gce.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397
  1. /*
  2. Copyright 2018 The Kubernetes Authors.
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package gce
  14. import (
  15. "fmt"
  16. "net/http"
  17. "os/exec"
  18. "regexp"
  19. "strings"
  20. "time"
  21. compute "google.golang.org/api/compute/v1"
  22. "google.golang.org/api/googleapi"
  23. "k8s.io/api/core/v1"
  24. metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
  25. "k8s.io/apimachinery/pkg/util/uuid"
  26. "k8s.io/apimachinery/pkg/util/wait"
  27. clientset "k8s.io/client-go/kubernetes"
  28. "k8s.io/kubernetes/test/e2e/framework"
  29. e2elog "k8s.io/kubernetes/test/e2e/framework/log"
  30. gcecloud "k8s.io/legacy-cloud-providers/gce"
  31. )
  32. func init() {
  33. framework.RegisterProvider("gce", factory)
  34. framework.RegisterProvider("gke", factory)
  35. }
  36. func factory() (framework.ProviderInterface, error) {
  37. e2elog.Logf("Fetching cloud provider for %q\r", framework.TestContext.Provider)
  38. zone := framework.TestContext.CloudConfig.Zone
  39. region := framework.TestContext.CloudConfig.Region
  40. var err error
  41. if region == "" {
  42. region, err = gcecloud.GetGCERegion(zone)
  43. if err != nil {
  44. return nil, fmt.Errorf("error parsing GCE/GKE region from zone %q: %v", zone, err)
  45. }
  46. }
  47. managedZones := []string{} // Manage all zones in the region
  48. if !framework.TestContext.CloudConfig.MultiZone {
  49. managedZones = []string{zone}
  50. }
  51. gceCloud, err := gcecloud.CreateGCECloud(&gcecloud.CloudConfig{
  52. APIEndpoint: framework.TestContext.CloudConfig.APIEndpoint,
  53. ProjectID: framework.TestContext.CloudConfig.ProjectID,
  54. Region: region,
  55. Zone: zone,
  56. ManagedZones: managedZones,
  57. NetworkName: "", // TODO: Change this to use framework.TestContext.CloudConfig.Network?
  58. SubnetworkName: "",
  59. NodeTags: nil,
  60. NodeInstancePrefix: "",
  61. TokenSource: nil,
  62. UseMetadataServer: false,
  63. AlphaFeatureGate: gcecloud.NewAlphaFeatureGate([]string{}),
  64. })
  65. if err != nil {
  66. return nil, fmt.Errorf("Error building GCE/GKE provider: %v", err)
  67. }
  68. // Arbitrarily pick one of the zones we have nodes in
  69. if framework.TestContext.CloudConfig.Zone == "" && framework.TestContext.CloudConfig.MultiZone {
  70. zones, err := gceCloud.GetAllZonesFromCloudProvider()
  71. if err != nil {
  72. return nil, err
  73. }
  74. framework.TestContext.CloudConfig.Zone, _ = zones.PopAny()
  75. }
  76. return NewProvider(gceCloud), nil
  77. }
  78. // NewProvider returns a cloud provider interface for GCE
  79. func NewProvider(gceCloud *gcecloud.Cloud) framework.ProviderInterface {
  80. return &Provider{
  81. gceCloud: gceCloud,
  82. }
  83. }
  84. // Provider is a structure to handle GCE clouds for e2e testing
  85. type Provider struct {
  86. framework.NullProvider
  87. gceCloud *gcecloud.Cloud
  88. }
  89. // ResizeGroup resizes an instance group
  90. func (p *Provider) ResizeGroup(group string, size int32) error {
  91. // TODO: make this hit the compute API directly instead of shelling out to gcloud.
  92. // TODO: make gce/gke implement InstanceGroups, so we can eliminate the per-provider logic
  93. zone, err := getGCEZoneForGroup(group)
  94. if err != nil {
  95. return err
  96. }
  97. output, err := exec.Command("gcloud", "compute", "instance-groups", "managed", "resize",
  98. group, fmt.Sprintf("--size=%v", size),
  99. "--project="+framework.TestContext.CloudConfig.ProjectID, "--zone="+zone).CombinedOutput()
  100. if err != nil {
  101. return fmt.Errorf("Failed to resize node instance group %s: %s", group, output)
  102. }
  103. return nil
  104. }
  105. // GetGroupNodes returns a node name for the specified node group
  106. func (p *Provider) GetGroupNodes(group string) ([]string, error) {
  107. // TODO: make this hit the compute API directly instead of shelling out to gcloud.
