
The recently introduced failure handling in ExpectNoError depends on error wrapping: if an error prefix gets added with `fmt.Errorf("foo: %v", err)`, then ExpectNoError cannot detect that the root cause is an assertion failure and then will add another useless "unexpected error" prefix and will not dump the additional failure information (currently the backtrace inside the E2E framework). Instead of manually deciding on a case-by-case basis where %w is needed, all error wrapping was updated automatically with sed -i "s/fmt.Errorf\(.*\): '*\(%s\|%v\)'*\",\(.* err)\)/fmt.Errorf\1: %w\",\3/" $(git grep -l 'fmt.Errorf' test/e2e*) This may be unnecessary in some cases, but it's not wrong.
978 lines
32 KiB
Go
978 lines
32 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
// To run the node e2e tests remotely against one or more hosts on gce:
|
|
// $ go run run_remote.go --v 2 --ssh-env gce --hosts <comma separated hosts>
|
|
// To run the node e2e tests remotely against one or more images on gce and provision them:
|
|
// $ go run run_remote.go --v 2 --project <project> --zone <zone> --ssh-env gce --images <comma separated images>
|
|
package main
|
|
|
|
import (
|
|
"context"
|
|
"encoding/base64"
|
|
"flag"
|
|
"fmt"
|
|
"math/rand"
|
|
"net/http"
|
|
"os"
|
|
"os/exec"
|
|
"os/signal"
|
|
"path/filepath"
|
|
"regexp"
|
|
"sort"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
"k8s.io/kubernetes/test/e2e_node/remote"
|
|
"k8s.io/kubernetes/test/e2e_node/system"
|
|
|
|
"github.com/google/uuid"
|
|
"golang.org/x/oauth2/google"
|
|
compute "google.golang.org/api/compute/v0.beta"
|
|
"google.golang.org/api/option"
|
|
"k8s.io/klog/v2"
|
|
"sigs.k8s.io/yaml"
|
|
)
|
|
|
|
var mode = flag.String("mode", "gce", "Mode to operate in. One of gce|ssh. Defaults to gce")
|
|
var testArgs = flag.String("test_args", "", "Space-separated list of arguments to pass to Ginkgo test runner.")
|
|
var testSuite = flag.String("test-suite", "default", "Test suite the runner initializes with. Currently support default|cadvisor|conformance")
|
|
var instanceNamePrefix = flag.String("instance-name-prefix", "", "prefix for instance names")
|
|
var zone = flag.String("zone", "", "gce zone the hosts live in")
|
|
var project = flag.String("project", "", "gce project the hosts live in")
|
|
var imageConfigFile = flag.String("image-config-file", "", "yaml file describing images to run")
|
|
var imageConfigDir = flag.String("image-config-dir", "", "(optional)path to image config files")
|
|
var imageProject = flag.String("image-project", "", "gce project the hosts live in")
|
|
var images = flag.String("images", "", "images to test")
|
|
var preemptibleInstances = flag.Bool("preemptible-instances", false, "If true, gce instances will be configured to be preemptible")
|
|
var hosts = flag.String("hosts", "", "hosts to test")
|
|
var cleanup = flag.Bool("cleanup", true, "If true remove files from remote hosts and delete temporary instances")
|
|
var deleteInstances = flag.Bool("delete-instances", true, "If true, delete any instances created")
|
|
var buildOnly = flag.Bool("build-only", false, "If true, build e2e_node_test.tar.gz and exit.")
|
|
var instanceMetadata = flag.String("instance-metadata", "", "key/value metadata for instances separated by '=' or '<', 'k=v' means the key is 'k' and the value is 'v'; 'k<p' means the key is 'k' and the value is extracted from the local path 'p', e.g. k1=v1,k2<p2")
|
|
var gubernator = flag.Bool("gubernator", false, "If true, output Gubernator link to view logs")
|
|
var ginkgoFlags = flag.String("ginkgo-flags", "", "Passed to ginkgo to specify additional flags such as --skip=.")
|
|
var systemSpecName = flag.String("system-spec-name", "", fmt.Sprintf("The name of the system spec used for validating the image in the node conformance test. The specs are at %s. If unspecified, the default built-in spec (system.DefaultSpec) will be used.", system.SystemSpecPath))
|
|
var extraEnvs = flag.String("extra-envs", "", "The extra environment variables needed for node e2e tests. Format: a list of key=value pairs, e.g., env1=val1,env2=val2")
|
|
var runtimeConfig = flag.String("runtime-config", "", "The runtime configuration for the API server on the node e2e tests.. Format: a list of key=value pairs, e.g., env1=val1,env2=val2")
|
|
var kubeletConfigFile = flag.String("kubelet-config-file", "", "The KubeletConfiguration file that should be applied to the kubelet")
|
|
|
|
// envs is the type used to collect all node envs. The key is the env name,
|
|
// and the value is the env value
|
|
type envs map[string]string
|
|
|
|
// String function of flag.Value
|
|
func (e *envs) String() string {
|
|
return fmt.Sprint(*e)
|
|
}
|
|
|
|
// Set function of flag.Value
|
|
func (e *envs) Set(value string) error {
|
|
kv := strings.SplitN(value, "=", 2)
|
|
if len(kv) != 2 {
|
|
return fmt.Errorf("invalid env string %s", value)
|
|
}
|
|
emap := *e
|
|
emap[kv[0]] = kv[1]
|
|
return nil
|
|
}
|
|
|
|
// nodeEnvs is the node envs from the flag `node-env`.
