ingress.go 37 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929
  1. /*
  2. Copyright 2015 The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package network
  14. import (
  15. "encoding/json"
  16. "fmt"
  17. "net/http"
  18. "path/filepath"
  19. "strings"
  20. "time"
  21. compute "google.golang.org/api/compute/v1"
  22. v1 "k8s.io/api/core/v1"
  23. rbacv1beta1 "k8s.io/api/rbac/v1beta1"
  24. "k8s.io/apimachinery/pkg/api/errors"
  25. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  26. "k8s.io/apimachinery/pkg/runtime/schema"
  27. "k8s.io/apimachinery/pkg/util/uuid"
  28. "k8s.io/apimachinery/pkg/util/wait"
  29. "k8s.io/apiserver/pkg/authentication/serviceaccount"
  30. "k8s.io/kubernetes/test/e2e/framework"
  31. "k8s.io/kubernetes/test/e2e/framework/auth"
  32. "k8s.io/kubernetes/test/e2e/framework/ingress"
  33. e2elog "k8s.io/kubernetes/test/e2e/framework/log"
  34. "k8s.io/kubernetes/test/e2e/framework/providers/gce"
  35. "github.com/onsi/ginkgo"
  36. "github.com/onsi/gomega"
  37. )
  38. const (
  39. negUpdateTimeout = 2 * time.Minute
  40. instanceGroupAnnotation = "ingress.gcp.kubernetes.io/instance-groups"
  41. )
  42. var _ = SIGDescribe("Loadbalancing: L7", func() {
  43. defer ginkgo.GinkgoRecover()
  44. var (
  45. ns string
  46. jig *ingress.TestJig
  47. conformanceTests []ingress.ConformanceTests
  48. )
  49. f := framework.NewDefaultFramework("ingress")
  50. ginkgo.BeforeEach(func() {
  51. jig = ingress.NewIngressTestJig(f.ClientSet)
  52. ns = f.Namespace.Name
  53. // this test wants powerful permissions. Since the namespace names are unique, we can leave this
  54. // lying around so we don't have to race any caches
  55. err := auth.BindClusterRole(jig.Client.RbacV1beta1(), "cluster-admin", f.Namespace.Name,
  56. rbacv1beta1.Subject{Kind: rbacv1beta1.ServiceAccountKind, Namespace: f.Namespace.Name, Name: "default"})
  57. framework.ExpectNoError(err)
  58. err = auth.WaitForAuthorizationUpdate(jig.Client.AuthorizationV1beta1(),
  59. serviceaccount.MakeUsername(f.Namespace.Name, "default"),
  60. "", "create", schema.GroupResource{Resource: "pods"}, true)
  61. framework.ExpectNoError(err)
  62. })
  63. // Before enabling this loadbalancer test in any other test list you must
  64. // make sure the associated project has enough quota. At the time of this
  65. // writing a GCE project is allowed 3 backend services by default. This
  66. // test requires at least 5.
  67. //
  68. // Slow by design ~10m for each "It" block dominated by loadbalancer setup time
  69. // TODO: write similar tests for nginx, haproxy and AWS Ingress.
  70. ginkgo.Describe("GCE [Slow] [Feature:Ingress]", func() {
  71. var gceController *gce.IngressController
  72. // Platform specific setup
  73. ginkgo.BeforeEach(func() {
  74. framework.SkipUnlessProviderIs("gce", "gke")
  75. ginkgo.By("Initializing gce controller")
  76. gceController = &gce.IngressController{
  77. Ns: ns,
  78. Client: jig.Client,
  79. Cloud: framework.TestContext.CloudConfig,
  80. }
  81. err := gceController.Init()
  82. framework.ExpectNoError(err)
  83. })
  84. // Platform specific cleanup
  85. ginkgo.AfterEach(func() {
  86. if ginkgo.CurrentGinkgoTestDescription().Failed {
  87. framework.DescribeIng(ns)
  88. }
  89. if jig.Ingress == nil {
  90. ginkgo.By("No ingress created, no cleanup necessary")
  91. return
  92. }
  93. ginkgo.By("Deleting ingress")
  94. jig.TryDeleteIngress()
  95. ginkgo.By("Cleaning up cloud resources")
  96. err := gceController.CleanupIngressController()
  97. framework.ExpectNoError(err)
  98. })
  99. ginkgo.It("should conform to Ingress spec", func() {
  100. conformanceTests = ingress.CreateIngressComformanceTests(jig, ns, map[string]string{})
  101. for _, t := range conformanceTests {
  102. ginkgo.By(t.EntryLog)
  103. t.Execute()
  104. ginkgo.By(t.ExitLog)
  105. jig.WaitForIngress(true)
  106. }
  107. })
  108. ginkgo.It("should create ingress with pre-shared certificate", func() {
  109. executePresharedCertTest(f, jig, "")
  110. })
  111. ginkgo.It("should support multiple TLS certs", func() {
  112. ginkgo.By("Creating an ingress with no certs.")
  113. jig.CreateIngress(filepath.Join(ingress.IngressManifestPath, "multiple-certs"), ns, map[string]string{
  114. ingress.IngressStaticIPKey: ns,
  115. }, map[string]string{})
  116. ginkgo.By("Adding multiple certs to the ingress.")
  117. hosts := []string{"test1.ingress.com", "test2.ingress.com", "test3.ingress.com", "test4.ingress.com"}
  118. secrets := []string{"tls-secret-1", "tls-secret-2", "tls-secret-3", "tls-secret-4"}
  119. certs := [][]byte{}
  120. for i, host := range hosts {
  121. jig.AddHTTPS(secrets[i], host)
  122. certs = append(certs, jig.GetRootCA(secrets[i]))
  123. }
  124. for i, host := range hosts {
  125. err := jig.WaitForIngressWithCert(true, []string{host}, certs[i])
  126. framework.ExpectNoError(err, fmt.Sprintf("Unexpected error while waiting for ingress: %v", err))
  127. }
  128. ginkgo.By("Remove all but one of the certs on the ingress.")
