Add fake filesystem for test to avoid temporal files on the local filesystem
This commit is contained in:
parent
14b5259b0f
commit
18d6573981
15 changed files with 633 additions and 89 deletions
|
@ -34,16 +34,21 @@ jobs:
|
||||||
- go get github.com/golang/lint/golint
|
- go get github.com/golang/lint/golint
|
||||||
- make fmt lint vet
|
- make fmt lint vet
|
||||||
- stage: Coverage
|
- stage: Coverage
|
||||||
|
before_script:
|
||||||
|
# start minikube
|
||||||
|
- test/e2e/up.sh
|
||||||
script:
|
script:
|
||||||
- go get github.com/mattn/goveralls
|
- go get github.com/mattn/goveralls
|
||||||
- go get github.com/modocache/gover
|
- go get github.com/modocache/gover
|
||||||
- if ! go get github.com/golang/tools/cmd/cover; then go get golang.org/x/tools/cmd/cover;
|
- if ! go get github.com/golang/tools/cmd/cover; then go get golang.org/x/tools/cmd/cover;fi
|
||||||
fi
|
- if ! go get github.com/jteeuwen/go-bindata/...; then github.com/jteeuwen/go-bindata/...;fi
|
||||||
- make cover
|
- make cover
|
||||||
- stage: e2e
|
- stage: e2e
|
||||||
before_script:
|
before_script:
|
||||||
|
- if ! go get github.com/jteeuwen/go-bindata/...; then github.com/jteeuwen/go-bindata/...;fi
|
||||||
- make e2e-image
|
- make e2e-image
|
||||||
- test/e2e/up.sh
|
- test/e2e/up.sh
|
||||||
|
- test/e2e/wait-for-nginx.sh
|
||||||
script:
|
script:
|
||||||
- make e2e-test
|
- make e2e-test
|
||||||
# split builds to avoid job timeouts
|
# split builds to avoid job timeouts
|
||||||
|
|
10
Makefile
10
Makefile
|
@ -133,8 +133,12 @@ endif
|
||||||
clean:
|
clean:
|
||||||
$(DOCKER) rmi -f $(MULTI_ARCH_IMG):$(TAG) || true
|
$(DOCKER) rmi -f $(MULTI_ARCH_IMG):$(TAG) || true
|
||||||
|
|
||||||
|
.PHONE: gobindata
|
||||||
|
gobindata:
|
||||||
|
go-bindata -o internal/file/bindata.go -prefix="rootfs" -pkg=file -ignore=Dockerfile -ignore=".DS_Store" rootfs/...
|
||||||
|
|
||||||
.PHONY: build
|
.PHONY: build
|
||||||
build: clean
|
build: clean gobindata
|
||||||
CGO_ENABLED=0 GOOS=${GOOS} GOARCH=${GOARCH} go build -a -installsuffix cgo \
|
CGO_ENABLED=0 GOOS=${GOOS} GOARCH=${GOARCH} go build -a -installsuffix cgo \
|
||||||
-ldflags "-s -w -X ${PKG}/version.RELEASE=${TAG} -X ${PKG}/version.COMMIT=${COMMIT} -X ${PKG}/version.REPO=${REPO_INFO}" \
|
-ldflags "-s -w -X ${PKG}/version.RELEASE=${TAG} -X ${PKG}/version.COMMIT=${COMMIT} -X ${PKG}/version.REPO=${REPO_INFO}" \
|
||||||
-o ${TEMP_DIR}/rootfs/nginx-ingress-controller ${PKG}/cmd/nginx
|
-o ${TEMP_DIR}/rootfs/nginx-ingress-controller ${PKG}/cmd/nginx
|
||||||
|
@ -150,7 +154,7 @@ lint:
|
||||||
@go list -f '{{if len .TestGoFiles}}"golint {{.Dir}}/..."{{end}}' $(shell go list ${PKG}/... | grep -v vendor | grep -v '/test/e2e') | xargs -L 1 sh -c
|
@go list -f '{{if len .TestGoFiles}}"golint {{.Dir}}/..."{{end}}' $(shell go list ${PKG}/... | grep -v vendor | grep -v '/test/e2e') | xargs -L 1 sh -c
|
||||||
|
|
||||||
.PHONY: test
|
.PHONY: test
|
||||||
test: fmt lint vet
|
test: fmt lint vet gobindata
|
||||||
@echo "+ $@"
|
@echo "+ $@"
|
||||||
@go test -v -race -tags "$(BUILDTAGS) cgo" $(shell go list ${PKG}/... | grep -v vendor | grep -v '/test/e2e')
|
@go test -v -race -tags "$(BUILDTAGS) cgo" $(shell go list ${PKG}/... | grep -v vendor | grep -v '/test/e2e')
|
||||||
|
|
||||||
|
@ -165,7 +169,7 @@ e2e-test:
|
||||||
@KUBECONFIG=${HOME}/.kube/config INGRESSNGINXCONFIG=${HOME}/.kube/config ./e2e-tests
|
@KUBECONFIG=${HOME}/.kube/config INGRESSNGINXCONFIG=${HOME}/.kube/config ./e2e-tests
