-env(){
export NUM_SERVERS=1
export NUM_AGENTS=1
export AGENT_ARGS=''
export SERVER_ARGS=''
export WAIT_SERVICES="${all_services[@]}"
unset AGENT_1_ARGS AGENT_2_ARGS AGENT_3_ARGS
unset SERVER_1_ARGS SERVER_2_ARGS SERVER_3_ARGS
unset -f server-pre-hook server-post-hook agent-pre-hook agent-post-hook cluster-pre-hook cluster-post-hook test-post-hook
}
# ---
count-running-tests(){
local count=0
for pid in ${pids[@]}; do
if [ $(pgrep -c -P $pid) -gt 0 ]; then
((count++))
fi
done
echo "Currently running ${count} tests" 1>&2
echo ${count}
}
export -f count-running-tests
# ---
2019-11-01 16:48:28 +00:00
e2e-test() {
local label=$label
if [ -n "$LABEL_SUFFIX" ]; then
label="$label-$LABEL_SUFFIX"
fi
local logOutput=
if [ -n "$E2E_OUTPUT" ]; then
logOutput=$E2E_OUTPUT/$logName
fi
if [[ $label =~ ^PARALLEL.* ]]; then
LABEL=$label LOG_OUTPUT=$logOutput MAX_CONCURRENT_TESTS=3 run-test $@
else
LABEL=$label LOG_OUTPUT=$logOutput run-test $@
fi
2019-11-01 16:48:28 +00:00
}
# ---
test-run-sonobuoy() {
local suffix
if [ "$1" ] && [[ ! $1 =~ ^(serial|parallel)$ ]] ; then
2019-11-01 16:48:28 +00:00
suffix="-$1"
export LABEL_SUFFIX=$1
else
unset LABEL_SUFFIX
2019-11-01 16:48:28 +00:00
fi
cleanup-test-env
2019-11-01 16:48:28 +00:00
. ./scripts/test-setup-sonobuoy$suffix
if [ "$1" = "parallel" ] || [ "$2" = "parallel" ]; then
label=PARALLEL \
logName=e2e-STATUS-${ARCH}-parallel.log \
e2e-test ${sonobuoyParallelArgs[@]}
echo "Exit code $? for parallel start"
fi
if [ "$1" = "serial" ] || [ "$2" = "serial" ]; then
label=SERIAL \
logName=e2e-STATUS-${ARCH}-serial.log \
e2e-test ${sonobuoySerialArgs[@]}
echo "Exit code $? for serial start"
fi
2019-11-01 16:48:28 +00:00
}
export -f test-run-sonobuoy
# ---
pid-cleanup() {
local code=$?
local failCount=0
2020-01-24 00:33:35 +00:00
set +e
if [ $code -eq 0 ]; then
for pid in ${pids[@]}; do
wait $pid || code=$?
done
fi
2019-11-01 16:48:28 +00:00
if [ $code -ne 0 ]; then
for pid in ${pids[@]}; do
pkill -P $pid
wait $pid || failCount=$((failCount+1))
done
fi
trap - EXIT INT TERM
set +x
echo
if [ $failCount -eq 0 ]; then
printf '\033[32mAll tests passed.\033[m\n'
else
printf "\033[31m$failCount tests failed.\033[m\n"
2020-01-24 00:33:35 +00:00
if [ "$DRONE_BUILD_EVENT" = 'tag' ]; then
printf "\033[31mIgnoring test failures on tag.\033[m\n"
code=0
else
code=1
fi
2020-01-21 18:07:12 +00:00
fi
2019-11-01 16:48:28 +00:00
echo
exit $code
}
export -f pid-cleanup
# ---
pids=()
2020-01-24 00:33:35 +00:00
trap pid-cleanup EXIT INT TERM