123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134 |
- /*
- Copyright 2016 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package remote
- import (
- "fmt"
- "path/filepath"
- "strings"
- "k8s.io/klog"
- )
- // utils.go contains functions used across test suites.
- const (
- cniVersion = "v0.7.5"
- cniArch = "amd64"
- cniDirectory = "cni/bin" // The CNI tarball places binaries under directory under "cni/bin".
- cniConfDirectory = "cni/net.d"
- cniURL = "https://dl.k8s.io/network-plugins/cni-plugins-" + cniArch + "-" + cniVersion + ".tgz"
- )
- const cniConfig = `{
- "name": "mynet",
- "type": "bridge",
- "bridge": "mynet0",
- "isDefaultGateway": true,
- "forceAddress": false,
- "ipMasq": true,
- "hairpinMode": true,
- "ipam": {
- "type": "host-local",
- "subnet": "10.10.0.0/16"
- }
- }
- `
- // Install the cni plugin and add basic bridge configuration to the
- // configuration directory.
- func setupCNI(host, workspace string) error {
- klog.V(2).Infof("Install CNI on %q", host)
- cniPath := filepath.Join(workspace, cniDirectory)
- cmd := getSSHCommand(" ; ",
- fmt.Sprintf("mkdir -p %s", cniPath),
- fmt.Sprintf("curl -s -L %s | tar -xz -C %s", cniURL, cniPath),
- )
- if output, err := SSH(host, "sh", "-c", cmd); err != nil {
- return fmt.Errorf("failed to install cni plugin on %q: %v output: %q", host, err, output)
- }
- // The added CNI network config is not needed for kubenet. It is only
- // used when testing the CNI network plugin, but is added in both cases
- // for consistency and simplicity.
- klog.V(2).Infof("Adding CNI configuration on %q", host)
- cniConfigPath := filepath.Join(workspace, cniConfDirectory)
- cmd = getSSHCommand(" ; ",
- fmt.Sprintf("mkdir -p %s", cniConfigPath),
- fmt.Sprintf("echo %s > %s", quote(cniConfig), filepath.Join(cniConfigPath, "mynet.conf")),
- )
- if output, err := SSH(host, "sh", "-c", cmd); err != nil {
- return fmt.Errorf("failed to write cni configuration on %q: %v output: %q", host, err, output)
- }
- return nil
- }
- // configureFirewall configures iptable firewall rules.
- func configureFirewall(host string) error {
- klog.V(2).Infof("Configure iptables firewall rules on %q", host)
- // TODO: consider calling bootstrap script to configure host based on OS
- output, err := SSH(host, "iptables", "-L", "INPUT")
- if err != nil {
- return fmt.Errorf("failed to get iptables INPUT on %q: %v output: %q", host, err, output)
- }
- if strings.Contains(output, "Chain INPUT (policy DROP)") {
- cmd := getSSHCommand("&&",
- "(iptables -C INPUT -w -p TCP -j ACCEPT || iptables -A INPUT -w -p TCP -j ACCEPT)",
- "(iptables -C INPUT -w -p UDP -j ACCEPT || iptables -A INPUT -w -p UDP -j ACCEPT)",
- "(iptables -C INPUT -w -p ICMP -j ACCEPT || iptables -A INPUT -w -p ICMP -j ACCEPT)")
- output, err := SSH(host, "sh", "-c", cmd)
- if err != nil {
- return fmt.Errorf("failed to configured firewall on %q: %v output: %v", host, err, output)
- }
- }
- output, err = SSH(host, "iptables", "-L", "FORWARD")
- if err != nil {
- return fmt.Errorf("failed to get iptables FORWARD on %q: %v output: %q", host, err, output)
- }
- if strings.Contains(output, "Chain FORWARD (policy DROP)") {
- cmd := getSSHCommand("&&",
- "(iptables -C FORWARD -w -p TCP -j ACCEPT || iptables -A FORWARD -w -p TCP -j ACCEPT)",
- "(iptables -C FORWARD -w -p UDP -j ACCEPT || iptables -A FORWARD -w -p UDP -j ACCEPT)",
- "(iptables -C FORWARD -w -p ICMP -j ACCEPT || iptables -A FORWARD -w -p ICMP -j ACCEPT)")
- output, err = SSH(host, "sh", "-c", cmd)
- if err != nil {
- return fmt.Errorf("failed to configured firewall on %q: %v output: %v", host, err, output)
- }
- }
- return nil
- }
- // cleanupNodeProcesses kills all running node processes may conflict with the test.
- func cleanupNodeProcesses(host string) {
- klog.V(2).Infof("Killing any existing node processes on %q", host)
- cmd := getSSHCommand(" ; ",
- "pkill kubelet",
- "pkill kube-apiserver",
- "pkill etcd",
- "pkill e2e_node.test",
- )
- // No need to log an error if pkill fails since pkill will fail if the commands are not running.
- // If we are unable to stop existing running k8s processes, we should see messages in the kubelet/apiserver/etcd
- // logs about failing to bind the required ports.
- SSH(host, "sh", "-c", cmd)
- }
- // Quotes a shell literal so it can be nested within another shell scope.
- func quote(s string) string {
- return fmt.Sprintf("'\"'\"'%s'\"'\"'", s)
- }
|