element_type
stringclasses
4 values
project_name
stringclasses
1 value
uuid
stringlengths
36
36
name
stringlengths
0
346
imports
stringlengths
0
2.67k
structs
stringclasses
761 values
interfaces
stringclasses
22 values
file_location
stringclasses
545 values
code
stringlengths
26
8.07M
global_vars
stringclasses
7 values
package
stringclasses
124 values
tags
stringclasses
1 value
function
openshift/openshift-tests-private
c63ee3d3-efb7-4e97-a7c1-9bdf7b4a11c9
GetCleanJSON
['"encoding/json"']
['ocGetter']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r ocGetter) GetCleanJSON() (string, error) { params := r.getCommonParams() params = append(params, []string{"-o", "json"}...) result, err := r.oc.WithoutNamespace().Run("get").Args(params...).Output() return result, err }
mco
function
openshift/openshift-tests-private
26cd9ddb-2239-4c07-88bc-88aa442368f6
Get
['"fmt"']
['ocGetter']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *ocGetter) Get(jsonPath string, extraParams ...string) (string, error) { params := r.getCommonParams() params = append(params, extraParams...) params = append(params, []string{"-o", fmt.Sprintf("jsonpath=%s", jsonPath)}...) logger.Debugf("resource params %v:", params) result, err := r.oc.WithoutNamespace().Run("get").Args(params...).Output() return result, err }
mco
function
openshift/openshift-tests-private
2d6a452e-6937-461d-aeca-95c521c3ae42
GetSafe
['ocGetter']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *ocGetter) GetSafe(jsonPath, defaultValue string, extraParams ...string) string { ret, err := r.Get(jsonPath, extraParams...) if err != nil { return defaultValue } return ret }
mco
function
openshift/openshift-tests-private
e00203a7-f4ca-4fa5-8563-7aed35452948
GetOrFail
['ocGetter']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *ocGetter) GetOrFail(jsonPath string, extraParams ...string) string { ret, err := r.Get(jsonPath, extraParams...) if err != nil { e2e.Failf("Could not get value %s in %s. Error: %v", jsonPath, r, err) } return ret }
mco
function
openshift/openshift-tests-private
900f43de-1387-4666-aac6-c5a3990f9a9a
Poll
['ocGetter']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *ocGetter) Poll(jsonPath string) func() string { return func() string { ret, _ := r.Get(jsonPath) return ret } }
mco
function
openshift/openshift-tests-private
c25c6a72-7845-4bd6-95ff-5aefc26c160b
String
['"fmt"']
['ocGetter']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r ocGetter) String() string { return fmt.Sprintf("<Kind: %s, Name: %s, Namespace: %s>", r.kind, r.name, r.namespace) }
mco
function
openshift/openshift-tests-private
3c004dc2-fe52-47f9-bc94-2e12b3a16022
NewResource
['ocGetter', 'Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func NewResource(oc *exutil.CLI, kind, name string) *Resource { return &Resource{ocGetter: ocGetter{oc, kind, "", name}} }
mco
function
openshift/openshift-tests-private
c1db3344-dc5a-4641-ade9-571ba603ba1c
NewNamespacedResource
['ocGetter', 'Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func NewNamespacedResource(oc *exutil.CLI, kind, namespace, name string) *Resource { return &Resource{ocGetter: ocGetter{oc, kind, namespace, name}} }
mco
function
openshift/openshift-tests-private
b7cf029f-d3f8-4f4e-a66f-c07aad57bd06
Delete
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) Delete(extraParams ...string) error { params := r.getCommonParams() params = append(params, extraParams...) _, err := r.oc.WithoutNamespace().Run("delete").Args(params...).Output() if err != nil { logger.Errorf("%v", err) } return err }
mco
function
openshift/openshift-tests-private
8652f616-a4c1-4fe7-bbee-5c6ea7737bcd
DeleteOrFail
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) DeleteOrFail(extraParams ...string) { err := r.Delete(extraParams...) o.Expect(err).NotTo(o.HaveOccurred()) }
mco
function
openshift/openshift-tests-private
08aa40c4-1bc1-4525-b38a-f2e89fc1acfa
GetSpecOrFail
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r Resource) GetSpecOrFail() string { return r.GetOrFail(`{.spec}`) }
mco
function
openshift/openshift-tests-private
fc5418fb-0ccd-4322-bdad-b22cf7897a74
SetSpec
['"encoding/json"']
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r Resource) SetSpec(spec string) error { return r.Patch("json", `[{ "op": "add", "path": "/spec", "value": `+spec+`}]`) }
mco
function
openshift/openshift-tests-private
30706105-dd7e-4190-96b0-444d204a9c07
Exists
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) Exists() bool { _, err := r.Get("{.}") return err == nil }
mco
function
openshift/openshift-tests-private
5c447f1a-6edf-4282-9b1b-dd9caabcd255
HasOwner
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r Resource) HasOwner() (bool, error) { firstOwner, err := r.Get(`{.metadata.ownerReferences[0]}`) return firstOwner != "", err }
mco
function
openshift/openshift-tests-private
be6e3c41-5db6-4c30-826b-b40416d9889d
Logs
['"time"']
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r Resource) Logs(args ...string) (string, error) { var ( params = []string{} stdout, stderr string err error ) if r.namespace != "" { params = append([]string{"-n", r.namespace}, params...) } params = append(params, args...) params = append(params, r.kind+"/"+r.name) err = Retry(5, 10*time.Second, func() error { stdout, stderr, err = r.oc.WithoutNamespace().Run("logs").Args(params...).Outputs() return err }) if err != nil { logger.Errorf("Error getting %s logs.\nStdout:%s\nStderr:%s\nErr:%s", r, stdout, stderr, err) return stdout + stderr, err } return stdout, err }
mco
function
openshift/openshift-tests-private
40b9fa92-22c1-4283-acc8-80a798f2413c
Patch
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) Patch(patchType, patch string, extraParams ...string) error { params := r.getCommonParams() params = append(params, []string{"--type", patchType, "-p", patch}...) params = append(params, extraParams...) _, err := r.oc.WithoutNamespace().Run("patch").Args(params...).Output() if err != nil { logger.Errorf("%v", err) } return err }
mco
function
openshift/openshift-tests-private
10e84a75-976e-40c7-ba06-c23b7c890430
GetAnnotation
['"fmt"', '"strings"']
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) GetAnnotation(annotation string) (string, error) { scapedAnnotation := strings.ReplaceAll(annotation, `.`, `\.`) return r.Get(fmt.Sprintf(`{.metadata.annotations.%s}`, scapedAnnotation)) }
mco
function
openshift/openshift-tests-private
f32aa225-143a-43eb-b230-3b1e3a6cec27
GetAnnotationOrFail
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) GetAnnotationOrFail(annotation string) string { annotation, err := r.GetAnnotation(annotation) o.Expect(err).NotTo(o.HaveOccurred(), "Error getting annotation %s from %s", annotation, r) return annotation }
mco
function
openshift/openshift-tests-private
5c446682-5b1a-46b0-a224-39d093fe537c
GetConditionByType
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) GetConditionByType(ctype string) string { return r.GetOrFail(`{.status.conditions[?(@.type=="` + ctype + `")]}`) }
mco
function
openshift/openshift-tests-private
829732b2-7125-41e5-9a5c-b9b831a87d31
GetConditionStatusByType
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) GetConditionStatusByType(ctype string) string { return r.GetOrFail(`{.status.conditions[?(@.type=="` + ctype + `")].status}`) }
mco
function
openshift/openshift-tests-private
83b2fb0c-f7b1-497b-b9de-07b5d42dcad0
IsConditionStatusTrue
['"strings"']
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) IsConditionStatusTrue(ctype string) bool { return strings.EqualFold(r.GetConditionStatusByType(ctype), TrueString) }
mco
function
openshift/openshift-tests-private
4c765925-607f-4dd5-82da-7565bc17e0b0
GetLabel
['"encoding/json"', '"fmt"']
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) GetLabel(label string) (string, error) { labels := map[string]string{} labelsJSON, err := r.Get(`{.metadata.labels}`) if err != nil { return "", err } if labelsJSON == "" { return "", fmt.Errorf("Labels not defined. Could not get .metadata.labels attribute") } if err := json.Unmarshal([]byte(labelsJSON), &labels); err != nil { return "", err } value, ok := labels[label] if !ok { return "", fmt.Errorf("%s. Label not found in -n %s %s", label, r.GetNamespace(), r.GetName()) } return value, nil }
mco
function
openshift/openshift-tests-private
14632afd-209a-41a3-a7e0-60057e49ea00
AddLabel
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) AddLabel(label, value string) error { params := r.getCommonParams() params = append(params, []string{label + "=" + value}...) return r.oc.WithoutNamespace().Run("label").Args(params...).Execute() }
mco
function
openshift/openshift-tests-private
d4fff9a3-dbee-4a2b-8083-8865474b1e36
RemoveLabel
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) RemoveLabel(label string) error { params := r.getCommonParams() params = append(params, []string{label + "-"}...) return r.oc.WithoutNamespace().Run("label").Args(params...).Execute() }
mco
function
openshift/openshift-tests-private
c30ddfeb-f54c-446e-949b-8636116dde3d
Describe
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) Describe() (string, error) { params := []string{r.kind, r.name} if r.namespace != "" { params = append([]string{"-n", r.namespace}, params...) } return r.oc.WithoutNamespace().Run("describe").Args(params...).Output() }
mco
function
openshift/openshift-tests-private
9626f6b9-1e25-440c-a9ac-9968d96fdbbd
ExportToFile
['"encoding/json"', '"os"']
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) ExportToFile(fileName string) error { // We want to write the json info as "pretty", so that it is human readable. // But we don't want to use "PrettyString" because we want full control on the errors definition, dErr := r.Get(`{}`) if dErr != nil { return dErr } var data interface{} if err := json.Unmarshal([]byte(definition), &data); err != nil { return err } formattedDefinition, err := json.MarshalIndent(data, "", " ") if err != nil { return err } value := string(formattedDefinition) err = os.WriteFile(fileName, []byte(value), 0o644) if err != nil { logger.Infof("Resource %s has been saved in file %s", r, fileName) } return err }
mco
function
openshift/openshift-tests-private
e9dc3c0b-6d63-481b-baab-55864419b6ec
PrettyString
['"encoding/json"']
['Resource']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (r *Resource) PrettyString() string { definition, dErr := r.Get(`{}`) if dErr != nil { return dErr.Error() } var data interface{} if err := json.Unmarshal([]byte(definition), &data); err != nil { return err.Error() } formattedDefinition, err := json.MarshalIndent(data, "", " ") if err != nil { return err.Error() } return string(formattedDefinition) }
mco
function
openshift/openshift-tests-private
802aa57d-c0be-4022-ae2e-ed66f5386970
NewMCOTemplate
['Template']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func NewMCOTemplate(oc *exutil.CLI, fileName string) *Template { return &Template{oc: oc, templateFile: generateTemplateAbsolutePath(fileName)} }
mco
function
openshift/openshift-tests-private
47001dc5-edeb-4ca0-9d42-11800b4dfe2e
SetTemplate
['Template']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (t *Template) SetTemplate(template string) { t.templateFile = template }
mco
function
openshift/openshift-tests-private
8befbf52-f3f2-4acf-bfd8-9981b0217e9c
Create
['"fmt"']
['Template']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (t *Template) Create(parameters ...string) error { if t.templateFile == "" { return fmt.Errorf("There is no template configured") } allParams := []string{"--ignore-unknown-parameters=true", "-f", t.templateFile} allParams = append(allParams, parameters...) return exutil.CreateClusterResourceFromTemplateWithError(t.oc, allParams...) }
mco
function
openshift/openshift-tests-private
2bcaa093-9b1f-438a-93cb-3b5bc0dd0ab6
NewResourceList
['ocGetter', 'ResourceList']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func NewResourceList(oc *exutil.CLI, kind string) *ResourceList { return &ResourceList{ocGetter{oc.AsAdmin(), kind, "", ""}, []string{}, ""} }
mco
function
openshift/openshift-tests-private
83cc989a-afac-4537-8cf4-3571894fc2f2
NewNamespacedResourceList
['ocGetter', 'ResourceList']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func NewNamespacedResourceList(oc *exutil.CLI, kind, namespace string) *ResourceList { return &ResourceList{ocGetter{oc.AsAdmin(), kind, namespace, ""}, []string{}, ""} }
mco
function
openshift/openshift-tests-private
cf29aec3-2884-424d-8d10-8c2f59bee99e
CleanParams
['ResourceList']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (l *ResourceList) CleanParams() { l.extraParams = []string{} }
mco
function
openshift/openshift-tests-private
f4f0eeeb-24e2-4542-a0f8-a89da9a4348b
SortByTimestamp
['ResourceList']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (l *ResourceList) SortByTimestamp() { l.SortBy("metadata.creationTimestamp") }
mco
function
openshift/openshift-tests-private
745861df-c63b-417a-9c94-756776f8fb9b
SortByZone
['ResourceList']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (l *ResourceList) SortByZone() { l.SortBy(`.metadata.labels.topology\.kubernetes\.io/zone`) }
mco
function
openshift/openshift-tests-private
23ead87d-5cd9-4bf1-aaab-20c626cf041d
SortBy
['"fmt"']
['ResourceList']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (l *ResourceList) SortBy(field string) { l.extraParams = append(l.extraParams, fmt.Sprintf(`--sort-by=%s`, field)) }