|
||||||
|
|
||||||
.PHONY: cover
|
.PHONY: cover
|
||||||
cover:
|
cover: gobindata
|
||||||
@echo "+ $@"
|
@echo "+ $@"
|
||||||
@go list -f '{{if len .TestGoFiles}}"go test -coverprofile={{.Dir}}/.coverprofile {{.ImportPath}}"{{end}}' $(shell go list ${PKG}/... | grep -v vendor | grep -v '/test/e2e') | xargs -L 1 sh -c
|
@go list -f '{{if len .TestGoFiles}}"go test -coverprofile={{.Dir}}/.coverprofile {{.ImportPath}}"{{end}}' $(shell go list ${PKG}/... | grep -v vendor | grep -v '/test/e2e') | xargs -L 1 sh -c
|
||||||
gover
|
gover
|
||||||
|
|
|
@ -118,7 +118,7 @@ func main() {
|
||||||
|
|
||||||
// create the default SSL certificate (dummy)
|
// create the default SSL certificate (dummy)
|
||||||
defCert, defKey := ssl.GetFakeSSLCert()
|
defCert, defKey := ssl.GetFakeSSLCert()
|
||||||
c, err := ssl.AddOrUpdateCertAndKey(fakeCertificate, defCert, defKey, []byte{}, fs)
|
c, err := ssl.AddOrUpdateCertAndKey(fakeCertificate, defCert, defKey, []byte{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Fatalf("Error generating self signed certificate: %v", err)
|
glog.Fatalf("Error generating self signed certificate: %v", err)
|
||||||
}
|
}
|
||||||
|
|
289
internal/file/bindata.go
Normal file
289
internal/file/bindata.go
Normal file
File diff suppressed because one or more lines are too long
127
internal/file/filesystem.go
Normal file
127
internal/file/filesystem.go
Normal file
|
@ -0,0 +1,127 @@
|
||||||
|
package file
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/golang/glog"
|
||||||
|
|
||||||
|
"k8s.io/kubernetes/pkg/util/filesystem"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Filesystem is an interface that we can use to mock various filesystem operations
|
||||||
|
type Filesystem interface {
|
||||||
|
filesystem.Filesystem
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewLocalFS implements Filesystem using same-named functions from "os" and "io/ioutil".
|
||||||
|
func NewLocalFS() (Filesystem, error) {
|
||||||
|
fs := filesystem.DefaultFs{}
|
||||||
|
|
||||||
|
err := initialize(false, fs)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return fs, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewFakeFS creates an in-memory filesytem with all the required
|
||||||
|
// paths used by the ingress controller.
|
||||||
|
// This allows running test without polluting the local machine.
|
||||||
|
func NewFakeFS() (Filesystem, error) {
|
||||||
|
fs := filesystem.NewFakeFs()
|
||||||
|
|
||||||
|
err := initialize(true, fs)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return fs, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// initialize creates the required directory structure and when
|
||||||
|
// runs as virtual filesystem it copies the local files to it
|
||||||
|
func initialize(isVirtual bool, fs Filesystem) error {
|
||||||
|
for _, directory := range directories {
|
||||||
|
err := fs.MkdirAll(directory, 0655)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if !isVirtual {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, file := range files {
|
||||||
|
f, err := fs.Create(file)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = f.Write([]byte(""))
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
err = f.Close()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
err := fs.MkdirAll("/proc", 0655)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
glog.Info("Restoring generated (go-bindata) assets in virtual filesystem...")