|
|
var nodeEnvs = make(envs)
|
|
|
|
func init() {
|
|
flag.Var(&nodeEnvs, "node-env", "An environment variable passed to instance as metadata, e.g. when '--node-env=PATH=/usr/bin' is specified, there will be an extra instance metadata 'PATH=/usr/bin'.")
|
|
}
|
|
|
|
const (
|
|
defaultMachine = "n1-standard-1"
|
|
acceleratorTypeResourceFormat = "https://www.googleapis.com/compute/beta/projects/%s/zones/%s/acceleratorTypes/%s"
|
|
)
|
|
|
|
var (
|
|
computeService *compute.Service
|
|
arc Archive
|
|
suite remote.TestSuite
|
|
)
|
|
|
|
// Archive contains path info in the archive.
|
|
type Archive struct {
|
|
sync.Once
|
|
path string
|
|
err error
|
|
}
|
|
|
|
// TestResult contains some information about the test results.
|
|
type TestResult struct {
|
|
output string
|
|
err error
|
|
host string
|
|
exitOk bool
|
|
}
|
|
|
|
// ImageConfig specifies what images should be run and how for these tests.
|
|
// It can be created via the `--images` and `--image-project` flags, or by
|
|
// specifying the `--image-config-file` flag, pointing to a json or yaml file
|
|
// of the form:
|
|
//
|
|
// images:
|
|
// short-name:
|
|
// image: gce-image-name
|
|
// project: gce-image-project
|
|
// machine: for benchmark only, the machine type (GCE instance) to run test
|
|
// tests: for benchmark only, a list of ginkgo focus strings to match tests
|
|
//
|
|
// TODO(coufon): replace 'image' with 'node' in configurations
|
|
// and we plan to support testing custom machines other than GCE by specifying host
|
|
type ImageConfig struct {
|
|
Images map[string]GCEImage `json:"images"`
|
|
}
|
|
|
|
// Accelerator contains type and count about resource.
|
|
type Accelerator struct {
|
|
Type string `json:"type,omitempty"`
|
|
Count int64 `json:"count,omitempty"`
|
|
}
|
|
|
|
// Resources contains accelerators array.
|
|
type Resources struct {
|
|
Accelerators []Accelerator `json:"accelerators,omitempty"`
|
|
}
|
|
|
|
// GCEImage contains some information about GCE Image.
|
|
type GCEImage struct {
|
|
Image string `json:"image,omitempty"`
|
|
ImageRegex string `json:"image_regex,omitempty"`
|
|
// ImageFamily is the image family to use. The latest image from the image family will be used, e.g cos-81-lts.
|
|
ImageFamily string `json:"image_family,omitempty"`
|
|
ImageDesc string `json:"image_description,omitempty"`
|
|
KernelArguments []string `json:"kernel_arguments,omitempty"`
|
|
Project string `json:"project"`
|
|
Metadata string `json:"metadata"`
|
|
Machine string `json:"machine,omitempty"`
|
|
Resources Resources `json:"resources,omitempty"`
|
|
// This test is for benchmark (no limit verification, more result log, node name has format 'machine-image-uuid') if 'Tests' is non-empty.
|
|
Tests []string `json:"tests,omitempty"`
|
|
}
|
|
|
|
type internalImageConfig struct {
|
|
images map[string]internalGCEImage
|
|
}
|
|
|
|
// internalGCEImage is an internal GCE image representation for E2E node.
|
|
type internalGCEImage struct {
|
|
image string
|
|
// imageDesc is the description of the image. If empty, the value in the
|
|
// 'image' will be used.
|
|
imageDesc string
|
|
kernelArguments []string
|
|
project string
|
|
resources Resources
|
|
metadata *compute.Metadata
|
|
machine string
|
|
tests []string
|
|
}
|
|
|
|
func main() {
|
|
klog.InitFlags(nil)
|
|
flag.Parse()
|
|
switch *testSuite {
|
|
case "conformance":
|
|
suite = remote.InitConformanceRemote()
|
|
case "cadvisor":
|
|
suite = remote.InitCAdvisorE2ERemote()
|
|
// TODO: Add subcommand for node soaking, node conformance, cri validation.
|
|
case "default":
|
|
// Use node e2e suite by default if no subcommand is specified.
|
|
suite = remote.InitNodeE2ERemote()
|
|
default:
|
|
klog.Fatalf("--test-suite must be one of default, cadvisor, or conformance")
|
|
}
|
|
|
|
// Listen for SIGINT and ignore the first one. In case SIGINT is sent to this
|
|
// process and all its children, we ignore it here, while our children ssh connections
|
|
// are stopped. This allows us to gather artifacts and print out test state before
|
|
// being killed.