mco
function
openshift/openshift-tests-private
6dc54643-a9fe-4967-a52c-09f253d92d6b
ByLabel
['"fmt"']
['ResourceList']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (l *ResourceList) ByLabel(label string) { l.extraParams = append(l.extraParams, fmt.Sprintf("--selector=%s", label)) }
mco
function
openshift/openshift-tests-private
c27d03a3-8843-4501-bb04-e75495cdb66c
ByFieldSelector
['"fmt"']
['ResourceList']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (l *ResourceList) ByFieldSelector(fieldSelector string) { l.extraParams = append(l.extraParams, fmt.Sprintf("--field-selector=%s", fieldSelector)) }
mco
function
openshift/openshift-tests-private
25f91fd4-031c-4dd9-8465-0bd89d3f0aa3
SetItemsFilter
['ResourceList']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (l *ResourceList) SetItemsFilter(filter string) { l.itemsFilter = filter }
mco
function
openshift/openshift-tests-private
8e11441c-d919-497f-9b57-d865028a6292
GetAll
['"strings"']
['ocGetter', 'Resource', 'ResourceList']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (l ResourceList) GetAll() ([]Resource, error) { if l.itemsFilter == "" { l.itemsFilter = "*" } // silently look for the elements in order not to create a dirty log // TODO: Improve this. There is no method to get the current showInfo value, so we can't restore it l.oc.NotShowInfo() defer l.oc.SetShowInfo() allItemsNames, err := l.Get("{.items["+l.itemsFilter+"].metadata.name}", l.extraParams...) if err != nil { return nil, err } allNames := strings.Split(strings.Trim(allItemsNames, " "), " ") allResources := []Resource{} for _, name := range allNames { if name != "" { newResource := Resource{ocGetter: ocGetter{l.oc, l.kind, l.namespace, name}} allResources = append(allResources, newResource) } } return allResources, nil }
mco
function
openshift/openshift-tests-private
ec6a0028-c642-4bc5-8599-4c92de2496b1
Exist
['"github.com/onsi/gomega/types"']
['existMatcher']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func Exist() types.GomegaMatcher { return &existMatcher{} }
mco
function
openshift/openshift-tests-private
1a0480b6-df83-4362-99a1-e7452b38d62b
Match
['"fmt"']
['existMatcher']
['Exister']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (matcher *existMatcher) Match(actual interface{}) (success bool, err error) { resource, ok := actual.(Exister) if !ok { return false, fmt.Errorf("Exist matcher expects a resource implementing the Exister interface") } return resource.Exists(), nil }
mco
function
openshift/openshift-tests-private
63ec9f20-97d9-4a72-a61a-ddb0ce543cff
FailureMessage
['"fmt"', '"reflect"']
['existMatcher']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (matcher *existMatcher) FailureMessage(actual interface{}) (message string) { return fmt.Sprintf("Expected %s \n\t%s\nto exist", reflect.TypeOf(actual), actual) }
mco
function
openshift/openshift-tests-private
5c4bbd0d-3644-423c-901c-d3e54fe8fcce
NegatedFailureMessage
['"fmt"', '"reflect"']
['existMatcher']
github.com/openshift/openshift-tests-private/test/extended/mco/resource.go
func (matcher *existMatcher) NegatedFailureMessage(actual interface{}) (message string) { return fmt.Sprintf("Expected %s \n\t%s\nnot to exist", reflect.TypeOf(actual), actual) }
mco
file
openshift/openshift-tests-private
380a6def-c417-4b19-a4d6-240d5b614406
secret
import ( "context" "encoding/base64" "encoding/json" "fmt" "os" "path/filepath" "time" o "github.com/onsi/gomega" exutil "github.com/openshift/openshift-tests-private/test/extended/util" logger "github.com/openshift/openshift-tests-private/test/extended/util/logext" "k8s.io/apimachinery/pkg/util/wait" e2e "k8s.io/kubernetes/test/e2e/framework" )
github.com/openshift/openshift-tests-private/test/extended/mco/secret.go
package mco import ( "context" "encoding/base64" "encoding/json" "fmt" "os" "path/filepath" "time" o "github.com/onsi/gomega" exutil "github.com/openshift/openshift-tests-private/test/extended/util" logger "github.com/openshift/openshift-tests-private/test/extended/util/logext" "k8s.io/apimachinery/pkg/util/wait" e2e "k8s.io/kubernetes/test/e2e/framework" ) // Secret struct encapsulates the functionalities regarding ocp secrets type Secret struct { Resource } // SecretList handles list of secrets type SecretList struct { ResourceList } // NewSecret creates a Secret struct func NewSecret(oc *exutil.CLI, namespace, name string) *Secret { return &Secret{Resource: *NewNamespacedResource(oc, "secret", namespace, name)} } // NewSecretList creates a new SecretList struct func NewSecretList(oc *exutil.CLI, namespace string) *SecretList { return &SecretList{*NewNamespacedResourceList(oc, "secret", namespace)} } // GetAll returns a []Secret list with all existing secrets func (sl *SecretList) GetAll() ([]Secret, error) { allSecretResources, err := sl.ResourceList.GetAll() if err != nil { return nil, err } allSecrets := make([]Secret, 0, len(allSecretResources)) for _, secretRes := range allSecretResources { allSecrets = append(allSecrets, *NewSecret(sl.oc, sl.GetNamespace(), secretRes.name)) } return allSecrets, nil } // ExtractToDir extracts the secret's content to a given directory func (s Secret) ExtractToDir(directory string) error { err := s.oc.WithoutNamespace().Run("extract").Args(s.GetKind()+"/"+s.GetName(), "-n", s.GetNamespace(), "--to", directory).Execute() if err != nil { return err } return nil } // Extract extracts the secret's content to a random directory in the testcase's output directory func (s Secret) Extract() (string, error) { layout := "2006_01_02T15-04-05Z.000" directory := filepath.Join(e2e.TestContext.OutputDir, fmt.Sprintf("%s-%s-secret-%s", s.GetNamespace(), s.GetName(), time.Now().Format(layout))) os.MkdirAll(directory, os.ModePerm) return directory, s.ExtractToDir(directory) } // GetDataValue gets the value stored in the secret's key func (s Secret) GetDataValue(key string) (string, error) { templateArg := fmt.Sprintf(`--template={{index .data "%s" | base64decode}}`, key) return s.oc.AsAdmin().WithoutNamespace().Run("get").Args(s.GetKind(), s.GetName(), "-n", s.GetNamespace(), templateArg).Output() } // GetDecodedDataMap returns the valus in the .data field as a map[string][string] with the values decoded func (s Secret) GetDecodedDataMap() (map[string]string, error) { data := map[string]string{} dataJSON, err := s.Get(`{.data}`) if err != nil { return nil, err } if err := json.Unmarshal([]byte(dataJSON), &data); err != nil { return nil, err } for k, vb64 := range data { v, err := base64.StdEncoding.DecodeString(vb64) if err != nil { logger.Errorf("The certiifcate provided in the kubeconfig is not base64 encoded") return nil, err } // Replace the original encoded value with the decoded value data[k] = string(v) } return data, nil } // GetDataValueOrFail gets the value stored in the secret's key and fail the test if there is any error func (s Secret) GetDataValueOrFail(key string) string { data, err := s.GetDataValue(key) o.ExpectWithOffset(1, err).NotTo(o.HaveOccurred(), "Cannot get the value of %s from secret %s -n %s", key, s.GetName(), s.GetNamespace()) return data } // SetDataValue sets a key/value to store in the secret func (s Secret) SetDataValue(key, value string) error { // silently set the value so that we don't print the secret in the logs leaking sensible information s.oc.NotShowInfo() defer s.oc.SetShowInfo() logger.Debugf("Secret %s -n %s. Setting value: %s=%s", s.GetName(), s.GetNamespace(), key, value) // command example: oc secret pull-secret -n openshift-config set data .dockerconfigjson={} return s.oc.AsAdmin().WithoutNamespace().Run("set").Args("data", s.GetKind(), s.GetName(), "-n", s.GetNamespace(), fmt.Sprintf("%s=%s", key, value)).Execute() } // GetPullSecret returns the cluster's pull secret func GetPullSecret(oc *exutil.CLI) *Secret { return NewSecret(oc.AsAdmin(), "openshift-config", "pull-secret") } // waitUntilSecretHasStableValue polls a data in a secret and returns its value once it has been retrieved "numTries" times with the same value func waitUntilSecretHasStableValue(secret *Secret, data string, timeout, poll time.Duration, numTries int) (string, error) { var ( count = 0 oldVal string ) immediate := true waitErr := wait.PollUntilContextTimeout(context.TODO(), poll, timeout, immediate, func(_ context.Context) (bool, error) { val, err := secret.GetDataValue(data) if val == oldVal && err == nil { count++ } else { count = 0 oldVal = val } if count == numTries { return true, nil } return false, nil }) if waitErr == nil { return oldVal, nil } return "", waitErr } // rotateCertificateInSecret rotates the certificates in a Secret. We only return "tls.crt" since currently there is no use case for "tls.key" func rotateTLSSecretOrFail(secret *Secret) string { logger.Infof("Rotating TLS certificate in %s", secret) initialCert := secret.GetDataValueOrFail("tls.crt") logger.Debugf("Current certificate: %s", initialCert) logger.Infof("Patch certificate") o.Expect( secret.Patch("merge", `{"metadata": {"annotations": {"auth.openshift.io/certificate-not-after": null}}}`), ).To(o.Succeed(), "The secret %s could not be patched in order to rotate the certificate", secret) logger.Infof("Wait for certificate rotation") o.Eventually(secret.GetDataValueOrFail, "3m", "20s").WithArguments("tls.crt"). ShouldNot(exutil.Secure(o.Equal(initialCert)), "The certificate was not rotated in %s", secret) logger.Infof("Wait for the new certificate to be stable (avoid double rotations: OCPQE-20323)") newCert, err := waitUntilSecretHasStableValue(secret, "tls.crt", 5*time.Minute, 5*time.Second, 3) o.Expect(err).NotTo(o.HaveOccurred(), "We cannot get a new stable certificate after the certificate rotation in %s", secret) return newCert }
package mco
function
openshift/openshift-tests-private
beb3cf2d-e696-4461-8671-db8f720a6ac2
NewSecret
['Secret']
github.com/openshift/openshift-tests-private/test/extended/mco/secret.go
func NewSecret(oc *exutil.CLI, namespace, name string) *Secret { return &Secret{Resource: *NewNamespacedResource(oc, "secret", namespace, name)} }
mco
function
openshift/openshift-tests-private
b9bb4057-3cc5-4a56-8ebe-a38be8579f66
NewSecretList
['SecretList']
github.com/openshift/openshift-tests-private/test/extended/mco/secret.go
func NewSecretList(oc *exutil.CLI, namespace string) *SecretList { return &SecretList{*NewNamespacedResourceList(oc, "secret", namespace)} }
mco
function
openshift/openshift-tests-private
65275151-f908-45f5-892c-97f3ed8237c7
GetAll
['Secret', 'SecretList']
github.com/openshift/openshift-tests-private/test/extended/mco/secret.go
func (sl *SecretList) GetAll() ([]Secret, error) { allSecretResources, err := sl.ResourceList.GetAll() if err != nil { return nil, err } allSecrets := make([]Secret, 0, len(allSecretResources)) for _, secretRes := range allSecretResources { allSecrets = append(allSecrets, *NewSecret(sl.oc, sl.GetNamespace(), secretRes.name)) } return allSecrets, nil }
mco
function
openshift/openshift-tests-private
b2f831c4-69e1-4746-ac09-141f531e0cbd
ExtractToDir
['Secret']
github.com/openshift/openshift-tests-private/test/extended/mco/secret.go
func (s Secret) ExtractToDir(directory string) error { err := s.oc.WithoutNamespace().Run("extract").Args(s.GetKind()+"/"+s.GetName(), "-n", s.GetNamespace(), "--to", directory).Execute() if err != nil { return err } return nil }
mco
function
openshift/openshift-tests-private
bddd1247-4de2-42f4-9fc1-2808d1b2d473
Extract
['"fmt"', '"os"', '"path/filepath"', '"time"']
['Secret']
github.com/openshift/openshift-tests-private/test/extended/mco/secret.go
func (s Secret) Extract() (string, error) { layout := "2006_01_02T15-04-05Z.000" directory := filepath.Join(e2e.TestContext.OutputDir, fmt.Sprintf("%s-%s-secret-%s", s.GetNamespace(), s.GetName(), time.Now().Format(layout))) os.MkdirAll(directory, os.ModePerm) return directory, s.ExtractToDir(directory) }
mco
function
openshift/openshift-tests-private
a3c5d531-a882-4437-8513-b13f7619e591
GetDataValue
['"fmt"']
['Secret']
github.com/openshift/openshift-tests-private/test/extended/mco/secret.go
func (s Secret) GetDataValue(key string) (string, error) { templateArg := fmt.Sprintf(`--template={{index .data "%s" | base64decode}}`, key) return s.oc.AsAdmin().WithoutNamespace().Run("get").Args(s.GetKind(), s.GetName(), "-n", s.GetNamespace(), templateArg).Output() }
mco
function
openshift/openshift-tests-private
4739d234-5e50-4eea-94d9-005ca8e3dfb6
GetDecodedDataMap
['"encoding/base64"', '"encoding/json"']
['Secret']
github.com/openshift/openshift-tests-private/test/extended/mco/secret.go
func (s Secret) GetDecodedDataMap() (map[string]string, error) { data := map[string]string{} dataJSON, err := s.Get(`{.data}`) if err != nil { return nil, err } if err := json.Unmarshal([]byte(dataJSON), &data); err != nil { return nil, err } for k, vb64 := range data { v, err := base64.StdEncoding.DecodeString(vb64) if err != nil { logger.Errorf("The certiifcate provided in the kubeconfig is not base64 encoded") return nil, err } // Replace the original encoded value with the decoded value data[k] = string(v) } return data, nil }
mco
function
openshift/openshift-tests-private
2418b423-8d5f-4466-8014-ac8a81075f25
GetDataValueOrFail
['Secret']
github.com/openshift/openshift-tests-private/test/extended/mco/secret.go