|
||||||
|
for _, assetName := range AssetNames() {
|
||||||
|
err := restoreAsset("/", assetName, fs)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// restoreAsset restores an asset under the given directory
|
||||||
|
func restoreAsset(dir, name string, fs Filesystem) error {
|
||||||
|
data, err := Asset(name)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
info, err := AssetInfo(name)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
err = fs.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
f, err := fs.Create(_filePath(dir, name))
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = f.Write(data)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
err = f.Close()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
//Missing info.Mode()
|
||||||
|
|
||||||
|
err = fs.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
37
internal/file/filesystem_test.go
Normal file
37
internal/file/filesystem_test.go
Normal file
|
@ -0,0 +1,37 @@
|
||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package file
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestNewFakeFS(t *testing.T) {
|
||||||
|
fs, err := NewFakeFS()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error creating filesystem abstraction: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if fs == nil {
|
||||||
|
t.Fatal("expected a filesystem but none returned")
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = fs.Stat("/etc/nginx/nginx.conf")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error reading default nginx.conf file: %v", err)
|
||||||
|
}
|
||||||
|
}
|
26
internal/file/structure.go
Normal file
26
internal/file/structure.go
Normal file
|
@ -0,0 +1,26 @@
|
||||||
|
package file
|
||||||
|
|
||||||
|
const (
|
||||||
|
// AuthDirectory default directory used to store files
|
||||||
|
// to authenticate request
|
||||||
|
AuthDirectory = "/etc/ingress-controller/auth"
|
||||||
|
|
||||||
|
// DefaultSSLDirectory defines the location where the SSL certificates will be generated
|
||||||
|
// This directory contains all the SSL certificates that are specified in Ingress rules.
|
||||||
|
// The name of each file is <namespace>-<secret name>.pem. The content is the concatenated
|
||||||
|
// certificate and key.
|
||||||
|
DefaultSSLDirectory = "/ingress-controller/ssl"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
directories = []string{
|
||||||
|
"/etc/nginx/template",
|
||||||
|
"/run",
|
||||||
|
DefaultSSLDirectory,
|
||||||
|
AuthDirectory,
|
||||||
|
}
|
||||||
|
|
||||||
|
files = []string{
|
||||||
|
"/run/nginx.pid",
|
||||||
|
}
|
||||||
|
)
|
|
@ -76,8 +76,8 @@ type Configuration struct {
|
||||||
|
|
||||||
ConfigMapName string
|
ConfigMapName string
|
||||||
DefaultService string
|
DefaultService string
|
||||||
IngressClass string
|
|
||||||
Namespace string
|
Namespace string
|
||||||
|
|
||||||
ForceNamespaceIsolation bool
|
ForceNamespaceIsolation bool
|
||||||
|
|
||||||
|
@ -87,7 +87,6 @@ type Configuration struct {
|
||||||
UDPConfigMapName string
|
UDPConfigMapName string
|
||||||
|
|
||||||
DefaultHealthzURL string
|
DefaultHealthzURL string
|
||||||
DefaultIngressClass string
|
|
||||||
DefaultSSLCertificate string
|
DefaultSSLCertificate string
|
||||||
|
|
||||||
// optional
|
// optional
|
||||||
|
|
|
@ -43,6 +43,7 @@ import (
|
||||||
"k8s.io/client-go/util/flowcontrol"
|
"k8s.io/client-go/util/flowcontrol"
|
||||||
"k8s.io/kubernetes/pkg/util/filesystem"
|
"k8s.io/kubernetes/pkg/util/filesystem"
|
||||||
|
|
||||||
|
"k8s.io/ingress-nginx/internal/file"
|
||||||
"k8s.io/ingress-nginx/internal/ingress"
|
"k8s.io/ingress-nginx/internal/ingress"
|
||||||
"k8s.io/ingress-nginx/internal/ingress/annotations"
|
"k8s.io/ingress-nginx/internal/ingress/annotations"
|
||||||
"k8s.io/ingress-nginx/internal/ingress/annotations/class"
|
"k8s.io/ingress-nginx/internal/ingress/annotations/class"
|
||||||
|
@ -57,6 +58,7 @@ import (
|
||||||
"k8s.io/ingress-nginx/internal/net/dns"
|
"k8s.io/ingress-nginx/internal/net/dns"
|
||||||
"k8s.io/ingress-nginx/internal/net/ssl"
|
"k8s.io/ingress-nginx/internal/net/ssl"
|
||||||
"k8s.io/ingress-nginx/internal/task"
|
"k8s.io/ingress-nginx/internal/task"
|
||||||
|
"k8s.io/ingress-nginx/internal/watch"
|
||||||
)
|
)
|
||||||
|
|
||||||
type statusModule string
|
type statusModule string
|
||||||
|
@ -77,7 +79,7 @@ var (
|
||||||
// NewNGINXController creates a new NGINX Ingress controller.