|
|
c := make(chan os.Signal, 2)
|
|
signal.Notify(c, os.Interrupt)
|
|
go func() {
|
|
<-c
|
|
fmt.Printf("Received SIGINT. Will exit on next SIGINT.\n")
|
|
<-c
|
|
fmt.Printf("Received another SIGINT. Will exit.\n")
|
|
os.Exit(1)
|
|
}()
|
|
|
|
rand.Seed(time.Now().UnixNano())
|
|
if *buildOnly {
|
|
// Build the archive and exit
|
|
remote.CreateTestArchive(suite, *systemSpecName, *kubeletConfigFile)
|
|
return
|
|
}
|
|
|
|
var gceImages *internalImageConfig
|
|
if *mode == "gce" {
|
|
if *hosts == "" && *imageConfigFile == "" && *images == "" {
|
|
klog.Fatalf("Must specify one of --image-config-file, --hosts, --images.")
|
|
}
|
|
var err error
|
|
computeService, err = getComputeClient()
|
|
if err != nil {
|
|
klog.Fatalf("Unable to create gcloud compute service using defaults. Make sure you are authenticated. %v", err)
|
|
}
|
|
if gceImages, err = prepareGceImages(); err != nil {
|
|
klog.Fatalf("While preparing GCE images: %v", err)
|
|
}
|
|
if *instanceNamePrefix == "" {
|
|
*instanceNamePrefix = "tmp-node-e2e-" + uuid.New().String()[:8]
|
|
}
|
|
}
|
|
|
|
// Setup coloring
|
|
stat, _ := os.Stdout.Stat()
|
|
useColor := (stat.Mode() & os.ModeCharDevice) != 0
|
|
blue := ""
|
|
noColour := ""
|
|
if useColor {
|
|
blue = "\033[0;34m"
|
|
noColour = "\033[0m"
|
|
}
|
|
|
|
go arc.getArchive()
|
|
defer arc.deleteArchive()
|
|
|
|
results := make(chan *TestResult)
|
|
running := 0
|
|
if gceImages != nil {
|
|
for shortName := range gceImages.images {
|
|
imageConfig := gceImages.images[shortName]
|
|
fmt.Printf("Initializing e2e tests using image %s/%s/%s.\n", shortName, imageConfig.project, imageConfig.image)
|
|
running++
|
|
go func(image *internalGCEImage, junitFileName string) {
|
|
results <- testImage(image, junitFileName)
|
|
}(&imageConfig, shortName)
|
|
}
|
|
}
|
|
if *hosts != "" {
|
|
for _, host := range strings.Split(*hosts, ",") {
|
|
fmt.Printf("Initializing e2e tests using host %s.\n", host)
|
|
running++
|
|
go func(host string, junitFileName string) {
|
|
results <- testHost(host, *cleanup, "", junitFileName, *ginkgoFlags)
|
|
}(host, host)
|
|
}
|
|
}
|
|
|
|
// Wait for all tests to complete and emit the results
|
|
errCount := 0
|
|
exitOk := true
|
|
for i := 0; i < running; i++ {
|
|
tr := <-results
|
|
host := tr.host
|
|
fmt.Println() // Print an empty line
|
|
fmt.Printf("%s>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>%s\n", blue, noColour)
|
|
fmt.Printf("%s> START TEST >%s\n", blue, noColour)
|
|
fmt.Printf("%s>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>%s\n", blue, noColour)
|
|
fmt.Printf("Start Test Suite on Host %s\n", host)
|
|
fmt.Printf("%s\n", tr.output)
|
|
if tr.err != nil {
|
|
errCount++
|
|
fmt.Printf("Failure Finished Test Suite on Host %s\n%v\n", host, tr.err)
|
|
} else {
|
|
fmt.Printf("Success Finished Test Suite on Host %s\n", host)
|
|
}
|
|
exitOk = exitOk && tr.exitOk
|
|
fmt.Printf("%s<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<%s\n", blue, noColour)
|
|
fmt.Printf("%s< FINISH TEST <%s\n", blue, noColour)
|
|
fmt.Printf("%s<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<%s\n", blue, noColour)
|
|
fmt.Println() // Print an empty line
|
|
}
|
|
// Set the exit code if there were failures
|
|
if !exitOk {
|
|
fmt.Printf("Failure: %d errors encountered.\n", errCount)
|
|
callGubernator(*gubernator)
|
|
arc.deleteArchive()
|
|
os.Exit(1)
|
|
}
|
|
callGubernator(*gubernator)
|
|
}
|
|
|
|
func prepareGceImages() (*internalImageConfig, error) {
|
|
gceImages := &internalImageConfig{
|
|
images: make(map[string]internalGCEImage),
|
|
}
|
|
|
|
// Parse images from given config file and convert them to internalGCEImage.
|
|
if *imageConfigFile != "" {
|
|
configPath := *imageConfigFile
|
|
if *imageConfigDir != "" {
|
|
configPath = filepath.Join(*imageConfigDir, *imageConfigFile)
|
|
}
|
|
|
|
imageConfigData, err := os.ReadFile(configPath)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Could not read image config file provided: %w", err)
|
|
}
|
|
// Unmarshal the given image config file. All images for this test run will be organized into a map.
|
|
// shortName->GCEImage, e.g cos-stable->cos-stable-81-12871-103-0.