func (s Secret) GetDataValueOrFail(key string) string { data, err := s.GetDataValue(key) o.ExpectWithOffset(1, err).NotTo(o.HaveOccurred(), "Cannot get the value of %s from secret %s -n %s", key, s.GetName(), s.GetNamespace()) return data }
mco
function
openshift/openshift-tests-private
cc910a77-9607-4c4e-ad53-07f74bf87cd7
SetDataValue
['"fmt"']
['Secret']
github.com/openshift/openshift-tests-private/test/extended/mco/secret.go
func (s Secret) SetDataValue(key, value string) error { // silently set the value so that we don't print the secret in the logs leaking sensible information s.oc.NotShowInfo() defer s.oc.SetShowInfo() logger.Debugf("Secret %s -n %s. Setting value: %s=%s", s.GetName(), s.GetNamespace(), key, value) // command example: oc secret pull-secret -n openshift-config set data .dockerconfigjson={} return s.oc.AsAdmin().WithoutNamespace().Run("set").Args("data", s.GetKind(), s.GetName(), "-n", s.GetNamespace(), fmt.Sprintf("%s=%s", key, value)).Execute() }
mco
function
openshift/openshift-tests-private
c944e87a-2164-4e4f-8db2-8092114e7dbf
GetPullSecret
['Secret']
github.com/openshift/openshift-tests-private/test/extended/mco/secret.go
func GetPullSecret(oc *exutil.CLI) *Secret { return NewSecret(oc.AsAdmin(), "openshift-config", "pull-secret") }
mco
function
openshift/openshift-tests-private
19d4ccfa-a49c-4791-9e3d-f7acac1b0923
waitUntilSecretHasStableValue
['"context"', '"time"', '"k8s.io/apimachinery/pkg/util/wait"']
['Secret']
github.com/openshift/openshift-tests-private/test/extended/mco/secret.go
func waitUntilSecretHasStableValue(secret *Secret, data string, timeout, poll time.Duration, numTries int) (string, error) { var ( count = 0 oldVal string ) immediate := true waitErr := wait.PollUntilContextTimeout(context.TODO(), poll, timeout, immediate, func(_ context.Context) (bool, error) { val, err := secret.GetDataValue(data) if val == oldVal && err == nil { count++ } else { count = 0 oldVal = val } if count == numTries { return true, nil } return false, nil }) if waitErr == nil { return oldVal, nil } return "", waitErr }
mco
function
openshift/openshift-tests-private
2edf9d25-51cd-4e10-a26a-6f3cb747a8c3
rotateTLSSecretOrFail
['"time"']
['Secret']
github.com/openshift/openshift-tests-private/test/extended/mco/secret.go
func rotateTLSSecretOrFail(secret *Secret) string { logger.Infof("Rotating TLS certificate in %s", secret) initialCert := secret.GetDataValueOrFail("tls.crt") logger.Debugf("Current certificate: %s", initialCert) logger.Infof("Patch certificate") o.Expect( secret.Patch("merge", `{"metadata": {"annotations": {"auth.openshift.io/certificate-not-after": null}}}`), ).To(o.Succeed(), "The secret %s could not be patched in order to rotate the certificate", secret) logger.Infof("Wait for certificate rotation") o.Eventually(secret.GetDataValueOrFail, "3m", "20s").WithArguments("tls.crt"). ShouldNot(exutil.Secure(o.Equal(initialCert)), "The certificate was not rotated in %s", secret) logger.Infof("Wait for the new certificate to be stable (avoid double rotations: OCPQE-20323)") newCert, err := waitUntilSecretHasStableValue(secret, "tls.crt", 5*time.Minute, 5*time.Second, 3) o.Expect(err).NotTo(o.HaveOccurred(), "We cannot get a new stable certificate after the certificate rotation in %s", secret) return newCert }
mco
test
openshift/openshift-tests-private
d54c57c6-dd3d-488d-a55c-f98c761a7761
util
import ( "bytes" "compress/gzip" "context" "crypto/x509" b64 "encoding/base64" "encoding/json" "encoding/pem" "fmt" "net" "net/url" "os" "os/exec" "path" "path/filepath" "regexp" "sort" "strconv" "strings" "time" "github.com/google/uuid" "github.com/tidwall/gjson" "github.com/tidwall/sjson" "sigs.k8s.io/yaml" g "github.com/onsi/ginkgo/v2" o "github.com/onsi/gomega" "k8s.io/apimachinery/pkg/util/wait" exutil "github.com/openshift/openshift-tests-private/test/extended/util" logger "github.com/openshift/openshift-tests-private/test/extended/util/logext" e2e "k8s.io/kubernetes/test/e2e/framework" )
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
package mco import ( "bytes" "compress/gzip" "context" "crypto/x509" b64 "encoding/base64" "encoding/json" "encoding/pem" "fmt" "net" "net/url" "os" "os/exec" "path" "path/filepath" "regexp" "sort" "strconv" "strings" "time" "github.com/google/uuid" "github.com/tidwall/gjson" "github.com/tidwall/sjson" "sigs.k8s.io/yaml" g "github.com/onsi/ginkgo/v2" o "github.com/onsi/gomega" "k8s.io/apimachinery/pkg/util/wait" exutil "github.com/openshift/openshift-tests-private/test/extended/util" logger "github.com/openshift/openshift-tests-private/test/extended/util/logext" e2e "k8s.io/kubernetes/test/e2e/framework" ) // fixturePathCache to store fixture path mapping, key: dir name under testdata, value: fixture path var fixturePathCache = make(map[string]string) // PodDisruptionBudget struct is used to handle PodDisruptionBudget resources in OCP type PodDisruptionBudget struct { name string namespace string template string } // ImageContentSourcePolicy struct is used to handle ImageContentSourcePolicy resources in OCP type ImageContentSourcePolicy struct { name string template string } // ImageDigestMirrorSet struct is used to handle ImageDigestMirrorSet resources in OCP type ImageDigestMirrorSet struct { Resource Template } // NewImageDigestMirrorSet create a new ImageDigestMirrorSet struct func NewImageDigestMirrorSet(oc *exutil.CLI, name string, t Template) *ImageDigestMirrorSet { return &ImageDigestMirrorSet{Resource: *NewResource(oc, "ImageDigestMirrorSet", name), Template: t} } // ImageTagMirrorSet struct is used to handle ImageTagMirrorSet resources in OCP type ImageTagMirrorSet struct { Resource Template } // NewImageTagMirrorSet create a new ImageTagMirrorSet struct func NewImageTagMirrorSet(oc *exutil.CLI, name string, t Template) *ImageTagMirrorSet { return &ImageTagMirrorSet{Resource: *NewResource(oc, "ImageTagMirrorSet", name), Template: t} } // TextToVerify is a helper struct to verify configurations using the `createMcAndVerifyMCValue` function type TextToVerify struct { textToVerifyForMC string textToVerifyForNode string needBash bool needChroot bool } func (pdb *PodDisruptionBudget) create(oc *exutil.CLI) { logger.Infof("Creating pod disruption budget: %s", pdb.name) exutil.CreateNsResourceFromTemplate(oc, pdb.namespace, "--ignore-unknown-parameters=true", "-f", pdb.template, "-p", "NAME="+pdb.name) } func (pdb *PodDisruptionBudget) delete(oc *exutil.CLI) { logger.Infof("Deleting pod disruption budget: %s", pdb.name) err := oc.AsAdmin().WithoutNamespace().Run("delete").Args("pdb", pdb.name, "-n", pdb.namespace, "--ignore-not-found=true").Execute() o.Expect(err).NotTo(o.HaveOccurred()) } func (icsp *ImageContentSourcePolicy) create(oc *exutil.CLI) { exutil.CreateClusterResourceFromTemplate(oc, "--ignore-unknown-parameters=true", "-f", icsp.template, "-p", "NAME="+icsp.name) mcp := NewMachineConfigPool(oc.AsAdmin(), "worker") mcp.waitForComplete() mcp.name = "master" mcp.waitForComplete() } func (icsp *ImageContentSourcePolicy) delete(oc *exutil.CLI) { logger.Infof("deleting icsp config: %s", icsp.name) err := oc.AsAdmin().WithoutNamespace().Run("delete").Args("imagecontentsourcepolicy", icsp.name, "--ignore-not-found=true").Execute() o.Expect(err).NotTo(o.HaveOccurred()) mcp := NewMachineConfigPool(oc.AsAdmin(), "worker") mcp.waitForComplete() mcp.name = "master" mcp.waitForComplete() } func getTimeDifferenceInMinute(oldTimestamp, newTimestamp string) float64 { oldTimeValues := strings.Split(oldTimestamp, ":") oldTimeHour, _ := strconv.Atoi(oldTimeValues[0]) oldTimeMinute, _ := strconv.Atoi(oldTimeValues[1]) oldTimeSecond, _ := strconv.Atoi(strings.Split(oldTimeValues[2], ".")[0]) oldTimeNanoSecond, _ := strconv.Atoi(strings.Split(oldTimeValues[2], ".")[1]) newTimeValues := strings.Split(newTimestamp, ":") newTimeHour, _ := strconv.Atoi(newTimeValues[0]) newTimeMinute, _ := strconv.Atoi(newTimeValues[1]) newTimeSecond, _ := strconv.Atoi(strings.Split(newTimeValues[2], ".")[0]) newTimeNanoSecond, _ := strconv.Atoi(strings.Split(newTimeValues[2], ".")[1]) y, m, d := time.Now().Date() oldTime := time.Date(y, m, d, oldTimeHour, oldTimeMinute, oldTimeSecond, oldTimeNanoSecond, time.UTC) newTime := time.Date(y, m, d, newTimeHour, newTimeMinute, newTimeSecond, newTimeNanoSecond, time.UTC) return newTime.Sub(oldTime).Minutes() } func filterTimestampFromLogs(logs string, numberOfTimestamp int) []string { return regexp.MustCompile("(?m)[0-9]{1,2}:[0-9]{1,2}:[0-9]{1,2}.[0-9]{1,6}").FindAllString(logs, numberOfTimestamp) } func getMachineConfigDetails(oc *exutil.CLI, mcName string) (string, error) { return oc.AsAdmin().WithoutNamespace().Run("get").Args("mc", mcName, "-o", "yaml").Output() } // func getKubeletConfigDetails(oc *exutil.CLI, kcName string) (string, error) { // return oc.AsAdmin().WithoutNamespace().Run("get").Args("kubeletconfig", kcName, "-o", "yaml").Output() // } func getPullSecret(oc *exutil.CLI) (string, error) { return oc.AsAdmin().WithoutNamespace().Run("get").Args("secret/pull-secret", "-n", "openshift-config", `--template={{index .data ".dockerconfigjson" | base64decode}}`).OutputToFile("auth.dockerconfigjson") } func setDataForPullSecret(oc *exutil.CLI, configFile string) (string, error) { return oc.AsAdmin().WithoutNamespace().Run("set").Args("data", "secret/pull-secret", "-n", "openshift-config", "--from-file=.dockerconfigjson="+configFile).Output() } func getCommitID(oc *exutil.CLI, component, clusterVersion string) (string, error) { secretFile, secretErr := getPullSecret(oc) if secretErr != nil { return "", secretErr } outFilePath, ocErr := oc.AsAdmin().WithoutNamespace().Run("adm").Args("release", "info", "--registry-config="+secretFile, "--commits", clusterVersion, "--insecure=true").OutputToFile("commitIdLogs.txt") if ocErr != nil { return "", ocErr } commitID, cmdErr := exec.Command("bash", "-c", "cat "+outFilePath+" | grep "+component+" | awk '{print $3}'").Output() return strings.TrimSuffix(string(commitID), "\n"), cmdErr } func getGoVersion(component, commitID string) (float64, error) { curlOutput, curlErr := exec.Command("bash", "-c", "curl -Lks https://raw.githubusercontent.com/openshift/"+component+"/"+commitID+"/go.mod | egrep '^go'").Output() if curlErr != nil { return 0, curlErr } goVersion := string(curlOutput)[3:] // We only want X.Y version, not X.Y.Z version goVersionSplit := strings.Split(goVersion, ".") if len(goVersionSplit) < 2 { return 0, fmt.Errorf("Wrong go version string %s. It should be at least X.Y format", goVersion) } xyGoVersion := goVersionSplit[0] + "." + goVersionSplit[1] return strconv.ParseFloat(strings.TrimSuffix(xyGoVersion, "\n"), 64) } func containsMultipleStrings(sourceString string, expectedStrings []string) bool { o.Expect(sourceString).NotTo(o.BeEmpty()) o.Expect(expectedStrings).NotTo(o.BeEmpty()) var count int for _, element := range expectedStrings { if strings.Contains(sourceString, element) { count++ } } return len(expectedStrings) == count } // generateTemplateAbsolutePath manipulates absolute path of test file by // cached fixture test data dir and file name // because exutil.FixturePath will copy all test files to fixture path (tmp dir with prefix fixture-testdata-dir) // this operation is very expensive, we don't want to call it for every case func generateTemplateAbsolutePath(fileName string) string { mcoDirName := "mco" mcoBaseDir := "" if mcoBaseDir = fixturePathCache[mcoDirName]; mcoBaseDir == "" { logger.Infof("mco fixture dir is not initialized, start to create") mcoBaseDir = exutil.FixturePath("testdata", mcoDirName) fixturePathCache[mcoDirName] = mcoBaseDir logger.Infof("mco fixture dir is initialized: %s", mcoBaseDir) } else { mcoBaseDir = fixturePathCache[mcoDirName] logger.Debugf("mco fixture dir found in cache: %s", mcoBaseDir) } return filepath.Join(mcoBaseDir, fileName) } func getSATokenFromContainer(oc *exutil.CLI, podName, podNamespace, container string) string { podOut, err := exutil.RemoteShContainer(oc, podNamespace, podName, container, "cat", "/var/run/secrets/kubernetes.io/serviceaccount/token") o.Expect(err).NotTo(o.HaveOccurred()) return podOut } func getHostFromRoute(oc *exutil.CLI, routeName, routeNamespace string) string { stdout, err := oc.AsAdmin().WithoutNamespace().Run("get").Args("route", routeName, "-n", routeNamespace, "-o", "jsonpath='{.spec.host}'").Output() o.Expect(err).NotTo(o.HaveOccurred()) return stdout } // DEPRECATED, use generateTempFilePath instead func generateTmpFile(oc *exutil.CLI, fileName string) string { return filepath.Join(e2e.TestContext.OutputDir, oc.Namespace()+"-"+fileName) } func getPrometheusQueryResults(oc *exutil.CLI, query string) string { token := getSATokenFromContainer(oc, "prometheus-k8s-0", "openshift-monitoring", "prometheus") routeHost := getHostFromRoute(oc, "prometheus-k8s", "openshift-monitoring") url := fmt.Sprintf("https://%s/api/v1/query?query=%s", routeHost, query) headers := fmt.Sprintf("Authorization: Bearer %s", token) curlCmd := fmt.Sprintf("curl -ks -H '%s' %s", headers, url) logger.Infof("curl cmd:\n %s", curlCmd) curlOutput, cmdErr := exec.Command("bash", "-c", curlCmd).Output() logger.Infof("curl output:\n%s", curlOutput) o.Expect(cmdErr).NotTo(o.HaveOccurred()) return string(curlOutput) } func gZipData(data []byte) (compressedData []byte, err error) { var b bytes.Buffer gz := gzip.NewWriter(&b) defer