|
// NewNGINXController creates a new NGINX Ingress controller.
|
||||||
// If the environment variable NGINX_BINARY exists it will be used
|
// If the environment variable NGINX_BINARY exists it will be used
|
||||||
// as source for nginx commands
|
// as source for nginx commands
|
||||||
func NewNGINXController(config *Configuration) *NGINXController {
|
func NewNGINXController(config *Configuration, fs file.Filesystem) *NGINXController {
|
||||||
ngx := os.Getenv("NGINX_BINARY")
|
ngx := os.Getenv("NGINX_BINARY")
|
||||||
if ngx == "" {
|
if ngx == "" {
|
||||||
ngx = nginxBinary
|
ngx = nginxBinary
|
||||||
|
@ -114,12 +116,12 @@ func NewNGINXController(config *Configuration) *NGINXController {
|
||||||
stopCh: make(chan struct{}),
|
stopCh: make(chan struct{}),
|
||||||
stopLock: &sync.Mutex{},
|
stopLock: &sync.Mutex{},
|
||||||
|
|
||||||
fileSystem: filesystem.DefaultFs{},
|
fileSystem: fs,
|
||||||
}
|
}
|
||||||
|
|
||||||
n.listers, n.controllers = n.createListers(n.stopCh)
|
n.listers, n.controllers = n.createListers(n.stopCh)
|
||||||
|
|
||||||
n.stats = newStatsCollector(config.Namespace, config.IngressClass, n.binary, n.cfg.ListenPorts.Status)
|
n.stats = newStatsCollector(config.Namespace, class.IngressClass, n.binary, n.cfg.ListenPorts.Status)
|
||||||
|
|
||||||
n.syncQueue = task.NewTaskQueue(n.syncIngress)
|
n.syncQueue = task.NewTaskQueue(n.syncIngress)
|
||||||
|
|
||||||
|
@ -131,8 +133,8 @@ func NewNGINXController(config *Configuration) *NGINXController {
|
||||||
PublishService: config.PublishService,
|
PublishService: config.PublishService,
|
||||||
IngressLister: n.listers.Ingress,
|
IngressLister: n.listers.Ingress,
|
||||||
ElectionID: config.ElectionID,
|
ElectionID: config.ElectionID,
|
||||||
IngressClass: config.IngressClass,
|
IngressClass: class.IngressClass,
|
||||||
DefaultIngressClass: config.DefaultIngressClass,
|
DefaultIngressClass: class.DefaultClass,
|
||||||
UpdateStatusOnShutdown: config.UpdateStatusOnShutdown,
|
UpdateStatusOnShutdown: config.UpdateStatusOnShutdown,
|
||||||
UseNodeInternalIP: config.UseNodeInternalIP,
|
UseNodeInternalIP: config.UseNodeInternalIP,
|
||||||
})
|
})
|
||||||
|
@ -142,7 +144,7 @@ func NewNGINXController(config *Configuration) *NGINXController {
|
||||||
|
|
||||||
var onChange func()
|
var onChange func()
|
||||||
onChange = func() {
|
onChange = func() {
|
||||||
template, err := ngx_template.NewTemplate(tmplPath, onChange)
|
template, err := ngx_template.NewTemplate(tmplPath, fs)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
