316 lines
11 KiB
Go
316 lines
11 KiB
Go
/*
|
|
Copyright 2014 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package skipper
|
|
|
|
import (
|
|
"bufio"
|
|
"bytes"
|
|
"context"
|
|
"fmt"
|
|
"regexp"
|
|
"runtime"
|
|
"runtime/debug"
|
|
"strings"
|
|
|
|
"github.com/onsi/ginkgo"
|
|
|
|
apierrors "k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/labels"
|
|
"k8s.io/apimachinery/pkg/runtime/schema"
|
|
utilversion "k8s.io/apimachinery/pkg/util/version"
|
|
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
|
"k8s.io/client-go/discovery"
|
|
"k8s.io/client-go/dynamic"
|
|
clientset "k8s.io/client-go/kubernetes"
|
|
"k8s.io/component-base/featuregate"
|
|
"k8s.io/kubernetes/test/e2e/framework"
|
|
e2enode "k8s.io/kubernetes/test/e2e/framework/node"
|
|
e2essh "k8s.io/kubernetes/test/e2e/framework/ssh"
|
|
)
|
|
|
|
func skipInternalf(caller int, format string, args ...interface{}) {
|
|
msg := fmt.Sprintf(format, args...)
|
|
framework.Logf(msg)
|
|
skip(msg, caller+1)
|
|
}
|
|
|
|
// SkipPanic is the value that will be panicked from Skip.
|
|
type SkipPanic struct {
|
|
Message string // The failure message passed to Fail
|
|
Filename string // The filename that is the source of the failure
|
|
Line int // The line number of the filename that is the source of the failure
|
|
FullStackTrace string // A full stack trace starting at the source of the failure
|
|
}
|
|
|
|
// String makes SkipPanic look like the old Ginkgo panic when printed.
|
|
func (SkipPanic) String() string { return ginkgo.GINKGO_PANIC }
|
|
|
|
// Skip wraps ginkgo.Skip so that it panics with more useful
|
|
// information about why the test is being skipped. This function will
|
|
// panic with a SkipPanic.
|
|
func skip(message string, callerSkip ...int) {
|
|
skip := 1
|
|
if len(callerSkip) > 0 {
|
|
skip += callerSkip[0]
|
|
}
|
|
|
|
_, file, line, _ := runtime.Caller(skip)
|
|
sp := SkipPanic{
|
|
Message: message,
|
|
Filename: file,
|
|
Line: line,
|
|
FullStackTrace: pruneStack(skip),
|
|
}
|
|
|
|
defer func() {
|
|
e := recover()
|
|
if e != nil {
|
|
panic(sp)
|
|
}
|
|
}()
|
|
|
|
ginkgo.Skip(message, skip)
|
|
}
|
|
|
|
// ginkgo adds a lot of test running infrastructure to the stack, so
|
|
// we filter those out
|
|
var stackSkipPattern = regexp.MustCompile(`onsi/ginkgo`)
|
|
|
|
func pruneStack(skip int) string {
|
|
skip += 2 // one for pruneStack and one for debug.Stack
|
|
stack := debug.Stack()
|
|
scanner := bufio.NewScanner(bytes.NewBuffer(stack))
|
|
var prunedStack []string
|
|
|
|
// skip the top of the stack
|
|
for i := 0; i < 2*skip+1; i++ {
|
|
scanner.Scan()
|
|
}
|
|
|
|
for scanner.Scan() {
|
|
if stackSkipPattern.Match(scanner.Bytes()) {
|
|
scanner.Scan() // these come in pairs
|
|
} else {
|
|
prunedStack = append(prunedStack, scanner.Text())
|
|
scanner.Scan() // these come in pairs
|
|
prunedStack = append(prunedStack, scanner.Text())
|
|
}
|
|
}
|
|
|
|
return strings.Join(prunedStack, "\n")
|
|
}
|
|
|
|
// Skipf skips with information about why the test is being skipped.
|
|
func Skipf(format string, args ...interface{}) {
|
|
skipInternalf(1, format, args...)
|
|
panic("unreachable")
|
|
}
|
|
|
|
// SkipUnlessAtLeast skips if the value is less than the minValue.
|
|
func SkipUnlessAtLeast(value int, minValue int, message string) {
|
|
if value < minValue {
|
|
skipInternalf(1, message)
|
|
}
|
|
}
|
|
|
|
// SkipUnlessFeatureGateEnabled skips if the feature is disabled
|
|
func SkipUnlessFeatureGateEnabled(gate featuregate.Feature) {
|
|
if !utilfeature.DefaultFeatureGate.Enabled(gate) {
|
|
skipInternalf(1, "Only supported when %v feature is enabled", gate)
|
|
}
|
|
}
|
|
|
|
// SkipIfFeatureGateEnabled skips if the feature is enabled
|
|
func SkipIfFeatureGateEnabled(gate featuregate.Feature) {
|
|
if utilfeature.DefaultFeatureGate.Enabled(gate) {
|
|
skipInternalf(1, "Only supported when %v feature is disabled", gate)
|
|
}
|
|
}
|
|
|
|
// SkipIfMissingResource skips if the gvr resource is missing.
