Files
virtual-kubelet/vendor/github.com/vmware/govmomi/toolbox/toolbox-test.sh
Loc Nguyen 513cebe7b7 VMware vSphere Integrated Containers provider (#206)
* Add Virtual Kubelet provider for VIC

Initial virtual kubelet provider for VMware VIC.  This provider currently
handles creating and starting of a pod VM via the VIC portlayer and persona
server.  Image store handling via the VIC persona server.  This provider
currently requires the feature/wolfpack branch of VIC.

* Added pod stop and delete.  Also added node capacity.

Added the ability to stop and delete pod VMs via VIC.  Also retrieve
node capacity information from the VCH.

* Cleanup and readme file

Some file clean up and added a Readme.md markdown file for the VIC
provider.

* Cleaned up errors, added function comments, moved operation code

1. Cleaned up error handling.  Set standard for creating errors.
2. Added method prototype comments for all interface functions.
3. Moved PodCreator, PodStarter, PodStopper, and PodDeleter to a new folder.

* Add mocking code and unit tests for podcache, podcreator, and podstarter

Used the unit test framework used in VIC to handle assertions in the provider's
unit test.  Mocking code generated using OSS project mockery, which is compatible
with the testify assertion framework.

* Vendored packages for the VIC provider

Requires feature/wolfpack branch of VIC and a few specific commit sha of
projects used within VIC.

* Implementation of POD Stopper and Deleter unit tests (#4)

