123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875 |
- /*
- Copyright 2015 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package gce
- import (
- "crypto/sha256"
- "encoding/json"
- "fmt"
- "net/http"
- "os/exec"
- "strconv"
- "strings"
- "time"
- "github.com/onsi/ginkgo"
- compute "google.golang.org/api/compute/v1"
- "google.golang.org/api/googleapi"
- "k8s.io/api/core/v1"
- metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
- "k8s.io/apimachinery/pkg/util/wait"
- clientset "k8s.io/client-go/kubernetes"
- "k8s.io/kubernetes/test/e2e/framework"
- e2elog "k8s.io/kubernetes/test/e2e/framework/log"
- utilexec "k8s.io/utils/exec"
- )
- const (
- // Name of the config-map and key the ingress controller stores its uid in.
- uidConfigMap = "ingress-uid"
- uidKey = "uid"
- // all cloud resources created by the ingress controller start with this
- // prefix.
- k8sPrefix = "k8s-"
- // clusterDelimiter is the delimiter used by the ingress controller
- // to split uid from other naming/metadata.
- clusterDelimiter = "--"
- // Cloud resources created by the ingress controller older than this
- // are automatically purged to prevent running out of quota.
- // TODO(37335): write soak tests and bump this up to a week.
- maxAge = 48 * time.Hour
- // GCE only allows names < 64 characters, and the loadbalancer controller inserts
- // a single character of padding.
- nameLenLimit = 62
- negBackend = backendType("networkEndpointGroup")
- igBackend = backendType("instanceGroup")
- )
- type backendType string
- // IngressController manages implementation details of Ingress on GCE/GKE.
- type IngressController struct {
- Ns string
- rcPath string
- UID string
- staticIPName string
- rc *v1.ReplicationController
- svc *v1.Service
- Client clientset.Interface
- Cloud framework.CloudConfig
- }
- // CleanupIngressController calls cont.CleanupIngressControllerWithTimeout with hard-coded timeout
- func (cont *IngressController) CleanupIngressController() error {
- return cont.CleanupIngressControllerWithTimeout(framework.LoadBalancerCleanupTimeout)
- }
- // CleanupIngressControllerWithTimeout calls the IngressController.Cleanup(false)
- // followed with deleting the static ip, and then a final IngressController.Cleanup(true)
- func (cont *IngressController) CleanupIngressControllerWithTimeout(timeout time.Duration) error {
- pollErr := wait.Poll(5*time.Second, timeout, func() (bool, error) {
- if err := cont.Cleanup(false); err != nil {
- e2elog.Logf("Monitoring glbc's cleanup of gce resources:\n%v", err)
- return false, nil
- }
- return true, nil
- })
- // Always try to cleanup even if pollErr == nil, because the cleanup
- // routine also purges old leaked resources based on creation timestamp.
- ginkgo.By("Performing final delete of any remaining resources")
- if cleanupErr := cont.Cleanup(true); cleanupErr != nil {
- ginkgo.By(fmt.Sprintf("WARNING: possibly leaked resources: %v\n", cleanupErr))
- } else {
- ginkgo.By("No resources leaked.")
- }
- // Static-IP allocated on behalf of the test, never deleted by the
- // controller. Delete this IP only after the controller has had a chance
- // to cleanup or it might interfere with the controller, causing it to
- // throw out confusing events.
- if ipErr := wait.Poll(5*time.Second, 1*time.Minute, func() (bool, error) {
- if err := cont.deleteStaticIPs(); err != nil {
- e2elog.Logf("Failed to delete static-ip: %v\n", err)
- return false, nil
- }
- return true, nil
- }); ipErr != nil {
- // If this is a persistent error, the suite will fail when we run out
- // of quota anyway.