  108. // TODO: make gce/gke implement InstanceGroups, so we can eliminate the per-provider logic
  109. zone, err := getGCEZoneForGroup(group)
  110. if err != nil {
  111. return nil, err
  112. }
  113. output, err := exec.Command("gcloud", "compute", "instance-groups", "managed",
  114. "list-instances", group, "--project="+framework.TestContext.CloudConfig.ProjectID,
  115. "--zone="+zone).CombinedOutput()
  116. if err != nil {
  117. return nil, fmt.Errorf("Failed to get nodes in instance group %s: %s", group, output)
  118. }
  119. re := regexp.MustCompile(".*RUNNING")
  120. lines := re.FindAllString(string(output), -1)
  121. for i, line := range lines {
  122. lines[i] = line[:strings.Index(line, " ")]
  123. }
  124. return lines, nil
  125. }
  126. // GroupSize returns the size of an instance group
  127. func (p *Provider) GroupSize(group string) (int, error) {
  128. // TODO: make this hit the compute API directly instead of shelling out to gcloud.
  129. // TODO: make gce/gke implement InstanceGroups, so we can eliminate the per-provider logic
  130. zone, err := getGCEZoneForGroup(group)
  131. if err != nil {
  132. return -1, err
  133. }
  134. output, err := exec.Command("gcloud", "compute", "instance-groups", "managed",
  135. "list-instances", group, "--project="+framework.TestContext.CloudConfig.ProjectID,
  136. "--zone="+zone).CombinedOutput()
  137. if err != nil {
  138. return -1, fmt.Errorf("Failed to get group size for group %s: %s", group, output)
  139. }
  140. re := regexp.MustCompile("RUNNING")
  141. return len(re.FindAllString(string(output), -1)), nil
  142. }
  143. // EnsureLoadBalancerResourcesDeleted ensures that cloud load balancer resources that were created
  144. func (p *Provider) EnsureLoadBalancerResourcesDeleted(ip, portRange string) error {
  145. project := framework.TestContext.CloudConfig.ProjectID
  146. region, err := gcecloud.GetGCERegion(framework.TestContext.CloudConfig.Zone)
  147. if err != nil {
  148. return fmt.Errorf("could not get region for zone %q: %v", framework.TestContext.CloudConfig.Zone, err)
  149. }
  150. return wait.Poll(10*time.Second, 5*time.Minute, func() (bool, error) {
  151. service := p.gceCloud.ComputeServices().GA
  152. list, err := service.ForwardingRules.List(project, region).Do()
  153. if err != nil {
  154. return false, err
  155. }
  156. for _, item := range list.Items {
  157. if item.PortRange == portRange && item.IPAddress == ip {
  158. e2elog.Logf("found a load balancer: %v", item)
  159. return false, nil
  160. }
  161. }
  162. return true, nil
  163. })
  164. }
  165. func getGCEZoneForGroup(group string) (string, error) {
  166. output, err := exec.Command("gcloud", "compute", "instance-groups", "managed", "list",
  167. "--project="+framework.TestContext.CloudConfig.ProjectID, "--format=value(zone)", "--filter=name="+group).CombinedOutput()
  168. if err != nil {
  169. return "", fmt.Errorf("Failed to get zone for node group %s: %s", group, output)
  170. }
  171. return strings.TrimSpace(string(output)), nil
  172. }
  173. // DeleteNode deletes a node which is specified as the argument
  174. func (p *Provider) DeleteNode(node *v1.Node) error {
  175. zone := framework.TestContext.CloudConfig.Zone
  176. project := framework.TestContext.CloudConfig.ProjectID
  177. return p.gceCloud.DeleteInstance(project, zone, node.Name)
  178. }
  179. // CreatePD creates a persistent volume
  180. func (p *Provider) CreatePD(zone string) (string, error) {
  181. pdName := fmt.Sprintf("%s-%s", framework.TestContext.Prefix, string(uuid.NewUUID()))
  182. if zone == "" && framework.TestContext.CloudConfig.MultiZone {
  183. zones, err := p.gceCloud.GetAllZonesFromCloudProvider()
  184. if err != nil {
  185. return "", err
  186. }
  187. zone, _ = zones.PopAny()
  188. }
  189. tags := map[string]string{}
  190. if err := p.gceCloud.CreateDisk(pdName, gcecloud.DiskTypeStandard, zone, 2 /* sizeGb */, tags); err != nil {
  191. return "", err
  192. }
  193. return pdName, nil
  194. }
  195. // DeletePD deletes a persistent volume
  196. func (p *Provider) DeletePD(pdName string) error {
  197. err := p.gceCloud.DeleteDisk(pdName)
  198. if err != nil {
  199. if gerr, ok := err.(*googleapi.Error); ok && len(gerr.Errors) > 0 && gerr.Errors[0].Reason == "notFound" {
  200. // PD already exists, ignore error.
