/
add-on-conformance.go
194 lines (167 loc) · 7.59 KB
/
add-on-conformance.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
package eksconfig
import (
"errors"
"fmt"
"os"
"path/filepath"
"runtime"
"strings"
"time"
"github.com/aws/aws-k8s-tester/pkg/timeutil"
)
// AddOnConformance defines parameters for EKS cluster
// add-on Conformance.
// ref. https://github.com/cncf/k8s-conformance/blob/master/instructions.md
// ref. https://github.com/vmware-tanzu/sonobuoy
type AddOnConformance struct {
// Enable is 'true' to create this add-on.
Enable bool `json:"enable"`
// Created is true when the resource has been created.
// Used for delete operations.
Created bool `json:"created" read-only:"true"`
TimeFrameCreate timeutil.TimeFrame `json:"time-frame-create" read-only:"true"`
TimeFrameDelete timeutil.TimeFrame `json:"time-frame-delete" read-only:"true"`
// Namespace is the namespace to create objects in.
Namespace string `json:"namespace"`
// SonobuoyPath is the path to download the "sonobuoy".
SonobuoyPath string `json:"sonobuoy-path,omitempty"`
// SonobuoyDownloadURL is the download URL to download "sonobuoy" binary from.
// ref. https://github.com/vmware-tanzu/sonobuoy/releases
SonobuoyDownloadURL string `json:"sonobuoy-download-url,omitempty"`
SonobuoyDeleteTimeout time.Duration `json:"sonobuoy-delete-timeout"`
SonobuoyDeleteTimeoutString string `json:"sonobuoy-delete-timeout-string" read-only:"true"`
SonobuoyRunTimeout time.Duration `json:"sonobuoy-run-timeout"`
SonobuoyRunTimeoutString string `json:"sonobuoy-run-timeout-string" read-only:"true"`
// SonobuoyRunMode is the mode to run sonobuoy in.
// Valid modes are 'non-disruptive-conformance', 'quick', 'certified-conformance'.
// The default is 'certified-conformance'.
// ref. https://github.com/vmware-tanzu/sonobuoy
SonobuoyRunMode string `json:"sonobuoy-run-mode"`
SonobuoyRunKubeConformanceImage string `json:"sonobuoy-run-kube-conformance-image"`
SonobuoyResultTarGzPath string `json:"sonobuoy-result-tar-gz-path" read-only:"true"`
SonobuoyResultDir string `json:"sonobuoy-result-dir" read-only:"true"`
SonobuoyResultE2eLogPath string `json:"sonobuoy-result-e2e-log-path" read-only:"true"`
SonobuoyResultJunitXMLPath string `json:"sonobuoy-result-junit-xml-path" read-only:"true"`
}
// EnvironmentVariablePrefixAddOnConformance is the environment variable prefix used for "eksconfig".
const EnvironmentVariablePrefixAddOnConformance = AWS_K8S_TESTER_EKS_PREFIX + "ADD_ON_CONFORMANCE_"
// IsEnabledAddOnConformance returns true if "AddOnConformance" is enabled.
// Otherwise, nil the field for "omitempty".
func (cfg *Config) IsEnabledAddOnConformance() bool {
if cfg.AddOnConformance == nil {
return false
}
if cfg.AddOnConformance.Enable {
return true
}
cfg.AddOnConformance = nil
return false
}
func getDefaultAddOnConformance() *AddOnConformance {
addOn := &AddOnConformance{
Enable: false,
SonobuoyPath: "/tmp/sonobuoy-v0.18.2",
SonobuoyDownloadURL: "https://github.com/vmware-tanzu/sonobuoy/releases/download/v0.18.2/sonobuoy_0.18.2_linux_amd64.tar.gz",
}
if runtime.GOOS == "darwin" {
addOn.SonobuoyDownloadURL = strings.Replace(addOn.SonobuoyDownloadURL, "linux", "darwin", -1)
}
return addOn
}
/*
TODO: fix this... conformance with managed node group does not work
Plugin: e2e
Status: failed
Total: 4897
Passed: 267
Failed: 9
Skipped: 4621
Failed tests:
[sig-network] Services should be able to change the type from ClusterIP to ExternalName [Conformance]
[sig-network] Services should be able to create a functioning NodePort service [Conformance]
[sig-api-machinery] Aggregator Should be able to support the 1.10 Sample API Server using the current Aggregator [Conformance]
[sig-network] Networking Granular Checks: Pods should function for intra-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance]
[sig-cli] Kubectl client Kubectl run --rm job should create a job from an image, then delete the job [Conformance]
[sig-network] Services should be able to change the type from ExternalName to NodePort [Conformance]
[sig-network] DNS should provide DNS for ExternalName services [Conformance]
[sig-network] Networking Granular Checks: Pods should function for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance]
[sig-network] DNS should provide DNS for pods for Hostname [LinuxOnly] [Conformance]
Plugin: systemd-logs
Status: passed
Total: 14
Passed: 14
Failed: 0
Skipped: 0
*/
func (cfg *Config) validateAddOnConformance() error {
if !cfg.IsEnabledAddOnConformance() {
return nil
}
if !cfg.IsEnabledAddOnNodeGroups() && !cfg.IsEnabledAddOnManagedNodeGroups() {
return errors.New("AddOnConformance.Enable true but no node group is enabled")
}
// TODO: fix this...