|
|
externalImageConfig := ImageConfig{Images: make(map[string]GCEImage)}
|
|
err = yaml.Unmarshal(imageConfigData, &externalImageConfig)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Could not parse image config file: %w", err)
|
|
}
|
|
|
|
for shortName, imageConfig := range externalImageConfig.Images {
|
|
var image string
|
|
if (imageConfig.ImageRegex != "" || imageConfig.ImageFamily != "") && imageConfig.Image == "" {
|
|
image, err = getGCEImage(imageConfig.ImageRegex, imageConfig.ImageFamily, imageConfig.Project)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Could not retrieve a image based on image regex %q and family %q: %v",
|
|
imageConfig.ImageRegex, imageConfig.ImageFamily, err)
|
|
}
|
|
} else {
|
|
image = imageConfig.Image
|
|
}
|
|
// Convert the given image into an internalGCEImage.
|
|
metadata := imageConfig.Metadata
|
|
if len(strings.TrimSpace(*instanceMetadata)) > 0 {
|
|
metadata += "," + *instanceMetadata
|
|
}
|
|
gceImage := internalGCEImage{
|
|
image: image,
|
|
imageDesc: imageConfig.ImageDesc,
|
|
project: imageConfig.Project,
|
|
metadata: getImageMetadata(metadata),
|
|
kernelArguments: imageConfig.KernelArguments,
|
|
machine: imageConfig.Machine,
|
|
tests: imageConfig.Tests,
|
|
resources: imageConfig.Resources,
|
|
}
|
|
if gceImage.imageDesc == "" {
|
|
gceImage.imageDesc = gceImage.image
|
|
}
|
|
gceImages.images[shortName] = gceImage
|
|
}
|
|
}
|
|
|
|
// Allow users to specify additional images via cli flags for local testing
|
|
// convenience; merge in with config file
|
|
if *images != "" {
|
|
if *imageProject == "" {
|
|
klog.Fatal("Must specify --image-project if you specify --images")
|
|
}
|
|
cliImages := strings.Split(*images, ",")
|
|
for _, image := range cliImages {
|
|
gceImage := internalGCEImage{
|
|
image: image,
|
|
project: *imageProject,
|
|
metadata: getImageMetadata(*instanceMetadata),
|
|
}
|
|
gceImages.images[image] = gceImage
|
|
}
|
|
}
|
|
|
|
if len(gceImages.images) != 0 && *zone == "" {
|
|
klog.Fatal("Must specify --zone flag")
|
|
}
|
|
// Make sure GCP project is set. Without a project, images can't be retrieved..
|
|
for shortName, imageConfig := range gceImages.images {
|
|
if imageConfig.project == "" {
|
|
klog.Fatalf("Invalid config for %v; must specify a project", shortName)
|
|
}
|
|
}
|
|
if len(gceImages.images) != 0 {
|
|
if *project == "" {
|
|
klog.Fatal("Must specify --project flag to launch images into")
|
|
}
|
|
}
|
|
|
|
return gceImages, nil
|
|
}
|
|
|
|
func callGubernator(gubernator bool) {
|
|
if gubernator {
|
|
fmt.Println("Running gubernator.sh")
|
|
output, err := exec.Command("./test/e2e_node/gubernator.sh", "y").Output()
|
|
|
|
if err != nil {
|
|
fmt.Println("gubernator.sh Failed")
|
|
fmt.Println(err)
|
|
return
|
|
}
|
|
fmt.Printf("%s", output)
|
|
}
|
|
return
|
|
}
|
|
|
|
func (a *Archive) getArchive() (string, error) {
|
|
a.Do(func() { a.path, a.err = remote.CreateTestArchive(suite, *systemSpecName, *kubeletConfigFile) })
|
|
return a.path, a.err
|
|
}
|
|
|
|
func (a *Archive) deleteArchive() {
|
|
path, err := a.getArchive()
|
|
if err != nil {
|
|
return
|
|
}
|
|
os.Remove(path)
|
|
}
|
|
|
|
func getImageMetadata(input string) *compute.Metadata {
|
|
if input == "" {
|
|
return nil
|
|
}
|
|
klog.V(3).Infof("parsing instance metadata: %q", input)
|
|
raw := parseInstanceMetadata(input)
|
|
klog.V(4).Infof("parsed instance metadata: %v", raw)
|
|
metadataItems := []*compute.MetadataItems{}
|
|
for k, v := range raw {
|
|
val := v
|
|
metadataItems = append(metadataItems, &compute.MetadataItems{
|
|
Key: k,
|
|
Value: &val,
|
|
})
|
|
}
|
|
ret := compute.Metadata{Items: metadataItems}
|
|
return &ret
|
|
}
|
|
|
|
func registerGceHostIP(host string) error {
|
|
instance, err := computeService.Instances.Get(*project, *zone, host).Do()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if strings.ToUpper(instance.Status) != "RUNNING" {
|
|
return fmt.Errorf("instance %s not in state RUNNING, was %s", host, instance.Status)
|
|
}
|
|
externalIP := getExternalIP(instance)
|
|
if len(externalIP) > 0 {
|
|
remote.AddHostnameIP(host, externalIP)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Run tests in archive against host
|
|
func testHost(host string, deleteFiles bool, imageDesc, junitFileName, ginkgoFlagsStr string) *TestResult {
|
|
path, err := arc.getArchive()
|
|
if err != nil {
|
|
// Don't log fatal because we need to do any needed cleanup contained in "defer" statements
|
|
return &TestResult{
|
|
err: fmt.Errorf("unable to create test archive: %w", err),
|
|
}
|
|
}
|
|
|
|
output, exitOk, err := remote.RunRemote(suite, path, host, deleteFiles, imageDesc, junitFileName, *testArgs, ginkgoFlagsStr, *systemSpecName, *extraEnvs, *runtimeConfig)
|
|
return &TestResult{
|
|
output: output,
|
|
err: err,
|
|
host: host,
|
|
exitOk: exitOk,
|
|
}
|
|
}
|
|
|
|
type imageObj struct {
|
|
creationTime time.Time
|
|
name string
|
|
}
|
|
|
|
type byCreationTime []imageObj
|
|
|
|
func (a byCreationTime) Len() int { return len(a) }
|
|
func (a byCreationTime) Less(i, j int) bool { return a[i].creationTime.After(a[j].creationTime) }
|
|
func (a byCreationTime) Swap(i, j int) { a[i], a[j] = a[j], a[i] }
|
|
|
|
// Returns an image name based on regex and given GCE project.