// this error is different from the rest because it must be clear why nginx is not working
|
// this error is different from the rest because it must be clear why nginx is not working
|
||||||
glog.Errorf(`
|
glog.Errorf(`
|
||||||
|
@ -153,19 +155,28 @@ Error loading new template : %v
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
n.t.Close()
|
|
||||||
n.t = template
|
n.t = template
|
||||||
glog.Info("new NGINX template loaded")
|
glog.Info("new NGINX template loaded")
|
||||||
n.SetForceReload(true)
|
n.SetForceReload(true)
|
||||||
}
|
}
|
||||||
|
|
||||||
ngxTpl, err := ngx_template.NewTemplate(tmplPath, onChange)
|
ngxTpl, err := ngx_template.NewTemplate(tmplPath, fs)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
glog.Fatalf("invalid NGINX template: %v", err)
|
glog.Fatalf("invalid NGINX template: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
n.t = ngxTpl
|
n.t = ngxTpl
|
||||||
|
|
||||||
|
// TODO: refactor
|
||||||
|
if _, ok := fs.(filesystem.DefaultFs); !ok {
|
||||||
|
watch.NewDummyFileWatcher(tmplPath, onChange)
|
||||||
|
} else {
|
||||||
|
_, err = watch.NewFileWatcher(tmplPath, onChange)
|
||||||
|
if err != nil {
|
||||||
|
glog.Fatalf("unexpected error watching template %v: %v", tmplPath, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
return n
|
return n
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -29,16 +29,17 @@ import (
|
||||||
text_template "text/template"
|
text_template "text/template"
|
||||||
|
|
||||||
"github.com/golang/glog"
|
"github.com/golang/glog"
|
||||||
|
"github.com/pkg/errors"
|
||||||
|
|
||||||
"github.com/pborman/uuid"
|
"github.com/pborman/uuid"
|
||||||
|
|
||||||
extensions "k8s.io/api/extensions/v1beta1"
|
extensions "k8s.io/api/extensions/v1beta1"
|
||||||
"k8s.io/apimachinery/pkg/util/sets"
|
"k8s.io/apimachinery/pkg/util/sets"
|
||||||
|
"k8s.io/ingress-nginx/internal/file"
|
||||||
"k8s.io/ingress-nginx/internal/ingress"
|
"k8s.io/ingress-nginx/internal/ingress"
|
||||||
"k8s.io/ingress-nginx/internal/ingress/annotations/ratelimit"
|
"k8s.io/ingress-nginx/internal/ingress/annotations/ratelimit"
|
||||||
"k8s.io/ingress-nginx/internal/ingress/controller/config"
|
"k8s.io/ingress-nginx/internal/ingress/controller/config"
|
||||||
ing_net "k8s.io/ingress-nginx/internal/net"
|
ing_net "k8s.io/ingress-nginx/internal/net"
|
||||||
"k8s.io/ingress-nginx/internal/watch"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -50,34 +51,29 @@ const (
|
||||||
// Template ...
|
// Template ...