- ginkgo.By(fmt.Sprintf("WARNING: possibly leaked static IP: %v\n", ipErr))
- }
- // Logging that the GLBC failed to cleanup GCE resources on ingress deletion
- // See kubernetes/ingress#431
- if pollErr != nil {
- return fmt.Errorf("error: L7 controller failed to delete all cloud resources on time. %v", pollErr)
- }
- return nil
- }
- func (cont *IngressController) getL7AddonUID() (string, error) {
- e2elog.Logf("Retrieving UID from config map: %v/%v", metav1.NamespaceSystem, uidConfigMap)
- cm, err := cont.Client.CoreV1().ConfigMaps(metav1.NamespaceSystem).Get(uidConfigMap, metav1.GetOptions{})
- if err != nil {
- return "", err
- }
- if uid, ok := cm.Data[uidKey]; ok {
- return uid, nil
- }
- return "", fmt.Errorf("Could not find cluster UID for L7 addon pod")
- }
- // ListGlobalForwardingRules returns a list of global forwarding rules
- func (cont *IngressController) ListGlobalForwardingRules() []*compute.ForwardingRule {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- fwdList := []*compute.ForwardingRule{}
- l, err := gceCloud.ListGlobalForwardingRules()
- framework.ExpectNoError(err)
- for _, fwd := range l {
- if cont.isOwned(fwd.Name) {
- fwdList = append(fwdList, fwd)
- }
- }
- return fwdList
- }
- func (cont *IngressController) deleteForwardingRule(del bool) string {
- msg := ""
- fwList := []compute.ForwardingRule{}
- for _, regex := range []string{fmt.Sprintf("%vfw-.*%v.*", k8sPrefix, clusterDelimiter), fmt.Sprintf("%vfws-.*%v.*", k8sPrefix, clusterDelimiter)} {
- gcloudComputeResourceList("forwarding-rules", regex, cont.Cloud.ProjectID, &fwList)
- if len(fwList) == 0 {
- continue
- }
- for _, f := range fwList {
- if !cont.canDelete(f.Name, f.CreationTimestamp, del) {
- continue
- }
- if del {
- GcloudComputeResourceDelete("forwarding-rules", f.Name, cont.Cloud.ProjectID, "--global")
- } else {
- msg += fmt.Sprintf("%v (forwarding rule)\n", f.Name)
- }
- }
- }
- return msg
- }
- // GetGlobalAddress returns the global address by name.
- func (cont *IngressController) GetGlobalAddress(ipName string) *compute.Address {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- ip, err := gceCloud.GetGlobalAddress(ipName)
- framework.ExpectNoError(err)
- return ip
- }
- func (cont *IngressController) deleteAddresses(del bool) string {
- msg := ""
- ipList := []compute.Address{}
- regex := fmt.Sprintf("%vfw-.*%v.*", k8sPrefix, clusterDelimiter)
- gcloudComputeResourceList("addresses", regex, cont.Cloud.ProjectID, &ipList)
- if len(ipList) != 0 {
- for _, ip := range ipList {
- if !cont.canDelete(ip.Name, ip.CreationTimestamp, del) {
- continue
- }
- if del {
- GcloudComputeResourceDelete("addresses", ip.Name, cont.Cloud.ProjectID, "--global")
- } else {
- msg += fmt.Sprintf("%v (static-ip)\n", ip.Name)
- }
- }
- }
- return msg
- }
- // ListTargetHTTPProxies lists all target HTTP proxies in the project
- func (cont *IngressController) ListTargetHTTPProxies() []*compute.TargetHttpProxy {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- tpList := []*compute.TargetHttpProxy{}
- l, err := gceCloud.ListTargetHTTPProxies()
- framework.ExpectNoError(err)
- for _, tp := range l {
- if cont.isOwned(tp.Name) {
- tpList = append(tpList, tp)
- }
- }
- return tpList
- }
- // ListTargetHTTPSProxies lists all target HTTPS proxies
- func (cont *IngressController) ListTargetHTTPSProxies() []*compute.TargetHttpsProxy {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- tpsList := []*compute.TargetHttpsProxy{}
- l, err := gceCloud.ListTargetHTTPSProxies()
- framework.ExpectNoError(err)
- for _, tps := range l {
- if cont.isOwned(tps.Name) {
- tpsList = append(tpsList, tps)
- }
- }