  129. jig.RemoveHTTPS(secrets[1])
  130. jig.RemoveHTTPS(secrets[2])
  131. jig.RemoveHTTPS(secrets[3])
  132. ginkgo.By("Test that the remaining cert is properly served.")
  133. err := jig.WaitForIngressWithCert(true, []string{hosts[0]}, certs[0])
  134. framework.ExpectNoError(err, fmt.Sprintf("Unexpected error while waiting for ingress: %v", err))
  135. ginkgo.By("Add back one of the certs that was removed and check that all certs are served.")
  136. jig.AddHTTPS(secrets[1], hosts[1])
  137. for i, host := range hosts[:2] {
  138. err := jig.WaitForIngressWithCert(true, []string{host}, certs[i])
  139. framework.ExpectNoError(err, fmt.Sprintf("Unexpected error while waiting for ingress: %v", err))
  140. }
  141. })
  142. ginkgo.It("multicluster ingress should get instance group annotation", func() {
  143. name := "echomap"
  144. jig.CreateIngress(filepath.Join(ingress.IngressManifestPath, "http"), ns, map[string]string{
  145. ingress.IngressClassKey: ingress.MulticlusterIngressClassValue,
  146. }, map[string]string{})
  147. ginkgo.By(fmt.Sprintf("waiting for Ingress %s to get instance group annotation", name))
  148. pollErr := wait.Poll(2*time.Second, framework.LoadBalancerPollTimeout, func() (bool, error) {
  149. ing, err := f.ClientSet.NetworkingV1beta1().Ingresses(ns).Get(name, metav1.GetOptions{})
  150. framework.ExpectNoError(err)
  151. annotations := ing.Annotations
  152. if annotations == nil || annotations[instanceGroupAnnotation] == "" {
  153. e2elog.Logf("Waiting for ingress to get %s annotation. Found annotations: %v", instanceGroupAnnotation, annotations)
  154. return false, nil
  155. }
  156. return true, nil
  157. })
  158. if pollErr != nil {
  159. framework.ExpectNoError(fmt.Errorf("Timed out waiting for ingress %s to get %s annotation", name, instanceGroupAnnotation))
  160. }
  161. // Verify that the ingress does not get other annotations like url-map, target-proxy, backends, etc.
  162. // Note: All resources except the firewall rule have an annotation.
  163. umKey := ingress.StatusPrefix + "/url-map"
  164. fwKey := ingress.StatusPrefix + "/forwarding-rule"
  165. tpKey := ingress.StatusPrefix + "/target-proxy"
  166. fwsKey := ingress.StatusPrefix + "/https-forwarding-rule"
  167. tpsKey := ingress.StatusPrefix + "/https-target-proxy"
  168. scKey := ingress.StatusPrefix + "/ssl-cert"
  169. beKey := ingress.StatusPrefix + "/backends"
  170. wait.Poll(2*time.Second, time.Minute, func() (bool, error) {
  171. ing, err := f.ClientSet.NetworkingV1beta1().Ingresses(ns).Get(name, metav1.GetOptions{})
  172. framework.ExpectNoError(err)
  173. annotations := ing.Annotations
  174. if annotations != nil && (annotations[umKey] != "" || annotations[fwKey] != "" ||
  175. annotations[tpKey] != "" || annotations[fwsKey] != "" || annotations[tpsKey] != "" ||
  176. annotations[scKey] != "" || annotations[beKey] != "") {
  177. framework.Failf("unexpected annotations. Expected to not have annotations for urlmap, forwarding rule, target proxy, ssl cert and backends, got: %v", annotations)
  178. return true, nil
  179. }
  180. return false, nil
  181. })
  182. // Verify that the controller does not create any other resource except instance group.
  183. // TODO(59778): Check GCE resources specific to this ingress instead of listing all resources.
  184. if len(gceController.ListURLMaps()) != 0 {
  185. framework.Failf("unexpected url maps, expected none, got: %v", gceController.ListURLMaps())
  186. }
  187. if len(gceController.ListGlobalForwardingRules()) != 0 {
  188. framework.Failf("unexpected forwarding rules, expected none, got: %v", gceController.ListGlobalForwardingRules())
  189. }
  190. if len(gceController.ListTargetHTTPProxies()) != 0 {
  191. framework.Failf("unexpected target http proxies, expected none, got: %v", gceController.ListTargetHTTPProxies())
  192. }
  193. if len(gceController.ListTargetHTTPSProxies()) != 0 {
  194. framework.Failf("unexpected target https proxies, expected none, got: %v", gceController.ListTargetHTTPProxies())
  195. }
  196. if len(gceController.ListSslCertificates()) != 0 {
  197. framework.Failf("unexpected ssl certificates, expected none, got: %v", gceController.ListSslCertificates())
  198. }
  199. if len(gceController.ListGlobalBackendServices()) != 0 {
  200. framework.Failf("unexpected backend service, expected none, got: %v", gceController.ListGlobalBackendServices())
  201. }
  202. // Controller does not have a list command for firewall rule. We use get instead.
  203. if fw, err := gceController.GetFirewallRuleOrError(); err == nil {
  204. framework.Failf("unexpected nil error in getting firewall rule, expected firewall NotFound, got firewall: %v", fw)
  205. }
  206. // TODO(nikhiljindal): Check the instance group annotation value and verify with a multizone cluster.
  207. })
  208. // TODO: Implement a multizone e2e that verifies traffic reaches each
  209. // zone based on pod labels.
