| #!/bin/bash |
| |
| # ============LICENSE_START=============================================== |
| # Copyright (C) 2020 Nordix Foundation. All rights reserved. |
| # ======================================================================== |
| # Licensed under the Apache License, Version 2.0 (the "License"); |
| # you may not use this file except in compliance with the License. |
| # You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| # ============LICENSE_END================================================= |
| # |
| |
| # This is a script that contains container/service managemnt functions for Kube Http Proxy |
| # This http proxy is to provide full access for the test script to all adressable kube object in a clister |
| |
| ################ Test engine functions ################ |
| |
| # Create the image var used during the test |
| # arg: <image-tag-suffix> (selects staging, snapshot, release etc) |
| # <image-tag-suffix> is present only for images with staging, snapshot,release tags |
| __KUBEPROXY_imagesetup() { |
| __check_and_create_image_var KUBEPROXY "KUBE_PROXY_IMAGE" "KUBE_PROXY_IMAGE_BASE" "KUBE_PROXY_IMAGE_TAG" LOCAL "$KUBE_PROXY_DISPLAY_NAME" |
| } |
| |
| # Pull image from remote repo or use locally built image |
| # arg: <pull-policy-override> <pull-policy-original> |
| # <pull-policy-override> Shall be used for images allowing overriding. For example use a local image when test is started to use released images |
| # <pull-policy-original> Shall be used for images that does not allow overriding |
| # Both var may contain: 'remote', 'remote-remove' or 'local' |
| __KUBEPROXY_imagepull() { |
| echo -e $RED"Image for app KUBEPROXY shall never be pulled from remote repo"$ERED |
| } |
| |
| # Build image (only for simulator or interfaces stubs owned by the test environment) |
| # arg: <image-tag-suffix> (selects staging, snapshot, release etc) |
| # <image-tag-suffix> is present only for images with staging, snapshot,release tags |
| __KUBEPROXY_imagebuild() { |
| cd ../http-https-proxy |
| echo " Building KUBEPROXY - $KUBE_PROXY_DISPLAY_NAME - image: $KUBE_PROXY_IMAGE" |
| docker build --build-arg NEXUS_PROXY_REPO=$NEXUS_PROXY_REPO -t $KUBE_PROXY_IMAGE . &> .dockererr |
| if [ $? -eq 0 ]; then |
| echo -e $GREEN" Build Ok"$EGREEN |
| __retag_and_push_image KUBE_PROXY_IMAGE |
| if [ $? -ne 0 ]; then |
| exit 1 |
| fi |
| else |
| echo -e $RED" Build Failed"$ERED |
| ((RES_CONF_FAIL++)) |
| cat .dockererr |
| echo -e $RED"Exiting...."$ERED |
| exit 1 |
| fi |
| } |
| |
| # Generate a string for each included image using the app display name and a docker images format string |
| # If a custom image repo is used then also the source image from the local repo is listed |
| # arg: <docker-images-format-string> <file-to-append> |
| __KUBEPROXY_image_data() { |
| echo -e "$KUBE_PROXY_DISPLAY_NAME\t$(docker images --format $1 $KUBE_PROXY_IMAGE)" >> $2 |
| if [ ! -z "$KUBE_PROXY_IMAGE_SOURCE" ]; then |
| echo -e "-- source image --\t$(docker images --format $1 $KUBE_PROXY_IMAGE_SOURCE)" >> $2 |
| fi |
| } |
| |
| # Scale kubernetes resources to zero |
| # All resources shall be ordered to be scaled to 0, if relevant. If not relevant to scale, then do no action. |
| # This function is called for apps fully managed by the test script |
| __KUBEPROXY_kube_scale_zero() { |
| __kube_scale_all_resources $KUBE_SIM_NAMESPACE autotest KUBEPROXY |
| } |
| |
| # Scale kubernetes resources to zero and wait until this has been accomplished, if relevant. If not relevant to scale, then do no action. |
| # This function is called for prestarted apps not managed by the test script. |
