| #!/usr/bin/env bash |
| |
| # Copyright 2014 The Kubernetes Authors. |
| # |
| # Licensed under the Apache License, Version 2.0 (the "License"); |
| # you may not use this file except in compliance with the License. |
| # You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| |
| # This command checks that the built commands can function together for |
| # simple scenarios. It does not require Docker. |
| |
| set -o errexit |
| set -o nounset |
| set -o pipefail |
| |
| KUBE_ROOT=$(dirname "${BASH_SOURCE}")/../.. |
| source "${KUBE_ROOT}/hack/lib/init.sh" |
| source "${KUBE_ROOT}/hack/lib/test.sh" |
| source "${KUBE_ROOT}/test/cmd/legacy-script.sh" |
| |
| function run_kube_apiserver() { |
| kube::log::status "Building kube-apiserver" |
| make -C "${KUBE_ROOT}" WHAT="cmd/kube-apiserver" |
| |
| # Start kube-apiserver |
| kube::log::status "Starting kube-apiserver" |
| |
| # Admission Controllers to invoke prior to persisting objects in cluster |
| ENABLE_ADMISSION_PLUGINS="LimitRanger,ResourceQuota" |
| DISABLE_ADMISSION_PLUGINS="ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook" |
| |
| # Include RBAC (to exercise bootstrapping), and AlwaysAllow to allow all actions |
| AUTHORIZATION_MODE="RBAC,AlwaysAllow" |
| |
| # Enable features |
| ENABLE_FEATURE_GATES="DryRun=true" |
| |
| "${KUBE_OUTPUT_HOSTBIN}/kube-apiserver" \ |
| --insecure-bind-address="127.0.0.1" \ |
| --bind-address="127.0.0.1" \ |
| --insecure-port="${API_PORT}" \ |
| --authorization-mode="${AUTHORIZATION_MODE}" \ |
| --secure-port="${SECURE_API_PORT}" \ |
| --feature-gates="${ENABLE_FEATURE_GATES}" \ |
| --enable-admission-plugins="${ENABLE_ADMISSION_PLUGINS}" \ |
| --disable-admission-plugins="${DISABLE_ADMISSION_PLUGINS}" \ |
| --etcd-servers="http://${ETCD_HOST}:${ETCD_PORT}" \ |
| --runtime-config=api/v1 \ |
| --storage-media-type="${KUBE_TEST_API_STORAGE_TYPE-}" \ |
| --cert-dir="${TMPDIR:-/tmp/}" \ |
| --service-cluster-ip-range="10.0.0.0/24" \ |
| --token-auth-file=hack/testdata/auth-tokens.csv 1>&2 & |
| APISERVER_PID=$! |
| |
| kube::util::wait_for_url "http://127.0.0.1:${API_PORT}/healthz" "apiserver" |
| } |
| |
| function run_kube_controller_manager() { |
| kube::log::status "Building kube-controller-manager" |
| make -C "${KUBE_ROOT}" WHAT="cmd/kube-controller-manager" |
| |
| # Start controller manager |
| kube::log::status "Starting controller-manager" |
| "${KUBE_OUTPUT_HOSTBIN}/kube-controller-manager" \ |
| --port="${CTLRMGR_PORT}" \ |
| --kube-api-content-type="${KUBE_TEST_API_TYPE-}" \ |
| --master="127.0.0.1:${API_PORT}" 1>&2 & |
| CTLRMGR_PID=$! |
| |
| kube::util::wait_for_url "http://127.0.0.1:${CTLRMGR_PORT}/healthz" "controller-manager" |
| } |
| |
| # Creates a node object with name 127.0.0.1. This is required because we do not |
| # run kubelet. |
| function create_node() { |
| kubectl create -f - -s "http://127.0.0.1:${API_PORT}" << __EOF__ |
| { |
| "kind": "Node", |
| "apiVersion": "v1", |
| "metadata": { |
| "name": "127.0.0.1" |
| }, |
| "status": { |
| "capacity": { |
| "memory": "1Gi" |
| } |
| } |
| } |
| __EOF__ |
| } |
| |
| kube::log::status "Running kubectl tests for kube-apiserver" |
| |
| setup |
| run_kube_apiserver |
| run_kube_controller_manager |
| create_node |
| SUPPORTED_RESOURCES=("*") |
| # WARNING: Do not wrap this call in a subshell to capture output, e.g. output=$(runTests) |
| # Doing so will suppress errexit behavior inside runTests |
| runTests |
| |
| kube::log::status "TESTS PASSED" |