  210. })
  211. ginkgo.Describe("GCE [Slow] [Feature:NEG]", func() {
  212. var gceController *gce.IngressController
  213. // Platform specific setup
  214. ginkgo.BeforeEach(func() {
  215. framework.SkipUnlessProviderIs("gce", "gke")
  216. ginkgo.By("Initializing gce controller")
  217. gceController = &gce.IngressController{
  218. Ns: ns,
  219. Client: jig.Client,
  220. Cloud: framework.TestContext.CloudConfig,
  221. }
  222. err := gceController.Init()
  223. framework.ExpectNoError(err)
  224. })
  225. // Platform specific cleanup
  226. ginkgo.AfterEach(func() {
  227. if ginkgo.CurrentGinkgoTestDescription().Failed {
  228. framework.DescribeIng(ns)
  229. }
  230. if jig.Ingress == nil {
  231. ginkgo.By("No ingress created, no cleanup necessary")
  232. return
  233. }
  234. ginkgo.By("Deleting ingress")
  235. jig.TryDeleteIngress()
  236. ginkgo.By("Cleaning up cloud resources")
  237. err := gceController.CleanupIngressController()
  238. framework.ExpectNoError(err)
  239. })
  240. ginkgo.It("should conform to Ingress spec", func() {
  241. jig.PollInterval = 5 * time.Second
  242. conformanceTests = ingress.CreateIngressComformanceTests(jig, ns, map[string]string{
  243. ingress.NEGAnnotation: `{"ingress": true}`,
  244. })
  245. for _, t := range conformanceTests {
  246. ginkgo.By(t.EntryLog)
  247. t.Execute()
  248. ginkgo.By(t.ExitLog)
  249. jig.WaitForIngress(true)
  250. err := gceController.WaitForNegBackendService(jig.GetServicePorts(false))
  251. framework.ExpectNoError(err)
  252. }
  253. })
  254. ginkgo.It("should be able to switch between IG and NEG modes", func() {
  255. var err error
  256. ginkgo.By("Create a basic HTTP ingress using NEG")
  257. jig.CreateIngress(filepath.Join(ingress.IngressManifestPath, "neg"), ns, map[string]string{}, map[string]string{})
  258. jig.WaitForIngress(true)
  259. err = gceController.WaitForNegBackendService(jig.GetServicePorts(false))
  260. framework.ExpectNoError(err)
  261. ginkgo.By("Switch backend service to use IG")
  262. svcList, err := f.ClientSet.CoreV1().Services(ns).List(metav1.ListOptions{})
  263. framework.ExpectNoError(err)
  264. for _, svc := range svcList.Items {
  265. svc.Annotations[ingress.NEGAnnotation] = `{"ingress": false}`
  266. _, err = f.ClientSet.CoreV1().Services(ns).Update(&svc)
  267. framework.ExpectNoError(err)
  268. }
  269. err = wait.Poll(5*time.Second, framework.LoadBalancerPollTimeout, func() (bool, error) {
  270. if err := gceController.BackendServiceUsingIG(jig.GetServicePorts(false)); err != nil {
  271. e2elog.Logf("ginkgo.Failed to verify IG backend service: %v", err)
  272. return false, nil
  273. }
  274. return true, nil
  275. })
  276. framework.ExpectNoError(err, "Expect backend service to target IG, but failed to observe")
  277. jig.WaitForIngress(true)
  278. ginkgo.By("Switch backend service to use NEG")
  279. svcList, err = f.ClientSet.CoreV1().Services(ns).List(metav1.ListOptions{})
  280. framework.ExpectNoError(err)
  281. for _, svc := range svcList.Items {
  282. svc.Annotations[ingress.NEGAnnotation] = `{"ingress": true}`
  283. _, err = f.ClientSet.CoreV1().Services(ns).Update(&svc)
  284. framework.ExpectNoError(err)
  285. }
  286. err = wait.Poll(5*time.Second, framework.LoadBalancerPollTimeout, func() (bool, error) {
  287. if err := gceController.BackendServiceUsingNEG(jig.GetServicePorts(false)); err != nil {
  288. e2elog.Logf("ginkgo.Failed to verify NEG backend service: %v", err)
  289. return false, nil
  290. }
  291. return true, nil
  292. })
  293. framework.ExpectNoError(err, "Expect backend service to target NEG, but failed to observe")
  294. jig.WaitForIngress(true)
  295. })
  296. ginkgo.It("should be able to create a ClusterIP service", func() {
  297. ginkgo.By("Create a basic HTTP ingress using NEG")
  298. jig.CreateIngress(filepath.Join(ingress.IngressManifestPath, "neg-clusterip"), ns, map[string]string{}, map[string]string{})
  299. jig.WaitForIngress(true)
  300. svcPorts := jig.GetServicePorts(false)
  301. err := gceController.WaitForNegBackendService(svcPorts)
  302. framework.ExpectNoError(err)
  303. // ClusterIP ServicePorts have no NodePort
  304. for _, sp := range svcPorts {
  305. gomega.Expect(sp.NodePort).To(gomega.Equal(int32(0)))
  306. }
  307. })
  308. ginkgo.It("should sync endpoints to NEG", func() {
  309. name := "hostname"
  310. scaleAndValidateNEG := func(num int) {
  311. scale, err := f.ClientSet.AppsV1().Deployments(ns).GetScale(name, metav1.GetOptions{})
  312. framework.ExpectNoError(err)
  313. if scale.Spec.Replicas != int32(num) {
  314. scale.Spec.Replicas = int32(num)
  315. _, err = f.ClientSet.AppsV1().Deployments(ns).UpdateScale(name, scale)
  316. framework.ExpectNoError(err)
  317. }
  318. err = wait.Poll(10*time.Second, negUpdateTimeout, func() (bool, error) {
  319. res, err := jig.GetDistinctResponseFromIngress()
  320. if err != nil {
  321. return false, nil
  322. }
  323. e2elog.Logf("Expecting %d backends, got %d", num, res.Len())