|
|
func getGCEImage(imageRegex, imageFamily string, project string) (string, error) {
|
|
imageObjs := []imageObj{}
|
|
imageRe := regexp.MustCompile(imageRegex)
|
|
if err := computeService.Images.List(project).Pages(context.Background(),
|
|
func(ilc *compute.ImageList) error {
|
|
for _, instance := range ilc.Items {
|
|
if imageRegex != "" && !imageRe.MatchString(instance.Name) {
|
|
continue
|
|
}
|
|
if imageFamily != "" && instance.Family != imageFamily {
|
|
continue
|
|
}
|
|
creationTime, err := time.Parse(time.RFC3339, instance.CreationTimestamp)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to parse instance creation timestamp %q: %w", instance.CreationTimestamp, err)
|
|
}
|
|
io := imageObj{
|
|
creationTime: creationTime,
|
|
name: instance.Name,
|
|
}
|
|
imageObjs = append(imageObjs, io)
|
|
}
|
|
return nil
|
|
},
|
|
); err != nil {
|
|
return "", fmt.Errorf("failed to list images in project %q: %w", project, err)
|
|
}
|
|
|
|
// Pick the latest image after sorting.
|
|
sort.Sort(byCreationTime(imageObjs))
|
|
if len(imageObjs) > 0 {
|
|
klog.V(4).Infof("found images %+v based on regex %q and family %q in project %q", imageObjs, imageRegex, imageFamily, project)
|
|
return imageObjs[0].name, nil
|
|
}
|
|
return "", fmt.Errorf("found zero images based on regex %q and family %q in project %q", imageRegex, imageFamily, project)
|
|
}
|
|
|
|
// Provision a gce instance using image and run the tests in archive against the instance.
|
|
// Delete the instance afterward.
|
|
func testImage(imageConfig *internalGCEImage, junitFileName string) *TestResult {
|
|
ginkgoFlagsStr := *ginkgoFlags
|
|
// Check whether the test is for benchmark.
|
|
if len(imageConfig.tests) > 0 {
|
|
// Benchmark needs machine type non-empty.
|
|
if imageConfig.machine == "" {
|
|
imageConfig.machine = defaultMachine
|
|
}
|
|
// Use the Ginkgo focus in benchmark config.
|
|
ginkgoFlagsStr += (" " + testsToGinkgoFocus(imageConfig.tests))
|
|
}
|
|
|
|
host, err := createInstance(imageConfig)
|
|
if *deleteInstances {
|
|
defer deleteInstance(host)
|
|
}
|
|
if err != nil {
|
|
return &TestResult{
|
|
err: fmt.Errorf("unable to create gce instance with running docker daemon for image %s. %v", imageConfig.image, err),
|
|
}
|
|
}
|
|
|
|
// Only delete the files if we are keeping the instance and want it cleaned up.
|
|
// If we are going to delete the instance, don't bother with cleaning up the files
|
|
deleteFiles := !*deleteInstances && *cleanup
|
|
|
|
if err = registerGceHostIP(host); err != nil {
|
|
return &TestResult{
|
|
err: err,
|
|
host: host,
|
|
exitOk: false,
|
|
}
|
|
}
|
|
|
|
result := testHost(host, deleteFiles, imageConfig.imageDesc, junitFileName, ginkgoFlagsStr)
|
|
// This is a temporary solution to collect serial node serial log. Only port 1 contains useful information.
|
|
// TODO(random-liu): Extract out and unify log collection logic with cluste e2e.
