
This change refactors the way Kubelet's DockerPuller handles the docker config credentials to utilize a new credentialprovider library. The credentialprovider library is based on several of the files from the Kubelet's dockertools directory, but supports a new pluggable model for retrieving a .dockercfg-compatible JSON blob with credentials. With this change, the Kubelet will lazily ask for the docker config from a set of DockerConfigProvider extensions each time it needs a credential. This change provides common implementations of DockerConfigProvider for: - "Default": load .dockercfg from disk - "Caching": wraps another provider in a cache that expires after a pre-specified lifetime. GCP-only: - "google-dockercfg": reads a .dockercfg from a GCE instance's metadata - "google-dockercfg-url": reads a .dockercfg from a URL specified in a GCE instance's metadata. - "google-container-registry": reads an access token from GCE metadata into a password field.
87 lines
2.4 KiB
Bash
Executable File
87 lines
2.4 KiB
Bash
Executable File
#!/bin/bash
|
|
|
|
# Copyright 2014 Google Inc. All rights reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
# Launches a container and verifies it can be reached. Assumes that
|
|
# we're being called by hack/e2e-test.sh (we use some env vars it sets up).
|
|
|
|
set -o errexit
|
|
set -o nounset
|
|
set -o pipefail
|
|
|
|
if [[ "${KUBERNETES_PROVIDER:-gce}" != "gce" ]]; then
|
|
echo WARNING: Skipping private.sh for cloud provider: $KUBERNETES_PROVIDER.
|
|
exit 0
|
|
fi
|
|
|
|
KUBE_ROOT=$(dirname "${BASH_SOURCE}")/../..
|
|
source "${KUBE_ROOT}/cluster/kube-env.sh"
|
|
source "${KUBE_ROOT}/cluster/$KUBERNETES_PROVIDER/util.sh"
|
|
|
|
# Launch some pods.
|
|
num_pods=2
|
|
$KUBECFG -p 8080:9376 run container.cloud.google.com/_b_k8s_test/serve_hostname ${num_pods} my-hostname
|
|
|
|
function teardown() {
|
|
echo "Cleaning up test artifacts"
|
|
$KUBECFG stop my-hostname
|
|
$KUBECFG rm my-hostname
|
|
}
|
|
|
|
trap "teardown" EXIT
|
|
|
|
pod_id_list=$($KUBECFG '-template={{range.items}}{{.id}} {{end}}' -l replicationController=my-hostname list pods)
|
|
# Pod turn up on a clean cluster can take a while for the docker image pull.
|
|
all_running=0
|
|
for i in $(seq 1 24); do
|
|
echo "Waiting for pods to come up."
|
|
sleep 5
|
|
all_running=1
|
|
for id in $pod_id_list; do
|
|
current_status=$($KUBECFG -template '{{.currentState.status}}' get pods/$id) || true
|
|
if [[ "$current_status" != "Running" ]]; then
|
|
all_running=0
|
|
break
|
|
fi
|
|
done
|
|
if [[ "${all_running}" == 1 ]]; then
|
|
break
|
|
fi
|
|
done
|
|
if [[ "${all_running}" == 0 ]]; then
|
|
echo "Pods did not come up in time"
|
|
exit 1
|
|
fi
|
|
|
|
# Get minion IP addresses
|
|
detect-minions
|
|
|
|
# let images stabilize
|
|
echo "Letting images stabilize"
|
|
sleep 5
|
|
|
|
# Verify that something is listening.
|
|
for id in ${pod_id_list}; do
|
|
ip=$($KUBECFG -template '{{.currentState.hostIP}}' get pods/$id)
|
|
echo "Trying to reach server that should be running at ${ip}:8080..."
|
|
ok=0
|
|
for i in $(seq 1 5); do
|
|
curl --connect-timeout 1 "http://${ip}:8080" >/dev/null 2>&1 && ok=1 && break
|
|
sleep 2
|
|
done
|
|
done
|
|
|
|
exit 0
|