Skip to content

Commit 20f507f

Browse files
author
Kenichi Omichi
committed
Use log functions of core framework on [d-i]
This makes sub packages of e2e test framework to use log functions of core framework instead for avoiding circular dependencies.
1 parent 37651f1 commit 20f507f

File tree

8 files changed

+37
-39
lines changed

8 files changed

+37
-39
lines changed

test/e2e/framework/deployment/BUILD

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ go_library(
2020
"//staging/src/k8s.io/apimachinery/pkg/watch:go_default_library",
2121
"//staging/src/k8s.io/client-go/kubernetes:go_default_library",
2222
"//staging/src/k8s.io/client-go/tools/watch:go_default_library",
23-
"//test/e2e/framework/log:go_default_library",
23+
"//test/e2e/framework:go_default_library",
2424
"//test/utils:go_default_library",
2525
"//test/utils/image:go_default_library",
2626
],

test/e2e/framework/deployment/fixtures.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,14 +30,14 @@ import (
3030
clientset "k8s.io/client-go/kubernetes"
3131
watchtools "k8s.io/client-go/tools/watch"
3232
deploymentutil "k8s.io/kubernetes/pkg/controller/deployment/util"
33-
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
33+
"k8s.io/kubernetes/test/e2e/framework"
3434
testutils "k8s.io/kubernetes/test/utils"
3535
imageutils "k8s.io/kubernetes/test/utils/image"
3636
)
3737

3838
// UpdateDeploymentWithRetries updates the specified deployment with retries.
3939
func UpdateDeploymentWithRetries(c clientset.Interface, namespace, name string, applyUpdate testutils.UpdateDeploymentFunc) (*appsv1.Deployment, error) {
40-
return testutils.UpdateDeploymentWithRetries(c, namespace, name, applyUpdate, e2elog.Logf, poll, pollShortTimeout)
40+
return testutils.UpdateDeploymentWithRetries(c, namespace, name, applyUpdate, framework.Logf, poll, pollShortTimeout)
4141
}
4242

4343
// CheckDeploymentRevisionAndImage checks if the input deployment's and its new replica set's revision and image are as expected.
@@ -67,7 +67,7 @@ func WatchRecreateDeployment(c clientset.Interface, d *appsv1.Deployment) error
6767
_, allOldRSs, err := deploymentutil.GetOldReplicaSets(d, c.AppsV1())
6868
newRS, nerr := deploymentutil.GetNewReplicaSet(d, c.AppsV1())
6969
if err == nil && nerr == nil {
70-
e2elog.Logf("%+v", d)
70+
framework.Logf("%+v", d)
7171
logReplicaSetsOfDeployment(d, allOldRSs, newRS)
7272
logPodsOfDeployment(c, d, append(allOldRSs, newRS))
7373
}
@@ -128,7 +128,7 @@ func CreateDeployment(client clientset.Interface, replicas int32, podLabels map[
128128
if err != nil {
129129
return nil, fmt.Errorf("deployment %q Create API error: %v", deploymentSpec.Name, err)
130130
}
131-
e2elog.Logf("Waiting deployment %q to complete", deploymentSpec.Name)
131+
framework.Logf("Waiting deployment %q to complete", deploymentSpec.Name)
132132
err = WaitForDeploymentComplete(client, deployment)
133133
if err != nil {
134134
return nil, fmt.Errorf("deployment %q failed to complete: %v", deploymentSpec.Name, err)

test/e2e/framework/deployment/logging.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,14 @@ package deployment
1919
import (
2020
appsv1 "k8s.io/api/apps/v1"
2121
clientset "k8s.io/client-go/kubernetes"
22-
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
22+
"k8s.io/kubernetes/test/e2e/framework"
2323
testutils "k8s.io/kubernetes/test/utils"
2424
)
2525

2626
func logReplicaSetsOfDeployment(deployment *appsv1.Deployment, allOldRSs []*appsv1.ReplicaSet, newRS *appsv1.ReplicaSet) {
27-
testutils.LogReplicaSetsOfDeployment(deployment, allOldRSs, newRS, e2elog.Logf)
27+
testutils.LogReplicaSetsOfDeployment(deployment, allOldRSs, newRS, framework.Logf)
2828
}
2929