- return tpsList
- }
- func (cont *IngressController) deleteTargetProxy(del bool) string {
- msg := ""
- tpList := []compute.TargetHttpProxy{}
- regex := fmt.Sprintf("%vtp-.*%v.*", k8sPrefix, clusterDelimiter)
- gcloudComputeResourceList("target-http-proxies", regex, cont.Cloud.ProjectID, &tpList)
- if len(tpList) != 0 {
- for _, t := range tpList {
- if !cont.canDelete(t.Name, t.CreationTimestamp, del) {
- continue
- }
- if del {
- GcloudComputeResourceDelete("target-http-proxies", t.Name, cont.Cloud.ProjectID)
- } else {
- msg += fmt.Sprintf("%v (target-http-proxy)\n", t.Name)
- }
- }
- }
- tpsList := []compute.TargetHttpsProxy{}
- regex = fmt.Sprintf("%vtps-.*%v.*", k8sPrefix, clusterDelimiter)
- gcloudComputeResourceList("target-https-proxies", regex, cont.Cloud.ProjectID, &tpsList)
- if len(tpsList) != 0 {
- for _, t := range tpsList {
- if !cont.canDelete(t.Name, t.CreationTimestamp, del) {
- continue
- }
- if del {
- GcloudComputeResourceDelete("target-https-proxies", t.Name, cont.Cloud.ProjectID)
- } else {
- msg += fmt.Sprintf("%v (target-https-proxy)\n", t.Name)
- }
- }
- }
- return msg
- }
- // ListURLMaps lists all URL maps
- func (cont *IngressController) ListURLMaps() []*compute.UrlMap {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- umList := []*compute.UrlMap{}
- l, err := gceCloud.ListURLMaps()
- framework.ExpectNoError(err)
- for _, um := range l {
- if cont.isOwned(um.Name) {
- umList = append(umList, um)
- }
- }
- return umList
- }
- func (cont *IngressController) deleteURLMap(del bool) (msg string) {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- umList, err := gceCloud.ListURLMaps()
- if err != nil {
- if cont.isHTTPErrorCode(err, http.StatusNotFound) {
- return msg
- }
- return fmt.Sprintf("Failed to list url maps: %v", err)
- }
- if len(umList) == 0 {
- return msg
- }
- for _, um := range umList {
- if !cont.canDelete(um.Name, um.CreationTimestamp, del) {
- continue
- }
- if del {
- e2elog.Logf("Deleting url-map: %s", um.Name)
- if err := gceCloud.DeleteURLMap(um.Name); err != nil &&
- !cont.isHTTPErrorCode(err, http.StatusNotFound) {
- msg += fmt.Sprintf("Failed to delete url map %v\n", um.Name)
- }
- } else {
- msg += fmt.Sprintf("%v (url-map)\n", um.Name)
- }
- }
- return msg
- }
- // ListGlobalBackendServices lists all global backend services
- func (cont *IngressController) ListGlobalBackendServices() []*compute.BackendService {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- beList := []*compute.BackendService{}
- l, err := gceCloud.ListGlobalBackendServices()
- framework.ExpectNoError(err)
- for _, be := range l {
- if cont.isOwned(be.Name) {
- beList = append(beList, be)
- }
- }
- return beList
- }
- func (cont *IngressController) deleteBackendService(del bool) (msg string) {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- beList, err := gceCloud.ListGlobalBackendServices()
- if err != nil {
- if cont.isHTTPErrorCode(err, http.StatusNotFound) {
- return msg
- }
- return fmt.Sprintf("Failed to list backend services: %v", err)
- }
- if len(beList) == 0 {
- e2elog.Logf("No backend services found")
- return msg
- }
- for _, be := range beList {
- if !cont.canDelete(be.Name, be.CreationTimestamp, del) {
- continue
- }
- if del {
- e2elog.Logf("Deleting backed-service: %s", be.Name)
- if err := gceCloud.DeleteGlobalBackendService(be.Name); err != nil &&
- !cont.isHTTPErrorCode(err, http.StatusNotFound) {
- msg += fmt.Sprintf("Failed to delete backend service %v: %v\n", be.Name, err)
- }
- } else {
- msg += fmt.Sprintf("%v (backend-service)\n", be.Name)
- }
- }
- return msg
- }
