100 lines
3.2 KiB
Bash
100 lines
3.2 KiB
Bash
#!/bin/bash
|
|
|
|
# Copyright 2017 The Kubernetes Authors.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
ROOT="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"/..
|
|
. ${ROOT}/hack/versions
|
|
# CRI_CONTAINERD_FLAGS are the extra flags to use when start cri-containerd.
|
|
CRI_CONTAINERD_FLAGS=${CRI_CONTAINERD_FLAGS:-""}
|
|
|
|
CRICONTAINERD_SOCK=/var/run/cri-containerd.sock
|
|
|
|
# test_setup starts containerd and cri-containerd.
|
|
test_setup() {
|
|
local report_dir=$1
|
|
if [ ! -x ${ROOT}/_output/cri-containerd ]; then
|
|
echo "cri-containerd is not built"
|
|
exit 1
|
|
fi
|
|
|
|
# Start containerd
|
|
if [ ! -x "$(command -v containerd)" ]; then
|
|
echo "containerd is not installed, please run hack/install-deps.sh"
|
|
exit 1
|
|
fi
|
|
sudo pkill containerd
|
|
sudo containerd &> ${report_dir}/containerd.log &
|
|
# Wait for containerd to be running by using the containerd client ctr to check the version
|
|
# of the containerd server. Wait an increasing amount of time after each of five attempts
|
|
readiness_check "sudo ctr version"
|
|
|
|
# Start cri-containerd
|
|
sudo ${ROOT}/_output/cri-containerd --alsologtostderr --v 4 ${CRI_CONTAINERD_FLAGS} \
|
|
&> ${report_dir}/cri-containerd.log &
|
|
readiness_check "sudo ${GOPATH}/bin/crictl --runtime-endpoint=${CRICONTAINERD_SOCK} info"
|
|
}
|
|
|
|
# test_teardown kills containerd and cri-containerd.
|
|
test_teardown() {
|
|
sudo pkill containerd
|
|
}
|
|
|
|
# readiness_check checks readiness of a daemon with specified command.
|
|
readiness_check() {
|
|
local command=$1
|
|
local MAX_ATTEMPTS=5
|
|
local attempt_num=1
|
|
until ${command} &> /dev/null || (( attempt_num == MAX_ATTEMPTS ))
|
|
do
|
|
echo "$attempt_num attempt \"$command\"! Trying again in $attempt_num seconds..."
|
|
sleep $(( attempt_num++ ))
|
|
done
|
|
}
|
|
|
|
# upload_logs_to_gcs uploads test logs to gcs.
|
|
# Var set:
|
|
# 1. Bucket: gcs bucket to upload logs.
|
|
# 2. Dir: directory name to upload logs.
|
|
# 3. Test Result: directory of the test result.
|
|
upload_logs_to_gcs() {
|
|
local -r bucket=$1
|
|
local -r dir=$2
|
|
local -r result=$3
|
|
if ! gsutil ls "gs://${bucket}" > /dev/null; then
|
|
create_ttl_bucket ${bucket}
|
|
fi
|
|
local -r upload_log_path=${bucket}/${dir}
|
|
gsutil cp -r "${REPORT_DIR}" "gs://${upload_log_path}"
|
|
echo "Test logs are uploaed to:
|
|
http://gcsweb.k8s.io/gcs/${upload_log_path}/"
|
|
}
|
|
|
|
# create_ttl_bucket create a public bucket in which all objects
|
|
# have a default TTL (30 days).
|
|
# Var set:
|
|
# 1. Bucket: gcs bucket name.
|
|
create_ttl_bucket() {
|
|
local -r bucket=$1
|
|
gsutil mb "gs://${bucket}"
|
|
local -r bucket_rule=$(mktemp)
|
|
# Set 30 day TTL for logs inside the bucket.
|
|
echo '{"rule": [{"action": {"type": "Delete"},"condition": {"age": 30}}]}' > ${bucket_rule}
|
|
gsutil lifecycle set "${bucket_rule}" "gs://${bucket}"
|
|
rm "${bucket_rule}"
|
|
|
|
gsutil -m acl ch -g all:R "gs://${bucket}"
|
|
gsutil defacl set public-read "gs://${bucket}"
|
|
}
|