  201. return nil
  202. }
  203. e2elog.Logf("error deleting PD %q: %v", pdName, err)
  204. }
  205. return err
  206. }
  207. // CreatePVSource creates a persistent volume source
  208. func (p *Provider) CreatePVSource(zone, diskName string) (*v1.PersistentVolumeSource, error) {
  209. return &v1.PersistentVolumeSource{
  210. GCEPersistentDisk: &v1.GCEPersistentDiskVolumeSource{
  211. PDName: diskName,
  212. FSType: "ext3",
  213. ReadOnly: false,
  214. },
  215. }, nil
  216. }
  217. // DeletePVSource deletes a persistent volume source
  218. func (p *Provider) DeletePVSource(pvSource *v1.PersistentVolumeSource) error {
  219. return framework.DeletePDWithRetry(pvSource.GCEPersistentDisk.PDName)
  220. }
  221. // CleanupServiceResources cleans up GCE Service Type=LoadBalancer resources with
  222. // the given name. The name is usually the UUID of the Service prefixed with an
  223. // alpha-numeric character ('a') to work around cloudprovider rules.
  224. func (p *Provider) CleanupServiceResources(c clientset.Interface, loadBalancerName, region, zone string) {
  225. if pollErr := wait.Poll(5*time.Second, framework.LoadBalancerCleanupTimeout, func() (bool, error) {
  226. if err := p.cleanupGCEResources(c, loadBalancerName, region, zone); err != nil {
  227. e2elog.Logf("Still waiting for glbc to cleanup: %v", err)
  228. return false, nil
  229. }
  230. return true, nil
  231. }); pollErr != nil {
  232. framework.Failf("Failed to cleanup service GCE resources.")
  233. }
  234. }
  235. func (p *Provider) cleanupGCEResources(c clientset.Interface, loadBalancerName, region, zone string) (retErr error) {
  236. if region == "" {
  237. // Attempt to parse region from zone if no region is given.
  238. var err error
  239. region, err = gcecloud.GetGCERegion(zone)
  240. if err != nil {
  241. return fmt.Errorf("error parsing GCE/GKE region from zone %q: %v", zone, err)
  242. }
  243. }
  244. if err := p.gceCloud.DeleteFirewall(gcecloud.MakeFirewallName(loadBalancerName)); err != nil &&
  245. !IsGoogleAPIHTTPErrorCode(err, http.StatusNotFound) {
  246. retErr = err
  247. }
  248. if err := p.gceCloud.DeleteRegionForwardingRule(loadBalancerName, region); err != nil &&
  249. !IsGoogleAPIHTTPErrorCode(err, http.StatusNotFound) {
  250. retErr = fmt.Errorf("%v\n%v", retErr, err)
  251. }
  252. if err := p.gceCloud.DeleteRegionAddress(loadBalancerName, region); err != nil &&
  253. !IsGoogleAPIHTTPErrorCode(err, http.StatusNotFound) {
  254. retErr = fmt.Errorf("%v\n%v", retErr, err)
  255. }
  256. clusterID, err := GetClusterID(c)
  257. if err != nil {
  258. retErr = fmt.Errorf("%v\n%v", retErr, err)
  259. return
  260. }
  261. hcNames := []string{gcecloud.MakeNodesHealthCheckName(clusterID)}
  262. hc, getErr := p.gceCloud.GetHTTPHealthCheck(loadBalancerName)
  263. if getErr != nil && !IsGoogleAPIHTTPErrorCode(getErr, http.StatusNotFound) {
  264. retErr = fmt.Errorf("%v\n%v", retErr, getErr)
  265. return
  266. }
  267. if hc != nil {
  268. hcNames = append(hcNames, hc.Name)
  269. }
  270. if err := p.gceCloud.DeleteExternalTargetPoolAndChecks(&v1.Service{}, loadBalancerName, region, clusterID, hcNames...); err != nil &&
  271. !IsGoogleAPIHTTPErrorCode(err, http.StatusNotFound) {
  272. retErr = fmt.Errorf("%v\n%v", retErr, err)
  273. }
  274. return
  275. }
  276. // LoadBalancerSrcRanges contains the ranges of ips used by the GCE load balancers (l4 & L7)
  277. // for proxying client requests and performing health checks.
