/* Copyright 2014 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package skipper import ( "context" "fmt" "github.com/onsi/ginkgo/v2" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/labels" utilversion "k8s.io/apimachinery/pkg/util/version" "k8s.io/client-go/discovery" clientset "k8s.io/client-go/kubernetes" "k8s.io/component-base/featuregate" "k8s.io/kubernetes/test/e2e/framework" e2enode "k8s.io/kubernetes/test/e2e/framework/node" e2essh "k8s.io/kubernetes/test/e2e/framework/ssh" ) func skipInternalf(caller int, format string, args ...interface{}) { msg := fmt.Sprintf(format, args...) ginkgo.Skip(msg, caller+1) panic("unreachable") } // Skipf skips with information about why the test is being skipped. // The direct caller is recorded in the callstack. func Skipf(format string, args ...interface{}) { skipInternalf(1, format, args...) panic("unreachable") } // SkipUnlessAtLeast skips if the value is less than the minValue. func SkipUnlessAtLeast(value int, minValue int, message string) { if value < minValue { skipInternalf(1, message) } } var featureGate featuregate.FeatureGate // InitFeatureGates must be called in test suites that have a --feature-gates parameter. // If not called, SkipUnlessFeatureGateEnabled and SkipIfFeatureGateEnabled will // record a test failure. func InitFeatureGates(defaults featuregate.FeatureGate, overrides map[string]bool) error { clone := defaults.DeepCopy() if err := clone.SetFromMap(overrides); err != nil { return err } featureGate = clone return nil } // SkipUnlessFeatureGateEnabled skips if the feature is disabled. // // Beware that this only works in test suites that have a --feature-gate // parameter and call InitFeatureGates. In test/e2e, the `Feature: XYZ` tag // has to be used instead and invocations have to make sure that they // only run tests that work with the given test cluster. func SkipUnlessFeatureGateEnabled(gate featuregate.Feature) { if featureGate == nil { framework.Failf("Feature gate checking is not enabled, don't use SkipUnlessFeatureGateEnabled(%v). Instead use the Feature tag.", gate) } if !featureGate.Enabled(gate) { skipInternalf(1, "Only supported when %v feature is enabled", gate) } } // SkipUnlessNodeCountIsAtLeast skips if the number of nodes is less than the minNodeCount. func SkipUnlessNodeCountIsAtLeast(minNodeCount int) { if framework.TestContext.CloudConfig.NumNodes < minNodeCount { skipInternalf(1, "Requires at least %d nodes (not %d)", minNodeCount, framework.TestContext.CloudConfig.NumNodes) } } // SkipUnlessNodeCountIsAtMost skips if the number of nodes is greater than the maxNodeCount. func SkipUnlessNodeCountIsAtMost(maxNodeCount int) { if framework.TestContext.CloudConfig.NumNodes > maxNodeCount { skipInternalf(1, "Requires at most %d nodes (not %d)", maxNodeCount, framework.TestContext.CloudConfig.NumNodes) } } // SkipIfProviderIs skips if the provider is included in the unsupportedProviders. func SkipIfProviderIs(unsupportedProviders ...string) { if framework.ProviderIs(unsupportedProviders...) { skipInternalf(1, "Not supported for providers %v (found %s)", unsupportedProviders, framework.TestContext.Provider) } } // SkipUnlessProviderIs skips if the provider is not included in the supportedProviders. func SkipUnlessProviderIs(supportedProviders ...string) { if !framework.ProviderIs(supportedProviders...) { skipInternalf(1, "Only supported for providers %v (not %s)", supportedProviders, framework.TestContext.Provider) } } // SkipUnlessMultizone skips if the cluster does not have multizone. func SkipUnlessMultizone(ctx context.Context, c clientset.Interface) { zones, err := e2enode.GetClusterZones(ctx, c) if err != nil { skipInternalf(1, "Error listing cluster zones") } if zones.Len() <= 1 { skipInternalf(1, "Requires more than one zone") } } // SkipIfMultizone skips if the cluster has multizone. func SkipIfMultizone(ctx context.Context, c clientset.Interface) { zones, err := e2enode.GetClusterZones(ctx, c) if err != nil { skipInternalf(1, "Error listing cluster zones") } if zones.Len() > 1 { skipInternalf(1, "Requires at most one zone") } } // SkipUnlessMasterOSDistroIs skips if the master OS distro is not included in the