|
|
serialPortOutput, err := computeService.Instances.GetSerialPortOutput(*project, *zone, host).Port(1).Do()
|
|
if err != nil {
|
|
klog.Errorf("Failed to collect serial output from node %q: %v", host, err)
|
|
} else {
|
|
logFilename := "serial-1.log"
|
|
err := remote.WriteLog(host, logFilename, serialPortOutput.Contents)
|
|
if err != nil {
|
|
klog.Errorf("Failed to write serial output from node %q to %q: %v", host, logFilename, err)
|
|
}
|
|
}
|
|
return result
|
|
}
|
|
|
|
// Provision a gce instance using image
|
|
func createInstance(imageConfig *internalGCEImage) (string, error) {
|
|
p, err := computeService.Projects.Get(*project).Do()
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed to get project info %q: %w", *project, err)
|
|
}
|
|
// Use default service account
|
|
serviceAccount := p.DefaultServiceAccount
|
|
klog.V(1).Infof("Creating instance %+v with service account %q", *imageConfig, serviceAccount)
|
|
name := imageToInstanceName(imageConfig)
|
|
i := &compute.Instance{
|
|
Name: name,
|
|
MachineType: machineType(imageConfig.machine),
|
|
NetworkInterfaces: []*compute.NetworkInterface{
|
|
{
|
|
AccessConfigs: []*compute.AccessConfig{
|
|
{
|
|
Type: "ONE_TO_ONE_NAT",
|
|
Name: "External NAT",
|
|
},
|
|
}},
|
|
},
|
|
Disks: []*compute.AttachedDisk{
|
|
{
|
|
AutoDelete: true,
|
|
Boot: true,
|
|
Type: "PERSISTENT",
|
|
InitializeParams: &compute.AttachedDiskInitializeParams{
|
|
SourceImage: sourceImage(imageConfig.image, imageConfig.project),
|
|
DiskSizeGb: 20,
|
|
},
|
|
},
|
|
},
|
|
ServiceAccounts: []*compute.ServiceAccount{
|
|
{
|
|
Email: serviceAccount,
|
|
Scopes: []string{
|
|
"https://www.googleapis.com/auth/cloud-platform",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
scheduling := compute.Scheduling{
|
|
Preemptible: *preemptibleInstances,
|
|
}
|
|
for _, accelerator := range imageConfig.resources.Accelerators {
|
|
if i.GuestAccelerators == nil {
|
|
autoRestart := true
|
|
i.GuestAccelerators = []*compute.AcceleratorConfig{}
|
|
scheduling.OnHostMaintenance = "TERMINATE"
|
|
scheduling.AutomaticRestart = &autoRestart
|
|
}
|
|
aType := fmt.Sprintf(acceleratorTypeResourceFormat, *project, *zone, accelerator.Type)
|
|
ac := &compute.AcceleratorConfig{
|
|
AcceleratorCount: accelerator.Count,
|
|
AcceleratorType: aType,
|
|
}
|
|
i.GuestAccelerators = append(i.GuestAccelerators, ac)
|
|
}
|
|
i.Scheduling = &scheduling
|
|
i.Metadata = imageConfig.metadata
|
|
var insertionOperationName string
|
|
if _, err := computeService.Instances.Get(*project, *zone, i.Name).Do(); err != nil {
|
|
op, err := computeService.Instances.Insert(*project, *zone, i).Do()
|
|
|
|
if err != nil {
|
|
ret := fmt.Sprintf("could not create instance %s: API error: %v", name, err)
|
|
if op != nil {
|
|
ret = fmt.Sprintf("%s: %v", ret, op.Error)
|
|
}
|
|
return "", fmt.Errorf(ret)
|
|
} else if op.Error != nil {
|
|
var errs []string
|
|
for _, insertErr := range op.Error.Errors {
|
|
errs = append(errs, fmt.Sprintf("%+v", insertErr))
|
|
}
|
|
return "", fmt.Errorf("could not create instance %s: %+v", name, errs)
|
|
|
|
}
|
|
insertionOperationName = op.Name
|
|
}
|
|
instanceRunning := false
|
|
var instance *compute.Instance
|
|
for i := 0; i < 30 && !instanceRunning; i++ {
|
|
if i > 0 {
|
|
time.Sleep(time.Second * 20)
|
|
}
|
|
var insertionOperation *compute.Operation
|
|
insertionOperation, err = computeService.ZoneOperations.Get(*project, *zone, insertionOperationName).Do()
|
|
if err != nil {
|
|
continue
|
|
}
|
|
if strings.ToUpper(insertionOperation.Status) != "DONE" {
|
|
err = fmt.Errorf("instance insert operation %s not in state DONE, was %s", name, insertionOperation.Status)
|
|
continue
|
|
}
|
|
if insertionOperation.Error != nil {
|
|
var errs []string
|
|
for _, insertErr := range insertionOperation.Error.Errors {
|
|
errs = append(errs, fmt.Sprintf("%+v", insertErr))
|
|
}
|
|
return name, fmt.Errorf("could not create instance %s: %+v", name, errs)
|
|
}
|
|
|
|
instance, err = computeService.Instances.Get(*project, *zone, name).Do()
|
|
if err != nil {
|
|
continue
|
|
}
|
|
if strings.ToUpper(instance.Status) != "RUNNING" {
|
|
err = fmt.Errorf("instance %s not in state RUNNING, was %s", name, instance.Status)
|
|
continue
|
|
}
|
|
externalIP := getExternalIP(instance)
|
|
if len(externalIP) > 0 {
|
|
remote.AddHostnameIP(name, externalIP)
|
|
}
|
|
|
|
var output string
|
|
output, err = remote.SSH(name, "sh", "-c",
|
|
"'systemctl list-units --type=service --state=running | grep -e containerd -e crio'")
|
|
if err != nil {
|
|
err = fmt.Errorf("instance %s not running containerd/crio daemon - Command failed: %s", name, output)
|
|
continue
|
|
}
|
|
if !strings.Contains(output, "containerd.service") &&
|
|
!strings.Contains(output, "crio.service") {
|
|
err = fmt.Errorf("instance %s not running containerd/crio daemon: %s", name, output)
|
|
continue
|
|
}
|
|
instanceRunning = true
|
|
}
|
|
// If instance didn't reach running state in time, return with error now.