|
||||||
type Template struct {
|
type Template struct {
|
||||||
tmpl *text_template.Template
|
tmpl *text_template.Template
|
||||||
fw watch.FileWatcher
|
//fw watch.FileWatcher
|
||||||
bp *BufferPool
|
bp *BufferPool
|
||||||
}
|
}
|
||||||
|
|
||||||
//NewTemplate returns a new Template instance or an
|
//NewTemplate returns a new Template instance or an
|
||||||
//error if the specified template file contains errors
|
//error if the specified template file contains errors
|
||||||
func NewTemplate(file string, onChange func()) (*Template, error) {
|
func NewTemplate(file string, fs file.Filesystem) (*Template, error) {
|
||||||
tmpl, err := text_template.New("nginx.tmpl").Funcs(funcMap).ParseFiles(file)
|
data, err := fs.ReadFile(file)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, errors.Wrapf(err, "unexpected error reading template %v", file)
|
||||||
}
|
}
|
||||||
fw, err := watch.NewFileWatcher(file, onChange)
|
|
||||||
|
tmpl, err := text_template.New("nginx.tmpl").Funcs(funcMap).Parse(string(data))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
return &Template{
|
return &Template{
|
||||||
tmpl: tmpl,
|
tmpl: tmpl,
|
||||||
fw: fw,
|
|
||||||
bp: NewBufferPool(defBufferSize),
|
bp: NewBufferPool(defBufferSize),
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Close removes the file watcher
|
|
||||||
func (t *Template) Close() {
|
|
||||||
t.fw.Close()
|
|
||||||
}
|
|
||||||
|
|
||||||
// Write populates a buffer using a template with NGINX configuration
|
// Write populates a buffer using a template with NGINX configuration
|
||||||
// and the servers and upstreams created by Ingress rules
|
// and the servers and upstreams created by Ingress rules
|
||||||
func (t *Template) Write(conf config.TemplateConfig) ([]byte, error) {
|
func (t *Template) Write(conf config.TemplateConfig) ([]byte, error) {
|
||||||
|
|
|
@ -26,6 +26,7 @@ import (
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"k8s.io/ingress-nginx/internal/file"
|
||||||
"k8s.io/ingress-nginx/internal/ingress"
|
"k8s.io/ingress-nginx/internal/ingress"
|
||||||
"k8s.io/ingress-nginx/internal/ingress/annotations/authreq"
|
"k8s.io/ingress-nginx/internal/ingress/annotations/authreq"
|
||||||
"k8s.io/ingress-nginx/internal/ingress/annotations/rewrite"
|
"k8s.io/ingress-nginx/internal/ingress/annotations/rewrite"
|
||||||
|
@ -174,13 +175,13 @@ func TestTemplateWithData(t *testing.T) {
|
||||||
if dat.ListenPorts == nil {
|
if dat.ListenPorts == nil {
|
||||||
dat.ListenPorts = &config.ListenPorts{}
|
dat.ListenPorts = &config.ListenPorts{}
|
||||||
}
|
}
|
||||||
tf, err := os.Open(path.Join(pwd, "../../../../rootfs/etc/nginx/template/nginx.tmpl"))
|
|
||||||
if err != nil {
|
|
||||||
t.Errorf("unexpected error reading json file: %v", err)
|
|
||||||
}
|
|
||||||
defer tf.Close()
|
|
||||||
|
|
||||||
ngxTpl, err := NewTemplate(tf.Name(), func() {})
|
fs, err := file.NewFakeFS()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("unexpected error: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
ngxTpl, err := NewTemplate("/etc/nginx/template/nginx.tmpl", fs)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Errorf("invalid NGINX template: %v", err)
|
t.Errorf("invalid NGINX template: %v", err)
|
||||||
}
|
}
|
||||||
|
@ -207,13 +208,12 @@ func BenchmarkTemplateWithData(b *testing.B) {
|
||||||
b.Errorf("unexpected error unmarshalling json: %v", err)
|
b.Errorf("unexpected error unmarshalling json: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
tf, err := os.Open(path.Join(pwd, "../../../rootfs/etc/nginx/template/nginx.tmpl"))
|
fs, err := file.NewFakeFS()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
b.Errorf("unexpected error reading json file: %v", err)
|
b.Fatalf("unexpected error: %v", err)
|
||||||
}
|
}
|
||||||
defer tf.Close()
|
|
||||||
|
|
||||||
ngxTpl, err := NewTemplate(tf.Name(), func() {})
|
ngxTpl, err := NewTemplate("/etc/nginx/template/nginx.tmpl", fs)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
b.Errorf("invalid NGINX template: %v", err)
|
b.Errorf("invalid NGINX template: %v", err)
|
||||||
}
|
}
|
||||||
|
|
29
internal/watch/dummy.go
Normal file
29
internal/watch/dummy.go
Normal file
|
@ -0,0 +1,29 @@
|
||||||
|
/*
|
||||||
|
Copyright 2017 The Kubernetes Authors.
|
||||||
|
|
||||||
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
you may not use this file except in compliance with the License.