if cfg.IsEnabledAddOnManagedNodeGroups() {
return errors.New("AddOnConformance.Enable true with AddOnManagedNodeGroups.Enable true")
}
if cfg.AddOnConformance.Namespace == "" {
cfg.AddOnConformance.Namespace = cfg.Name + "-conformance"
}
if cfg.AddOnConformance.SonobuoyDeleteTimeout == time.Duration(0) {
cfg.AddOnConformance.SonobuoyDeleteTimeout = 5 * time.Minute
}
cfg.AddOnConformance.SonobuoyDeleteTimeoutString = cfg.AddOnConformance.SonobuoyDeleteTimeout.String()
// "certified-conformance" takes >=3-hour
if cfg.AddOnConformance.SonobuoyRunTimeout == time.Duration(0) {
cfg.AddOnConformance.SonobuoyRunTimeout = 5 * time.Hour
}
cfg.AddOnConformance.SonobuoyRunTimeoutString = cfg.AddOnConformance.SonobuoyRunTimeout.String()
if cfg.AddOnConformance.SonobuoyRunMode == "" {
cfg.AddOnConformance.SonobuoyRunMode = "certified-conformance"
}
switch cfg.AddOnConformance.SonobuoyRunMode {
case "non-disruptive-conformance":
case "quick":
case "certified-conformance":
default:
return fmt.Errorf("unknown AddOnConformance.SonobuoyRunMode %q", cfg.AddOnConformance.SonobuoyRunMode)
}
if cfg.AddOnConformance.SonobuoyRunKubeConformanceImage == "" {
cfg.AddOnConformance.SonobuoyRunKubeConformanceImage = fmt.Sprintf("gcr.io/google-containers/conformance:v%s.0", cfg.Parameters.Version)
}
if cfg.AddOnConformance.SonobuoyResultTarGzPath == "" {
cfg.AddOnConformance.SonobuoyResultTarGzPath = filepath.Join(
filepath.Dir(cfg.ConfigPath),
fmt.Sprintf("%s-sonobuoy-result.tar.gz", cfg.Name),
)
os.RemoveAll(cfg.AddOnConformance.SonobuoyResultTarGzPath)
}
if !strings.HasSuffix(cfg.AddOnConformance.SonobuoyResultTarGzPath, ".tar.gz") {
return fmt.Errorf("AddOnConformance.SonobuoyResultTarGzPath[%q] must have '.tar.gz' extension", cfg.AddOnConformance.SonobuoyResultTarGzPath)
}
cfg.AddOnConformance.SonobuoyResultDir = filepath.Join(
filepath.Dir(cfg.ConfigPath),
fmt.Sprintf("%s-sonobuoy-results", cfg.Name),
)
if cfg.AddOnConformance.SonobuoyResultE2eLogPath == "" {
cfg.AddOnConformance.SonobuoyResultE2eLogPath = filepath.Join(
filepath.Dir(cfg.ConfigPath),
fmt.Sprintf("%s-sonobuoy-result.e2e.log", cfg.Name),
)
os.RemoveAll(cfg.AddOnConformance.SonobuoyResultE2eLogPath)
}
if !strings.HasSuffix(cfg.AddOnConformance.SonobuoyResultE2eLogPath, ".log") {
return fmt.Errorf("AddOnConformance.SonobuoyResultE2eLogPath[%q] must have '.log' extension", cfg.AddOnConformance.SonobuoyResultTarGzPath)
}
if cfg.AddOnConformance.SonobuoyResultJunitXMLPath == "" {
cfg.AddOnConformance.SonobuoyResultJunitXMLPath = filepath.Join(
filepath.Dir(cfg.ConfigPath),
fmt.Sprintf("%s-sonobuoy-result.junit.xml", cfg.Name),
)
os.RemoveAll(cfg.AddOnConformance.SonobuoyResultJunitXMLPath)
}
if !strings.HasSuffix(cfg.AddOnConformance.SonobuoyResultJunitXMLPath, ".xml") {
return fmt.Errorf("AddOnConformance.SonobuoyResultJunitXMLPath[%q] must have '.xml' extension", cfg.AddOnConformance.SonobuoyResultTarGzPath)
}
return nil
}