/
add-on-conformance.go
163 lines (142 loc) · 6.54 KB
/
add-on-conformance.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
package eksconfig
import (
"errors"
"fmt"
"os"
"path/filepath"
"runtime"
"strings"
"time"
)
// AddOnConformance defines parameters for EKS cluster
// add-on Conformance.
// ref. https://github.com/cncf/k8s-conformance/blob/master/instructions.md
// ref. https://github.com/vmware-tanzu/sonobuoy
type AddOnConformance struct {
// Enable is 'true' to create this add-on.
Enable bool `json:"enable"`
// Created is true when the resource has been created.
// Used for delete operations.
Created bool `json:"created" read-only:"true"`
// CreateTook is the duration that took to create the resource.
CreateTook time.Duration `json:"create-took,omitempty" read-only:"true"`
// CreateTookString is the duration that took to create the resource.
CreateTookString string `json:"create-took-string,omitempty" read-only:"true"`
// DeleteTook is the duration that took to create the resource.
DeleteTook time.Duration `json:"delete-took,omitempty" read-only:"true"`
// DeleteTookString is the duration that took to create the resource.
DeleteTookString string `json:"delete-took-string,omitempty" read-only:"true"`
// Namespace is the namespace to create objects in.
Namespace string `json:"namespace"`
// SonobuoyPath is the path to download the "sonobuoy".
SonobuoyPath string `json:"sonobuoy-path,omitempty"`
// SonobuoyDownloadURL is the download URL to download "sonobuoy" binary from.
// ref. https://github.com/vmware-tanzu/sonobuoy/releases
SonobuoyDownloadURL string `json:"sonobuoy-download-url,omitempty"`
SonobuoyDeleteTimeout time.Duration `json:"sonobuoy-delete-timeout"`
SonobuoyDeleteTimeoutString string `json:"sonobuoy-delete-timeout-string" read-only:"true"`
SonobuoyRunTimeout time.Duration `json:"sonobuoy-run-timeout"`
SonobuoyRunTimeoutString string `json:"sonobuoy-run-timeout-string" read-only:"true"`
// SonobuoyRunMode is the mode to run sonobuoy in.
// Valid modes are 'non-disruptive-conformance', 'quick', 'certified-conformance'.
// The default is 'certified-conformance'.
// ref. https://github.com/vmware-tanzu/sonobuoy
SonobuoyRunMode string `json:"sonobuoy-run-mode"`
SonobuoyRunKubeConformanceImage string `json:"sonobuoy-run-kube-conformance-image"`
SonobuoyResultTarGzPath string `json:"sonobuoy-result-tar-gz-path" read-only:"true"`
SonobuoyResultDir string `json:"sonobuoy-result-dir" read-only:"true"`
SonobuoyResultE2eLogPath string `json:"sonobuoy-result-e2e-log-path" read-only:"true"`
SonobuoyResultJunitXMLPath string `json:"sonobuoy-result-junit-xml-path" read-only:"true"`
}
// EnvironmentVariablePrefixAddOnConformance is the environment variable prefix used for "eksconfig".
const EnvironmentVariablePrefixAddOnConformance = AWS_K8S_TESTER_EKS_PREFIX + "ADD_ON_CONFORMANCE_"
// IsEnabledAddOnConformance returns true if "AddOnConformance" is enabled.
// Otherwise, nil the field for "omitempty".