* Updated files for initial PR
2018-06-04 15:41:32 -07:00

260 lines
7.9 KiB
Bash
Executable File

#!/bin/bash -e
# Copyright 2017 VMware, Inc. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
# Create (or reuse) a VM to run toolbox and/or toolbox.test
# Requires ESX to be configured with:
# govc host.esxcli system settings advanced set -o /Net/GuestIPHack -i 1
set -o pipefail
vm="toolbox-test-$(uuidgen)"
destroy=true
verbose=true
while getopts n:qstv flag
do
case $flag in
n)
vm=$OPTARG
unset destroy
;;
q)
verbose=false # you want this if generating lots of traffic, such as large file transfers
;;
s)
start=true
;;
t)
test=true
;;
*)
echo "unknown option" 1>&2
exit 1
;;
esac
done
echo "Building toolbox binaries..."
pushd "$(git rev-parse --show-toplevel)" >/dev/null
GOOS=linux GOARCH=amd64 go build -o "$GOPATH/bin/toolbox" -v ./toolbox/toolbox
GOOS=linux GOARCH=amd64 go test -race -i -c ./toolbox -o "$GOPATH/bin/toolbox.test"
popd >/dev/null
iso=coreos_production_iso_image.iso
govc datastore.mkdir -p images
if ! govc datastore.ls images | grep -q $iso ; then
echo "Downloading ${iso}..."
if [ ! -e $iso ] ; then
wget http://beta.release.core-os.net/amd64-usr/current/$iso
fi
echo "Uploading ${iso}..."
govc datastore.upload $iso images/$iso
fi
if [ ! -e config.iso ] ; then
echo "Generating config.iso..."
keys=$(cat ~/.ssh/id_[rd]sa.pub)
dir=$(mktemp -d toolbox.XXXXXX)
pushd "${dir}" >/dev/null
mkdir -p drive/openstack/latest
cat > drive/openstack/latest/user_data <<EOF
#!/bin/bash
# Add ${USER}'s public key(s) to .ssh/authorized_keys
echo "$keys" | update-ssh-keys -u core -a coreos-cloudinit
EOF
genisoimage=$(type -p genisoimage mkisofs | head -1)
$genisoimage -R -V config-2 -o config.iso ./drive
popd >/dev/null
mv -f "$dir/config.iso" .
rm -rf "$dir"
fi
govc datastore.mkdir -p "$vm"
vm_path="$(govc find / -type m -name "$vm")"
if [ -z "$vm_path" ] ; then
echo "Creating VM ${vm}..."
govc vm.create -g otherGuest64 -m 1024 -on=false "$vm"
device=$(govc device.cdrom.add -vm "$vm")
govc device.cdrom.insert -vm "$vm" -device "$device" images/$iso
govc datastore.upload config.iso "$vm/config.iso" >/dev/null
device=$(govc device.cdrom.add -vm "$vm")
govc device.cdrom.insert -vm "$vm" -device "$device" "$vm/config.iso"
vm_path="$(govc find / -type m -name "$vm")"
else
govc object.collect -s "$vm_path" -guest.toolsStatus toolsNot* # wait for previous toolbox to unregister
fi
state=$(govc object.collect -s "$vm_path" runtime.powerState)
if [ "$state" != "poweredOn" ] ; then
govc vm.power -on "$vm"
fi
echo -n "Waiting for ${vm} ip..."
ip=$(govc vm.ip -esxcli "$vm")
opts=(-o "UserKnownHostsFile /dev/null" -o "StrictHostKeyChecking no" -o "LogLevel error" -o "BatchMode yes")
destroy() {
if [ -n "$test" ] ; then
rm -f "$GOVC_TLS_KNOWN_HOSTS"
fi
if [ -n "$destroy" ] ; then
echo "Destroying VM ${vm}..."
govc vm.destroy "$vm"
govc datastore.rm -f "$vm"
else
ssh "${opts[@]}" "core@${ip}" pkill toolbox || true
fi
}
trap destroy EXIT
scp "${opts[@]}" "$GOPATH"/bin/toolbox{,.test} "core@${ip}:"
if [ -n "$test" ] ; then
# validate guest.FileManager adds the host thumbprint when transferring files
unset GOVC_INSECURE
GOVC_TLS_KNOWN_HOSTS=$(mktemp --tmpdir toolbox.XXXXXX)
govc about.cert -k -thumbprint > "$GOVC_TLS_KNOWN_HOSTS"
export GOVC_TLS_KNOWN_HOSTS GOVC_GUEST_LOGIN=user:pass
echo "Running toolbox tests..."
ssh "${opts[@]}" "core@${ip}" ./toolbox.test -test.v=$verbose -test.run TestServiceRunESX -toolbox.testesx \
-toolbox.testpid="$$" -toolbox.powerState="$state" &
echo "Waiting for VM ip from toolbox..."
ip=$(govc vm.ip "$vm")
echo "toolbox vm.ip=$ip"
echo "Testing guest.{start,kill,ps} operations via govc..."
export GOVC_VM="$vm"
# should be 0 procs as toolbox only lists processes it started, for now
test -z "$(govc guest.ps -e | grep -v STIME)"
out=$(govc guest.start /bin/date)
if [ "$out" != "$$" ] ; then
echo "'$out' != '$$'" 1>&2
fi
# These processes would run for 1h if we didn't kill them.
pid=$(govc guest.start sleep 1h)
echo "Killing func $pid..."
govc guest.kill -p "$pid"
govc guest.ps -e -p "$pid" -X | grep "$pid"
govc guest.ps -e -p "$pid" -json | jq -r .ProcessInfo[].ExitCode | grep -q 42
pid=$(govc guest.start /bin/sh -c "sleep 3600")
echo "Killing proc $pid..."
govc guest.kill -p "$pid"
govc guest.ps -e -p "$pid" -X | grep "$pid"
echo "Testing file copy to and from guest via govc..."
base="$(basename "$0")"
dest="/tmp/$base"
govc guest.upload -f -perm 0640 -gid 10 "$0" "$dest"
govc guest.download "$dest" - | md5sum --quiet -c <(<"$0" md5sum)
govc guest.chmod 0755 "$dest"
govc guest.ls "$dest" | grep rwxr-xr-x
echo "Testing custom hgfs.FileHandler..."
if ! govc guest.download "/echo:$dest" - 2>/dev/null ; then
govc guest.download "/echo:$dest?foo=bar" - >/dev/null
fi
home=$(govc guest.getenv HOME | cut -d= -f2)
if date | govc guest.upload -f - /tmp 2>/dev/null ; then
echo "guest.upload to directory should fail without .tgz source" 1>&2
exit 1
fi
if [ "$verbose" = "false" ] ; then # else you don't want to see this noise
# Download the $HOME directory, includes toolbox binaries (~30M total)
# Note: trailing slash is required
prefix=$(basename "$home")
govc guest.download "$home/?prefix=$prefix/&format=tgz" - | tar -tzvf - | grep "$prefix"/toolbox
govc guest.mkdir -p /tmp/toolbox-src
# Upload source files from this directory
# and validate that query string is not used as the file/dir name (see hgfs.ArchiveHandler)
git archive --format tgz HEAD | govc guest.upload -f - /tmp/toolbox-src?skip=stuff
# Upload .tar
git archive --format tar HEAD | govc guest.upload -f - /tmp/toolbox-src
# Download .tar
govc guest.download "/tmp/toolbox-src/" - | tar -tvf - | grep "$base"
# Download a single file as a .tar.gz (note: /archive: prefix is required)
govc guest.download "/archive:/tmp/toolbox-src/$base?format=tgz" - | tar -tvzf - | grep -v README.md
# Download a single file as a .tar (note: /archive: prefix is required)
govc guest.download "/archive:/tmp/toolbox-src/$base" - | tar -tvf - | grep -v README.md
govc guest.rmdir -r /tmp/toolbox-src
fi
echo "Testing we can download /proc files..."
for name in uptime diskstats net/dev ; do
test -n "$(govc guest.download /proc/$name -)"
done
addr=$(govc guest.getenv TOOLBOX_ECHO_SERVER | cut -d= -f2)
echo "Testing http.RoundTrip via $addr..."
govc guest.run GET "$addr/$vm" | grep "$vm"
echo "$vm" | govc guest.run -e Content-Type:text/plain -d - POST "$addr" | grep "$vm"
echo "Testing commands with IO..."
# Note that we don't use a pipe here, as guest.ps transitions the vm to VM_STATE_GUEST_OPERATION,
# which prevents guest.run from invoking guest operations. By letting guest.ps complete before
# guest.run, the vm will have transitioned back to VM_STATE_POWERED_ON.
data=$(govc guest.ps -json)
govc guest.run -d "$data" jq .
# test ProcessIO download retries
govc version | govc guest.run -d - bash -c "'sleep 2 && cat'"
echo "Waiting for tests to complete..."
wait
fi
if [ -n "$start" ] ; then
(
govc object.collect -s "$vm_path" -guest.toolsStatus toolsOk # wait for toolbox to register
/usr/bin/time -f "Waiting for VM ip from toolbox...%e" govc vm.ip -v4 -n ethernet-0 "$vm"
) &
echo "Starting toolbox..."
ssh "${opts[@]}" "core@${ip}" ./toolbox -toolbox.trace=$verbose
fi