  324. return res.Len() == num, nil
  325. })
  326. framework.ExpectNoError(err)
  327. }
  328. ginkgo.By("Create a basic HTTP ingress using NEG")
  329. jig.CreateIngress(filepath.Join(ingress.IngressManifestPath, "neg"), ns, map[string]string{}, map[string]string{})
  330. jig.WaitForIngress(true)
  331. jig.WaitForIngressToStable()
  332. err := gceController.WaitForNegBackendService(jig.GetServicePorts(false))
  333. framework.ExpectNoError(err)
  334. // initial replicas number is 1
  335. scaleAndValidateNEG(1)
  336. ginkgo.By("Scale up number of backends to 5")
  337. scaleAndValidateNEG(5)
  338. ginkgo.By("Scale down number of backends to 3")
  339. scaleAndValidateNEG(3)
  340. ginkgo.By("Scale up number of backends to 6")
  341. scaleAndValidateNEG(6)
  342. ginkgo.By("Scale down number of backends to 2")
  343. scaleAndValidateNEG(3)
  344. })
  345. ginkgo.It("rolling update backend pods should not cause service disruption", func() {
  346. name := "hostname"
  347. replicas := 8
  348. ginkgo.By("Create a basic HTTP ingress using NEG")
  349. jig.CreateIngress(filepath.Join(ingress.IngressManifestPath, "neg"), ns, map[string]string{}, map[string]string{})
  350. jig.WaitForIngress(true)
  351. jig.WaitForIngressToStable()
  352. err := gceController.WaitForNegBackendService(jig.GetServicePorts(false))
  353. framework.ExpectNoError(err)
  354. ginkgo.By(fmt.Sprintf("Scale backend replicas to %d", replicas))
  355. scale, err := f.ClientSet.AppsV1().Deployments(ns).GetScale(name, metav1.GetOptions{})
  356. framework.ExpectNoError(err)
  357. scale.Spec.Replicas = int32(replicas)
  358. _, err = f.ClientSet.AppsV1().Deployments(ns).UpdateScale(name, scale)
  359. framework.ExpectNoError(err)
  360. err = wait.Poll(10*time.Second, framework.LoadBalancerPollTimeout, func() (bool, error) {
  361. res, err := jig.GetDistinctResponseFromIngress()
  362. if err != nil {
  363. return false, nil
  364. }
  365. return res.Len() == replicas, nil
  366. })
  367. framework.ExpectNoError(err)
  368. ginkgo.By("Trigger rolling update and observe service disruption")
  369. deploy, err := f.ClientSet.AppsV1().Deployments(ns).Get(name, metav1.GetOptions{})
  370. framework.ExpectNoError(err)
  371. // trigger by changing graceful termination period to 60 seconds
  372. gracePeriod := int64(60)
  373. deploy.Spec.Template.Spec.TerminationGracePeriodSeconds = &gracePeriod
  374. _, err = f.ClientSet.AppsV1().Deployments(ns).Update(deploy)
  375. framework.ExpectNoError(err)
  376. err = wait.Poll(10*time.Second, framework.LoadBalancerPollTimeout, func() (bool, error) {
  377. res, err := jig.GetDistinctResponseFromIngress()
  378. framework.ExpectNoError(err)
  379. deploy, err := f.ClientSet.AppsV1().Deployments(ns).Get(name, metav1.GetOptions{})
  380. framework.ExpectNoError(err)
  381. if int(deploy.Status.UpdatedReplicas) == replicas {
  382. if res.Len() == replicas {
  383. return true, nil
  384. }
  385. e2elog.Logf("Expecting %d different responses, but got %d.", replicas, res.Len())
  386. return false, nil
  387. }
  388. e2elog.Logf("Waiting for rolling update to finished. Keep sending traffic.")
  389. return false, nil
  390. })
  391. framework.ExpectNoError(err)
  392. })
  393. ginkgo.It("should sync endpoints for both Ingress-referenced NEG and standalone NEG", func() {
  394. name := "hostname"
  395. expectedKeys := []int32{80, 443}
  396. scaleAndValidateExposedNEG := func(num int) {
  397. scale, err := f.ClientSet.AppsV1().Deployments(ns).GetScale(name, metav1.GetOptions{})
  398. framework.ExpectNoError(err)
  399. if scale.Spec.Replicas != int32(num) {
  400. scale.Spec.Replicas = int32(num)
  401. _, err = f.ClientSet.AppsV1().Deployments(ns).UpdateScale(name, scale)
  402. framework.ExpectNoError(err)
  403. }
  404. err = wait.Poll(10*time.Second, negUpdateTimeout, func() (bool, error) {
  405. svc, err := f.ClientSet.CoreV1().Services(ns).Get(name, metav1.GetOptions{})
  406. framework.ExpectNoError(err)
  407. var status ingress.NegStatus
  408. v, ok := svc.Annotations[ingress.NEGStatusAnnotation]
  409. if !ok {
  410. // Wait for NEG sync loop to find NEGs
  411. e2elog.Logf("Waiting for %v, got: %+v", ingress.NEGStatusAnnotation, svc.Annotations)
  412. return false, nil
  413. }
  414. err = json.Unmarshal([]byte(v), &status)
  415. if err != nil {
  416. e2elog.Logf("Error in parsing Expose NEG annotation: %v", err)
  417. return false, nil
  418. }
  419. e2elog.Logf("Got %v: %v", ingress.NEGStatusAnnotation, v)
  420. // Expect 2 NEGs to be created based on the test setup (neg-exposed)
  421. if len(status.NetworkEndpointGroups) != 2 {
  422. e2elog.Logf("Expected 2 NEGs, got %d", len(status.NetworkEndpointGroups))
  423. return false, nil
  424. }
  425. for _, port := range expectedKeys {
  426. if _, ok := status.NetworkEndpointGroups[port]; !ok {
  427. e2elog.Logf("Expected ServicePort key %v, but does not exist", port)
  428. }
  429. }
  430. if len(status.NetworkEndpointGroups) != len(expectedKeys) {