- func (cont *IngressController) deleteHTTPHealthCheck(del bool) (msg string) {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- hcList, err := gceCloud.ListHTTPHealthChecks()
- if err != nil {
- if cont.isHTTPErrorCode(err, http.StatusNotFound) {
- return msg
- }
- return fmt.Sprintf("Failed to list HTTP health checks: %v", err)
- }
- if len(hcList) == 0 {
- return msg
- }
- for _, hc := range hcList {
- if !cont.canDelete(hc.Name, hc.CreationTimestamp, del) {
- continue
- }
- if del {
- e2elog.Logf("Deleting http-health-check: %s", hc.Name)
- if err := gceCloud.DeleteHTTPHealthCheck(hc.Name); err != nil &&
- !cont.isHTTPErrorCode(err, http.StatusNotFound) {
- msg += fmt.Sprintf("Failed to delete HTTP health check %v\n", hc.Name)
- }
- } else {
- msg += fmt.Sprintf("%v (http-health-check)\n", hc.Name)
- }
- }
- return msg
- }
- // ListSslCertificates lists all SSL certificates
- func (cont *IngressController) ListSslCertificates() []*compute.SslCertificate {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- sslList := []*compute.SslCertificate{}
- l, err := gceCloud.ListSslCertificates()
- framework.ExpectNoError(err)
- for _, ssl := range l {
- if cont.isOwned(ssl.Name) {
- sslList = append(sslList, ssl)
- }
- }
- return sslList
- }
- func (cont *IngressController) deleteSSLCertificate(del bool) (msg string) {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- sslList, err := gceCloud.ListSslCertificates()
- if err != nil {
- if cont.isHTTPErrorCode(err, http.StatusNotFound) {
- return msg
- }
- return fmt.Sprintf("Failed to list ssl certificates: %v", err)
- }
- if len(sslList) != 0 {
- for _, s := range sslList {
- if !cont.canDelete(s.Name, s.CreationTimestamp, del) {
- continue
- }
- if del {
- e2elog.Logf("Deleting ssl-certificate: %s", s.Name)
- if err := gceCloud.DeleteSslCertificate(s.Name); err != nil &&
- !cont.isHTTPErrorCode(err, http.StatusNotFound) {
- msg += fmt.Sprintf("Failed to delete ssl certificates: %v\n", s.Name)
- }
- } else {
- msg += fmt.Sprintf("%v (ssl-certificate)\n", s.Name)
- }
- }
- }
- return msg
- }
- // ListInstanceGroups lists all instance groups
- func (cont *IngressController) ListInstanceGroups() []*compute.InstanceGroup {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- igList := []*compute.InstanceGroup{}
- l, err := gceCloud.ListInstanceGroups(cont.Cloud.Zone)
- framework.ExpectNoError(err)
- for _, ig := range l {
- if cont.isOwned(ig.Name) {
- igList = append(igList, ig)
- }
- }
- return igList
- }
- func (cont *IngressController) deleteInstanceGroup(del bool) (msg string) {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- // TODO: E2E cloudprovider has only 1 zone, but the cluster can have many.
- // We need to poll on all IGs across all zones.
- igList, err := gceCloud.ListInstanceGroups(cont.Cloud.Zone)
- if err != nil {
- if cont.isHTTPErrorCode(err, http.StatusNotFound) {
- return msg
- }
- return fmt.Sprintf("Failed to list instance groups: %v", err)
- }
- if len(igList) == 0 {
- return msg
- }
- for _, ig := range igList {
- if !cont.canDelete(ig.Name, ig.CreationTimestamp, del) {
- continue
- }
- if del {
- e2elog.Logf("Deleting instance-group: %s", ig.Name)
- if err := gceCloud.DeleteInstanceGroup(ig.Name, cont.Cloud.Zone); err != nil &&
- !cont.isHTTPErrorCode(err, http.StatusNotFound) {
- msg += fmt.Sprintf("Failed to delete instance group %v\n", ig.Name)
- }
- } else {
- msg += fmt.Sprintf("%v (instance-group)\n", ig.Name)
- }
- }
- return msg
- }
- func (cont *IngressController) deleteNetworkEndpointGroup(del bool) (msg string) {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- // TODO: E2E cloudprovider has only 1 zone, but the cluster can have many.