3030
func logPodsOfDeployment(c clientset.Interface, deployment *appsv1.Deployment, rsList []*appsv1.ReplicaSet) {
31-
testutils.LogPodsOfDeployment(c, deployment, rsList, e2elog.Logf)
31+
testutils.LogPodsOfDeployment(c, deployment, rsList, framework.Logf)
3232
}

test/e2e/framework/deployment/wait.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ import (
2525
"k8s.io/apimachinery/pkg/util/wait"
2626
clientset "k8s.io/client-go/kubernetes"
2727
deploymentutil "k8s.io/kubernetes/pkg/controller/deployment/util"
28-
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
28+
"k8s.io/kubernetes/test/e2e/framework"
2929
testutils "k8s.io/kubernetes/test/utils"
3030
)
3131

@@ -43,27 +43,27 @@ func WaitForObservedDeployment(c clientset.Interface, ns, deploymentName string,
4343

4444
// WaitForDeploymentWithCondition waits for the specified deployment condition.
4545
func WaitForDeploymentWithCondition(c clientset.Interface, ns, deploymentName, reason string, condType appsv1.DeploymentConditionType) error {
46-
return testutils.WaitForDeploymentWithCondition(c, ns, deploymentName, reason, condType, e2elog.Logf, poll, pollLongTimeout)
46+
return testutils.WaitForDeploymentWithCondition(c, ns, deploymentName, reason, condType, framework.Logf, poll, pollLongTimeout)
4747
}
4848

4949
// WaitForDeploymentRevisionAndImage waits for the deployment's and its new RS's revision and container image to match the given revision and image.
5050
// Note that deployment revision and its new RS revision should be updated shortly most of the time, but an overwhelmed RS controller
5151
// may result in taking longer to relabel a RS.
5252
func WaitForDeploymentRevisionAndImage(c clientset.Interface, ns, deploymentName string, revision, image string) error {
53-
return testutils.WaitForDeploymentRevisionAndImage(c, ns, deploymentName, revision, image, e2elog.Logf, poll, pollLongTimeout)
53+
return testutils.WaitForDeploymentRevisionAndImage(c, ns, deploymentName, revision, image, framework.Logf, poll, pollLongTimeout)
5454
}
5555

5656
// WaitForDeploymentComplete waits for the deployment to complete, and don't check if rolling update strategy is broken.
5757
// Rolling update strategy is used only during a rolling update, and can be violated in other situations,
5858
// such as shortly after a scaling event or the deployment is just created.
5959
func WaitForDeploymentComplete(c clientset.Interface, d *appsv1.Deployment) error {
60-
return testutils.WaitForDeploymentComplete(c, d, e2elog.Logf, poll, pollLongTimeout)
60+
return testutils.WaitForDeploymentComplete(c, d, framework.Logf, poll, pollLongTimeout)
6161
}
6262

6363
// WaitForDeploymentCompleteAndCheckRolling waits for the deployment to complete, and check rolling update strategy isn't broken at any times.
6464
// Rolling update strategy should not be broken during a rolling update.
6565
func WaitForDeploymentCompleteAndCheckRolling(c clientset.Interface, d *appsv1.Deployment) error {
66-
return testutils.WaitForDeploymentCompleteAndCheckRolling(c, d, e2elog.Logf, poll, pollLongTimeout)
66+
return testutils.WaitForDeploymentCompleteAndCheckRolling(c, d, framework.Logf, poll, pollLongTimeout)
6767
}
6868

6969
// WaitForDeploymentUpdatedReplicasGTE waits for given deployment to be observed by the controller and has at least a number of updatedReplicas

test/e2e/framework/endpoints/BUILD

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ go_library(
1010
"//staging/src/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
1111
"//staging/src/k8s.io/apimachinery/pkg/types:go_default_library",
1212
"//staging/src/k8s.io/client-go/kubernetes:go_default_library",
13-
"//test/e2e/framework/log:go_default_library",
13+
"//test/e2e/framework:go_default_library",
1414
"//vendor/github.com/onsi/ginkgo:go_default_library",
1515
],
1616
)

test/e2e/framework/endpoints/ports.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ import (
3232
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
3333
"k8s.io/apimachinery/pkg/types"
3434
clientset "k8s.io/client-go/kubernetes"
35-
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
35+
"k8s.io/kubernetes/test/e2e/framework"
3636
)
3737