| __KUBEPROXY_kube_scale_zero_and_wait() { |
| echo -e $RED" KUBEPROXY app is not scaled in this state"$ERED |
| } |
| |
| # Delete all kube resouces for the app |
| # This function is called for apps managed by the test script. |
| __KUBEPROXY_kube_delete_all() { |
| __kube_delete_all_resources $KUBE_SIM_NAMESPACE autotest KUBEPROXY |
| } |
| |
| # Store docker logs |
| # This function is called for apps managed by the test script. |
| # args: <log-dir> <file-prexix> |
| __KUBEPROXY_store_docker_logs() { |
| docker logs $KUBE_PROXY_APP_NAME > $1$2_kubeproxy.log 2>&1 |
| } |
| |
| ####################################################### |
| |
| ## Access to Kube http proxy |
| # Direct access |
| KUBE_PROXY_HTTPX="http" |
| |
| |
| # Set http as the protocol to use for all communication to the Kube http proxy |
| # args: - |
| # (Function for test scripts) |
| use_kube_proxy_http() { |
| echo -e $BOLD"$KUBE_PROXY_DISPLAY_NAME protocol setting"$EBOLD |
| echo -e " Using $BOLD http $EBOLD towards Kube http proxy" |
| |
| KUBE_PROXY_HTTPX="http" |
| |
| echo -e $YELLOW" This setting cannot be changed once the kube proxy is started"$EYELLOW |
| echo "" |
| } |
| |
| # Set https as the protocol to use for all communication to the Kube http proxy |
| # args: - |
| # (Function for test scripts) |
| use_kube_proxy_https() { |
| echo -e $BOLD"$KUBE_PROXY_DISPLAY_NAME protocol setting"$EBOLD |
| echo -e " Using $BOLD https $EBOLD towards Kube http proxy" |
| |
| KUBE_PROXY_HTTPX="https" |
| |
| echo -e $YELLOW" This setting cannot be changed once the kube proxy is started"$EYELLOW |
| echo "" |
| } |
| |
| ######################### |
| ### Kube Http Proxy functions |
| ######################### |
| |
| # Start the Kube Http Proxy in the simulator group |
| # args: - |
| # (Function for test scripts) |
| start_kube_proxy() { |
| |
| echo -e $BOLD"Starting $KUBE_PROXY_DISPLAY_NAME"$EBOLD |
| |
| if [ $RUNMODE == "KUBE" ]; then |
| |
| # Check if app shall be fully managed by the test script |
| __check_included_image "KUBEPROXY" |
| retcode_i=$? |
| |
| # Check if app shall only be used by the testscipt |
| __check_prestarted_image "KUBEPROXY" |
| retcode_p=$? |
| |
| if [ $retcode_i -ne 0 ] && [ $retcode_p -ne 0 ]; then |
| echo -e $RED"The $KUBE_PROXY_APP_NAME app is not included as managed nor prestarted in this test script"$ERED |
| echo -e $RED"The $KUBE_PROXY_APP_NAME will not be started"$ERED |
| exit |
| fi |
| if [ $retcode_i -eq 0 ] && [ $retcode_p -eq 0 ]; then |
| echo -e $RED"The $KUBE_PROXY_APP_NAME app is included both as managed and prestarted in this test script"$ERED |
| echo -e $RED"The $KUBE_PROXY_APP_NAME will not be started"$ERED |
| exit |
| fi |
| |
| # Check if app shall be used - not managed - by the test script |
| if [ $retcode_p -eq 0 ]; then |
| echo -e " Using existing $KUBE_PROXY_APP_NAME deployment and service" |
| echo " Setting KUBEPROXY replicas=1" |
| __kube_scale deployment $KUBE_PROXY_APP_NAME $KUBE_SIM_NAMESPACE 1 |
| fi |
| |
| if [ $retcode_i -eq 0 ]; then |
| echo -e " Creating $KUBE_PROXY_APP_NAME deployment and service" |
| export KUBE_PROXY_APP_NAME |
| |
| export KUBE_PROXY_WEB_EXTERNAL_PORT |
| export KUBE_PROXY_WEB_INTERNAL_PORT |
| export KUBE_PROXY_EXTERNAL_PORT |
| export KUBE_PROXY_INTERNAL_PORT |
| |
| export KUBE_PROXY_WEB_EXTERNAL_SECURE_PORT |
| export KUBE_PROXY_WEB_INTERNAL_SECURE_PORT |
| export KUBE_PROXY_EXTERNAL_SECURE_PORT |
| export KUBE_PROXY_INTERNAL_SECURE_PORT |
| |
| export KUBE_SIM_NAMESPACE |
| export KUBE_PROXY_IMAGE |
| |
| __kube_create_namespace $KUBE_SIM_NAMESPACE |
| |
| # Create service |