- // We need to poll on all NEGs across all zones.
- negList, err := gceCloud.ListNetworkEndpointGroup(cont.Cloud.Zone)
- if err != nil {
- if cont.isHTTPErrorCode(err, http.StatusNotFound) {
- return msg
- }
- // Do not return error as NEG is still alpha.
- e2elog.Logf("Failed to list network endpoint group: %v", err)
- return msg
- }
- if len(negList) == 0 {
- return msg
- }
- for _, neg := range negList {
- if !cont.canDeleteNEG(neg.Name, neg.CreationTimestamp, del) {
- continue
- }
- if del {
- e2elog.Logf("Deleting network-endpoint-group: %s", neg.Name)
- if err := gceCloud.DeleteNetworkEndpointGroup(neg.Name, cont.Cloud.Zone); err != nil &&
- !cont.isHTTPErrorCode(err, http.StatusNotFound) {
- msg += fmt.Sprintf("Failed to delete network endpoint group %v\n", neg.Name)
- }
- } else {
- msg += fmt.Sprintf("%v (network-endpoint-group)\n", neg.Name)
- }
- }
- return msg
- }
- // canDelete returns true if either the name ends in a suffix matching this
- // controller's UID, or the creationTimestamp exceeds the maxAge and del is set
- // to true. Always returns false if the name doesn't match that we expect for
- // Ingress cloud resources.
- func (cont *IngressController) canDelete(resourceName, creationTimestamp string, delOldResources bool) bool {
- // ignore everything not created by an ingress controller.
- splitName := strings.Split(resourceName, clusterDelimiter)
- if !strings.HasPrefix(resourceName, k8sPrefix) || len(splitName) != 2 {
- return false
- }
- // Resources created by the GLBC have a "0"" appended to the end if truncation
- // occurred. Removing the zero allows the following match.
- truncatedClusterUID := splitName[1]
- if len(truncatedClusterUID) >= 1 && strings.HasSuffix(truncatedClusterUID, "0") {
- truncatedClusterUID = truncatedClusterUID[:len(truncatedClusterUID)-1]
- }
- // always delete things that are created by the current ingress controller.
- // Because of resource name truncation, this looks for a common prefix
- if strings.HasPrefix(cont.UID, truncatedClusterUID) {
- return true
- }
- if !delOldResources {
- return false
- }
- return canDeleteWithTimestamp(resourceName, creationTimestamp)
- }
- // isOwned returns true if the resourceName ends in a suffix matching this
- // controller UID.
- func (cont *IngressController) isOwned(resourceName string) bool {
- return cont.canDelete(resourceName, "", false)
- }
- // canDeleteNEG returns true if either the name contains this controller's UID,
- // or the creationTimestamp exceeds the maxAge and del is set to true.
- func (cont *IngressController) canDeleteNEG(resourceName, creationTimestamp string, delOldResources bool) bool {
- if !strings.HasPrefix(resourceName, "k8s") {
- return false
- }
- if strings.Contains(resourceName, cont.UID) {
- return true
- }
- if !delOldResources {
- return false
- }
- return canDeleteWithTimestamp(resourceName, creationTimestamp)
- }
- func canDeleteWithTimestamp(resourceName, creationTimestamp string) bool {
- createdTime, err := time.Parse(time.RFC3339, creationTimestamp)
- if err != nil {
- e2elog.Logf("WARNING: Failed to parse creation timestamp %v for %v: %v", creationTimestamp, resourceName, err)
- return false
- }
- if time.Since(createdTime) > maxAge {
- e2elog.Logf("%v created on %v IS too old", resourceName, creationTimestamp)
- return true
- }
- return false
- }
- // GetFirewallRuleName returns the name of the firewall used for the IngressController.
- func (cont *IngressController) GetFirewallRuleName() string {
- return fmt.Sprintf("%vfw-l7%v%v", k8sPrefix, clusterDelimiter, cont.UID)
- }
- // GetFirewallRule returns the firewall used by the IngressController.