3838
// ServiceStartTimeout is how long to wait for a service endpoint to be resolvable.
@@ -103,7 +103,7 @@ func ValidateEndpointsPorts(c clientset.Interface, namespace, serviceName string
103103
for start := time.Now(); time.Since(start) < ServiceStartTimeout; time.Sleep(1 * time.Second) {
104104
ep, err := c.CoreV1().Endpoints(namespace).Get(serviceName, metav1.GetOptions{})
105105
if err != nil {
106-
e2elog.Logf("Get endpoints failed (%v elapsed, ignoring for 5s): %v", time.Since(start), err)
106+
framework.Logf("Get endpoints failed (%v elapsed, ignoring for 5s): %v", time.Since(start), err)
107107
continue
108108
}
109109
portsByPodUID := GetContainerPortsByPodUID(ep)
@@ -116,21 +116,21 @@ func ValidateEndpointsPorts(c clientset.Interface, namespace, serviceName string
116116
if err != nil {
117117
return err
118118
}
119-
e2elog.Logf("successfully validated that service %s in namespace %s exposes endpoints %v (%v elapsed)",
119+
framework.Logf("successfully validated that service %s in namespace %s exposes endpoints %v (%v elapsed)",
120120
serviceName, namespace, expectedEndpoints, time.Since(start))
121121
return nil
122122
}
123123
if i%5 == 0 {
124-
e2elog.Logf("Unexpected endpoints: found %v, expected %v (%v elapsed, will retry)", portsByPodUID, expectedEndpoints, time.Since(start))
124+
framework.Logf("Unexpected endpoints: found %v, expected %v (%v elapsed, will retry)", portsByPodUID, expectedEndpoints, time.Since(start))
125125
}
126126
i++
127127
}
128128
if pods, err := c.CoreV1().Pods(metav1.NamespaceAll).List(metav1.ListOptions{}); err == nil {
129129
for _, pod := range pods.Items {
130-
e2elog.Logf("Pod %s\t%s\t%s\t%s", pod.Namespace, pod.Name, pod.Spec.NodeName, pod.DeletionTimestamp)
130+
framework.Logf("Pod %s\t%s\t%s\t%s", pod.Namespace, pod.Name, pod.Spec.NodeName, pod.DeletionTimestamp)
131131
}
132132
} else {
133-
e2elog.Logf("Can't list pod debug info: %v", err)
133+
framework.Logf("Can't list pod debug info: %v", err)
134134
}
135135
return fmt.Errorf("Timed out waiting for service %s in namespace %s to expose endpoints %v (%v elapsed)", serviceName, namespace, expectedEndpoints, ServiceStartTimeout)
136136
}

test/e2e/framework/ingress/BUILD

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@ go_library(
1818
"//staging/src/k8s.io/apimachinery/pkg/util/wait:go_default_library",
1919
"//staging/src/k8s.io/client-go/kubernetes:go_default_library",
2020
"//test/e2e/framework:go_default_library",
21-
"//test/e2e/framework/log:go_default_library",
2221
"//test/e2e/framework/node:go_default_library",
2322
"//test/e2e/framework/service:go_default_library",
2423
"//test/e2e/framework/testfiles:go_default_library",

test/e2e/framework/ingress/ingress_utils.go

Lines changed: 17 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,6 @@ import (
4949
"k8s.io/apimachinery/pkg/util/wait"
5050
clientset "k8s.io/client-go/kubernetes"
5151
"k8s.io/kubernetes/test/e2e/framework"
52-
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
5352
e2enode "k8s.io/kubernetes/test/e2e/framework/node"
5453
e2eservice "k8s.io/kubernetes/test/e2e/framework/service"
5554
"k8s.io/kubernetes/test/e2e/framework/testfiles"
@@ -137,12 +136,12 @@ type E2ELogger struct{}
137136