| input_yaml=$SIM_GROUP"/"$KUBE_PROXY_COMPOSE_DIR"/"svc.yaml |
| output_yaml=$PWD/tmp/proxy_svc.yaml |
| __kube_create_instance service $KUBE_PROXY_APP_NAME $input_yaml $output_yaml |
| |
| # Create app |
| input_yaml=$SIM_GROUP"/"$KUBE_PROXY_COMPOSE_DIR"/"app.yaml |
| output_yaml=$PWD/tmp/proxy_app.yaml |
| __kube_create_instance app $KUBE_PROXY_APP_NAME $input_yaml $output_yaml |
| |
| fi |
| |
| echo " Retrieving host and ports for service..." |
| |
| #Finding host of the proxy |
| echo " Trying to find svc hostname..." |
| CLUSTER_KUBE_PROXY_HOST=$(__kube_cmd_with_timeout "kubectl get svc $KUBE_PROXY_APP_NAME -n $KUBE_SIM_NAMESPACE -o jsonpath={.status.loadBalancer.ingress[0].hostname}") |
| |
| |
| if [ "$CLUSTER_KUBE_PROXY_HOST" == "localhost" ]; then |
| #Local host found |
| echo -e $YELLOW" The test environment svc $KUBE_PROXY_APP_NAME host is: $CLUSTER_KUBE_PROXY_HOST"$EYELLOW |
| CLUSTER_KUBE_PROXY_HOST="127.0.0.1" |
| else |
| if [ -z "$CLUSTER_KUBE_PROXY_HOST" ]; then |
| #Host of proxy not found, trying to find the ip.... |
| echo " Trying to find svc ip..." |
| CLUSTER_KUBE_PROXY_HOST=$(__kube_cmd_with_timeout "kubectl get svc $KUBE_PROXY_APP_NAME -n $KUBE_SIM_NAMESPACE -o jsonpath={.status.loadBalancer.ingress[0].ip}") |
| if [ ! -z "$CLUSTER_KUBE_PROXY_HOST" ]; then |
| #Host ip found |
| echo -e $YELLOW" The test environment svc $KUBE_PROXY_APP_NAME ip is: $CLUSTER_KUBE_PROXY_HOST."$EYELLOW |
| fi |
| else |
| #Host or ip of proxy found |
| echo -e $YELLOW" The test environment host/ip is: $CLUSTER_KUBE_PROXY_HOST."$EYELLOW |
| fi |
| fi |
| |
| PORT_KEY_PREFIX="" |
| if [ $KUBE_PROXY_HTTPX == "https" ]; then |
| PORT_KEY_PREFIX="s" #add suffix to port key name to get https ports |
| fi |
| if [ -z "$CLUSTER_KUBE_PROXY_HOST" ]; then |
| #Host/ip of proxy not found, try to use the cluster and the nodeports of the proxy |
| CLUSTER_KUBE_PROXY_HOST=$(kubectl config view -o jsonpath={.clusters[0].cluster.server} | awk -F[/:] '{print $4}') |
| echo -e $YELLOW" The test environment cluster ip is: $CLUSTER_KUBE_PROXY_HOST."$EYELLOW |
| CLUSTER_KUBE_PROXY_PORT=$(__kube_get_service_nodeport $KUBE_PROXY_APP_NAME $KUBE_SIM_NAMESPACE "http$PORT_KEY_PREFIX") # port for proxy access |
| KUBE_PROXY_WEB_NODEPORT=$(__kube_get_service_nodeport $KUBE_PROXY_APP_NAME $KUBE_SIM_NAMESPACE "web$PORT_KEY_PREFIX") # web port, only for alive test |
| echo " Cluster ip/host, cluster http$PORT_KEY_PREFIX nodeport, cluster web$PORT_KEY_PREFIX nodeport: $CLUSTER_KUBE_PROXY_HOST $CLUSTER_KUBE_PROXY_PORT $KUBE_PROXY_WEB_NODEPORT" |
| else |
| #Find the service ports of the proxy |
| CLUSTER_KUBE_PROXY_PORT=$(__kube_get_service_port $KUBE_PROXY_APP_NAME $KUBE_SIM_NAMESPACE "http$PORT_KEY_PREFIX") # port for proxy access |
| KUBE_PROXY_WEB_NODEPORT=$(__kube_get_service_port $KUBE_PROXY_APP_NAME $KUBE_SIM_NAMESPACE "web$PORT_KEY_PREFIX") # web port, only for alive test |
| echo " Proxy ip/host, proxy http$PORT_KEY_PREFIX port, proxy web$PORT_KEY_PREFIX port: $CLUSTER_KUBE_PROXY_HOST $CLUSTER_KUBE_PROXY_PORT $KUBE_PROXY_WEB_NODEPORT" |
| fi |
| |
| KUBE_PROXY_WEB_PATH=$KUBE_PROXY_HTTPX"://"$CLUSTER_KUBE_PROXY_HOST":"$KUBE_PROXY_WEB_NODEPORT |
| |
| export KUBE_PROXY_PATH= # Make sure proxy is empty when checking the proxy itself |
| __check_service_start $KUBE_PROXY_APP_NAME $KUBE_PROXY_WEB_PATH$KUBE_PROXY_ALIVE_URL |
| |
| # Set proxy for all subsequent calls for all services etc |
| export KUBE_PROXY_PATH=$KUBE_PROXY_HTTPX"://"$CLUSTER_KUBE_PROXY_HOST":"$CLUSTER_KUBE_PROXY_PORT |
| export KUBE_PROXY_HTTPX |
| else |
| echo $YELLOW" Kube http proxy not needed in docker test. App not started" |
| fi |
| echo "" |
| |
| } |
| |