- // Causes a fatal error incase of an error.
- // TODO: Rename this to GetFirewallRuleOrDie and similarly rename all other
- // methods here to be consistent with rest of the code in this repo.
- func (cont *IngressController) GetFirewallRule() *compute.Firewall {
- fw, err := cont.GetFirewallRuleOrError()
- framework.ExpectNoError(err)
- return fw
- }
- // GetFirewallRuleOrError returns the firewall used by the IngressController.
- // Returns an error if that fails.
- // TODO: Rename this to GetFirewallRule when the above method with that name is renamed.
- func (cont *IngressController) GetFirewallRuleOrError() (*compute.Firewall, error) {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- fwName := cont.GetFirewallRuleName()
- return gceCloud.GetFirewall(fwName)
- }
- func (cont *IngressController) deleteFirewallRule(del bool) (msg string) {
- fwList := []compute.Firewall{}
- regex := fmt.Sprintf("%vfw-l7%v.*", k8sPrefix, clusterDelimiter)
- gcloudComputeResourceList("firewall-rules", regex, cont.Cloud.ProjectID, &fwList)
- if len(fwList) != 0 {
- for _, f := range fwList {
- if !cont.canDelete(f.Name, f.CreationTimestamp, del) {
- continue
- }
- if del {
- GcloudComputeResourceDelete("firewall-rules", f.Name, cont.Cloud.ProjectID)
- } else {
- msg += fmt.Sprintf("%v (firewall rule)\n", f.Name)
- }
- }
- }
- return msg
- }
- func (cont *IngressController) isHTTPErrorCode(err error, code int) bool {
- apiErr, ok := err.(*googleapi.Error)
- return ok && apiErr.Code == code
- }
- // WaitForNegBackendService waits for the expected backend service to become
- func (cont *IngressController) WaitForNegBackendService(svcPorts map[string]v1.ServicePort) error {
- return wait.Poll(5*time.Second, 1*time.Minute, func() (bool, error) {
- err := cont.verifyBackendMode(svcPorts, negBackend)
- if err != nil {
- e2elog.Logf("Err while checking if backend service is using NEG: %v", err)
- return false, nil
- }
- return true, nil
- })
- }
- // WaitForIgBackendService returns true only if all global backend service with matching svcPorts pointing to IG as backend
- func (cont *IngressController) WaitForIgBackendService(svcPorts map[string]v1.ServicePort) error {
- return wait.Poll(5*time.Second, 1*time.Minute, func() (bool, error) {
- err := cont.verifyBackendMode(svcPorts, igBackend)
- if err != nil {
- e2elog.Logf("Err while checking if backend service is using IG: %v", err)
- return false, nil
- }
- return true, nil
- })
- }
- // BackendServiceUsingNEG returns true only if all global backend service with matching svcPorts pointing to NEG as backend
- func (cont *IngressController) BackendServiceUsingNEG(svcPorts map[string]v1.ServicePort) error {
- return cont.verifyBackendMode(svcPorts, negBackend)
- }
- // BackendServiceUsingIG returns true only if all global backend service with matching svcPorts pointing to IG as backend
- func (cont *IngressController) BackendServiceUsingIG(svcPorts map[string]v1.ServicePort) error {
- return cont.verifyBackendMode(svcPorts, igBackend)
- }
- func (cont *IngressController) verifyBackendMode(svcPorts map[string]v1.ServicePort, backendType backendType) error {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- beList, err := gceCloud.ListGlobalBackendServices()
- if err != nil {
- return fmt.Errorf("failed to list backend services: %v", err)
- }
- hcList, err := gceCloud.ListHealthChecks()
- if err != nil {
- return fmt.Errorf("failed to list health checks: %v", err)
- }
- // Generate short UID
- uid := cont.UID
- if len(uid) > 8 {
- uid = uid[:8]
- }
- matchingBackendService := 0
- for svcName, sp := range svcPorts {
- match := false
- bsMatch := &compute.BackendService{}
- // NEG BackendServices' names contain the a sha256 hash of a string.
- // This logic is copied from the ingress-gce namer.
- // WARNING: This needs to adapt if the naming convention changed.