138137
// Infof outputs log.
139138
func (l *E2ELogger) Infof(format string, args ...interface{}) {
140-
e2elog.Logf(format, args...)
139+
framework.Logf(format, args...)
141140
}
142141

143142
// Errorf outputs log.
144143
func (l *E2ELogger) Errorf(format string, args ...interface{}) {
145-
e2elog.Logf(format, args...)
144+
framework.Logf(format, args...)
146145
}
147146

148147
// ConformanceTests contains a closure with an entry and exit log line.
@@ -337,7 +336,7 @@ func BuildInsecureClient(timeout time.Duration) *http.Client {
337336
// Ingress, it's updated.
338337
func createTLSSecret(kubeClient clientset.Interface, namespace, secretName string, hosts ...string) (host string, rootCA, privKey []byte, err error) {
339338
host = strings.Join(hosts, ",")
340-
e2elog.Logf("Generating RSA cert for host %v", host)
339+
framework.Logf("Generating RSA cert for host %v", host)
341340
cert, key, err := GenerateRSACerts(host, true)
342341
if err != nil {
343342
return
@@ -354,11 +353,11 @@ func createTLSSecret(kubeClient clientset.Interface, namespace, secretName strin
354353
var s *v1.Secret
355354
if s, err = kubeClient.CoreV1().Secrets(namespace).Get(secretName, metav1.GetOptions{}); err == nil {
356355
// TODO: Retry the update. We don't really expect anything to conflict though.
357-
e2elog.Logf("Updating secret %v in ns %v with hosts %v", secret.Name, namespace, host)
356+
framework.Logf("Updating secret %v in ns %v with hosts %v", secret.Name, namespace, host)
358357
s.Data = secret.Data
359358
_, err = kubeClient.CoreV1().Secrets(namespace).Update(s)
360359
} else {
361-
e2elog.Logf("Creating secret %v in ns %v with hosts %v", secret.Name, namespace, host)
360+
framework.Logf("Creating secret %v in ns %v with hosts %v", secret.Name, namespace, host)
362361
_, err = kubeClient.CoreV1().Secrets(namespace).Create(secret)
363362
}
364363
return host, cert, key, err
@@ -474,7 +473,7 @@ func (j *TestJig) Update(update func(ing *networkingv1beta1.Ingress)) {
474473
for i := 0; i < 3; i++ {
475474
j.Ingress, err = j.Client.NetworkingV1beta1().Ingresses(ns).Get(name, metav1.GetOptions{})
476475
if err != nil {
477-
e2elog.Failf("failed to get ingress %s/%s: %v", ns, name, err)
476+
framework.Failf("failed to get ingress %s/%s: %v", ns, name, err)
478477
}
479478
update(j.Ingress)
480479
j.Ingress, err = j.runUpdate(j.Ingress)
@@ -483,10 +482,10 @@ func (j *TestJig) Update(update func(ing *networkingv1beta1.Ingress)) {
483482
return
484483
}
485484
if !apierrs.IsConflict(err) && !apierrs.IsServerTimeout(err) {
486-
e2elog.Failf("failed to update ingress %s/%s: %v", ns, name, err)
485+
framework.Failf("failed to update ingress %s/%s: %v", ns, name, err)
487486
}
488487
}
489-
e2elog.Failf("too many retries updating ingress %s/%s", ns, name)
488+
framework.Failf("too many retries updating ingress %s/%s", ns, name)
490489
}
491490

492491
// AddHTTPS updates the ingress to add this secret for these hosts.
@@ -544,7 +543,7 @@ func (j *TestJig) GetRootCA(secretName string) (rootCA []byte) {
544543
var ok bool
545544
rootCA, ok = j.RootCAs[secretName]
546545
if !ok {
547-
e2elog.Failf("Failed to retrieve rootCAs, no recorded secret by name %v", secretName)
546+
framework.Failf("Failed to retrieve rootCAs, no recorded secret by name %v", secretName)
548547
}
549548
return
550549
}
@@ -676,7 +675,7 @@ func (j *TestJig) pollIngressWithCert(ing *networkingv1beta1.Ingress, address st
676675
// WaitForIngress returns when it gets the first 200 response
677676
func (j *TestJig) WaitForIngress(waitForNodePort bool) {
678677
if err := j.WaitForGivenIngressWithTimeout(j.Ingress, waitForNodePort, e2eservice.LoadBalancerPollTimeout); err != nil {
679-
e2elog.Failf("error in waiting for ingress to get an address: %s", err)
678+
framework.Failf("error in waiting for ingress to get an address: %s", err)
680679
}
681680
}
682681

