#!/usr/bin/env bash # Copyright 2014 The Kubernetes Authors. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # This command checks that the built commands can function together for # simple scenarios. It does not require Docker. set -o errexit set -o nounset set -o pipefail KUBE_ROOT=$(dirname "${BASH_SOURCE}")/../.. source "${KUBE_ROOT}/hack/lib/init.sh" source "${KUBE_ROOT}/hack/lib/test.sh" source "${KUBE_ROOT}/test/cmd/legacy-script.sh" function run_kube_apiserver() { kube::log::status "Building kube-apiserver" make -C "${KUBE_ROOT}" WHAT="cmd/kube-apiserver" # Start kube-apiserver kube::log::status "Starting kube-apiserver" # Admission Controllers to invoke prior to persisting objects in cluster ENABLE_ADMISSION_PLUGINS="LimitRanger,ResourceQuota" DISABLE_ADMISSION_PLUGINS="ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook" # Include RBAC (to exercise bootstrapping), and AlwaysAllow to allow all actions AUTHORIZATION_MODE="RBAC,AlwaysAllow" # Enable features ENABLE_FEATURE_GATES="DryRun=true" "${KUBE_OUTPUT_HOSTBIN}/kube-apiserver" \ --insecure-bind-address="127.0.0.1" \ --bind-address="127.0.0.1" \ --insecure-port="${API_PORT}" \ --authorization-mode="${AUTHORIZATION_MODE}" \ --secure-port="${SECURE_API_PORT}" \ --feature-gates="${ENABLE_FEATURE_GATES}" \ --enable-admission-plugins="${ENABLE_ADMISSION_PLUGINS}" \ --disable-admission-plugins="${DISABLE_ADMISSION_PLUGINS}" \ --etcd-servers="http://${ETCD_HOST}:${ETCD_PORT}" \ --runtime-config=api/v1 \ --storage-media-type="${KUBE_TEST_API_STORAGE_TYPE-}" \ --cert-dir="${TMPDIR:-/tmp/}" \ --service-cluster-ip-range="10.0.0.0/24" \ --token-auth-file=hack/testdata/auth-tokens.csv 1>&2 & APISERVER_PID=$! kube::util::wait_for_url "http://127.0.0.1:${API_PORT}/healthz" "apiserver" } function run_kube_controller_manager() { kube::log::status "Building kube-controller-manager" make -C "${KUBE_ROOT}" WHAT="cmd/kube-controller-manager" # Start controller manager kube::log::status "Starting controller-manager" "${KUBE_OUTPUT_HOSTBIN}/kube-controller-manager" \ --port="${CTLRMGR_PORT}" \ --kube-api-content-type="${KUBE_TEST_API_TYPE-}" \ --master="127.0.0.1:${API_PORT}" 1>&2 & CTLRMGR_PID=$! kube::util::wait_for_url "http://127.0.0.1:${CTLRMGR_PORT}/healthz" "controller-manager" } # Creates a node object with name 127.0.0.1. This is required because we do not # run kubelet. function create_node() { kubectl create -f - -s "http://127.0.0.1:${API_PORT}" << __EOF__ { "kind": "Node", "apiVersion": "v1", "metadata": { "name": "127.0.0.1" }, "status": { "capacity": { "memory": "1Gi" } } } __EOF__ } kube::log::status "Running kubectl tests for kube-apiserver" setup run_kube_apiserver run_kube_controller_manager create_node SUPPORTED_RESOURCES=("*") # WARNING: Do not wrap this call in a subshell to capture output, e.g. output=$(runTests) # Doing so will suppress errexit behavior inside runTests runTests kube::log::status "TESTS PASSED"