- negString := strings.Join([]string{uid, cont.Ns, svcName, fmt.Sprintf("%v", sp.Port)}, ";")
- negHash := fmt.Sprintf("%x", sha256.Sum256([]byte(negString)))[:8]
- for _, bs := range beList {
- // Non-NEG BackendServices are named with the Nodeport in the name.
- if backendType == igBackend && strings.Contains(bs.Name, strconv.Itoa(int(sp.NodePort))) {
- match = true
- bsMatch = bs
- matchingBackendService++
- break
- }
- // NEG BackendServices' names contain the a sha256 hash of a string.
- if backendType == negBackend && strings.Contains(bs.Name, negHash) {
- match = true
- bsMatch = bs
- matchingBackendService++
- break
- }
- }
- if match {
- for _, be := range bsMatch.Backends {
- if !strings.Contains(be.Group, string(backendType)) {
- return fmt.Errorf("expect to find backends with type %q, but got backend group: %v", backendType, be.Group)
- }
- }
- // Check that the correct HealthCheck exists for the BackendService
- hcMatch := false
- for _, hc := range hcList {
- if hc.Name == bsMatch.Name {
- hcMatch = true
- break
- }
- }
- if !hcMatch {
- return fmt.Errorf("missing healthcheck for backendservice: %v", bsMatch.Name)
- }
- }
- }
- if matchingBackendService != len(svcPorts) {
- beNames := []string{}
- for _, be := range beList {
- beNames = append(beNames, be.Name)
- }
- return fmt.Errorf("expect %d backend service with backend type: %v, but got %d matching backend service. Expect backend services for service ports: %v, but got backend services: %v", len(svcPorts), backendType, matchingBackendService, svcPorts, beNames)
- }
- return nil
- }
- // Cleanup cleans up cloud resources.
- // If del is false, it simply reports existing resources without deleting them.
- // If dle is true, it deletes resources it finds acceptable (see canDelete func).
- func (cont *IngressController) Cleanup(del bool) error {
- // Ordering is important here because we cannot delete resources that other
- // resources hold references to.
- errMsg := cont.deleteForwardingRule(del)
- // Static IPs are named after forwarding rules.
- errMsg += cont.deleteAddresses(del)
- errMsg += cont.deleteTargetProxy(del)
- errMsg += cont.deleteURLMap(del)
- errMsg += cont.deleteBackendService(del)
- errMsg += cont.deleteHTTPHealthCheck(del)
- errMsg += cont.deleteInstanceGroup(del)
- errMsg += cont.deleteNetworkEndpointGroup(del)
- errMsg += cont.deleteFirewallRule(del)
- errMsg += cont.deleteSSLCertificate(del)
- // TODO: Verify instance-groups, issue #16636. Gcloud mysteriously barfs when told
- // to unmarshal instance groups into the current vendored gce-client's understanding
- // of the struct.
- if errMsg == "" {
- return nil
- }
- return fmt.Errorf(errMsg)
- }
- // Init initializes the IngressController with an UID
- func (cont *IngressController) Init() error {
- uid, err := cont.getL7AddonUID()
- if err != nil {
- return err
- }
- cont.UID = uid
- // There's a name limit imposed by GCE. The controller will truncate.
- testName := fmt.Sprintf("k8s-fw-foo-app-X-%v--%v", cont.Ns, cont.UID)
- if len(testName) > nameLenLimit {
- e2elog.Logf("WARNING: test name including cluster UID: %v is over the GCE limit of %v", testName, nameLenLimit)
- } else {
- e2elog.Logf("Detected cluster UID %v", cont.UID)
- }
- return nil
- }
- // CreateStaticIP allocates a random static ip with the given name. Returns a string
- // representation of the ip. Caller is expected to manage cleanup of the ip by
- // invoking deleteStaticIPs.