func() { _ = gz.Close() }() _, err = gz.Write(data) if err != nil { return nil, err } if err := gz.Flush(); err != nil { return nil, err } if err := gz.Close(); err != nil { return nil, err } compressedData = b.Bytes() return compressedData, nil } func jsonEncode(s string) string { e, err := json.Marshal(s) if err != nil { e2e.Failf("Error json encoding the string: %s", s) } return string(e) } // MarshalOrFail returns a marshalled interface or panics func MarshalOrFail(input interface{}) []byte { bytes, err := json.Marshal(input) if err != nil { o.ExpectWithOffset(1, err).NotTo(o.HaveOccurred(), "The data cannot be marshaled. Data: %v", input) } return bytes } func getURLEncodedFileConfig(destinationPath, content, mode string) string { encodedContent := url.PathEscape(content) return getFileConfig(destinationPath, "data:,"+encodedContent, mode) } func getBase64EncodedFileConfig(destinationPath, content, mode string) string { return getFileConfig(destinationPath, GetBase64EncodedFileSourceContent(content), mode) } func getFileConfig(destinationPath, source, mode string) string { decimalMode := mode // if octal number we convert it to decimal. Json templates do not accept numbers with a leading zero (octal). // if we don't do this conversion the 'oc process' command will not be able to render the template because {"mode": 0666} // is not a valid json. Numbers in json cannot start with a leading 0 if mode != "" && mode[0] == '0' { // parse the octal string and conver to integer iMode, err := strconv.ParseInt(mode, 8, 64) // get a string with the decimal numeric representation of the mode decimalMode = fmt.Sprintf("%d", os.FileMode(iMode)) if err != nil { e2e.Failf("Filer permissions %s cannot be converted to integer", mode) } } var fileConfig string if mode == "" { fileConfig = fmt.Sprintf(`{"contents": {"source": "%s"}, "path": "%s"}`, source, destinationPath) } else { fileConfig = fmt.Sprintf(`{"contents": {"source": "%s"}, "path": "%s", "mode": %s}`, source, destinationPath, decimalMode) } return fileConfig } func getGzipFileJSONConfig(destinationPath, fileContent string) string { compressedContent, err := gZipData([]byte(fileContent)) o.Expect(err).NotTo(o.HaveOccurred()) encodedContent := b64.StdEncoding.EncodeToString(compressedContent) fileConfig := fmt.Sprintf(`{"contents": {"compression": "gzip", "source": "data:;base64,%s"}, "path": "%s"}`, encodedContent, destinationPath) return fileConfig } func getMaskServiceWithContentsConfig(name string, mask bool, unitContents string) string { // Escape not valid characters in json from the file content escapedContent := jsonEncode(unitContents) return fmt.Sprintf(`{"name": "%s", "mask": %t, "contents": %s}`, name, mask, escapedContent) } func getMaskServiceConfig(name string, mask bool) string { return fmt.Sprintf(`{"name": "%s", "mask": %t}`, name, mask) } func getDropinFileConfig(unitName string, enabled bool, fileName, fileContent string) string { // Escape not valid characters in json from the file content escapedContent := jsonEncode(fileContent) return fmt.Sprintf(`{"name": "%s", "enabled": %t, "dropins": [{"name": "%s", "contents": %s}]}`, unitName, enabled, fileName, escapedContent) } func getSingleUnitConfig(unitName string, unitEnabled bool, unitContents string) string { // Escape not valid characters in json from the file content escapedContent := jsonEncode(unitContents) return fmt.Sprintf(`{"name": "%s", "enabled": %t, "contents": %s}`, unitName, unitEnabled, escapedContent) } // AddToAllMachineSets adds a delta to all MachineSets replicas and wait for the MachineSets to be ready func AddToAllMachineSets(oc *exutil.CLI, delta int) error { allMs, err := NewMachineSetList(oc, "openshift-machine-api").GetAll() o.Expect(err).NotTo(o.HaveOccurred()) var addErr error modifiedMSs := []MachineSet{} for _, ms := range allMs { addErr = ms.AddToScale(delta) if addErr == nil { modifiedMSs = append(modifiedMSs, ms) } else { break } } if addErr != nil { logger.Infof("Error reconfiguring MachineSets. Restoring original replicas.") for _, ms := range modifiedMSs { _ = ms.AddToScale(-1 * delta) } return addErr } var waitErr error for _, ms := range allMs { immediate := true waitErr = wait.PollUntilContextTimeout(context.TODO(), 30*time.Second, 20*time.Minute, immediate, func(_ context.Context) (bool, error) { return ms.GetIsReady(), nil }) if waitErr != nil { logger.Errorf("MachineSet %s is not ready. Restoring original replicas.", ms.GetName()) for _, ms := range modifiedMSs { _ = ms.AddToScale(-1 * delta) } break } } return waitErr } func sortNodeList(nodes []Node) []Node { sort.Slice(nodes, func(l, r int) bool { lMetadata := JSON(nodes[l].GetOrFail("{.metadata}")) rMetadata := JSON(nodes[r].GetOrFail("{.metadata}")) lLabels := &JSONData{nil} if lMetadata.Get("labels").Exists() { lLabels = lMetadata.Get("labels") } rLabels := &JSONData{nil} if rMetadata.Get("labels").Exists() { rLabels = rMetadata.Get("labels") } lZone := lLabels.Get("topology.kubernetes.io/zone") rZone := rLabels.Get("topology.kubernetes.io/zone") // if both nodes have zone label, sort by zone, push nodes without label to end of list if lZone.Exists() && rZone.Exists() { //nolint:all if lZone.ToString() != rZone.ToString() { return lZone.ToString() < rZone.ToString() } } else if rZone.Exists() { return false } else if lZone.Exists() { return true } // if nodes are in the same zone or they have no labels sortby creationTime oldest to newest dateLayout := "2006-01-02T15:04:05Z" lDate, err := time.Parse(dateLayout, lMetadata.Get("creationTimestamp").ToString()) if err != nil { e2e.Failf("Cannot parse creationTimestamp %s in node %s", lMetadata.Get("creationTimestamp").ToString(), nodes[l].GetName()) } rDate, err := time.Parse(dateLayout, rMetadata.Get("creationTimestamp").ToString()) if err != nil { e2e.Failf("Cannot parse creationTimestamp %s in node %s", rMetadata.Get("creationTimestamp").ToString(), nodes[r].GetName()) } return lDate.Before(rDate) }) return nodes } // sortMasterNodeList returns the list of nodes sorted by the order used to updated them in MCO master pool. // // Master pool will use the same order as the rest of the pools, but the node running the operator pod will be the last one to be updated. func sortMasterNodeList(oc *exutil.CLI, nodes []Node) ([]Node, error) { masterSortedNodes := []Node{} operatorNode, err := GetOperatorNode(oc) if err != nil { return nil, err } logger.Infof("MCO operator pod running in node: %s", operatorNode) var latestNode Node for _, item := range sortNodeList(nodes) { node := item if node.GetName() == operatorNode.GetName() { latestNode = node continue } masterSortedNodes = append(masterSortedNodes, node) } masterSortedNodes = append(masterSortedNodes, latestNode) logger.Infof("Sorted master nodes: %s", masterSortedNodes) return masterSortedNodes, nil } func getMachineConfigControllerPod(oc *exutil.CLI) (string, error) { pod, err := oc.AsAdmin().WithoutNamespace().Run("get").Args("pod", "-n", MachineConfigNamespace, "-l", ControllerLabel+"="+ControllerLabelValue, "-o", `jsonpath={.items[?(@.status.phase=="Running")].metadata.name}`).Output() logger.Infof("machine-config-controller pod name is %s", pod) return pod, err } func getMachineConfigOperatorPod(oc *exutil.CLI) (string, error) { pods, err := exutil.GetAllPodsWithLabel(oc.AsAdmin(), MachineConfigNamespace, "k8s-app=machine-config-operator") logger.Infof("machine-config-operator pod name is %s", pods[0]) return pods[0], err } func getAlertsByName(oc *exutil.CLI, alertName string) ([]JSONData, error) { mon, monErr := exutil.NewPrometheusMonitor(oc.AsAdmin()) if monErr != nil { return nil, monErr } allAlerts, allAlertsErr := mon.GetAlerts() if allAlertsErr != nil { return nil, allAlertsErr } logger.Infof("get all alerts: %s\n", allAlerts) jsonObj := JSON(allAlerts) if jsonObj == nil { return nil, fmt.Errorf("Cannot parse json string: %s", allAlerts) } filteredAlerts, filteredAlertErr := jsonObj.GetJSONPath(fmt.Sprintf(`{.data.alerts[?(@.labels.alertname=="%s")]}`, alertName)) if filteredAlertErr != nil { return nil, filteredAlertErr } for _, alert := range filteredAlerts { logger.Infof("filtered alert %s\n", alert.String()) } return filteredAlerts, nil } // WrapWithBracketsIfIpv6 wraps the ip with brackets if it is an IPV6 address. // In order to use IPV6 addresses with curl commands we need to wrap them between brackets. func WrapWithBracketsIfIpv6(ip string) (string, error) { parsedIP := net.ParseIP(ip) if parsedIP == nil { return "", fmt.Errorf("The string %s is not a valid IP", ip) } // If it is an IPV6 address, wrap it if parsedIP.To4() == nil { return "[" + ip + "]", nil } return ip, nil } func isFIPSEnabledInClusterConfig(oc *exutil.CLI) bool { cc := NewNamespacedResource(oc.AsAdmin(), "cm", "kube-system", "cluster-config-v1") ic := cc.GetOrFail("{.data.install-config}") return strings.Contains(ic, "fips: true") } // preChecks executes some basic checks to make sure the the cluster is healthy enough to run MCO test cases func preChecks(oc *exutil.CLI) { exutil.By("MCO Preconditions Checks") allMCPs, err := NewMachineConfigPoolList(oc.AsAdmin()).GetAll() o.Expect(err).NotTo(o.HaveOccurred(), "Cannot get the list of MachineConfigPools") for _, pool := range allMCPs { logger.Infof("Check that %s pool is ready for testing", pool.GetName()) if err := pool.SanityCheck(); err != nil { // Check that it is not degraded nor updating logger.Errorf("MCP is not ready for testing (it is updating or degraded):\n%s", pool.PrettyString()) g.Skip(fmt.Sprintf("%s pool is not ready for testing. %s", pool.GetName(), err)) } } logger.Infof("Wait for MCC to get the leader lease") o.Eventually(NewController(oc.AsAdmin()).HasAcquiredLease, "6m", "20s").Should(o.BeTrue(), "The controller pod didn't acquire the lease properly. Cannot execute any test case if the controller is not active") logger.Infof("End of MCO Preconditions\n") } // helper func to generate a temp file path with target dir // and file name pattern, * is reserved keyword, will be replaced // by random string func generateTempFilePath(dir, pattern string) string { return filepath.Join(dir, strings.ReplaceAll(pattern, "*", exutil.GetRandomString())) } // create a temp dir with e2e namespace for every test in JustBeforeEach // fail the test, if dir creation is failed func createTmpDir() string { // according to review comment, dir name should not depend on temp ns // it is empty when initialized by `NewCLIWithoutNamespace` tmpdir := filepath.Join(e2e.TestContext.OutputDir, fmt.Sprintf("mco-test-%s", exutil.GetRandomString())) err := os.MkdirAll(tmpdir, 0o755) o.Expect(err).NotTo(o.HaveOccurred()) logger.Infof("create test dir %s", tmpdir) return tmpdir } // parse base domain from dns config. format is like $clustername.$basedomain // this func does not support negative case, if info cannot be retrieved, fail the test func getBaseDomain(oc *exutil.CLI) string { baseDomain := NewResource(oc.AsAdmin(), "dns", "cluster").GetOrFail("{.spec.baseDomain}") return baseDomain[strings.Index(baseDomain, ".")+1:] } // check whether hypershift operator is installed and hostedcluster is created func isHypershiftEnabled(oc *exutil.CLI) bool { guestClusterName, guestClusterKubeconfigFile, _ := exutil.ValidHypershiftAndGetGuestKubeConfWithNoSkip(oc) return (guestClusterName != "" && guestClusterKubeconfigFile != "") } // get first hostedcluster name func getFirstHostedCluster(oc *exutil.CLI) string { hostedClusterName, _, _ := exutil.ValidHypershiftAndGetGuestKubeConfWithNoSkip(oc) logger.Infof("first hostedcluster name is %s", hostedClusterName) return hostedClusterName } // get image url of latest nightly build // command is like `oc image info registry.ci.openshift.org/ocp/release:4.12 -a /tmp/config.json -ojson|jq -r '.config.config.Labels."io.openshift.release"'` // this func does not support negative scenario, if any error occurred, fail the test directly // return imageURL and build version func getLatestImageURL(oc *exutil.CLI, release string) (string, string) { if release == "" { release = "4.12" // TODO: need to update default major version to 4.13 when 4.12 is GA } imageURLFormat := "%s:%s" registryBaseURL := "registry.ci.openshift.org/ocp/release" registryQueryURL := fmt.Sprintf(imageURLFormat, registryBaseURL, release) registryConfig, extractErr := getPullSecret(oc) defer os.Remove(registryConfig) o.Expect(extractErr).NotTo(o.HaveOccurred(), "extract registry config from pull secret error") imageInfo, getImageInfoErr := oc.AsAdmin().WithoutNamespace().Run("image").Args("info", registryQueryURL, "-a", registryConfig, "-ojson").Output() o.Expect(getImageInfoErr).NotTo(o.HaveOccurred(), "get image info error") o.Expect(imageInfo).NotTo(o.BeEmpty()) imageJSON := JSON(imageInfo) buildVersion := imageJSON.Get("config").Get("config").Get("Labels").Get(`io.openshift.release`).ToString() o.Expect(buildVersion).NotTo(o.BeEmpty(), "nightly build version is empty") imageDigest := imageJSON.Get("digest").ToString() o.Expect(imageDigest).NotTo(o.BeEmpty(), "image digest is empty") imageURL := fmt.Sprintf("%s@%s", registryBaseURL, imageDigest) logger.Infof("Get latest nigthtly build of %s: %s", release, imageURL) return imageURL, buildVersion } // skipTestIfSupportedPlatformNotMatched skip the test if supported platforms are not matched func