2019-06-27 14:03:20 +00:00
#!/bin/bash
# Copyright 2018 The Kubernetes Authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
if ! [ -z " $DEBUG " ] ; then
set -x
fi
set -o errexit
set -o nounset
set -o pipefail
RED = '\e[35m'
NC = '\e[0m'
BGREEN = '\e[32m'
declare -a mandatory
mandatory = (
E2E_NODES
)
missing = false
for var in " ${ mandatory [@] } " ; do
if [ [ -z " ${ !var :- } " ] ] ; then
echo -e " ${ RED } Environment variable $var must be set ${ NC } "
missing = true
fi
done
if [ " $missing " = true ] ; then
exit 1
fi
function cleanup {
kubectl delete pod e2e 2>/dev/null || true
}
trap cleanup EXIT
E2E_CHECK_LEAKS = ${ E2E_CHECK_LEAKS :- }
FOCUS = ${ FOCUS :- .* }
2022-07-08 16:27:47 +00:00
BASEDIR = $( dirname " $0 " )
NGINX_BASE_IMAGE = $( cat $BASEDIR /../NGINX_BASE)
2019-06-27 14:03:20 +00:00
export E2E_CHECK_LEAKS
export FOCUS
echo -e " ${ BGREEN } Granting permissions to ingress-nginx e2e service account... ${ NC } "
kubectl create serviceaccount ingress-nginx-e2e || true
kubectl create clusterrolebinding permissive-binding \
--clusterrole= cluster-admin \
--user= admin \
--user= kubelet \
--serviceaccount= default:ingress-nginx-e2e || true
2022-07-11 01:35:47 +00:00
VER = $( kubectl version --client= false -o json | jq '.serverVersion.minor |tonumber' )
if [ $VER -lt 24 ] ; then
echo -e " ${ BGREEN } Waiting service account... ${ NC } " ; \
until kubectl get secret | grep -q -e ^ingress-nginx-e2e-token; do \
echo -e "waiting for api token" ; \
sleep 3; \
done
fi
2019-06-27 14:03:20 +00:00
2019-12-12 18:49:28 +00:00
echo -e "Starting the e2e test pod"
2019-06-27 14:03:20 +00:00
kubectl run --rm \
--attach \
--restart= Never \
--env= " E2E_NODES= ${ E2E_NODES } " \
--env= " FOCUS= ${ FOCUS } " \
--env= " E2E_CHECK_LEAKS= ${ E2E_CHECK_LEAKS } " \
2022-07-08 16:27:47 +00:00
--env= " NGINX_BASE_IMAGE= ${ NGINX_BASE_IMAGE } " \
2019-06-27 14:03:20 +00:00
--overrides= '{ "apiVersion": "v1", "spec":{"serviceAccountName": "ingress-nginx-e2e"}}' \
e2e --image= nginx-ingress-controller:e2e
2021-07-06 04:50:18 +00:00
2022-12-03 01:43:53 +00:00
# Get the junit-reports stored in the configMaps created during e2etests
echo "Getting the report files out now.."
reportsDir = "test/junitreports"
reportFileName = "report-e2e-test-suite"
[ ! -e ${ reportsDir } ] && mkdir $reportsDir
cd $reportsDir
# TODO: Seeking Rikatz help here to extract in a loop. Tried things like below without success
#for cmName in `k get cm -l junitreport=true -o json | jq '.items[].binaryData | keys[]' | tr '\"' ' '`
#do
#
2022-12-07 03:24:37 +00:00
#
2022-12-03 01:43:53 +00:00
# kubectl get cm -l junitreport=true -o json | jq -r '[.items[].binaryData | to_entries[] | {"key": .key, "value": .value }] | from_entries'
#
# Below lines successfully extract the report but they are one line per report.
# We only have 3 ginkgo reports so its ok for now
# But still, ideally this should be a loop as talked about in comments a few lines above
kubectl get cm $reportFileName .xml.gz -o "jsonpath={.binaryData['report-e2e-test-suite\.xml\.gz']}" > $reportFileName .xml.gz.base64
kubectl get cm $reportFileName -serial.xml.gz -o "jsonpath={.binaryData['report-e2e-test-suite-serial\.xml\.gz']}" > $reportFileName -serial.xml.gz.base64
cat $reportFileName .xml.gz.base64 | base64 -d > $reportFileName .xml.gz
cat $reportFileName -serial.xml.gz.base64 | base64 -d > $reportFileName -serial.xml.gz
gzip -d $reportFileName .xml.gz
gzip -d $reportFileName -serial.xml.gz
rm *.base64
cd ../..
# TODO Temporary: if condition to check if the memleak cm exists and only then try the extract for the memleak report
#
#kubectl get cm $reportFileName-serial -o "jsonpath={.data['report-e2e-test-suite-memleak\.xml\.gz']}" > $reportFileName-memleak.base64
#cat $reportFileName-memleak.base64 | base64 -d > $reportFileName-memleak.xml.gz
#gzip -d $reportFileName-memleak.xml.gz
echo "done getting the reports files out.."