@@ -689,7 +688,7 @@ func (j *TestJig) WaitForIngressToStable() {
689688
}
690689
return true, nil
691690
}); err != nil {
692-
e2elog.Failf("error in waiting for ingress to stablize: %v", err)
691+
framework.Failf("error in waiting for ingress to stablize: %v", err)
693692
}
694693
}
695694

@@ -735,7 +734,7 @@ func (j *TestJig) VerifyURL(route, host string, iterations int, interval time.Du
735734
for i := 0; i < iterations; i++ {
736735
b, err := framework.SimpleGET(httpClient, route, host)
737736
if err != nil {
738-
e2elog.Logf(b)
737+
framework.Logf(b)
739738
return err
740739
}
741740
j.Logger.Infof("Verified %v with host %v %d times, sleeping for %v", route, host, i, interval)
@@ -815,7 +814,7 @@ func (j *TestJig) GetDistinctResponseFromIngress() (sets.String, error) {
815814
// Wait for the loadbalancer IP.
816815
address, err := j.WaitForIngressAddress(j.Client, j.Ingress.Namespace, j.Ingress.Name, e2eservice.LoadBalancerPollTimeout)
817816
if err != nil {
818-
e2elog.Failf("Ingress failed to acquire an IP address within %v", e2eservice.LoadBalancerPollTimeout)
817+
framework.Failf("Ingress failed to acquire an IP address within %v", e2eservice.LoadBalancerPollTimeout)
819818
}
820819
responses := sets.NewString()
821820
timeoutClient := &http.Client{Timeout: IngressReqTimeout}
@@ -846,25 +845,25 @@ func (cont *NginxIngressController) Init() {
846845
read := func(file string) string {
847846
return string(testfiles.ReadOrDie(filepath.Join(IngressManifestPath, "nginx", file)))
848847
}
849-
e2elog.Logf("initializing nginx ingress controller")
848+
framework.Logf("initializing nginx ingress controller")
850849
framework.RunKubectlOrDieInput(read("rc.yaml"), "create", "-f", "-", fmt.Sprintf("--namespace=%v", cont.Ns))
851850

852851
rc, err := cont.Client.CoreV1().ReplicationControllers(cont.Ns).Get("nginx-ingress-controller", metav1.GetOptions{})
853852
framework.ExpectNoError(err)
854853
cont.rc = rc
855854

856-
e2elog.Logf("waiting for pods with label %v", rc.Spec.Selector)
855+
framework.Logf("waiting for pods with label %v", rc.Spec.Selector)
857856
sel := labels.SelectorFromSet(labels.Set(rc.Spec.Selector))
858857
framework.ExpectNoError(testutils.WaitForPodsWithLabelRunning(cont.Client, cont.Ns, sel))
859858
pods, err := cont.Client.CoreV1().Pods(cont.Ns).List(metav1.ListOptions{LabelSelector: sel.String()})
860859
framework.ExpectNoError(err)
861860
if len(pods.Items) == 0 {
862-
e2elog.Failf("Failed to find nginx ingress controller pods with selector %v", sel)
861+
framework.Failf("Failed to find nginx ingress controller pods with selector %v", sel)
863862
}
864863
cont.pod = &pods.Items[0]
865864
cont.externalIP, err = framework.GetHostExternalAddress(cont.Client, cont.pod)
866865
framework.ExpectNoError(err)
867-
e2elog.Logf("ingress controller running in pod %v on ip %v", cont.pod.Name, cont.externalIP)
866+
framework.Logf("ingress controller running in pod %v on ip %v", cont.pod.Name, cont.externalIP)
868867
}
869868

870869
func generateBacksideHTTPSIngressSpec(ns string) *networkingv1beta1.Ingress {

0 commit comments

Comments
 (0)