|
|
if err != nil {
|
|
return name, err
|
|
}
|
|
// Instance reached running state in time, make sure that cloud-init is complete
|
|
if isCloudInitUsed(imageConfig.metadata) {
|
|
cloudInitFinished := false
|
|
for i := 0; i < 60 && !cloudInitFinished; i++ {
|
|
if i > 0 {
|
|
time.Sleep(time.Second * 20)
|
|
}
|
|
var finished string
|
|
finished, err = remote.SSH(name, "ls", "/var/lib/cloud/instance/boot-finished")
|
|
if err != nil {
|
|
err = fmt.Errorf("instance %s has not finished cloud-init script: %s", name, finished)
|
|
continue
|
|
}
|
|
cloudInitFinished = true
|
|
}
|
|
}
|
|
|
|
// apply additional kernel arguments to the instance
|
|
if len(imageConfig.kernelArguments) > 0 {
|
|
klog.Info("Update kernel arguments")
|
|
if err := updateKernelArguments(instance, imageConfig.image, imageConfig.kernelArguments); err != nil {
|
|
return name, err
|
|
}
|
|
}
|
|
|
|
return name, err
|
|
}
|
|
|
|
func updateKernelArguments(instance *compute.Instance, image string, kernelArgs []string) error {
|
|
kernelArgsString := strings.Join(kernelArgs, " ")
|
|
|
|
var cmd []string
|
|
if strings.Contains(image, "cos") {
|
|
cmd = []string{
|
|
"dir=$(mktemp -d)",
|
|
"mount /dev/sda12 ${dir}",
|
|
fmt.Sprintf("sed -i -e \"s|cros_efi|cros_efi %s|g\" ${dir}/efi/boot/grub.cfg", kernelArgsString),
|
|
"umount ${dir}",
|
|
"rmdir ${dir}",
|
|
}
|
|
}
|
|
|
|
if strings.Contains(image, "ubuntu") {
|
|
cmd = []string{
|
|
fmt.Sprintf("echo \"GRUB_CMDLINE_LINUX_DEFAULT=%s ${GRUB_CMDLINE_LINUX_DEFAULT}\" > /etc/default/grub.d/99-additional-arguments.cfg", kernelArgsString),
|
|
"/usr/sbin/update-grub",
|
|
}
|
|
}
|
|
|
|
if len(cmd) == 0 {
|
|
klog.Warningf("The image %s does not support adding an additional kernel arguments", image)
|
|
return nil
|
|
}
|
|
|
|
out, err := remote.SSH(instance.Name, "sh", "-c", fmt.Sprintf("'%s'", strings.Join(cmd, "&&")))
|
|
if err != nil {
|
|
klog.Errorf("failed to run command %s: out: %s, err: %v", cmd, out, err)
|
|
return err
|
|
}
|
|
|
|
if err := rebootInstance(instance); err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func rebootInstance(instance *compute.Instance) error {
|
|
// wait until the instance will not response to SSH
|
|
klog.Info("Reboot the node and wait for instance not to be available via SSH")
|
|
if waitErr := wait.PollImmediate(5*time.Second, 5*time.Minute, func() (bool, error) {
|
|
if _, err := remote.SSH(instance.Name, "reboot"); err != nil {
|
|
return true, nil
|
|
}
|
|
|
|
return false, nil
|
|
}); waitErr != nil {
|
|
return fmt.Errorf("the instance %s still response to SSH: %v", instance.Name, waitErr)
|
|
}
|
|
|
|
// wait until the instance will response again to SSH
|
|
klog.Info("Wait for instance to be available via SSH")
|
|
if waitErr := wait.PollImmediate(30*time.Second, 5*time.Minute, func() (bool, error) {
|
|
if _, err := remote.SSH(instance.Name, "sh", "-c", "date"); err != nil {
|
|
return false, nil
|
|
}
|
|
return true, nil
|
|
}); waitErr != nil {
|
|
return fmt.Errorf("the instance %s does not response to SSH: %v", instance.Name, waitErr)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func isCloudInitUsed(metadata *compute.Metadata) bool {
|
|
if metadata == nil {
|
|
return false
|
|
}
|
|
for _, item := range metadata.Items {
|
|
if item.Key == "user-data" && item.Value != nil && strings.HasPrefix(*item.Value, "#cloud-config") {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func getExternalIP(instance *compute.Instance) string {
|
|
for i := range instance.NetworkInterfaces {
|
|
ni := instance.NetworkInterfaces[i]
|
|
for j := range ni.AccessConfigs {
|
|
ac := ni.AccessConfigs[j]
|
|
if len(ac.NatIP) > 0 {
|
|
return ac.NatIP
|
|
}
|
|
}
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func getComputeClient() (*compute.Service, error) {
|
|
const retries = 10
|
|
const backoff = time.Second * 6