skipTestIfSupportedPlatformNotMatched(oc *exutil.CLI, supported ...string) { var match bool p := exutil.CheckPlatform(oc) for _, sp := range supported { if strings.EqualFold(sp, p) { match = true break } } if !match { g.Skip(fmt.Sprintf("skip test because current platform %s is not in supported list %v", p, supported)) } } // IsAROCluster check cluster is ARO or not func IsAROCluster(oc *exutil.CLI) bool { return NewResource(oc.AsAdmin(), "clusters.aro.openshift.io", "cluster").Exists() } // skipTestIfRTKernel skips the current test if the cluster is using real time kernel func skipTestIfRTKernel(oc *exutil.CLI) { wMcp := NewMachineConfigPool(oc.AsAdmin(), MachineConfigPoolWorker) mMcp := NewMachineConfigPool(oc.AsAdmin(), MachineConfigPoolMaster) isWorkerRT, err := wMcp.IsRealTimeKernel() o.ExpectWithOffset(1, err).NotTo(o.HaveOccurred(), "Error trying to know if realtime kernel is active worker pool") isMasterRT, err := mMcp.IsRealTimeKernel() o.ExpectWithOffset(1, err).NotTo(o.HaveOccurred(), "Error trying to know if realtime kernel is active master pool") if isWorkerRT || isMasterRT { g.Skip("Pools are using real time kernel configuration. This test cannot be executed if the cluster is using RT kernel.") } } // skipTestIfExtensionsAreUsed skips the current test if any extension has been deployed in the nodes func skipTestIfExtensionsAreUsed(oc *exutil.CLI) { wMcp := NewMachineConfigPool(oc.AsAdmin(), MachineConfigPoolWorker) mMcp := NewMachineConfigPool(oc.AsAdmin(), MachineConfigPoolMaster) wCurrentMC, err := wMcp.GetConfiguredMachineConfig() o.ExpectWithOffset(1, err).NotTo(o.HaveOccurred(), "Error trying to get the current MC configured in worker pool") mCurrentMC, err := mMcp.GetConfiguredMachineConfig() o.ExpectWithOffset(1, err).NotTo(o.HaveOccurred(), "Error trying to get the current MC configured in master pool") wExtensions, err := wCurrentMC.GetExtensions() o.ExpectWithOffset(1, err).NotTo(o.HaveOccurred(), "Error trying to get the extensions configured in MC: %s", wCurrentMC.GetName()) mExtensions, err := mCurrentMC.GetExtensions() o.ExpectWithOffset(1, err).NotTo(o.HaveOccurred(), "Error trying to get the extensions configured in MC: %s", mCurrentMC.GetName()) if wExtensions != "[]" || mExtensions != "[]" { g.Skip("Current cluster is using extensions. This test cannot be execute in a cluster using extensions") } } // WorkersCanBeScaled returns true if worker nodes can be scaled using machinesets func WorkersCanBeScaled(oc *exutil.CLI) (bool, error) { logger.Infof("Checking if in this cluster workers can be scaled using machinesets") if exutil.CheckPlatform(oc) == BaremetalPlatform { logger.Infof("Baremetal platform. Can't scale up nodes in Baremetal test environmets. Nodes cannot be scaled") return false, nil } if !IsCapabilityEnabled(oc.AsAdmin(), "MachineAPI") { logger.Infof("MachineAPI capability is disabled. Nodes cannot be scaled") return false, nil } msl, err := NewMachineSetList(oc.AsAdmin(), MachineAPINamespace).GetAll() if err != nil { logger.Errorf("Error getting a list of MachineSet resources") return false, err } // If there is no machineset then clearly we can't use them to scale the workers if len(msl) == 0 { logger.Infof("No machineset configured. Nodes cannot be scaled") return false, nil } totalworkers := 0 for _, ms := range msl { replicas, err := ms.Get(`{.spec.replicas}`) if err != nil { logger.Errorf("Error getting the number of replicase in %s", ms) return false, err } if replicas != "" { intReplicas, err := strconv.Atoi(replicas) if err == nil { totalworkers += intReplicas } } } // In some UPI/SNO/Compact clusters machineset resources exist, but they are all configured with 0 replicas // If all machinesets have 0 replicas, then it means that we need to skip the test case if totalworkers == 0 { logger.Infof("All machinesets have 0 worker nodes. Nodes cannot be scaled") return false, nil } return true, nil } // skipTestIfWorkersCannotBeScaled skips the current test if the worker pool cannot be scaled via machineset func skipTestIfWorkersCannotBeScaled(oc *exutil.CLI) { canBeScaled, err := WorkersCanBeScaled(oc) o.ExpectWithOffset(1, err).NotTo(o.HaveOccurred(), "Error decidign if worker nodes can be scaled using machinesets") if !canBeScaled { g.Skip("Worker nodes cannot be scaled using machinesets. This test cannot be execute if workers cannot be scaled via machineset") } } // isBaselineCapabilitySetNone check value of enabledCapabilities in clusterversion, return true if it is empty or does not exist // nolint:deadcode func isBaselineCapabilitySetNone(oc *exutil.CLI) bool { return len(getEnabledCapabilities(oc)) == 0 } // getEnabledFeatureGates get enabled featuregates list func getEnabledFeatureGates(oc *exutil.CLI) ([]string, error) { enabledFeatureGates, err := NewResource(oc.AsAdmin(), "featuregate", "cluster").Get(`{.status.featureGates[0].enabled[*].name}`) if err != nil { return nil, err } return strings.Split(enabledFeatureGates, " "), nil } // IsFeaturegateEnabled check whether a featuregate is in enabled or not func IsFeaturegateEnabled(oc *exutil.CLI, featuregate string) (bool, error) { enabledFeatureGates, err := getEnabledFeatureGates(oc) if err != nil { return false, err } for _, f := range enabledFeatureGates { if f == featuregate { return true, nil } } return false, nil } func SkipIfNoFeatureGate(oc *exutil.CLI, featuregate string) { enabled, err := IsFeaturegateEnabled(oc, featuregate) o.Expect(err).NotTo(o.HaveOccurred(), "Error getting enabled featuregates") if !enabled { g.Skip(fmt.Sprintf("Featuregate %s is not enabled in this cluster", featuregate)) } } // getEnabledCapabilities get enabled capability list, the invoker can check expected capability is enabled or not func getEnabledCapabilities(oc *exutil.CLI) []interface{} { jsonStr := NewResource(oc.AsAdmin(), "clusterversion", "version").GetOrFail(`{.status.capabilities.enabledCapabilities}`) logger.Infof("enabled capabilities: %s", jsonStr) enabledCapabilities := make([]interface{}, 0) jsonData := JSON(jsonStr) if jsonData.Exists() { enabledCapabilities = jsonData.ToList() } return enabledCapabilities } // IsCapabilityEnabled check whether capability is in enabledCapabilities func IsCapabilityEnabled(oc *exutil.CLI, capability string) bool { enabledCapabilities := getEnabledCapabilities(oc) enabled := false for _, ec := range enabledCapabilities { if ec == capability { enabled = true break } } logger.Infof("Capability [%s] is enabled: %v", capability, enabled) return enabled } // GetCurrentTestPolarionIDNumber inspects the name of the test case and return the number of the polarion ID linked to this automated test case. It returns an empty string if no ID found. func GetCurrentTestPolarionIDNumber() string { name := g.CurrentSpecReport().FullText() r := regexp.MustCompile(`-(?P<id>\d+)-`) matches := r.FindStringSubmatch(name) number := r.SubexpIndex("id") if len(matches) < number+1 { logger.Errorf("Could not get the test case ID") return "" } return matches[number] } // GetBase64EncodedFileSourceContent returns the ignition config "source" value for a content file encoded in base64 func GetBase64EncodedFileSourceContent(fileContent string) string { encodedContent := b64.StdEncoding.EncodeToString([]byte(fileContent)) return "data:text/plain;charset=utf-8;base64," + encodedContent } // ConvertOctalPermissionsToDecimalOrFail transfomr an octal permission (0640) to its decimal form (416) func ConvertOctalPermissionsToDecimalOrFail(octalPerm string) int { o.ExpectWithOffset(1, octalPerm).To(o.And( o.Not(o.BeEmpty()), o.HavePrefix("0")), "Error the octal permissions %s should not be empty and should start with a '0' character") // parse the octal string and conver to integer iMode, err := strconv.ParseInt(octalPerm, 8, 64) o.ExpectWithOffset(1, err).NotTo(o.HaveOccurred(), "Error parsing string %s to ocatl", octalPerm) return int(iMode) } // PtrInt returns the pointer to an integer func PtrInt(a int) *int { return &a } // PtrStr returns the pointer to a string func PtrStr(a string) *string { return &a } // PtrTo returns the pointer to the element passed as parameter func PtrTo[T any](v T) *T { return &v } // RemoveAllMCDPods removes all MCD pods in openshift-machine-config-operator namespace func RemoveAllMCDPods(oc *exutil.CLI) error { return removeMCOPods(oc, "-l", "k8s-app=machine-config-daemon") } // removeAllMCOPods removes all MCO pods in openshift-machine-config-operator namespace matching the given selector args func removeMCOPods(oc *exutil.CLI, argsSelector ...string) error { args := append([]string{"pods", "-n", MachineConfigNamespace}, argsSelector...) err := oc.AsAdmin().WithoutNamespace().Run("delete").Args(args...).Execute() if err != nil { logger.Errorf("Cannot delete the pods in %s namespace", MachineConfigNamespace) return err } return waitForAllMCOPodsReady(oc, 15*time.Minute) } // waitForAllMCOPodsReady waits func waitForAllMCOPodsReady(oc *exutil.CLI, timeout time.Duration) error { logger.Infof("Waiting for MCO pods to be runnging and ready in namespace %s", MachineConfigNamespace) mcoPodsList := NewNamespacedResourceList(oc.AsAdmin(), "pod", MachineConfigNamespace) mcoPodsList.PrintDebugCommand() immediate := false waitErr := wait.PollUntilContextTimeout(context.TODO(), 10*time.Second, timeout, immediate, func(_ context.Context) (bool, error) { status, err := mcoPodsList.Get(`{.items[*].status.conditions[?(@.type=="Ready")].status}`) if err != nil { logger.Errorf("Problems getting pods info. Trying again") return false, nil } if strings.Contains(status, "False") { return false, nil } return true, nil }) if waitErr != nil { _ = oc.AsAdmin().WithoutNamespace().Run("get").Args("pods", "-n", MachineConfigNamespace).Execute() return fmt.Errorf("MCO pods were deleted in namespace %s, but they did not become ready", MachineConfigNamespace) } return nil } // OCCreate executes "oc create -f" command using a file. No "-n" parameter is provided, so the resources will be created in the current namespace or in the namespace defined in the resources' definitions func OCCreate(oc *exutil.CLI, fileName string) error { return oc.WithoutNamespace().Run("create").Args("-f", fileName).Execute() } // GetMCSPodNames returns a list of string containing the names of the MCS pods func GetMCSPodNames(oc *exutil.CLI) ([]string, error) { output, err := oc.AsAdmin().WithoutNamespace().Run("get").Args("pods", "-n", MachineConfigNamespace, "-l", "k8s-app=machine-config-server", "-o", "jsonpath={.items[*].metadata.name }").Output() if err != nil { return nil, err } if strings.Trim(output, " \n") == "" { return []string{}, nil } return strings.Split(output, " "), nil } // RotateMCSCertificates it executes the "oc adm ocp-certificates regenerate-machine-config-server-serving-cert" command in a master node // When we execute the command in the master node we make sure that in FIPS clusters we are running the command from a FIPS enabled machine. func RotateMCSCertificates(oc *exutil.CLI) error { wMcp := NewMachineConfigPool(oc.AsAdmin(), MachineConfigPoolWorker) master := wMcp.GetNodesOrFail()[0] remoteAdminKubeConfig := fmt.Sprintf("/root/remoteKubeConfig-%s", exutil.GetRandomString()) adminKubeConfig := exutil.KubeConfigPath() defer master.RemoveFile(remoteAdminKubeConfig) err := master.CopyFromLocal(adminKubeConfig, remoteAdminKubeConfig) if err != nil { return err } command := fmt.Sprintf("oc --kubeconfig=%s --insecure-skip-tls-verify adm ocp-certificates regenerate-machine-config-server-serving-cert", remoteAdminKubeConfig) logger.Infof("RUN: %s", command) stdout, err := master.DebugNodeWithChroot(strings.Split(command, " ")...) logger.Infof(stdout) return err } func GetCertificatesInfoFromPemBundle(bundleName string, pemBundle []byte) ([]CertificateInfo, error) { var certificatesInfo []CertificateInfo if pemBundle == nil { return nil, fmt.Errorf("Provided pem bundle is nil") } if len(pemBundle) == 0 { logger.Infof("Empty pem bundle") return certificatesInfo, nil } for { block, rest := pem.Decode(pemBundle) if block == nil { return nil, fmt.Errorf("failed to parse certificate PEM:\n%s", string(pemBundle)) } logger.Infof("FOUND: %s", block.Type) if block.Type != "CERTIFICATE" { return nil, fmt.Errorf("Only CERTIFICATES are expected in the bundle, but a type %s was found in it", block.Type) } cert, err := x509.ParseCertificate(block.Bytes) if err != nil { return nil, err } certificatesInfo = append(certificatesInfo, CertificateInfo{ BundleFile: bundleName, NotAfter: cert.NotAfter.Format(time.RFC3339), NotBefore: cert.NotBefore.Format(time.RFC3339), Signer: cert.Issuer.String(), Subject: cert.Subject.String(), }, ) pemBundle = rest if len(rest) == 0 { break } } return certificatesInfo, nil } // GetImageRegistryCertificates returns a map with the image registry certificates content. Key=certificate file name, Value=certificate content func GetImageRegistryCertificates(oc *exutil.CLI) (map[string]string, error) { return GetDataFromConfigMap(oc.AsAdmin(), "openshift-config-managed", "image-registry-ca") } // GetManagedMergedTrustedImageRegistryCertificates returns a map with the merged trusted image registry certificates content. Key=certificate file name, Value=certificate content func GetManagedMergedTrustedImageRegistryCertificates(oc *exutil.CLI) (map[string]string, error) { return