|
|
func SkipIfMissingResource(dynamicClient dynamic.Interface, gvr schema.GroupVersionResource, namespace string) {
|
|
resourceClient := dynamicClient.Resource(gvr).Namespace(namespace)
|
|
_, err := resourceClient.List(context.TODO(), metav1.ListOptions{})
|
|
if err != nil {
|
|
// not all resources support list, so we ignore those
|
|
if apierrors.IsMethodNotSupported(err) || apierrors.IsNotFound(err) || apierrors.IsForbidden(err) {
|
|
skipInternalf(1, "Could not find %s resource, skipping test: %#v", gvr, err)
|
|
}
|
|
framework.Failf("Unexpected error getting %v: %v", gvr, err)
|
|
}
|
|
}
|
|
|
|
// SkipUnlessNodeCountIsAtLeast skips if the number of nodes is less than the minNodeCount.
|
|
func SkipUnlessNodeCountIsAtLeast(minNodeCount int) {
|
|
if framework.TestContext.CloudConfig.NumNodes < minNodeCount {
|
|
skipInternalf(1, "Requires at least %d nodes (not %d)", minNodeCount, framework.TestContext.CloudConfig.NumNodes)
|
|
}
|
|
}
|
|
|
|
// SkipUnlessNodeCountIsAtMost skips if the number of nodes is greater than the maxNodeCount.
|
|
func SkipUnlessNodeCountIsAtMost(maxNodeCount int) {
|
|
if framework.TestContext.CloudConfig.NumNodes > maxNodeCount {
|
|
skipInternalf(1, "Requires at most %d nodes (not %d)", maxNodeCount, framework.TestContext.CloudConfig.NumNodes)
|
|
}
|
|
}
|
|
|
|
// SkipIfProviderIs skips if the provider is included in the unsupportedProviders.
|
|
func SkipIfProviderIs(unsupportedProviders ...string) {
|
|
if framework.ProviderIs(unsupportedProviders...) {
|
|
skipInternalf(1, "Not supported for providers %v (found %s)", unsupportedProviders, framework.TestContext.Provider)
|
|
}
|
|
}
|
|
|
|
// SkipUnlessProviderIs skips if the provider is not included in the supportedProviders.
|
|
func SkipUnlessProviderIs(supportedProviders ...string) {
|
|
if !framework.ProviderIs(supportedProviders...) {
|
|
skipInternalf(1, "Only supported for providers %v (not %s)", supportedProviders, framework.TestContext.Provider)
|
|
}
|
|
}
|
|
|
|
// SkipUnlessMultizone skips if the cluster does not have multizone.
|
|
func SkipUnlessMultizone(c clientset.Interface) {
|
|
zones, err := e2enode.GetClusterZones(c)
|
|
if err != nil {
|
|
skipInternalf(1, "Error listing cluster zones")
|
|
}
|
|
if zones.Len() <= 1 {
|
|
skipInternalf(1, "Requires more than one zone")
|
|
}
|
|
}
|
|
|
|
// SkipIfMultizone skips if the cluster has multizone.
|
|
func SkipIfMultizone(c clientset.Interface) {
|
|
zones, err := e2enode.GetClusterZones(c)
|
|
if err != nil {
|
|
skipInternalf(1, "Error listing cluster zones")
|
|
}
|
|
if zones.Len() > 1 {
|
|
skipInternalf(1, "Requires at most one zone")
|
|
}
|
|
}
|
|
|
|
// SkipUnlessMasterOSDistroIs skips if the master OS distro is not included in the supportedMasterOsDistros.
|
|
func SkipUnlessMasterOSDistroIs(supportedMasterOsDistros ...string) {
|
|
if !framework.MasterOSDistroIs(supportedMasterOsDistros...) {
|
|
skipInternalf(1, "Only supported for master OS distro %v (not %s)", supportedMasterOsDistros, framework.TestContext.MasterOSDistro)
|
|
}
|
|
}
|
|
|
|
// SkipUnlessNodeOSDistroIs skips if the node OS distro is not included in the supportedNodeOsDistros.
|
|
func SkipUnlessNodeOSDistroIs(supportedNodeOsDistros ...string) {
|
|
if !framework.NodeOSDistroIs(supportedNodeOsDistros...) {
|
|
skipInternalf(1, "Only supported for node OS distro %v (not %s)", supportedNodeOsDistros, framework.TestContext.NodeOSDistro)
|
|
}
|
|
}
|
|
|
|
// SkipUnlessNodeOSArchIs skips if the node OS distro is not included in the supportedNodeOsArchs.
|
|
func SkipUnlessNodeOSArchIs(supportedNodeOsArchs ...string) {
|
|
if !framework.NodeOSArchIs(supportedNodeOsArchs...) {
|
|
skipInternalf(1, "Only supported for node OS arch %v (not %s)", supportedNodeOsArchs, framework.TestContext.NodeOSArch)
|
|
}
|
|
}
|
|
|
|
// SkipIfNodeOSDistroIs skips if the node OS distro is included in the unsupportedNodeOsDistros.