  431. e2elog.Logf("Expected length of %+v to equal length of %+v, but does not", status.NetworkEndpointGroups, expectedKeys)
  432. }
  433. gceCloud, err := gce.GetGCECloud()
  434. framework.ExpectNoError(err)
  435. for _, neg := range status.NetworkEndpointGroups {
  436. networkEndpoints, err := gceCloud.ListNetworkEndpoints(neg, gceController.Cloud.Zone, false)
  437. framework.ExpectNoError(err)
  438. if len(networkEndpoints) != num {
  439. e2elog.Logf("Expect number of endpoints to be %d, but got %d", num, len(networkEndpoints))
  440. return false, nil
  441. }
  442. }
  443. return true, nil
  444. })
  445. framework.ExpectNoError(err)
  446. }
  447. ginkgo.By("Create a basic HTTP ingress using NEG")
  448. jig.CreateIngress(filepath.Join(ingress.IngressManifestPath, "neg-exposed"), ns, map[string]string{}, map[string]string{})
  449. jig.WaitForIngress(true)
  450. err := gceController.WaitForNegBackendService(jig.GetServicePorts(false))
  451. framework.ExpectNoError(err)
  452. // initial replicas number is 1
  453. scaleAndValidateExposedNEG(1)
  454. ginkgo.By("Scale up number of backends to 5")
  455. scaleAndValidateExposedNEG(5)
  456. ginkgo.By("Scale down number of backends to 3")
  457. scaleAndValidateExposedNEG(3)
  458. ginkgo.By("Scale up number of backends to 6")
  459. scaleAndValidateExposedNEG(6)
  460. ginkgo.By("Scale down number of backends to 2")
  461. scaleAndValidateExposedNEG(3)
  462. })
  463. ginkgo.It("should create NEGs for all ports with the Ingress annotation, and NEGs for the standalone annotation otherwise", func() {
  464. ginkgo.By("Create a basic HTTP ingress using standalone NEG")
  465. jig.CreateIngress(filepath.Join(ingress.IngressManifestPath, "neg-exposed"), ns, map[string]string{}, map[string]string{})
  466. jig.WaitForIngress(true)
  467. name := "hostname"
  468. detectNegAnnotation(f, jig, gceController, ns, name, 2)
  469. // Add Ingress annotation - NEGs should stay the same.
  470. ginkgo.By("Adding NEG Ingress annotation")
  471. svcList, err := f.ClientSet.CoreV1().Services(ns).List(metav1.ListOptions{})
  472. framework.ExpectNoError(err)
  473. for _, svc := range svcList.Items {
  474. svc.Annotations[ingress.NEGAnnotation] = `{"ingress":true,"exposed_ports":{"80":{},"443":{}}}`
  475. _, err = f.ClientSet.CoreV1().Services(ns).Update(&svc)
  476. framework.ExpectNoError(err)
  477. }
  478. detectNegAnnotation(f, jig, gceController, ns, name, 2)
  479. // Modify exposed NEG annotation, but keep ingress annotation
  480. ginkgo.By("Modifying exposed NEG annotation, but keep Ingress annotation")
  481. svcList, err = f.ClientSet.CoreV1().Services(ns).List(metav1.ListOptions{})
  482. framework.ExpectNoError(err)
  483. for _, svc := range svcList.Items {
  484. svc.Annotations[ingress.NEGAnnotation] = `{"ingress":true,"exposed_ports":{"443":{}}}`
  485. _, err = f.ClientSet.CoreV1().Services(ns).Update(&svc)
  486. framework.ExpectNoError(err)
  487. }
  488. detectNegAnnotation(f, jig, gceController, ns, name, 2)
  489. // Remove Ingress annotation. Expect 1 NEG
  490. ginkgo.By("Disabling Ingress annotation, but keeping one standalone NEG")
  491. svcList, err = f.ClientSet.CoreV1().Services(ns).List(metav1.ListOptions{})
  492. framework.ExpectNoError(err)
  493. for _, svc := range svcList.Items {
  494. svc.Annotations[ingress.NEGAnnotation] = `{"ingress":false,"exposed_ports":{"443":{}}}`
  495. _, err = f.ClientSet.CoreV1().Services(ns).Update(&svc)
  496. framework.ExpectNoError(err)
  497. }
  498. detectNegAnnotation(f, jig, gceController, ns, name, 1)
  499. // Remove NEG annotation entirely. Expect 0 NEGs.
  500. ginkgo.By("Removing NEG annotation")
  501. svcList, err = f.ClientSet.CoreV1().Services(ns).List(metav1.ListOptions{})
  502. framework.ExpectNoError(err)
  503. for _, svc := range svcList.Items {
  504. delete(svc.Annotations, ingress.NEGAnnotation)
  505. // Service cannot be ClusterIP if it's using Instance Groups.
  506. svc.Spec.Type = v1.ServiceTypeNodePort
  507. _, err = f.ClientSet.CoreV1().Services(ns).Update(&svc)
  508. framework.ExpectNoError(err)
  509. }
  510. detectNegAnnotation(f, jig, gceController, ns, name, 0)
  511. })
  512. })
  513. ginkgo.Describe("GCE [Slow] [Feature:kubemci]", func() {
  514. var gceController *gce.IngressController
  515. var ipName, ipAddress string
  516. // Platform specific setup
  517. ginkgo.BeforeEach(func() {
  518. framework.SkipUnlessProviderIs("gce", "gke")
  519. jig.Class = ingress.MulticlusterIngressClassValue
  520. jig.PollInterval = 5 * time.Second
  521. ginkgo.By("Initializing gce controller")
  522. gceController = &gce.IngressController{
  523. Ns: ns,
  524. Client: jig.Client,
  525. Cloud: framework.TestContext.CloudConfig,
  526. }
  527. err := gceController.Init()
  528. framework.ExpectNoError(err)
  529. // TODO(https://github.com/GoogleCloudPlatform/k8s-multicluster-ingress/issues/19):
  530. // Kubemci should reserve a static ip if user has not specified one.