|
|
|
|
// Setup the gce client for provisioning instances
|
|
// Getting credentials on gce jenkins is flaky, so try a couple times
|
|
var err error
|
|
var cs *compute.Service
|
|
for i := 0; i < retries; i++ {
|
|
if i > 0 {
|
|
time.Sleep(backoff)
|
|
}
|
|
|
|
var client *http.Client
|
|
client, err = google.DefaultClient(context.Background(), compute.ComputeScope)
|
|
if err != nil {
|
|
continue
|
|
}
|
|
|
|
cs, err = compute.NewService(context.Background(), option.WithHTTPClient(client))
|
|
if err != nil {
|
|
continue
|
|
}
|
|
return cs, nil
|
|
}
|
|
return nil, err
|
|
}
|
|
|
|
func deleteInstance(host string) {
|
|
klog.Infof("Deleting instance %q", host)
|
|
_, err := computeService.Instances.Delete(*project, *zone, host).Do()
|
|
if err != nil {
|
|
klog.Errorf("Error deleting instance %q: %v", host, err)
|
|
}
|
|
}
|
|
|
|
func parseInstanceMetadata(str string) map[string]string {
|
|
metadata := make(map[string]string)
|
|
ss := strings.Split(str, ",")
|
|
for _, s := range ss {
|
|
kv := strings.Split(s, "=")
|
|
if len(kv) == 2 {
|
|
metadata[kv[0]] = kv[1]
|
|
continue
|
|
}
|
|
kp := strings.Split(s, "<")
|
|
if len(kp) != 2 {
|
|
klog.Fatalf("Invalid instance metadata: %q", s)
|
|
continue
|
|
}
|
|
metaPath := kp[1]
|
|
if *imageConfigDir != "" {
|
|
metaPath = filepath.Join(*imageConfigDir, metaPath)
|
|
}
|
|
v, err := os.ReadFile(metaPath)
|
|
if err != nil {
|
|
klog.Fatalf("Failed to read metadata file %q: %v", metaPath, err)
|
|
continue
|
|
}
|
|
metadata[kp[0]] = ignitionInjectGCEPublicKey(metaPath, string(v))
|
|
}
|
|
for k, v := range nodeEnvs {
|
|
metadata[k] = v
|
|
}
|
|
return metadata
|
|
}
|
|
|
|
// ignitionInjectGCEPublicKey tries to inject the GCE SSH public key into the
|
|
// provided ignition file path.
|
|
//
|
|
// This will only being done if the job has the
|
|
// IGNITION_INJECT_GCE_SSH_PUBLIC_KEY_FILE environment variable set, while it
|
|
// tried to replace the GCE_SSH_PUBLIC_KEY_FILE_CONTENT placeholder.
|
|
func ignitionInjectGCEPublicKey(path string, content string) string {
|
|
if os.Getenv("IGNITION_INJECT_GCE_SSH_PUBLIC_KEY_FILE") == "" {
|
|
return content
|
|
}
|
|
|
|
klog.Infof("Injecting SSH public key into ignition")
|
|
|
|
const publicKeyEnv = "GCE_SSH_PUBLIC_KEY_FILE"
|
|
sshPublicKeyFile := os.Getenv(publicKeyEnv)
|
|
if sshPublicKeyFile == "" {
|
|
klog.Errorf("Environment variable %s is not set", publicKeyEnv)
|
|
os.Exit(1)
|
|
}
|
|
|
|
sshPublicKey, err := os.ReadFile(sshPublicKeyFile)
|
|
if err != nil {
|
|
klog.ErrorS(err, "unable to read SSH public key file")
|
|
os.Exit(1)
|
|
}
|
|
|
|
const sshPublicKeyFileContentMarker = "GCE_SSH_PUBLIC_KEY_FILE_CONTENT"
|
|
return strings.Replace(
|
|
content,
|
|
sshPublicKeyFileContentMarker,
|
|
base64.StdEncoding.EncodeToString(sshPublicKey),
|
|
1,
|
|
)
|
|
}
|
|
|
|
func imageToInstanceName(imageConfig *internalGCEImage) string {
|
|
if imageConfig.machine == "" {
|
|
return *instanceNamePrefix + "-" + imageConfig.image
|
|
}
|
|
// For benchmark test, node name has the format 'machine-image-uuid' to run
|
|
// different machine types with the same image in parallel
|
|
return imageConfig.machine + "-" + imageConfig.image + "-" + uuid.New().String()[:8]
|
|
}
|
|
|
|
func sourceImage(image, imageProject string) string {
|
|
return fmt.Sprintf("projects/%s/global/images/%s", imageProject, image)
|
|
}
|
|
|
|
func machineType(machine string) string {
|
|
if machine == "" {
|
|
machine = defaultMachine
|
|
}
|
|
return fmt.Sprintf("zones/%s/machineTypes/%s", *zone, machine)
|
|
}
|
|
|
|
// testsToGinkgoFocus converts the test string list to Ginkgo focus
|
|
func testsToGinkgoFocus(tests []string) string {
|
|
focus := "--focus=\""
|
|
for i, test := range tests {
|
|
if i == 0 {
|
|
focus += test
|
|
} else {
|
|
focus += ("|" + test)
|
|
}
|
|
}
|
|
return focus + "\""
|
|
}
|