|
||||||
|
You may obtain a copy of the License at
|
||||||
|
|
||||||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
|
||||||
|
Unless required by applicable law or agreed to in writing, software
|
||||||
|
distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
See the License for the specific language governing permissions and
|
||||||
|
limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package watch
|
||||||
|
|
||||||
|
// DummyFileWatcher noop implementation of a file watcher
|
||||||
|
type DummyFileWatcher struct{}
|
||||||
|
|
||||||
|
func NewDummyFileWatcher(file string, onEvent func()) FileWatcher {
|
||||||
|
return DummyFileWatcher{}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Close ends the watch
|
||||||
|
func (f DummyFileWatcher) Close() error {
|
||||||
|
return nil
|
||||||
|
}
|
|
@ -24,8 +24,12 @@ import (
|
||||||
"gopkg.in/fsnotify.v1"
|
"gopkg.in/fsnotify.v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
// FileWatcher defines a watch over a file
|
type FileWatcher interface {
|
||||||
type FileWatcher struct {
|
Close() error
|
||||||
|
}
|
||||||
|
|
||||||
|
// OSFileWatcher defines a watch over a file
|
||||||
|
type OSFileWatcher struct {
|
||||||
file string
|
file string
|
||||||
watcher *fsnotify.Watcher
|
watcher *fsnotify.Watcher
|
||||||
// onEvent callback to be invoked after the file being watched changes
|
// onEvent callback to be invoked after the file being watched changes
|
||||||
|
@ -34,7 +38,7 @@ type FileWatcher struct {
|
||||||
|
|
||||||
// NewFileWatcher creates a new FileWatcher
|
// NewFileWatcher creates a new FileWatcher
|
||||||
func NewFileWatcher(file string, onEvent func()) (FileWatcher, error) {
|
func NewFileWatcher(file string, onEvent func()) (FileWatcher, error) {
|
||||||
fw := FileWatcher{
|
fw := OSFileWatcher{
|
||||||
file: file,
|
file: file,
|
||||||
onEvent: onEvent,
|
onEvent: onEvent,
|
||||||
}
|
}
|
||||||
|
@ -43,12 +47,12 @@ func NewFileWatcher(file string, onEvent func()) (FileWatcher, error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Close ends the watch
|
// Close ends the watch
|
||||||
func (f *FileWatcher) Close() error {
|
func (f OSFileWatcher) Close() error {
|
||||||
return f.watcher.Close()
|
return f.watcher.Close()
|
||||||
}
|
}
|
||||||
|
|
||||||
// watch creates a fsnotify watcher for a file and create of write events
|
// watch creates a fsnotify watcher for a file and create of write events
|
||||||
func (f *FileWatcher) watch() error {
|
func (f *OSFileWatcher) watch() error {
|
||||||
watcher, err := fsnotify.NewWatcher()
|
watcher, err := fsnotify.NewWatcher()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
|
|
@ -35,47 +35,3 @@ until kubectl get nodes -o jsonpath="$JSONPATH" 2>&1 | grep -q "Ready=True";
|
||||||
do
|
do
|
||||||
sleep 1;
|
sleep 1;
|
||||||
done
|
done
|
||||||
|
|
||||||
echo "deploying NGINX Ingress controller"
|
|
||||||
cat deploy/namespace.yaml | kubectl apply -f -
|
|
||||||
cat deploy/default-backend.yaml | kubectl apply -f -
|
|
||||||
cat deploy/configmap.yaml | kubectl apply -f -
|
|
||||||
cat deploy/tcp-services-configmap.yaml | kubectl apply -f -
|
|
||||||
cat deploy/udp-services-configmap.yaml | kubectl apply -f -
|
|
||||||
cat deploy/without-rbac.yaml | kubectl apply -f -
|
|
||||||
cat deploy/provider/baremetal/service-nodeport.yaml | kubectl apply -f -
|
|
||||||
|
|
||||||
echo "updating image..."
|
|
||||||
kubectl set image \
|
|
||||||
deployments \
|
|
||||||
--namespace ingress-nginx \
|
|
||||||
--selector app=ingress-nginx \
|
|
||||||
nginx-ingress-controller=quay.io/kubernetes-ingress-controller/nginx-ingress-controller:test
|
|
||||||
|
|
||||||
sleep 5
|
|
||||||
|
|
||||||
echo "waiting NGINX ingress pod..."