  531. ipName = "kubemci-" + string(uuid.NewUUID())
  532. // ip released when the rest of lb resources are deleted in CleanupIngressController
  533. ipAddress = gceController.CreateStaticIP(ipName)
  534. ginkgo.By(fmt.Sprintf("allocated static ip %v: %v through the GCE cloud provider", ipName, ipAddress))
  535. })
  536. // Platform specific cleanup
  537. ginkgo.AfterEach(func() {
  538. if ginkgo.CurrentGinkgoTestDescription().Failed {
  539. framework.DescribeIng(ns)
  540. }
  541. if jig.Ingress == nil {
  542. ginkgo.By("No ingress created, no cleanup necessary")
  543. } else {
  544. ginkgo.By("Deleting ingress")
  545. jig.TryDeleteIngress()
  546. }
  547. ginkgo.By("Cleaning up cloud resources")
  548. err := gceController.CleanupIngressController()
  549. framework.ExpectNoError(err)
  550. })
  551. ginkgo.It("should conform to Ingress spec", func() {
  552. conformanceTests = ingress.CreateIngressComformanceTests(jig, ns, map[string]string{
  553. ingress.IngressStaticIPKey: ipName,
  554. })
  555. for _, t := range conformanceTests {
  556. ginkgo.By(t.EntryLog)
  557. t.Execute()
  558. ginkgo.By(t.ExitLog)
  559. jig.WaitForIngress(false /*waitForNodePort*/)
  560. }
  561. })
  562. ginkgo.It("should create ingress with pre-shared certificate", func() {
  563. executePresharedCertTest(f, jig, ipName)
  564. })
  565. ginkgo.It("should create ingress with backend HTTPS", func() {
  566. executeBacksideBacksideHTTPSTest(f, jig, ipName)
  567. })
  568. ginkgo.It("should support https-only annotation", func() {
  569. executeStaticIPHttpsOnlyTest(f, jig, ipName, ipAddress)
  570. })
  571. ginkgo.It("should remove clusters as expected", func() {
  572. ingAnnotations := map[string]string{
  573. ingress.IngressStaticIPKey: ipName,
  574. }
  575. ingFilePath := filepath.Join(ingress.IngressManifestPath, "http")
  576. jig.CreateIngress(ingFilePath, ns, ingAnnotations, map[string]string{})
  577. jig.WaitForIngress(false /*waitForNodePort*/)
  578. name := jig.Ingress.Name
  579. // Verify that the ingress is spread to 1 cluster as expected.
  580. verifyKubemciStatusHas(name, "is spread across 1 cluster")
  581. // Validate that removing the ingress from all clusters throws an error.
  582. // Reuse the ingress file created while creating the ingress.
  583. filePath := filepath.Join(framework.TestContext.OutputDir, "mci.yaml")
  584. output, err := framework.RunKubemciWithKubeconfig("remove-clusters", name, "--ingress="+filePath)
  585. if err != nil {
  586. framework.Failf("unexpected error in running kubemci remove-clusters command to remove from all clusters: %s", err)
  587. }
  588. if !strings.Contains(output, "You should use kubemci delete to delete the ingress completely") {
  589. framework.Failf("unexpected output in removing an ingress from all clusters, expected the output to include: You should use kubemci delete to delete the ingress completely, actual output: %s", output)
  590. }
  591. // Verify that the ingress is still spread to 1 cluster as expected.
  592. verifyKubemciStatusHas(name, "is spread across 1 cluster")
  593. // remove-clusters should succeed with --force=true
  594. if _, err := framework.RunKubemciWithKubeconfig("remove-clusters", name, "--ingress="+filePath, "--force=true"); err != nil {
  595. framework.Failf("unexpected error in running kubemci remove-clusters to remove from all clusters with --force=true: %s", err)
  596. }
  597. verifyKubemciStatusHas(name, "is spread across 0 cluster")
  598. })
  599. ginkgo.It("single and multi-cluster ingresses should be able to exist together", func() {
  600. ginkgo.By("Creating a single cluster ingress first")
  601. jig.Class = ""
  602. singleIngFilePath := filepath.Join(ingress.GCEIngressManifestPath, "static-ip-2")
  603. jig.CreateIngress(singleIngFilePath, ns, map[string]string{}, map[string]string{})
  604. jig.WaitForIngress(false /*waitForNodePort*/)
  605. // jig.Ingress will be overwritten when we create MCI, so keep a reference.
  606. singleIng := jig.Ingress
  607. // Create the multi-cluster ingress next.
  608. ginkgo.By("Creating a multi-cluster ingress next")
  609. jig.Class = ingress.MulticlusterIngressClassValue
  610. ingAnnotations := map[string]string{
  611. ingress.IngressStaticIPKey: ipName,
  612. }
  613. multiIngFilePath := filepath.Join(ingress.IngressManifestPath, "http")
  614. jig.CreateIngress(multiIngFilePath, ns, ingAnnotations, map[string]string{})
  615. jig.WaitForIngress(false /*waitForNodePort*/)
  616. mciIngress := jig.Ingress
  617. ginkgo.By("Deleting the single cluster ingress and verifying that multi-cluster ingress continues to work")
  618. jig.Ingress = singleIng
  619. jig.Class = ""
  620. jig.TryDeleteIngress()
  621. jig.Ingress = mciIngress
  622. jig.Class = ingress.MulticlusterIngressClassValue
  623. jig.WaitForIngress(false /*waitForNodePort*/)
  624. ginkgo.By("Cleanup: Deleting the multi-cluster ingress")
  625. jig.TryDeleteIngress()
  626. })
  627. })
  628. // Time: borderline 5m, slow by design
  629. ginkgo.Describe("[Slow] Nginx", func() {
  630. var nginxController *ingress.NginxIngressController
  631. ginkgo.BeforeEach(func() {
  632. framework.SkipUnlessProviderIs("gce", "gke")
  633. ginkgo.By("Initializing nginx controller")
  634. jig.Class = "nginx"
  635. nginxController = &ingress.NginxIngressController{Ns: ns, Client: jig.Client}
  636. // TODO: This test may fail on other platforms. We can simply skip it
  637. // but we want to allow easy testing where a user might've hand
  638. // configured firewalls.
