126 lines
3.9 KiB
Bash
Executable file
126 lines
3.9 KiB
Bash
Executable file
#!/bin/bash
|
|
|
|
# Copyright 2018 The Kubernetes Authors.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
if ! [ -z "$DEBUG" ]; then
|
|
set -x
|
|
fi
|
|
|
|
set -o errexit
|
|
set -o nounset
|
|
set -o pipefail
|
|
|
|
RED='\e[35m'
|
|
NC='\e[0m'
|
|
BGREEN='\e[32m'
|
|
|
|
declare -a mandatory
|
|
mandatory=(
|
|
E2E_NODES
|
|
)
|
|
|
|
missing=false
|
|
for var in "${mandatory[@]}"; do
|
|
if [[ -z "${!var:-}" ]]; then
|
|
echo -e "${RED}Environment variable $var must be set${NC}"
|
|
missing=true
|
|
fi
|
|
done
|
|
|
|
if [ "$missing" = true ]; then
|
|
exit 1
|
|
fi
|
|
|
|
function cleanup {
|
|
kubectl delete pod e2e 2>/dev/null || true
|
|
}
|
|
trap cleanup EXIT
|
|
|
|
E2E_CHECK_LEAKS=${E2E_CHECK_LEAKS:-}
|
|
FOCUS=${FOCUS:-.*}
|
|
|
|
BASEDIR=$(dirname "$0")
|
|
NGINX_BASE_IMAGE=$(cat $BASEDIR/../NGINX_BASE)
|
|
|
|
export E2E_CHECK_LEAKS
|
|
export FOCUS
|
|
|
|
echo -e "${BGREEN}Granting permissions to ingress-nginx e2e service account...${NC}"
|
|
kubectl create serviceaccount ingress-nginx-e2e || true
|
|
kubectl create clusterrolebinding permissive-binding \
|
|
--clusterrole=cluster-admin \
|
|
--user=admin \
|
|
--user=kubelet \
|
|
--serviceaccount=default:ingress-nginx-e2e || true
|
|
|
|
|
|
VER=$(kubectl version --client=false -o json |jq '.serverVersion.minor |tonumber')
|
|
if [ $VER -lt 24 ]; then
|
|
echo -e "${BGREEN}Waiting service account...${NC}"; \
|
|
until kubectl get secret | grep -q -e ^ingress-nginx-e2e-token; do \
|
|
echo -e "waiting for api token"; \
|
|
sleep 3; \
|
|
done
|
|
fi
|
|
|
|
|
|
echo -e "Starting the e2e test pod"
|
|
|
|
kubectl run --rm \
|
|
--attach \
|
|
--restart=Never \
|
|
--env="E2E_NODES=${E2E_NODES}" \
|
|
--env="FOCUS=${FOCUS}" \
|
|
--env="E2E_CHECK_LEAKS=${E2E_CHECK_LEAKS}" \
|
|
--env="NGINX_BASE_IMAGE=${NGINX_BASE_IMAGE}" \
|
|
--overrides='{ "apiVersion": "v1", "spec":{"serviceAccountName": "ingress-nginx-e2e"}}' \
|
|
e2e --image=nginx-ingress-controller:e2e
|
|
|
|
# Get the junit-reports stored in the configMaps created during e2etests
|
|
echo "Getting the report files out now.."
|
|
reportsDir="test/junitreports"
|
|
reportFileName="report-e2e-test-suite"
|
|
[ ! -e ${reportsDir} ] && mkdir $reportsDir
|
|
cd $reportsDir
|
|
|
|
# TODO: Seeking Rikatz help here to extract in a loop. Tried things like below without success
|
|
#for cmName in `k get cm -l junitreport=true -o json | jq '.items[].binaryData | keys[]' | tr '\"' ' '`
|
|
#do
|
|
#
|
|
#
|
|
# kubectl get cm -l junitreport=true -o json | jq -r '[.items[].binaryData | to_entries[] | {"key": .key, "value": .value }] | from_entries'
|
|
#
|
|
|
|
# Below lines successfully extract the report but they are one line per report.
|
|
# We only have 3 ginkgo reports so its ok for now
|
|
# But still, ideally this should be a loop as talked about in comments a few lines above
|
|
kubectl get cm $reportFileName.xml.gz -o "jsonpath={.binaryData['report-e2e-test-suite\.xml\.gz']}" > $reportFileName.xml.gz.base64
|
|
kubectl get cm $reportFileName-serial.xml.gz -o "jsonpath={.binaryData['report-e2e-test-suite-serial\.xml\.gz']}" > $reportFileName-serial.xml.gz.base64
|
|
|
|
cat $reportFileName.xml.gz.base64 | base64 -d > $reportFileName.xml.gz
|
|
cat $reportFileName-serial.xml.gz.base64 | base64 -d > $reportFileName-serial.xml.gz
|
|
|
|
gzip -d $reportFileName.xml.gz
|
|
gzip -d $reportFileName-serial.xml.gz
|
|
|
|
rm *.base64
|
|
cd ../..
|
|
|
|
# TODO Temporary: if condition to check if the memleak cm exists and only then try the extract for the memleak report
|
|
#
|
|
#kubectl get cm $reportFileName-serial -o "jsonpath={.data['report-e2e-test-suite-memleak\.xml\.gz']}" > $reportFileName-memleak.base64
|
|
#cat $reportFileName-memleak.base64 | base64 -d > $reportFileName-memleak.xml.gz
|
|
#gzip -d $reportFileName-memleak.xml.gz
|
|
echo "done getting the reports files out.."
|