|
|
func SkipIfNodeOSDistroIs(unsupportedNodeOsDistros ...string) {
|
|
if framework.NodeOSDistroIs(unsupportedNodeOsDistros...) {
|
|
skipInternalf(1, "Not supported for node OS distro %v (is %s)", unsupportedNodeOsDistros, framework.TestContext.NodeOSDistro)
|
|
}
|
|
}
|
|
|
|
// SkipUnlessServerVersionGTE skips if the server version is less than v.
|
|
func SkipUnlessServerVersionGTE(v *utilversion.Version, c discovery.ServerVersionInterface) {
|
|
gte, err := serverVersionGTE(v, c)
|
|
if err != nil {
|
|
framework.Failf("Failed to get server version: %v", err)
|
|
}
|
|
if !gte {
|
|
skipInternalf(1, "Not supported for server versions before %q", v)
|
|
}
|
|
}
|
|
|
|
// SkipUnlessSSHKeyPresent skips if no SSH key is found.
|
|
func SkipUnlessSSHKeyPresent() {
|
|
if _, err := e2essh.GetSigner(framework.TestContext.Provider); err != nil {
|
|
skipInternalf(1, "No SSH Key for provider %s: '%v'", framework.TestContext.Provider, err)
|
|
}
|
|
}
|
|
|
|
// serverVersionGTE returns true if v is greater than or equal to the server version.
|
|
func serverVersionGTE(v *utilversion.Version, c discovery.ServerVersionInterface) (bool, error) {
|
|
serverVersion, err := c.ServerVersion()
|
|
if err != nil {
|
|
return false, fmt.Errorf("Unable to get server version: %v", err)
|
|
}
|
|
sv, err := utilversion.ParseSemantic(serverVersion.GitVersion)
|
|
if err != nil {
|
|
return false, fmt.Errorf("Unable to parse server version %q: %v", serverVersion.GitVersion, err)
|
|
}
|
|
return sv.AtLeast(v), nil
|
|
}
|
|
|
|
// AppArmorDistros are distros with AppArmor support
|
|
var AppArmorDistros = []string{"gci", "ubuntu"}
|
|
|
|
// SkipIfAppArmorNotSupported skips if the AppArmor is not supported by the node OS distro.
|
|
func SkipIfAppArmorNotSupported() {
|
|
SkipUnlessNodeOSDistroIs(AppArmorDistros...)
|
|
}
|
|
|
|
// RunIfContainerRuntimeIs runs if the container runtime is included in the runtimes.
|
|
func RunIfContainerRuntimeIs(runtimes ...string) {
|
|
for _, containerRuntime := range runtimes {
|
|
if containerRuntime == framework.TestContext.ContainerRuntime {
|
|
return
|
|
}
|
|
}
|
|
skipInternalf(1, "Skipped because container runtime %q is not in %s", framework.TestContext.ContainerRuntime, runtimes)
|
|
}
|
|
|
|
// RunIfSystemSpecNameIs runs if the system spec name is included in the names.
|
|
func RunIfSystemSpecNameIs(names ...string) {
|
|
for _, name := range names {
|
|
if name == framework.TestContext.SystemSpecName {
|
|
return
|
|
}
|
|
}
|
|
skipInternalf(1, "Skipped because system spec name %q is not in %v", framework.TestContext.SystemSpecName, names)
|
|
}
|
|
|
|
// SkipUnlessComponentRunsAsPodsAndClientCanDeleteThem run if the component run as pods and client can delete them
|
|
func SkipUnlessComponentRunsAsPodsAndClientCanDeleteThem(componentName string, c clientset.Interface, ns string, labelSet labels.Set) {
|
|
// verify if component run as pod
|
|
label := labels.SelectorFromSet(labelSet)
|
|
listOpts := metav1.ListOptions{LabelSelector: label.String()}
|
|
pods, err := c.CoreV1().Pods(ns).List(context.TODO(), listOpts)
|
|
framework.Logf("SkipUnlessComponentRunsAsPodsAndClientCanDeleteThem: %v, %v", pods, err)
|
|
if err != nil {
|
|
skipInternalf(1, "Skipped because client failed to get component:%s pod err:%v", componentName, err)
|
|
}
|
|
|
|
if len(pods.Items) == 0 {
|
|
skipInternalf(1, "Skipped because component:%s is not running as pod.", componentName)
|
|
}
|
|
|
|
// verify if client can delete pod
|
|
pod := pods.Items[0]
|
|
if err := c.CoreV1().Pods(ns).Delete(context.TODO(), pod.Name, metav1.DeleteOptions{DryRun: []string{metav1.DryRunAll}}); err != nil {
|
|
skipInternalf(1, "Skipped because client failed to delete component:%s pod, err:%v", componentName, err)
|
|
}
|
|
}
|