  639. if framework.ProviderIs("gce", "gke") {
  640. framework.ExpectNoError(gce.GcloudComputeResourceCreate("firewall-rules", fmt.Sprintf("ingress-80-443-%v", ns), framework.TestContext.CloudConfig.ProjectID, "--allow", "tcp:80,tcp:443", "--network", framework.TestContext.CloudConfig.Network))
  641. } else {
  642. e2elog.Logf("WARNING: Not running on GCE/GKE, cannot create firewall rules for :80, :443. Assuming traffic can reach the external ips of all nodes in cluster on those ports.")
  643. }
  644. nginxController.Init()
  645. })
  646. ginkgo.AfterEach(func() {
  647. if framework.ProviderIs("gce", "gke") {
  648. framework.ExpectNoError(gce.GcloudComputeResourceDelete("firewall-rules", fmt.Sprintf("ingress-80-443-%v", ns), framework.TestContext.CloudConfig.ProjectID))
  649. }
  650. if ginkgo.CurrentGinkgoTestDescription().Failed {
  651. framework.DescribeIng(ns)
  652. }
  653. if jig.Ingress == nil {
  654. ginkgo.By("No ingress created, no cleanup necessary")
  655. return
  656. }
  657. ginkgo.By("Deleting ingress")
  658. jig.TryDeleteIngress()
  659. })
  660. ginkgo.It("should conform to Ingress spec", func() {
  661. // Poll more frequently to reduce e2e completion time.
  662. // This test runs in presubmit.
  663. jig.PollInterval = 5 * time.Second
  664. conformanceTests = ingress.CreateIngressComformanceTests(jig, ns, map[string]string{})
  665. for _, t := range conformanceTests {
  666. ginkgo.By(t.EntryLog)
  667. t.Execute()
  668. ginkgo.By(t.ExitLog)
  669. jig.WaitForIngress(false)
  670. }
  671. })
  672. })
  673. })
  674. // verifyKubemciStatusHas fails if kubemci get-status output for the given mci does not have the given expectedSubStr.
  675. func verifyKubemciStatusHas(name, expectedSubStr string) {
  676. statusStr, err := framework.RunKubemciCmd("get-status", name)
  677. if err != nil {
  678. framework.Failf("unexpected error in running kubemci get-status %s: %s", name, err)
  679. }
  680. if !strings.Contains(statusStr, expectedSubStr) {
  681. framework.Failf("expected status to have sub string %s, actual status: %s", expectedSubStr, statusStr)
  682. }
  683. }
  684. func executePresharedCertTest(f *framework.Framework, jig *ingress.TestJig, staticIPName string) {
  685. preSharedCertName := "test-pre-shared-cert"
  686. ginkgo.By(fmt.Sprintf("Creating ssl certificate %q on GCE", preSharedCertName))
  687. testHostname := "test.ingress.com"
  688. cert, key, err := ingress.GenerateRSACerts(testHostname, true)
  689. framework.ExpectNoError(err)
  690. gceCloud, err := gce.GetGCECloud()
  691. framework.ExpectNoError(err)
  692. defer func() {
  693. // We would not be able to delete the cert until ingress controller
  694. // cleans up the target proxy that references it.
  695. ginkgo.By("Deleting ingress before deleting ssl certificate")
  696. if jig.Ingress != nil {
  697. jig.TryDeleteIngress()
  698. }
  699. ginkgo.By(fmt.Sprintf("Deleting ssl certificate %q on GCE", preSharedCertName))
  700. err := wait.Poll(framework.LoadBalancerPollInterval, framework.LoadBalancerCleanupTimeout, func() (bool, error) {
  701. if err := gceCloud.DeleteSslCertificate(preSharedCertName); err != nil && !errors.IsNotFound(err) {
  702. e2elog.Logf("ginkgo.Failed to delete ssl certificate %q: %v. Retrying...", preSharedCertName, err)
  703. return false, nil
  704. }
  705. return true, nil
  706. })
  707. framework.ExpectNoError(err, fmt.Sprintf("ginkgo.Failed to delete ssl certificate %q: %v", preSharedCertName, err))
  708. }()
  709. _, err = gceCloud.CreateSslCertificate(&compute.SslCertificate{
  710. Name: preSharedCertName,
  711. Certificate: string(cert),
  712. PrivateKey: string(key),
  713. Description: "pre-shared cert for ingress testing",
  714. })
  715. framework.ExpectNoError(err, fmt.Sprintf("ginkgo.Failed to create ssl certificate %q: %v", preSharedCertName, err))
  716. ginkgo.By("Creating an ingress referencing the pre-shared certificate")
  717. // Create an ingress referencing this cert using pre-shared-cert annotation.
  718. ingAnnotations := map[string]string{
  719. ingress.IngressPreSharedCertKey: preSharedCertName,
  720. // Disallow HTTP to save resources. This is irrelevant to the
  721. // pre-shared cert test.