GetDataFromConfigMap(oc.AsAdmin(), "openshift-config-managed", "merged-trusted-image-registry-ca") } // GetDataFromConfigMap returns a map[string]string with the information of the ".data" section of a configmap func GetDataFromConfigMap(oc *exutil.CLI, namespace, name string) (map[string]string, error) { data := map[string]string{} cm := NewNamespacedResource(oc.AsAdmin(), "ConfigMap", namespace, name) dataJSON, err := cm.Get(`{.data}`) if err != nil { return nil, err } if dataJSON == "" { return data, nil } if err := json.Unmarshal([]byte(dataJSON), &data); err != nil { return nil, err } return data, nil } // createCertificate creates a CA and returns: (path to the key used to sign the CA, path to the CA, error) // nolint:unparam func createCA(tmpDir, caFileName string) (keyPath, caPath string, err error) { var ( keyFileName = "privateKey.pem" ) caPath = filepath.Join(tmpDir, caFileName) keyPath = filepath.Join(tmpDir, keyFileName) logger.Infof("Creating CA in directory %s", tmpDir) logger.Infof("Create key") keyArgs := []string{"genrsa", "-out", keyFileName, "4096"} cmd := exec.Command("openssl", keyArgs...) cmd.Dir = tmpDir output, err := cmd.CombinedOutput() if err != nil { logger.Errorf(string(output)) return "", "", err } logger.Infof("Create CA") caArgs := []string{"req", "-new", "-x509", "-nodes", "-days", "3600", "-key", "privateKey.pem", "-out", caFileName, "-subj", "/OU=MCO QE/CN=example.com"} cmd = exec.Command("openssl", caArgs...) cmd.Dir = tmpDir output, err = cmd.CombinedOutput() if err != nil { logger.Errorf(string(output)) return "", "", err } return keyPath, caPath, nil } // splitCommandString splits a string taking into account double quotes and single quotes, unscaping the quotes if necessary // Example. Split this: // command "with \"escaped\" double quotes" and 'with \'escaped\' single quotes' and simple params // Result: // - command // - with "escaped" double quotes // - and // - with 'escaped' single quotes // - and // - simple // - params func splitCommandString(strCommand string) []string { command := []string{} insideDoubleQuote := false insideSingleQuote := false isSingleQuote := func(b byte) bool { return b == '\'' && !insideDoubleQuote } isDoubleQuote := func(b byte) bool { return b == '"' && !insideSingleQuote } arg := []byte{} for _, char := range []byte(strings.TrimSpace(strCommand)) { if isDoubleQuote(char) { // skip the first character of the quote if !insideDoubleQuote { insideDoubleQuote = true continue } // we are inside a quote // if the new double quote is scaped we unscape it and continue inside a quote if arg[len(arg)-1] == '\\' { arg[len(arg)-1] = '"' continue } // If there is no scaped char the we get out of the quote state ignoring the last character of the quote insideDoubleQuote = false continue } if isSingleQuote(char) { // skip the first character of the quote if !insideSingleQuote { insideSingleQuote = true continue } // we are inside a quote // if the new single quote is scaped we unscape it and continue inside a quote if arg[len(arg)-1] == '\\' { arg[len(arg)-1] = '\'' continue } // If there is no scaped char the we get out of the quote state ignoring the last character of the quote insideSingleQuote = false continue } if char == ' ' && !insideDoubleQuote && !insideSingleQuote { command = append(command, string(arg)) arg = []byte{} continue } arg = append(arg, char) } if len(arg) > 0 { command = append(command, string(arg)) } return command } // GetInternalIgnitionConfigURL return the API server internal uri without any port and without the protocol func GetAPIServerInternalURI(oc *exutil.CLI) (string, error) { infra := NewResource(oc, "infrastructure", "cluster") apiServerInternalURI, err := infra.Get(`{.status.apiServerInternalURI}`) if err != nil { return "", err } return regexp.MustCompile(`^https*:\/\/(.*):\d+$`).ReplaceAllString(strings.TrimSpace(apiServerInternalURI), `$1`), nil } // IsCompactOrSNOCluster returns true if the current cluster is a Compact cluster or a SNO cluster func IsCompactOrSNOCluster(oc *exutil.CLI) bool { var ( wMcp = NewMachineConfigPool(oc.AsAdmin(), MachineConfigPoolWorker) mcpList = NewMachineConfigPoolList(oc.AsAdmin()) ) return wMcp.IsEmpty() && len(mcpList.GetAllOrFail()) == 2 } // IsInstalledWithAssistedInstaller returns true if the assisted-installer was involved in the installation of the cluster. If any error happens, it fails the test. // // Remember that the agent installer is using assisted-installer for the installation too. func IsInstalledWithAssistedInstallerOrFail(oc *exutil.CLI) bool { logger.Infof("Checking if the cluster was installed using assisted-installer") assistedInstallerNS := NewResource(oc, "ns", "assisted-installer") return assistedInstallerNS.Exists() } func IsOnPremPlatform(platform string) bool { switch platform { case BaremetalPlatform, OvirtPlatform, OpenstackPlatform, VspherePlatform, NutanixPlatform: return true default: return false } } func SkipIfNotOnPremPlatform(oc *exutil.CLI) { platform := exutil.CheckPlatform(oc) if !IsOnPremPlatform(platform) { g.Skip(fmt.Sprintf("Current platform: %s. This test can only be execute in OnPrem platforms.", platform)) } } // GetClonedResourceJSONString takes the json data of a given resource and clone it using a new name and namespace, removing unnecessary fields // Sometimes we need to apply extra changes, in order to do so we can provide an function using the extraModifications parameter func GetClonedResourceJSONString(res ResourceInterface, newName, newNamespace string, extraModifications func(string) (string, error)) (string, error) { jsonRes, err := res.GetCleanJSON() if err != nil { return "", err } jsonRes, err = sjson.Delete(jsonRes, "status") if err != nil { return "", err } jsonRes, err = sjson.Delete(jsonRes, "metadata.creationTimestamp") if err != nil { return "", err } jsonRes, err = sjson.Delete(jsonRes, "metadata.resourceVersion") if err != nil { return "", err } jsonRes, err = sjson.Delete(jsonRes, "metadata.uid") if err != nil { return "", err } jsonRes, err = sjson.Delete(jsonRes, "metadata.generation") if err != nil { return "", err } jsonRes, err = sjson.Set(jsonRes, "metadata.name", newName) if err != nil { return "", err } if newNamespace != "" { jsonRes, err = sjson.Set(jsonRes, "metadata.namespace", newNamespace) if err != nil { return "", err } } if extraModifications != nil { logger.Infof("Executing extra modifications") return extraModifications(jsonRes) } return jsonRes, nil } // CloneResource will clone the given resource with the new name and the new namespace. If new namespace is an empty strng, it is ignored and the namespace will not be changed. // Sometimes we need to apply extra changes to the cloned resource before it is created, in order to do so we can provide an function using the extraModifications parameter func CloneResource(res ResourceInterface, newName, newNamespace string, extraModifications func(string) (string, error)) (*Resource, error) { logger.Infof("Cloning resource %s with name %s and namespace %s", res, newName, newNamespace) jsonRes, err := GetClonedResourceJSONString(res, newName, newNamespace, extraModifications) if err != nil { return nil, err } if newNamespace == "" { newNamespace = res.GetNamespace() } filename := "cloned-" + res.GetKind() + "-" + newName + "-" + uuid.NewString() if newNamespace != "" { filename += "-namespace" } filename += ".json" tmpFile := generateTmpFile(res.GetOC(), filename) wErr := os.WriteFile(tmpFile, []byte(jsonRes), 0o644) if wErr != nil { return nil, wErr } logger.Infof("New resource created using definition file %s", tmpFile) _, cErr := res.GetOC().AsAdmin().WithoutNamespace().Run("create").Args("-f", tmpFile).Output() if cErr != nil { return nil, cErr } return NewNamespacedResource(res.GetOC(), res.GetKind(), newNamespace, newName), nil } func skipIfNoTechPreview(oc *exutil.CLI) { if !exutil.IsTechPreviewNoUpgrade(oc) { g.Skip("featureSet: TechPreviewNoUpgrade is required for this test") } } func IsTrue(s string) bool { return strings.EqualFold(s, TrueString) } // ToJSONOrFail converts the given string in to JSON forma func ToJSON(content string) (string, error) { var js json.RawMessage if json.Unmarshal([]byte(content), &js) == nil { // the string is already JSON, no need to manipulate it return content, nil } bytes, err := yaml.YAMLToJSON([]byte(content)) return string(bytes), err } // getCertsFromKubeconfig returns the certificate used in a kubeconfig file func getCertsFromKubeconfig(kubeconfig string) (string, error) { // We don't know if the kubeconfig file will be in YAML or in JSON format // We will transform it into JSON JSONstring, err := ToJSON(kubeconfig) if err != nil { return "", err } currentCtx := gjson.Get(JSONstring, "current-context") logger.Debugf("Context: %s\n", currentCtx) if !currentCtx.Exists() || currentCtx.String() == "" { return "", fmt.Errorf("No current-contenxt in the provided kubeconfig") } logger.Debugf("Current context: %s", currentCtx.String()) cluster := gjson.Get(JSONstring, `contexts.#(name=="`+currentCtx.String()+`").context.cluster`) if !cluster.Exists() || cluster.String() == "" { return "", fmt.Errorf("No current cluster information for context %s in the provided kubeconfig", currentCtx.String()) } logger.Debugf("Cluster: %s\n", cluster.String()) cert64 := gjson.Get(JSONstring, `clusters.#(name=="`+cluster.String()+`").cluster.certificate-authority-data`) if !cert64.Exists() || cert64.String() == "" { return "", fmt.Errorf("No current certificate-authority-data information for context %s and cluster %s in the provided kubeconfig", currentCtx.String(), cluster.String()) } cert, err := b64.StdEncoding.DecodeString(cert64.String()) if err != nil { logger.Errorf("The certiifcate provided in the kubeconfig is not base64 encoded") return "", err } logger.Infof("Certificate successfully extracted from kubeconfig data") logger.Debugf("Cert: %s\n", string(cert)) return string(cert), nil } // checkAllOperatorsHealthy fails the test if any ClusterOperator resource is degraded func checkAllOperatorsHealthy(oc *exutil.CLI, timeout, poll string) { o.Eventually(func(gm o.Gomega) { // Passing o.Gomega as parameter we can use assertions inside the Eventually function without breaking the retries. ops, err := NewResourceList(oc, "co").GetAll() gm.Expect(err).NotTo(o.HaveOccurred(), "Could not get a list with all the clusteroperator resources") for _, op := range ops { gm.Expect(&op).NotTo(BeDegraded(), "%s is Degraded!. \n%s", op.PrettyString()) } }, timeout, poll). Should(o.Succeed(), "There are degraded ClusterOperators!") } // IsSNO returns true if the cluster is a SNO cluster func IsSNO(oc *exutil.CLI) bool { return len(exutil.OrFail[[]Node](NewNodeList(oc.AsAdmin()).GetAll())) == 1 } // IsSNOSafe returns true if the cluster is a SNO cluster. Instead of failing, it returns an error if we can't know if the cluster is SNO or not func IsSNOSafe(oc *exutil.CLI) (bool, error) { allNodes, err := NewNodeList(oc.AsAdmin()).GetAll() if err != nil { return false, err } return len(allNodes) == 1, nil } // SkipIfSNO skips the test case if the cluster is a SNO cluster func SkipIfSNO(oc *exutil.CLI) { if IsSNO(oc) { g.Skip("There is only 1 node in the cluster. This test is not supported in SNO clusters") } } // SkipIfCompactOrSNO skips the test case if the cluster is a compact or SNO cluster func SkipIfCompactOrSNO(oc *exutil.CLI) { if IsCompactOrSNOCluster(oc) { g.Skip("The test is not supported in Compact or SNO clusters") } } // getAllKubeProxyPod returns the kube-rbac-proxy- pod for given namespace func getAllKubeProxyPod(oc *exutil.CLI, namespace string) ([]string, error) { var kubeRabcProxyPodList []string getKubeProxyPod, err := exutil.GetAllPods(oc.AsAdmin(), namespace) for i := range getKubeProxyPod { if strings.Contains(getKubeProxyPod[i], "kube-rbac-proxy-crio-") { kubeRabcProxyPodList = append(kubeRabcProxyPodList, getKubeProxyPod[i]) } } if len(kubeRabcProxyPodList) == 0 { logger.Infof("Empty kube-rbac-proxy-crio- pod list") return kubeRabcProxyPodList, err } return kubeRabcProxyPodList, err } // WaitForStableCluster to wait for all clusteroperators to report Available=true, Progressing=false, Degraded=false. func WaitForStableCluster(oc *exutil.CLI, minimumStable, timeout string) error { err := oc.AsAdmin().Run("adm").Args("wait-for-stable-cluster", "--minimum-stable-period", minimumStable, "--timeout", timeout).Execute() if err != nil { oc.Run("get").Args("co").Execute() } return err } func extractJournalLogs(oc *exutil.CLI, outDir string) (totalErr error) { var ( nl = NewNodeList(oc) ) logger.Infof("Collecting journal logs") allNodes, err := nl.GetAll() if err != nil { return err } for _, node := range allNodes { if node.HasTaintEffectOrFail("NoExecute") { logger.Infof("Node %s is tainted with 'NoExecute'. Validation skipped.", node.GetName()) continue } if node.GetConditionStatusByType("DiskPressure") != FalseString { logger.Infof("Node %s is under disk pressure. The node cannot be debugged. We skip the validation for this node", node.GetName()) continue } logger.Infof("Collecting journal logs from node: %s", node.GetName()) fileName := path.Join(outDir, node.GetName()+"-journal.log") tmpFilePath := path.Join("/tmp/journal.log") _, err := node.DebugNodeWithChroot("bash", "-c", "journalctl -o with-unit > "+tmpFilePath) if err != nil { totalErr = err