  278. func (p *Provider) LoadBalancerSrcRanges() []string {
  279. return gcecloud.LoadBalancerSrcRanges()
  280. }
  281. // EnableAndDisableInternalLB returns functions for both enabling and disabling internal Load Balancer
  282. func (p *Provider) EnableAndDisableInternalLB() (enable, disable func(svc *v1.Service)) {
  283. enable = func(svc *v1.Service) {
  284. svc.ObjectMeta.Annotations = map[string]string{gcecloud.ServiceAnnotationLoadBalancerType: string(gcecloud.LBTypeInternal)}
  285. }
  286. disable = func(svc *v1.Service) {
  287. delete(svc.ObjectMeta.Annotations, gcecloud.ServiceAnnotationLoadBalancerType)
  288. }
  289. return
  290. }
  291. // GetInstanceTags gets tags from GCE instance with given name.
  292. func GetInstanceTags(cloudConfig framework.CloudConfig, instanceName string) *compute.Tags {
  293. gceCloud := cloudConfig.Provider.(*Provider).gceCloud
  294. res, err := gceCloud.ComputeServices().GA.Instances.Get(cloudConfig.ProjectID, cloudConfig.Zone,
  295. instanceName).Do()
  296. if err != nil {
  297. framework.Failf("Failed to get instance tags for %v: %v", instanceName, err)
  298. }
  299. return res.Tags
  300. }
  301. // SetInstanceTags sets tags on GCE instance with given name.
  302. func SetInstanceTags(cloudConfig framework.CloudConfig, instanceName, zone string, tags []string) []string {
  303. gceCloud := cloudConfig.Provider.(*Provider).gceCloud
  304. // Re-get instance everytime because we need the latest fingerprint for updating metadata
  305. resTags := GetInstanceTags(cloudConfig, instanceName)
  306. _, err := gceCloud.ComputeServices().GA.Instances.SetTags(
  307. cloudConfig.ProjectID, zone, instanceName,
  308. &compute.Tags{Fingerprint: resTags.Fingerprint, Items: tags}).Do()
  309. if err != nil {
  310. framework.Failf("failed to set instance tags: %v", err)
  311. }
  312. e2elog.Logf("Sent request to set tags %v on instance: %v", tags, instanceName)
  313. return resTags.Items
  314. }
  315. // GetNodeTags gets k8s node tag from one of the nodes
  316. func GetNodeTags(c clientset.Interface, cloudConfig framework.CloudConfig) []string {
  317. nodes := framework.GetReadySchedulableNodesOrDie(c)
  318. if len(nodes.Items) == 0 {
  319. e2elog.Logf("GetNodeTags: Found 0 node.")
  320. return []string{}
  321. }
  322. return GetInstanceTags(cloudConfig, nodes.Items[0].Name).Items
  323. }
  324. // IsGoogleAPIHTTPErrorCode returns true if the error is a google api
  325. // error matching the corresponding HTTP error code.
  326. func IsGoogleAPIHTTPErrorCode(err error, code int) bool {
  327. apiErr, ok := err.(*googleapi.Error)
  328. return ok && apiErr.Code == code
  329. }
  330. // GetGCECloud returns GCE cloud provider
  331. func GetGCECloud() (*gcecloud.Cloud, error) {
  332. p, ok := framework.TestContext.CloudConfig.Provider.(*Provider)
  333. if !ok {
  334. return nil, fmt.Errorf("failed to convert CloudConfig.Provider to GCE provider: %#v", framework.TestContext.CloudConfig.Provider)
  335. }
  336. return p.gceCloud, nil
  337. }
  338. // GetClusterID returns cluster ID
  339. func GetClusterID(c clientset.Interface) (string, error) {
  340. cm, err := c.CoreV1().ConfigMaps(metav1.NamespaceSystem).Get(gcecloud.UIDConfigMapName, metav1.GetOptions{})
  341. if err != nil || cm == nil {
  342. return "", fmt.Errorf("error getting cluster ID: %v", err)
  343. }
  344. clusterID, clusterIDExists := cm.Data[gcecloud.UIDCluster]
  345. providerID, providerIDExists := cm.Data[gcecloud.UIDProvider]
  346. if !clusterIDExists {
  347. return "", fmt.Errorf("cluster ID not set")
  348. }
  349. if providerIDExists {
  350. return providerID, nil
  351. }
  352. return clusterID, nil
  353. }