func (cfg *Config) IsEnabledAddOnConformance() bool {
if cfg.AddOnConformance == nil {
return false
}
if cfg.AddOnConformance.Enable {
return true
}
cfg.AddOnConformance = nil
return false
}
func getDefaultAddOnConformance() *AddOnConformance {
addOn := &AddOnConformance{
Enable: false,
SonobuoyPath: "/tmp/sonobuoy-v0.18.1",
SonobuoyDownloadURL: "https://github.com/vmware-tanzu/sonobuoy/releases/download/v0.18.1/sonobuoy_0.18.1_linux_amd64.tar.gz",
}
if runtime.GOOS == "darwin" {
addOn.SonobuoyDownloadURL = strings.Replace(addOn.SonobuoyDownloadURL, "linux", "darwin", -1)
}
return addOn
}
func (cfg *Config) validateAddOnConformance() error {
if !cfg.IsEnabledAddOnConformance() {
return nil
}
if !cfg.IsEnabledAddOnNodeGroups() && !cfg.IsEnabledAddOnManagedNodeGroups() {
return errors.New("AddOnConformance.Enable true but no node group is enabled")
}
if cfg.AddOnConformance.Namespace == "" {
cfg.AddOnConformance.Namespace = cfg.Name + "-conformance"
}
if cfg.AddOnConformance.SonobuoyDeleteTimeout == time.Duration(0) {
cfg.AddOnConformance.SonobuoyDeleteTimeout = 5 * time.Minute
}
cfg.AddOnConformance.SonobuoyDeleteTimeoutString = cfg.AddOnConformance.SonobuoyDeleteTimeout.String()
if cfg.AddOnConformance.SonobuoyRunTimeout == time.Duration(0) {
cfg.AddOnConformance.SonobuoyRunTimeout = 2 * time.Hour
}
cfg.AddOnConformance.SonobuoyRunTimeoutString = cfg.AddOnConformance.SonobuoyRunTimeout.String()
if cfg.AddOnConformance.SonobuoyRunMode == "" {
cfg.AddOnConformance.SonobuoyRunMode = "certified-conformance"
}
switch cfg.AddOnConformance.SonobuoyRunMode {
case "non-disruptive-conformance":
case "quick":
case "certified-conformance":
default:
return fmt.Errorf("unknown AddOnConformance.SonobuoyRunMode %q", cfg.AddOnConformance.SonobuoyRunMode)
}
if cfg.AddOnConformance.SonobuoyRunKubeConformanceImage == "" {
cfg.AddOnConformance.SonobuoyRunKubeConformanceImage = fmt.Sprintf("gcr.io/google-containers/conformance:v%s.0", cfg.Parameters.Version)
}
if cfg.AddOnConformance.SonobuoyResultTarGzPath == "" {
cfg.AddOnConformance.SonobuoyResultTarGzPath = filepath.Join(
filepath.Dir(cfg.ConfigPath),
fmt.Sprintf("%s-sonobuoy-result.tar.gz", cfg.Name),
)
os.RemoveAll(cfg.AddOnConformance.SonobuoyResultTarGzPath)
}
if !strings.HasSuffix(cfg.AddOnConformance.SonobuoyResultTarGzPath, ".tar.gz") {
return fmt.Errorf("AddOnConformance.SonobuoyResultTarGzPath[%q] must have '.tar.gz' extension", cfg.AddOnConformance.SonobuoyResultTarGzPath)
}
cfg.AddOnConformance.SonobuoyResultDir = filepath.Join(
filepath.Dir(cfg.ConfigPath),
fmt.Sprintf("%s-sonobuoy-results", cfg.Name),
)
if cfg.AddOnConformance.SonobuoyResultE2eLogPath == "" {
cfg.AddOnConformance.SonobuoyResultE2eLogPath = filepath.Join(
filepath.Dir(cfg.ConfigPath),
fmt.Sprintf("%s-sonobuoy-result.e2e.log", cfg.Name),
)
os.RemoveAll(cfg.AddOnConformance.SonobuoyResultE2eLogPath)
}
if !strings.HasSuffix(cfg.AddOnConformance.SonobuoyResultE2eLogPath, ".log") {
return fmt.Errorf("AddOnConformance.SonobuoyResultE2eLogPath[%q] must have '.log' extension", cfg.AddOnConformance.SonobuoyResultTarGzPath)
}
if cfg.AddOnConformance.SonobuoyResultJunitXMLPath == "" {
cfg.AddOnConformance.SonobuoyResultJunitXMLPath = filepath.Join(
filepath.Dir(cfg.ConfigPath),
fmt.Sprintf("%s-sonobuoy-result.junit.xml", cfg.Name),
)
os.RemoveAll(cfg.AddOnConformance.SonobuoyResultJunitXMLPath)
}
if !strings.HasSuffix(cfg.AddOnConformance.SonobuoyResultJunitXMLPath, ".xml") {
return fmt.Errorf("AddOnConformance.SonobuoyResultJunitXMLPath[%q] must have '.xml' extension", cfg.AddOnConformance.SonobuoyResultTarGzPath)
}
return nil
}