logger.Infof("Error getting journal logs from node %s: %s", node.GetName(), err) continue } err = node.CopyToLocal(tmpFilePath, fileName) if err != nil { totalErr = err logger.Infof("Error copying the file with the journal logs from node %s: %s", node.GetName(), err) continue } } return totalErr } // Retry function that retries a given function f, with a specified number of attempts and a delay between attempts func Retry(attempts int, delay time.Duration, f func() error) error { var err error for i := 0; i < attempts; i++ { err = f() if err == nil { return nil } logger.Errorf("Attempt %d failed: %v\n", i+1, err) if i < attempts-1 { time.Sleep(delay) } } return err } // GetLastNLines returns the last N lines from a string func GetLastNLines(s string, n int) string { lines := strings.Split(strings.ReplaceAll(s, "\r\n", "\n"), "\n") lenLines := len(lines) if lenLines > n { return strings.Join(lines[lenLines-n:], "\n") } return strings.Join(lines, "\n") } // RemoveDuplicates remove duplicated values from a slice func RemoveDuplicates[T comparable](list []T) []T { allKeys := make(map[T]bool) fileterdList := []T{} for _, item := range list { if !allKeys[item] { allKeys[item] = true fileterdList = append(fileterdList, item) } } return fileterdList } // GetClusterDesiredReleaseImage returns the desired image reported in the status of the clusterversion resource func GetClusterDesiredReleaseImage(oc *exutil.CLI) (string, error) { return oc.AsAdmin().WithoutNamespace().Run("get").Args("clusterversion", "version", "-o", "jsonpath={.status.desired.image}").Output() } // MergeDockerConfigs accepts two docker configs strings as parameter and merge them func MergeDockerConfigs(dockerConfig1, dockerConfig2 string) (string, error) { type DockerConfig struct { Auths map[string]interface{} `json:"auths"` } var config1, config2 DockerConfig err := json.Unmarshal([]byte(dockerConfig1), &config1) if err != nil { logger.Errorf("Error unmarshalling dockerConfig1") return "", err } err = json.Unmarshal([]byte(dockerConfig2), &config2) if err != nil { logger.Errorf("Error unmarshalling dockerConfig2") return "", err } for k, v := range config2.Auths { config1.Auths[k] = v } mergedConfig, err := json.Marshal(config1) if err != nil { logger.Errorf("Cannot marshal the merged docker config") return "", err } return string(mergedConfig), err }
package mco
function
openshift/openshift-tests-private
7183ce4d-acd7-4675-bf07-54b1a035bbfe
NewImageDigestMirrorSet
['ImageDigestMirrorSet']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func NewImageDigestMirrorSet(oc *exutil.CLI, name string, t Template) *ImageDigestMirrorSet { return &ImageDigestMirrorSet{Resource: *NewResource(oc, "ImageDigestMirrorSet", name), Template: t} }
mco
function
openshift/openshift-tests-private
dc40d35e-8c90-4a8e-a57e-55834ee570a4
NewImageTagMirrorSet
['ImageTagMirrorSet']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func NewImageTagMirrorSet(oc *exutil.CLI, name string, t Template) *ImageTagMirrorSet { return &ImageTagMirrorSet{Resource: *NewResource(oc, "ImageTagMirrorSet", name), Template: t} }
mco
function
openshift/openshift-tests-private
b81ecbb7-9e08-47b9-8a56-6a2d303e6eb0
create
['PodDisruptionBudget']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func (pdb *PodDisruptionBudget) create(oc *exutil.CLI) { logger.Infof("Creating pod disruption budget: %s", pdb.name) exutil.CreateNsResourceFromTemplate(oc, pdb.namespace, "--ignore-unknown-parameters=true", "-f", pdb.template, "-p", "NAME="+pdb.name) }
mco
function
openshift/openshift-tests-private
c88b3ef5-cc15-46b1-b028-30dd071961d1
delete
['PodDisruptionBudget']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func (pdb *PodDisruptionBudget) delete(oc *exutil.CLI) { logger.Infof("Deleting pod disruption budget: %s", pdb.name) err := oc.AsAdmin().WithoutNamespace().Run("delete").Args("pdb", pdb.name, "-n", pdb.namespace, "--ignore-not-found=true").Execute() o.Expect(err).NotTo(o.HaveOccurred()) }
mco
function
openshift/openshift-tests-private
a21d1171-aa0c-4f10-ba8e-33c52ceff26e
create
['ImageContentSourcePolicy']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func (icsp *ImageContentSourcePolicy) create(oc *exutil.CLI) { exutil.CreateClusterResourceFromTemplate(oc, "--ignore-unknown-parameters=true", "-f", icsp.template, "-p", "NAME="+icsp.name) mcp := NewMachineConfigPool(oc.AsAdmin(), "worker") mcp.waitForComplete() mcp.name = "master" mcp.waitForComplete() }
mco
function
openshift/openshift-tests-private
32749e5f-7583-4ffc-93f5-46dcd7427361
delete
['ImageContentSourcePolicy']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func (icsp *ImageContentSourcePolicy) delete(oc *exutil.CLI) { logger.Infof("deleting icsp config: %s", icsp.name) err := oc.AsAdmin().WithoutNamespace().Run("delete").Args("imagecontentsourcepolicy", icsp.name, "--ignore-not-found=true").Execute() o.Expect(err).NotTo(o.HaveOccurred()) mcp := NewMachineConfigPool(oc.AsAdmin(), "worker") mcp.waitForComplete() mcp.name = "master" mcp.waitForComplete() }
mco
function
openshift/openshift-tests-private
1684c91c-bedf-49dc-a0a5-f8c6795ae648
getTimeDifferenceInMinute
['"strconv"', '"strings"', '"time"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getTimeDifferenceInMinute(oldTimestamp, newTimestamp string) float64 { oldTimeValues := strings.Split(oldTimestamp, ":") oldTimeHour, _ := strconv.Atoi(oldTimeValues[0]) oldTimeMinute, _ := strconv.Atoi(oldTimeValues[1]) oldTimeSecond, _ := strconv.Atoi(strings.Split(oldTimeValues[2], ".")[0]) oldTimeNanoSecond, _ := strconv.Atoi(strings.Split(oldTimeValues[2], ".")[1]) newTimeValues := strings.Split(newTimestamp, ":") newTimeHour, _ := strconv.Atoi(newTimeValues[0]) newTimeMinute, _ := strconv.Atoi(newTimeValues[1]) newTimeSecond, _ := strconv.Atoi(strings.Split(newTimeValues[2], ".")[0]) newTimeNanoSecond, _ := strconv.Atoi(strings.Split(newTimeValues[2], ".")[1]) y, m, d := time.Now().Date() oldTime := time.Date(y, m, d, oldTimeHour, oldTimeMinute, oldTimeSecond, oldTimeNanoSecond, time.UTC) newTime := time.Date(y, m, d, newTimeHour, newTimeMinute, newTimeSecond, newTimeNanoSecond, time.UTC) return newTime.Sub(oldTime).Minutes() }
mco
function
openshift/openshift-tests-private
d53b28e9-7611-4206-b10f-9e4f93343168
filterTimestampFromLogs
['"regexp"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func filterTimestampFromLogs(logs string, numberOfTimestamp int) []string { return regexp.MustCompile("(?m)[0-9]{1,2}:[0-9]{1,2}:[0-9]{1,2}.[0-9]{1,6}").FindAllString(logs, numberOfTimestamp) }
mco
function
openshift/openshift-tests-private
7293dbe8-c627-48ad-9339-82cc9a0924ed
getMachineConfigDetails
['"sigs.k8s.io/yaml"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getMachineConfigDetails(oc *exutil.CLI, mcName string) (string, error) { return oc.AsAdmin().WithoutNamespace().Run("get").Args("mc", mcName, "-o", "yaml").Output() }
mco
function
openshift/openshift-tests-private
a239e7b8-61d1-4302-96d1-b861e411de6d
getPullSecret
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getPullSecret(oc *exutil.CLI) (string, error) { return oc.AsAdmin().WithoutNamespace().Run("get").Args("secret/pull-secret", "-n", "openshift-config", `--template={{index .data ".dockerconfigjson" | base64decode}}`).OutputToFile("auth.dockerconfigjson") }
mco
function
openshift/openshift-tests-private
fc3ce127-4651-47a3-a359-6002980a5415
setDataForPullSecret
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func setDataForPullSecret(oc *exutil.CLI, configFile string) (string, error) { return oc.AsAdmin().WithoutNamespace().Run("set").Args("data", "secret/pull-secret", "-n", "openshift-config", "--from-file=.dockerconfigjson="+configFile).Output() }
mco
function
openshift/openshift-tests-private
409bd707-67ce-47d0-ac07-6456ad5c321a
getCommitID
['"os/exec"', '"strings"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getCommitID(oc *exutil.CLI, component, clusterVersion string) (string, error) { secretFile, secretErr := getPullSecret(oc) if secretErr != nil { return "", secretErr } outFilePath, ocErr := oc.AsAdmin().WithoutNamespace().Run("adm").Args("release", "info", "--registry-config="+secretFile, "--commits", clusterVersion, "--insecure=true").OutputToFile("commitIdLogs.txt") if ocErr != nil { return "", ocErr } commitID, cmdErr := exec.Command("bash", "-c", "cat "+outFilePath+" | grep "+component+" | awk '{print $3}'").Output() return strings.TrimSuffix(string(commitID), "\n"), cmdErr }
mco
function
openshift/openshift-tests-private
ad48c9a5-cbaa-4b4c-978e-a04ce2f64b35
getGoVersion
['"fmt"', '"os/exec"', '"strconv"', '"strings"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getGoVersion(component, commitID string) (float64, error) { curlOutput, curlErr := exec.Command("bash", "-c", "curl -Lks https://raw.githubusercontent.com/openshift/"+component+"/"+commitID+"/go.mod | egrep '^go'").Output() if curlErr != nil { return 0, curlErr } goVersion := string(curlOutput)[3:] // We only want X.Y version, not X.Y.Z version goVersionSplit := strings.Split(goVersion, ".") if len(goVersionSplit) < 2 { return 0, fmt.Errorf("Wrong go version string %s. It should be at least X.Y format", goVersion) } xyGoVersion := goVersionSplit[0] + "." + goVersionSplit[1] return strconv.ParseFloat(strings.TrimSuffix(xyGoVersion, "\n"), 64) }
mco
function
openshift/openshift-tests-private
a35d8c5b-2c09-491c-ac03-daedfbdbc2e9
containsMultipleStrings
['"strings"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func containsMultipleStrings(sourceString string, expectedStrings []string) bool { o.Expect(sourceString).NotTo(o.BeEmpty()) o.Expect(expectedStrings).NotTo(o.BeEmpty()) var count int for _, element := range expectedStrings { if strings.Contains(sourceString, element) { count++ } } return len(expectedStrings) == count }
mco
function
openshift/openshift-tests-private
736ebf35-0531-4dc0-97c1-f008a5413b72
generateTemplateAbsolutePath
['"path/filepath"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func generateTemplateAbsolutePath(fileName string) string { mcoDirName := "mco" mcoBaseDir := "" if mcoBaseDir = fixturePathCache[mcoDirName]; mcoBaseDir == "" { logger.Infof("mco fixture dir is not initialized, start to create") mcoBaseDir = exutil.FixturePath("testdata", mcoDirName) fixturePathCache[mcoDirName] = mcoBaseDir logger.Infof("mco fixture dir is initialized: %s", mcoBaseDir) } else { mcoBaseDir = fixturePathCache[mcoDirName] logger.Debugf("mco fixture dir found in cache: %s", mcoBaseDir) } return filepath.Join(mcoBaseDir, fileName) }
mco
function
openshift/openshift-tests-private
34cb7df1-0901-4ec9-9c3b-7238cf927f9e
getSATokenFromContainer
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getSATokenFromContainer(oc *exutil.CLI, podName, podNamespace, container string) string { podOut, err := exutil.RemoteShContainer(oc, podNamespace, podName, container, "cat", "/var/run/secrets/kubernetes.io/serviceaccount/token") o.Expect(err).NotTo(o.HaveOccurred()) return podOut }
mco
function
openshift/openshift-tests-private
d05e460a-719b-4434-bf8b-db671cb0142d
getHostFromRoute
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getHostFromRoute(oc *exutil.CLI, routeName, routeNamespace string) string { stdout, err := oc.AsAdmin().WithoutNamespace().Run("get").Args("route", routeName, "-n", routeNamespace, "-o", "jsonpath='{.spec.host}'").Output() o.Expect(err).NotTo(o.HaveOccurred()) return stdout }
mco
function
openshift/openshift-tests-private
9484b44c-ef98-4b52-b3ee-889f9a67e71a
generateTmpFile
['"path/filepath"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func generateTmpFile(oc *exutil.CLI, fileName string) string { return filepath.Join(e2e.TestContext.OutputDir, oc.Namespace()+"-"+fileName) }
mco
function
openshift/openshift-tests-private
10eab6ee-79f2-4f0e-93e0-1f1bd41882a4
getPrometheusQueryResults
['"fmt"', '"net/url"', '"os/exec"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getPrometheusQueryResults(oc *exutil.CLI, query string) string { token := getSATokenFromContainer(oc, "prometheus-k8s-0", "openshift-monitoring", "prometheus") routeHost := getHostFromRoute(oc, "prometheus-k8s", "openshift-monitoring") url := fmt.Sprintf("https://%s/api/v1/query?query=%s", routeHost, query) headers := fmt.Sprintf("Authorization: Bearer %s", token) curlCmd := fmt.Sprintf("curl -ks -H '%s' %s", headers, url) logger.Infof("curl cmd:\n %s", curlCmd) curlOutput, cmdErr := exec.Command("bash", "-c", curlCmd).Output() logger.Infof("curl output:\n%s", curlOutput) o.Expect(cmdErr).NotTo(o.HaveOccurred()) return string(curlOutput) }
mco
function
openshift/openshift-tests-private
d7fb1eac-3d6e-4124-9812-bd5db33614d1
gZipData
['"bytes"', '"compress/gzip"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func gZipData(data []byte) (compressedData []byte, err error) { var b bytes.Buffer gz := gzip.NewWriter(&b) defer func() { _ = gz.Close() }() _, err = gz.Write(data) if err != nil { return nil, err } if err := gz.Flush(); err != nil { return nil, err } if err := gz.Close(); err != nil { return nil, err } compressedData = b.Bytes() return compressedData, nil }
mco
function
openshift/openshift-tests-private
66fccd46-5bd4-4c8f-a61e-19557e612bf8
jsonEncode
['"encoding/json"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func jsonEncode(s string) string { e, err := json.Marshal(s) if err != nil { e2e.Failf("Error json encoding the string: %s", s) } return string(e) }