- func (cont *IngressController) CreateStaticIP(name string) string {
- gceCloud := cont.Cloud.Provider.(*Provider).gceCloud
- addr := &compute.Address{Name: name}
- if err := gceCloud.ReserveGlobalAddress(addr); err != nil {
- if delErr := gceCloud.DeleteGlobalAddress(name); delErr != nil {
- if cont.isHTTPErrorCode(delErr, http.StatusNotFound) {
- e2elog.Logf("Static ip with name %v was not allocated, nothing to delete", name)
- } else {
- e2elog.Logf("Failed to delete static ip %v: %v", name, delErr)
- }
- }
- framework.Failf("Failed to allocate static ip %v: %v", name, err)
- }
- ip, err := gceCloud.GetGlobalAddress(name)
- if err != nil {
- framework.Failf("Failed to get newly created static ip %v: %v", name, err)
- }
- cont.staticIPName = ip.Name
- e2elog.Logf("Reserved static ip %v: %v", cont.staticIPName, ip.Address)
- return ip.Address
- }
- // deleteStaticIPs delets all static-ips allocated through calls to
- // CreateStaticIP.
- func (cont *IngressController) deleteStaticIPs() error {
- if cont.staticIPName != "" {
- if err := GcloudComputeResourceDelete("addresses", cont.staticIPName, cont.Cloud.ProjectID, "--global"); err == nil {
- cont.staticIPName = ""
- } else {
- return err
- }
- } else {
- e2eIPs := []compute.Address{}
- gcloudComputeResourceList("addresses", "e2e-.*", cont.Cloud.ProjectID, &e2eIPs)
- ips := []string{}
- for _, ip := range e2eIPs {
- ips = append(ips, ip.Name)
- }
- e2elog.Logf("None of the remaining %d static-ips were created by this e2e: %v", len(ips), strings.Join(ips, ", "))
- }
- return nil
- }
- // gcloudComputeResourceList unmarshals json output of gcloud into given out interface.
- func gcloudComputeResourceList(resource, regex, project string, out interface{}) {
- // gcloud prints a message to stderr if it has an available update
- // so we only look at stdout.
- command := []string{
- "compute", resource, "list",
- fmt.Sprintf("--filter='name ~ \"%q\"'", regex),
- fmt.Sprintf("--project=%v", project),
- "-q", "--format=json",
- }
- output, err := exec.Command("gcloud", command...).Output()
- if err != nil {
- errCode := -1
- errMsg := ""
- if exitErr, ok := err.(utilexec.ExitError); ok {
- errCode = exitErr.ExitStatus()
- errMsg = exitErr.Error()
- if osExitErr, ok := err.(*exec.ExitError); ok {
- errMsg = fmt.Sprintf("%v, stderr %v", errMsg, string(osExitErr.Stderr))
- }
- }
- e2elog.Logf("Error running gcloud command 'gcloud %s': err: %v, output: %v, status: %d, msg: %v", strings.Join(command, " "), err, string(output), errCode, errMsg)
- }
- if err := json.Unmarshal([]byte(output), out); err != nil {
- e2elog.Logf("Error unmarshalling gcloud output for %v: %v, output: %v", resource, err, string(output))
- }
- }
- // GcloudComputeResourceDelete deletes the specified compute resource by name and project.
- func GcloudComputeResourceDelete(resource, name, project string, args ...string) error {
- e2elog.Logf("Deleting %v: %v", resource, name)
- argList := append([]string{"compute", resource, "delete", name, fmt.Sprintf("--project=%v", project), "-q"}, args...)
- output, err := exec.Command("gcloud", argList...).CombinedOutput()
- if err != nil {
- e2elog.Logf("Error deleting %v, output: %v\nerror: %+v", resource, string(output), err)
- }
- return err
- }
- // GcloudComputeResourceCreate creates a compute resource with a name and arguments.
- func GcloudComputeResourceCreate(resource, name, project string, args ...string) error {
- e2elog.Logf("Creating %v in project %v: %v", resource, project, name)
- argsList := append([]string{"compute", resource, "create", name, fmt.Sprintf("--project=%v", project)}, args...)
- e2elog.Logf("Running command: gcloud %+v", strings.Join(argsList, " "))
- output, err := exec.Command("gcloud", argsList...).CombinedOutput()
- if err != nil {
- e2elog.Logf("Error creating %v, output: %v\nerror: %+v", resource, string(output), err)
- }
- return err
- }
|