supportedMasterOsDistros. func SkipUnlessMasterOSDistroIs(supportedMasterOsDistros ...string) { if !framework.MasterOSDistroIs(supportedMasterOsDistros...) { skipInternalf(1, "Only supported for master OS distro %v (not %s)", supportedMasterOsDistros, framework.TestContext.MasterOSDistro) } } // SkipUnlessNodeOSDistroIs skips if the node OS distro is not included in the supportedNodeOsDistros. func SkipUnlessNodeOSDistroIs(supportedNodeOsDistros ...string) { if !framework.NodeOSDistroIs(supportedNodeOsDistros...) { skipInternalf(1, "Only supported for node OS distro %v (not %s)", supportedNodeOsDistros, framework.TestContext.NodeOSDistro) } } // SkipUnlessNodeOSArchIs skips if the node OS distro is not included in the supportedNodeOsArchs. func SkipUnlessNodeOSArchIs(supportedNodeOsArchs ...string) { if !framework.NodeOSArchIs(supportedNodeOsArchs...) { skipInternalf(1, "Only supported for node OS arch %v (not %s)", supportedNodeOsArchs, framework.TestContext.NodeOSArch) } } // SkipIfNodeOSDistroIs skips if the node OS distro is included in the unsupportedNodeOsDistros. func SkipIfNodeOSDistroIs(unsupportedNodeOsDistros ...string) { if framework.NodeOSDistroIs(unsupportedNodeOsDistros...) { skipInternalf(1, "Not supported for node OS distro %v (is %s)", unsupportedNodeOsDistros, framework.TestContext.NodeOSDistro) } } // SkipUnlessServerVersionGTE skips if the server version is less than v. func SkipUnlessServerVersionGTE(v *utilversion.Version, c discovery.ServerVersionInterface) { gte, err := serverVersionGTE(v, c) if err != nil { framework.Failf("Failed to get server version: %v", err) } if !gte { skipInternalf(1, "Not supported for server versions before %q", v) } } // SkipUnlessSSHKeyPresent skips if no SSH key is found. func SkipUnlessSSHKeyPresent() { if _, err := e2essh.GetSigner(framework.TestContext.Provider); err != nil { skipInternalf(1, "No SSH Key for provider %s: '%v'", framework.TestContext.Provider, err) } } // serverVersionGTE returns true if v is greater than or equal to the server version. func serverVersionGTE(v *utilversion.Version, c discovery.ServerVersionInterface) (bool, error) { serverVersion, err := c.ServerVersion() if err != nil { return false, fmt.Errorf("Unable to get server version: %w", err) } sv, err := utilversion.ParseSemantic(serverVersion.GitVersion) if err != nil { return false, fmt.Errorf("Unable to parse server version %q: %w", serverVersion.GitVersion, err) } return sv.AtLeast(v), nil } // AppArmorDistros are distros with AppArmor support var AppArmorDistros = []string{"gci", "ubuntu"} // SkipIfAppArmorNotSupported skips if the AppArmor is not supported by the node OS distro. func SkipIfAppArmorNotSupported() { SkipUnlessNodeOSDistroIs(AppArmorDistros...) } // SkipUnlessComponentRunsAsPodsAndClientCanDeleteThem run if the component run as pods and client can delete them func SkipUnlessComponentRunsAsPodsAndClientCanDeleteThem(ctx context.Context, componentName string, c clientset.Interface, ns string, labelSet labels.Set) { // verify if component run as pod label := labels.SelectorFromSet(labelSet) listOpts := metav1.ListOptions{LabelSelector: label.String()} pods, err := c.CoreV1().Pods(ns).List(ctx, listOpts) framework.Logf("SkipUnlessComponentRunsAsPodsAndClientCanDeleteThem: %v, %v", pods, err) if err != nil { skipInternalf(1, "Skipped because client failed to get component:%s pod err:%v", componentName, err) } if len(pods.Items) == 0 { skipInternalf(1, "Skipped because component:%s is not running as pod.", componentName) } // verify if client can delete pod pod := pods.Items[0] if err := c.CoreV1().Pods(ns).Delete(ctx, pod.Name, metav1.DeleteOptions{DryRun: []string{metav1.DryRunAll}}); err != nil { skipInternalf(1, "Skipped because client failed to delete component:%s pod, err:%v", componentName, err) } } // SkipIfIPv6 skips if the cluster IP family is IPv6 and the provider is included in the unsupportedProviders. func SkipIfIPv6(unsupportedProviders ...string) { if framework.TestContext.ClusterIsIPv6() && framework.ProviderIs(unsupportedProviders...) { skipInternalf(1, "Not supported for IPv6 clusters and providers %v (found %s)", unsupportedProviders, framework.TestContext.Provider) } }