mco
function
openshift/openshift-tests-private
3a63be6c-76d8-4496-b0db-c74b1b7be43e
MarshalOrFail
['"bytes"', '"encoding/json"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func MarshalOrFail(input interface{}) []byte { bytes, err := json.Marshal(input) if err != nil { o.ExpectWithOffset(1, err).NotTo(o.HaveOccurred(), "The data cannot be marshaled. Data: %v", input) } return bytes }
mco
function
openshift/openshift-tests-private
28924c60-8ac9-4a66-b81e-b0de186dee7e
getURLEncodedFileConfig
['"net/url"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getURLEncodedFileConfig(destinationPath, content, mode string) string { encodedContent := url.PathEscape(content) return getFileConfig(destinationPath, "data:,"+encodedContent, mode) }
mco
function
openshift/openshift-tests-private
6a61ae25-49db-4cdc-8d76-5067f5651171
getBase64EncodedFileConfig
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getBase64EncodedFileConfig(destinationPath, content, mode string) string { return getFileConfig(destinationPath, GetBase64EncodedFileSourceContent(content), mode) }
mco
function
openshift/openshift-tests-private
30f583f2-5d3d-4f25-ab69-2befd46a1c7d
getFileConfig
['"encoding/json"', '"fmt"', '"os"', '"path"', '"strconv"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getFileConfig(destinationPath, source, mode string) string { decimalMode := mode // if octal number we convert it to decimal. Json templates do not accept numbers with a leading zero (octal). // if we don't do this conversion the 'oc process' command will not be able to render the template because {"mode": 0666} // is not a valid json. Numbers in json cannot start with a leading 0 if mode != "" && mode[0] == '0' { // parse the octal string and conver to integer iMode, err := strconv.ParseInt(mode, 8, 64) // get a string with the decimal numeric representation of the mode decimalMode = fmt.Sprintf("%d", os.FileMode(iMode)) if err != nil { e2e.Failf("Filer permissions %s cannot be converted to integer", mode) } } var fileConfig string if mode == "" { fileConfig = fmt.Sprintf(`{"contents": {"source": "%s"}, "path": "%s"}`, source, destinationPath) } else { fileConfig = fmt.Sprintf(`{"contents": {"source": "%s"}, "path": "%s", "mode": %s}`, source, destinationPath, decimalMode) } return fileConfig }
mco
function
openshift/openshift-tests-private
21b1378b-b972-4c62-88bf-e0f921bb6b3a
getGzipFileJSONConfig
['"compress/gzip"', 'b64 "encoding/base64"', '"fmt"', '"path"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getGzipFileJSONConfig(destinationPath, fileContent string) string { compressedContent, err := gZipData([]byte(fileContent)) o.Expect(err).NotTo(o.HaveOccurred()) encodedContent := b64.StdEncoding.EncodeToString(compressedContent) fileConfig := fmt.Sprintf(`{"contents": {"compression": "gzip", "source": "data:;base64,%s"}, "path": "%s"}`, encodedContent, destinationPath) return fileConfig }
mco
function
openshift/openshift-tests-private
a4496794-abad-4e90-ad98-230544607872
getMaskServiceWithContentsConfig
['"encoding/json"', '"fmt"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getMaskServiceWithContentsConfig(name string, mask bool, unitContents string) string { // Escape not valid characters in json from the file content escapedContent := jsonEncode(unitContents) return fmt.Sprintf(`{"name": "%s", "mask": %t, "contents": %s}`, name, mask, escapedContent) }
mco
function
openshift/openshift-tests-private
841b7e2c-25ca-4ef3-a160-d0b83a206984
getMaskServiceConfig
['"fmt"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getMaskServiceConfig(name string, mask bool) string { return fmt.Sprintf(`{"name": "%s", "mask": %t}`, name, mask) }
mco
function
openshift/openshift-tests-private
30126810-3c90-4afe-af42-70156c64e259
getDropinFileConfig
['"encoding/json"', '"fmt"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getDropinFileConfig(unitName string, enabled bool, fileName, fileContent string) string { // Escape not valid characters in json from the file content escapedContent := jsonEncode(fileContent) return fmt.Sprintf(`{"name": "%s", "enabled": %t, "dropins": [{"name": "%s", "contents": %s}]}`, unitName, enabled, fileName, escapedContent) }
mco
function
openshift/openshift-tests-private
e365f40b-4056-49fc-8f1c-e0e84953cdf4
getSingleUnitConfig
['"encoding/json"', '"fmt"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getSingleUnitConfig(unitName string, unitEnabled bool, unitContents string) string { // Escape not valid characters in json from the file content escapedContent := jsonEncode(unitContents) return fmt.Sprintf(`{"name": "%s", "enabled": %t, "contents": %s}`, unitName, unitEnabled, escapedContent) }
mco
function
openshift/openshift-tests-private
2679c406-de67-4e34-a50c-4602c688f98b
AddToAllMachineSets
['"context"', '"time"', '"k8s.io/apimachinery/pkg/util/wait"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func AddToAllMachineSets(oc *exutil.CLI, delta int) error { allMs, err := NewMachineSetList(oc, "openshift-machine-api").GetAll() o.Expect(err).NotTo(o.HaveOccurred()) var addErr error modifiedMSs := []MachineSet{} for _, ms := range allMs { addErr = ms.AddToScale(delta) if addErr == nil { modifiedMSs = append(modifiedMSs, ms) } else { break } } if addErr != nil { logger.Infof("Error reconfiguring MachineSets. Restoring original replicas.") for _, ms := range modifiedMSs { _ = ms.AddToScale(-1 * delta) } return addErr } var waitErr error for _, ms := range allMs { immediate := true waitErr = wait.PollUntilContextTimeout(context.TODO(), 30*time.Second, 20*time.Minute, immediate, func(_ context.Context) (bool, error) { return ms.GetIsReady(), nil }) if waitErr != nil { logger.Errorf("MachineSet %s is not ready. Restoring original replicas.", ms.GetName()) for _, ms := range modifiedMSs { _ = ms.AddToScale(-1 * delta) } break } } return waitErr }
mco
function
openshift/openshift-tests-private
b80aeadd-8832-4151-964e-06366f9149fd
sortNodeList
['"sort"', '"time"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func sortNodeList(nodes []Node) []Node { sort.Slice(nodes, func(l, r int) bool { lMetadata := JSON(nodes[l].GetOrFail("{.metadata}")) rMetadata := JSON(nodes[r].GetOrFail("{.metadata}")) lLabels := &JSONData{nil} if lMetadata.Get("labels").Exists() { lLabels = lMetadata.Get("labels") } rLabels := &JSONData{nil} if rMetadata.Get("labels").Exists() { rLabels = rMetadata.Get("labels") } lZone := lLabels.Get("topology.kubernetes.io/zone") rZone := rLabels.Get("topology.kubernetes.io/zone") // if both nodes have zone label, sort by zone, push nodes without label to end of list if lZone.Exists() && rZone.Exists() { //nolint:all if lZone.ToString() != rZone.ToString() { return lZone.ToString() < rZone.ToString() } } else if rZone.Exists() { return false } else if lZone.Exists() { return true } // if nodes are in the same zone or they have no labels sortby creationTime oldest to newest dateLayout := "2006-01-02T15:04:05Z" lDate, err := time.Parse(dateLayout, lMetadata.Get("creationTimestamp").ToString()) if err != nil { e2e.Failf("Cannot parse creationTimestamp %s in node %s", lMetadata.Get("creationTimestamp").ToString(), nodes[l].GetName()) } rDate, err := time.Parse(dateLayout, rMetadata.Get("creationTimestamp").ToString()) if err != nil { e2e.Failf("Cannot parse creationTimestamp %s in node %s", rMetadata.Get("creationTimestamp").ToString(), nodes[r].GetName()) } return lDate.Before(rDate) }) return nodes }
mco
function
openshift/openshift-tests-private
65553378-6f8f-4b5c-989b-b2e366f95f6f
sortMasterNodeList
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func sortMasterNodeList(oc *exutil.CLI, nodes []Node) ([]Node, error) { masterSortedNodes := []Node{} operatorNode, err := GetOperatorNode(oc) if err != nil { return nil, err } logger.Infof("MCO operator pod running in node: %s", operatorNode) var latestNode Node for _, item := range sortNodeList(nodes) { node := item if node.GetName() == operatorNode.GetName() { latestNode = node continue } masterSortedNodes = append(masterSortedNodes, node) } masterSortedNodes = append(masterSortedNodes, latestNode) logger.Infof("Sorted master nodes: %s", masterSortedNodes) return masterSortedNodes, nil }
mco
function
openshift/openshift-tests-private
645a23f5-4c12-4b76-b63b-568e06a3aae2
getMachineConfigControllerPod
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getMachineConfigControllerPod(oc *exutil.CLI) (string, error) { pod, err := oc.AsAdmin().WithoutNamespace().Run("get").Args("pod", "-n", MachineConfigNamespace, "-l", ControllerLabel+"="+ControllerLabelValue, "-o", `jsonpath={.items[?(@.status.phase=="Running")].metadata.name}`).Output() logger.Infof("machine-config-controller pod name is %s", pod) return pod, err }
mco
function
openshift/openshift-tests-private
40373f93-9b8e-413c-8a1a-58b87e307a12
getMachineConfigOperatorPod
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getMachineConfigOperatorPod(oc *exutil.CLI) (string, error) { pods, err := exutil.GetAllPodsWithLabel(oc.AsAdmin(), MachineConfigNamespace, "k8s-app=machine-config-operator") logger.Infof("machine-config-operator pod name is %s", pods[0]) return pods[0], err }
mco
function
openshift/openshift-tests-private
c9574604-6f44-4057-b7b9-3bd5fc737230
getAlertsByName
['"encoding/json"', '"fmt"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getAlertsByName(oc *exutil.CLI, alertName string) ([]JSONData, error) { mon, monErr := exutil.NewPrometheusMonitor(oc.AsAdmin()) if monErr != nil { return nil, monErr } allAlerts, allAlertsErr := mon.GetAlerts() if allAlertsErr != nil { return nil, allAlertsErr } logger.Infof("get all alerts: %s\n", allAlerts) jsonObj := JSON(allAlerts) if jsonObj == nil { return nil, fmt.Errorf("Cannot parse json string: %s", allAlerts) } filteredAlerts, filteredAlertErr := jsonObj.GetJSONPath(fmt.Sprintf(`{.data.alerts[?(@.labels.alertname=="%s")]}`, alertName)) if filteredAlertErr != nil { return nil, filteredAlertErr } for _, alert := range filteredAlerts { logger.Infof("filtered alert %s\n", alert.String()) } return filteredAlerts, nil }
mco
function
openshift/openshift-tests-private
277431cc-8675-4fec-a10e-32b03427bc40
WrapWithBracketsIfIpv6
['"fmt"', '"net"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func WrapWithBracketsIfIpv6(ip string) (string, error) { parsedIP := net.ParseIP(ip) if parsedIP == nil { return "", fmt.Errorf("The string %s is not a valid IP", ip) } // If it is an IPV6 address, wrap it if parsedIP.To4() == nil { return "[" + ip + "]", nil } return ip, nil }
mco
function
openshift/openshift-tests-private
57b2a96b-b885-4b19-8017-7c60b67abc2f
isFIPSEnabledInClusterConfig
['"strings"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func isFIPSEnabledInClusterConfig(oc *exutil.CLI) bool { cc := NewNamespacedResource(oc.AsAdmin(), "cm", "kube-system", "cluster-config-v1") ic := cc.GetOrFail("{.data.install-config}") return strings.Contains(ic, "fips: true") }
mco
function
openshift/openshift-tests-private
10903ada-a380-462f-8861-10d6a09ef1e4
preChecks
['"fmt"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func preChecks(oc *exutil.CLI) { exutil.By("MCO Preconditions Checks") allMCPs, err := NewMachineConfigPoolList(oc.AsAdmin()).GetAll() o.Expect(err).NotTo(o.HaveOccurred(), "Cannot get the list of MachineConfigPools") for _, pool := range allMCPs { logger.Infof("Check that %s pool is ready for testing", pool.GetName()) if err := pool.SanityCheck(); err != nil { // Check that it is not degraded nor updating logger.Errorf("MCP is not ready for testing (it is updating or degraded):\n%s", pool.PrettyString()) g.Skip(fmt.Sprintf("%s pool is not ready for testing. %s", pool.GetName(), err)) } } logger.Infof("Wait for MCC to get the leader lease") o.Eventually(NewController(oc.AsAdmin()).HasAcquiredLease, "6m", "20s").Should(o.BeTrue(), "The controller pod didn't acquire the lease properly. Cannot execute any test case if the controller is not active") logger.Infof("End of MCO Preconditions\n") }
mco
function
openshift/openshift-tests-private
0905b192-4b1a-4d19-95b2-97ec662d9f12
generateTempFilePath
['"path/filepath"', '"strings"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func generateTempFilePath(dir, pattern string) string { return filepath.Join(dir, strings.ReplaceAll(pattern, "*", exutil.GetRandomString())) }
mco
function
openshift/openshift-tests-private
978e6620-93da-4f5c-9acf-1212c947067b
createTmpDir
['"fmt"', '"os"', '"path/filepath"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func createTmpDir() string { // according to review comment, dir name should not depend on temp ns // it is empty when initialized by `NewCLIWithoutNamespace` tmpdir := filepath.Join(e2e.TestContext.OutputDir, fmt.Sprintf("mco-test-%s", exutil.GetRandomString())) err := os.MkdirAll(tmpdir, 0o755) o.Expect(err).NotTo(o.HaveOccurred()) logger.Infof("create test dir %s", tmpdir) return tmpdir }
mco
function
openshift/openshift-tests-private
38bfe5c1-cb2b-4f70-882d-f57180e7404d
getBaseDomain
['"strings"']
github.com/openshift/openshift-tests-private/test/extended/mco/util.go
func getBaseDomain(oc *exutil.CLI) string { baseDomain := NewResource(oc.AsAdmin(), "dns", "cluster").GetOrFail("{.spec.baseDomain}") return baseDomain[strings.Index(baseDomain, ".")+1:] }
mco