mirror of
https://github.com/ceph/ceph-csi.git
synced 2025-06-14 18:53:35 +00:00
vendor update for CSI 0.3.0
This commit is contained in:
47
vendor/k8s.io/kubernetes/test/e2e/upgrades/ingress.go
generated
vendored
47
vendor/k8s.io/kubernetes/test/e2e/upgrades/ingress.go
generated
vendored
@ -29,6 +29,7 @@ import (
|
||||
compute "google.golang.org/api/compute/v1"
|
||||
extensions "k8s.io/api/extensions/v1beta1"
|
||||
"k8s.io/apimachinery/pkg/util/wait"
|
||||
"k8s.io/kubernetes/pkg/util/version"
|
||||
"k8s.io/kubernetes/test/e2e/framework"
|
||||
)
|
||||
|
||||
@ -45,6 +46,7 @@ type IngressUpgradeTest struct {
|
||||
httpClient *http.Client
|
||||
ip string
|
||||
ipName string
|
||||
skipSSLCheck bool
|
||||
}
|
||||
|
||||
// GCPResourceStore keeps track of the GCP resources spun up by an ingress.
|
||||
@ -97,7 +99,7 @@ func (t *IngressUpgradeTest) Setup(f *framework.Framework) {
|
||||
framework.IngressStaticIPKey: t.ipName,
|
||||
framework.IngressAllowHTTPKey: "false",
|
||||
}, map[string]string{})
|
||||
t.jig.AddHTTPS("tls-secret", "ingress.test.com")
|
||||
t.jig.SetHTTPS("tls-secret", "ingress.test.com")
|
||||
|
||||
By("waiting for Ingress to come up with ip: " + t.ip)
|
||||
framework.ExpectNoError(framework.PollURL(fmt.Sprintf("https://%v/%v", t.ip, path), host, framework.LoadBalancerPollTimeout, t.jig.PollInterval, t.httpClient, false))
|
||||
@ -145,6 +147,26 @@ func (t *IngressUpgradeTest) Teardown(f *framework.Framework) {
|
||||
framework.ExpectNoError(t.gceController.CleanupGCEIngressController())
|
||||
}
|
||||
|
||||
// Skip checks if the test or part of the test should be skipped.
|
||||
func (t *IngressUpgradeTest) Skip(upgCtx UpgradeContext) bool {
|
||||
sslNameChangeVersion, err := version.ParseGeneric("v1.10.0")
|
||||
framework.ExpectNoError(err)
|
||||
var hasVersionBelow, hasVersionAboveOrEqual bool
|
||||
for _, v := range upgCtx.Versions {
|
||||
if v.Version.LessThan(sslNameChangeVersion) {
|
||||
hasVersionBelow = true
|
||||
continue
|
||||
}
|
||||
hasVersionAboveOrEqual = true
|
||||
}
|
||||
// Skip SSL certificates check if k8s version changes between 1.10-
|
||||
// and 1.10+ because the naming scheme has changed.
|
||||
if hasVersionBelow && hasVersionAboveOrEqual {
|
||||
t.skipSSLCheck = true
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
func (t *IngressUpgradeTest) verify(f *framework.Framework, done <-chan struct{}, testDuringDisruption bool) {
|
||||
if testDuringDisruption {
|
||||
By("continuously hitting the Ingress IP")
|
||||
@ -177,13 +199,22 @@ func (t *IngressUpgradeTest) verify(f *framework.Framework, done <-chan struct{}
|
||||
postUpgradeResourceStore := &GCPResourceStore{}
|
||||
t.populateGCPResourceStore(postUpgradeResourceStore)
|
||||
|
||||
// Ignore certain fields in compute.Firewall that we know will change
|
||||
// due to the upgrade/downgrade.
|
||||
// TODO(rramkumar): Remove this once glbc 0.9.8 is released.
|
||||
t.resourceStore.Fw.Allowed = nil
|
||||
t.resourceStore.Fw.SourceRanges = nil
|
||||
postUpgradeResourceStore.Fw.Allowed = nil
|
||||
postUpgradeResourceStore.Fw.SourceRanges = nil
|
||||
// Stub out the number of instances as that is out of Ingress controller's control.
|
||||
for _, ig := range t.resourceStore.IgList {
|
||||
ig.Size = 0
|
||||
}
|
||||
for _, ig := range postUpgradeResourceStore.IgList {
|
||||
ig.Size = 0
|
||||
}
|
||||
// Stub out compute.SslCertificates in case we know it will change during an upgrade/downgrade.
|
||||
if t.skipSSLCheck {
|
||||
t.resourceStore.SslList = nil
|
||||
postUpgradeResourceStore.SslList = nil
|
||||
}
|
||||
|
||||
// TODO(rramkumar): Remove this when GLBC v1.2.0 is released.
|
||||
t.resourceStore.BeList = nil
|
||||
postUpgradeResourceStore.BeList = nil
|
||||
|
||||
framework.ExpectNoError(compareGCPResourceStores(t.resourceStore, postUpgradeResourceStore, func(v1 reflect.Value, v2 reflect.Value) error {
|
||||
i1 := v1.Interface()
|
||||
|
Reference in New Issue
Block a user