  722. ingress.IngressAllowHTTPKey: "false",
  723. }
  724. if staticIPName != "" {
  725. ingAnnotations[ingress.IngressStaticIPKey] = staticIPName
  726. }
  727. jig.CreateIngress(filepath.Join(ingress.IngressManifestPath, "pre-shared-cert"), f.Namespace.Name, ingAnnotations, map[string]string{})
  728. ginkgo.By("Test that ingress works with the pre-shared certificate")
  729. err = jig.WaitForIngressWithCert(true, []string{testHostname}, cert)
  730. framework.ExpectNoError(err, fmt.Sprintf("Unexpected error while waiting for ingress: %v", err))
  731. }
  732. func executeStaticIPHttpsOnlyTest(f *framework.Framework, jig *ingress.TestJig, ipName, ip string) {
  733. jig.CreateIngress(filepath.Join(ingress.IngressManifestPath, "static-ip"), f.Namespace.Name, map[string]string{
  734. ingress.IngressStaticIPKey: ipName,
  735. ingress.IngressAllowHTTPKey: "false",
  736. }, map[string]string{})
  737. ginkgo.By("waiting for Ingress to come up with ip: " + ip)
  738. httpClient := ingress.BuildInsecureClient(ingress.IngressReqTimeout)
  739. framework.ExpectNoError(framework.PollURL(fmt.Sprintf("https://%s/", ip), "", framework.LoadBalancerPollTimeout, jig.PollInterval, httpClient, false))
  740. ginkgo.By("should reject HTTP traffic")
  741. framework.ExpectNoError(framework.PollURL(fmt.Sprintf("http://%s/", ip), "", framework.LoadBalancerPollTimeout, jig.PollInterval, httpClient, true))
  742. }
  743. func executeBacksideBacksideHTTPSTest(f *framework.Framework, jig *ingress.TestJig, staticIPName string) {
  744. ginkgo.By("Creating a set of ingress, service and deployment that have backside re-encryption configured")
  745. deployCreated, svcCreated, ingCreated, err := jig.SetUpBacksideHTTPSIngress(f.ClientSet, f.Namespace.Name, staticIPName)
  746. defer func() {
  747. ginkgo.By("Cleaning up re-encryption ingress, service and deployment")
  748. if errs := jig.DeleteTestResource(f.ClientSet, deployCreated, svcCreated, ingCreated); len(errs) > 0 {
  749. framework.Failf("ginkgo.Failed to cleanup re-encryption ingress: %v", errs)
  750. }
  751. }()
  752. framework.ExpectNoError(err, "ginkgo.Failed to create re-encryption ingress")
  753. ginkgo.By(fmt.Sprintf("Waiting for ingress %s to come up", ingCreated.Name))
  754. ingIP, err := jig.WaitForIngressAddress(f.ClientSet, f.Namespace.Name, ingCreated.Name, framework.LoadBalancerPollTimeout)
  755. framework.ExpectNoError(err, "ginkgo.Failed to wait for ingress IP")
  756. ginkgo.By(fmt.Sprintf("Polling on address %s and verify the backend is serving HTTPS", ingIP))
  757. timeoutClient := &http.Client{Timeout: ingress.IngressReqTimeout}
  758. err = wait.PollImmediate(framework.LoadBalancerPollInterval, framework.LoadBalancerPollTimeout, func() (bool, error) {
  759. resp, err := framework.SimpleGET(timeoutClient, fmt.Sprintf("http://%s", ingIP), "")
  760. if err != nil {
  761. e2elog.Logf("SimpleGET failed: %v", err)
  762. return false, nil
  763. }
  764. if !strings.Contains(resp, "request_scheme=https") {
  765. return false, fmt.Errorf("request wasn't served by HTTPS, response body: %s", resp)
  766. }
  767. e2elog.Logf("Poll succeeded, request was served by HTTPS")
  768. return true, nil
  769. })
  770. framework.ExpectNoError(err, "ginkgo.Failed to verify backside re-encryption ingress")
  771. }
  772. func detectNegAnnotation(f *framework.Framework, jig *ingress.TestJig, gceController *gce.IngressController, ns, name string, negs int) {
  773. if err := wait.Poll(5*time.Second, negUpdateTimeout, func() (bool, error) {
  774. svc, err := f.ClientSet.CoreV1().Services(ns).Get(name, metav1.GetOptions{})
  775. if err != nil {
  776. return false, nil
  777. }
  778. // if we expect no NEGs, then we should be using IGs
  779. if negs == 0 {
  780. err := gceController.BackendServiceUsingIG(jig.GetServicePorts(false))
  781. if err != nil {
  782. e2elog.Logf("ginkgo.Failed to validate IG backend service: %v", err)
  783. return false, nil
  784. }
  785. return true, nil
  786. }
  787. var status ingress.NegStatus
  788. v, ok := svc.Annotations[ingress.NEGStatusAnnotation]
  789. if !ok {
  790. e2elog.Logf("Waiting for %v, got: %+v", ingress.NEGStatusAnnotation, svc.Annotations)
  791. return false, nil
  792. }
  793. err = json.Unmarshal([]byte(v), &status)
  794. if err != nil {
  795. e2elog.Logf("Error in parsing Expose NEG annotation: %v", err)
  796. return false, nil
  797. }
  798. e2elog.Logf("Got %v: %v", ingress.NEGStatusAnnotation, v)
  799. if len(status.NetworkEndpointGroups) != negs {
  800. e2elog.Logf("Expected %d NEGs, got %d", negs, len(status.NetworkEndpointGroups))
  801. return false, nil
  802. }
  803. gceCloud, err := gce.GetGCECloud()
  804. framework.ExpectNoError(err)
  805. for _, neg := range status.NetworkEndpointGroups {
  806. networkEndpoints, err := gceCloud.ListNetworkEndpoints(neg, gceController.Cloud.Zone, false)
  807. framework.ExpectNoError(err)
  808. if len(networkEndpoints) != 1 {
  809. e2elog.Logf("Expect NEG %s to exist, but got %d", neg, len(networkEndpoints))
  810. return false, nil
  811. }
  812. }
  813. err = gceController.BackendServiceUsingNEG(jig.GetServicePorts(false))
  814. if err != nil {
  815. e2elog.Logf("ginkgo.Failed to validate NEG backend service: %v", err)
  816. return false, nil
  817. }
  818. return true, nil
  819. }); err != nil {
  820. framework.ExpectNoError(err)
  821. }
  822. }