|
|
||||||
|
|
||||||
function waitForPod() {
|
|
||||||
until kubectl get pods -n ingress-nginx -l app=ingress-nginx -o jsonpath="$JSONPATH" 2>&1 | grep -q "Ready=True";
|
|
||||||
do
|
|
||||||
sleep 1;
|
|
||||||
done
|
|
||||||
}
|
|
||||||
|
|
||||||
export -f waitForPod
|
|
||||||
|
|
||||||
timeout 10s bash -c waitForPod
|
|
||||||
|
|
||||||
if kubectl get pods -n ingress-nginx -l app=ingress-nginx -o jsonpath="$JSONPATH" 2>&1 | grep -q "Ready=True";
|
|
||||||
then
|
|
||||||
echo "Kubernetes deployments started"
|
|
||||||
else
|
|
||||||
echo "Kubernetes deployments with issues:"
|
|
||||||
kubectl get pods -n ingress-nginx
|
|
||||||
|
|
||||||
echo "Reason:"
|
|
||||||
kubectl describe pods -n ingress-nginx
|
|
||||||
kubectl logs -n ingress-nginx -l app=ingress-nginx
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
61
test/e2e/wait-for-nginx.sh
Executable file
61
test/e2e/wait-for-nginx.sh
Executable file
|
@ -0,0 +1,61 @@
|
||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
# Copyright 2017 The Kubernetes Authors.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
export JSONPATH='{range .items[*]}{@.metadata.name}:{range @.status.conditions[*]}{@.type}={@.status};{end}{end}'
|
||||||
|
|
||||||
|
echo "deploying NGINX Ingress controller"
|
||||||
|
cat deploy/namespace.yaml | kubectl apply -f -
|
||||||
|
cat deploy/default-backend.yaml | kubectl apply -f -
|
||||||
|
cat deploy/configmap.yaml | kubectl apply -f -
|
||||||
|
cat deploy/tcp-services-configmap.yaml | kubectl apply -f -
|
||||||
|
cat deploy/udp-services-configmap.yaml | kubectl apply -f -
|
||||||
|
cat deploy/without-rbac.yaml | kubectl apply -f -
|
||||||
|
cat deploy/provider/baremetal/service-nodeport.yaml | kubectl apply -f -
|
||||||
|
|
||||||
|
echo "updating image..."
|
||||||
|
kubectl set image \
|
||||||
|
deployments \
|
||||||
|
--namespace ingress-nginx \
|
||||||
|
--selector app=ingress-nginx \
|
||||||
|
nginx-ingress-controller=quay.io/kubernetes-ingress-controller/nginx-ingress-controller:test
|
||||||
|
|
||||||
|
sleep 5
|
||||||
|
|
||||||
|
echo "waiting NGINX ingress pod..."
|
||||||
|
|
||||||
|
function waitForPod() {
|
||||||
|
until kubectl get pods -n ingress-nginx -l app=ingress-nginx -o jsonpath="$JSONPATH" 2>&1 | grep -q "Ready=True";
|
||||||
|
do
|
||||||
|
sleep 1;
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
export -f waitForPod
|
||||||
|
|
||||||
|
timeout 10s bash -c waitForPod
|
||||||
|
|
||||||
|
if kubectl get pods -n ingress-nginx -l app=ingress-nginx -o jsonpath="$JSONPATH" 2>&1 | grep -q "Ready=True";
|
||||||
|
then
|
||||||
|
echo "Kubernetes deployments started"
|
||||||
|
else
|
||||||
|
echo "Kubernetes deployments with issues:"
|
||||||
|
kubectl get pods -n ingress-nginx
|
||||||
|
|
||||||
|
echo "Reason:"
|
||||||
|
kubectl describe pods -n ingress-nginx
|
||||||
|
kubectl logs -n ingress-nginx -l app=ingress-nginx
|
||||||
|
exit 1
|
||||||
|
fi
|
Loading…
Reference in a new issue