Skip to content

Commit 518ff2a

Browse files
authored
Merge pull request kubernetes#81811 from oomichi/replace-e2elog-framework-deployment-ingress
Use log functions of core framework on [d-i]
2 parents 9c69a45 + 20f507f commit 518ff2a

File tree

8 files changed

+37
-39
lines changed

8 files changed

+37
-39
lines changed

test/e2e/framework/deployment/BUILD

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ go_library(
2020
"//staging/src/k8s.io/apimachinery/pkg/watch:go_default_library",
2121
"//staging/src/k8s.io/client-go/kubernetes:go_default_library",
2222
"//staging/src/k8s.io/client-go/tools/watch:go_default_library",
23-
"//test/e2e/framework/log:go_default_library",
23+
"//test/e2e/framework:go_default_library",
2424
"//test/utils:go_default_library",
2525
"//test/utils/image:go_default_library",
2626
],

test/e2e/framework/deployment/fixtures.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,14 +30,14 @@ import (
3030
clientset "k8s.io/client-go/kubernetes"
3131
watchtools "k8s.io/client-go/tools/watch"
3232
deploymentutil "k8s.io/kubernetes/pkg/controller/deployment/util"
33-
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
33+
"k8s.io/kubernetes/test/e2e/framework"
3434
testutils "k8s.io/kubernetes/test/utils"
3535
imageutils "k8s.io/kubernetes/test/utils/image"
3636
)
3737

3838
// UpdateDeploymentWithRetries updates the specified deployment with retries.
3939
func UpdateDeploymentWithRetries(c clientset.Interface, namespace, name string, applyUpdate testutils.UpdateDeploymentFunc) (*appsv1.Deployment, error) {
40-
return testutils.UpdateDeploymentWithRetries(c, namespace, name, applyUpdate, e2elog.Logf, poll, pollShortTimeout)
40+
return testutils.UpdateDeploymentWithRetries(c, namespace, name, applyUpdate, framework.Logf, poll, pollShortTimeout)
4141
}
4242

4343
// CheckDeploymentRevisionAndImage checks if the input deployment's and its new replica set's revision and image are as expected.
@@ -67,7 +67,7 @@ func WatchRecreateDeployment(c clientset.Interface, d *appsv1.Deployment) error
6767
_, allOldRSs, err := deploymentutil.GetOldReplicaSets(d, c.AppsV1())
6868
newRS, nerr := deploymentutil.GetNewReplicaSet(d, c.AppsV1())
6969
if err == nil && nerr == nil {
70-
e2elog.Logf("%+v", d)
70+
framework.Logf("%+v", d)
7171
logReplicaSetsOfDeployment(d, allOldRSs, newRS)
7272
logPodsOfDeployment(c, d, append(allOldRSs, newRS))
7373
}
@@ -128,7 +128,7 @@ func CreateDeployment(client clientset.Interface, replicas int32, podLabels map[
128128
if err != nil {
129129
return nil, fmt.Errorf("deployment %q Create API error: %v", deploymentSpec.Name, err)
130130
}
131-
e2elog.Logf("Waiting deployment %q to complete", deploymentSpec.Name)
131+
framework.Logf("Waiting deployment %q to complete", deploymentSpec.Name)
132132
err = WaitForDeploymentComplete(client, deployment)
133133
if err != nil {
134134
return nil, fmt.Errorf("deployment %q failed to complete: %v", deploymentSpec.Name, err)

test/e2e/framework/deployment/logging.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,14 @@ package deployment
1919
import (
2020
appsv1 "k8s.io/api/apps/v1"
2121
clientset "k8s.io/client-go/kubernetes"
22-
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
22+
"k8s.io/kubernetes/test/e2e/framework"
2323
testutils "k8s.io/kubernetes/test/utils"
2424
)
2525

2626
func logReplicaSetsOfDeployment(deployment *appsv1.Deployment, allOldRSs []*appsv1.ReplicaSet, newRS *appsv1.ReplicaSet) {
27-
testutils.LogReplicaSetsOfDeployment(deployment, allOldRSs, newRS, e2elog.Logf)
27+
testutils.LogReplicaSetsOfDeployment(deployment, allOldRSs, newRS, framework.Logf)
2828
}
2929

3030
func logPodsOfDeployment(c clientset.Interface, deployment *appsv1.Deployment, rsList []*appsv1.ReplicaSet) {
31-
testutils.LogPodsOfDeployment(c, deployment, rsList, e2elog.Logf)
31+
testutils.LogPodsOfDeployment(c, deployment, rsList, framework.Logf)
3232
}

test/e2e/framework/deployment/wait.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ import (
2525
"k8s.io/apimachinery/pkg/util/wait"
2626
clientset "k8s.io/client-go/kubernetes"
2727
deploymentutil "k8s.io/kubernetes/pkg/controller/deployment/util"
28-
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
28+
"k8s.io/kubernetes/test/e2e/framework"
2929
testutils "k8s.io/kubernetes/test/utils"
3030
)
3131

@@ -43,27 +43,27 @@ func WaitForObservedDeployment(c clientset.Interface, ns, deploymentName string,
4343

4444
// WaitForDeploymentWithCondition waits for the specified deployment condition.
4545
func WaitForDeploymentWithCondition(c clientset.Interface, ns, deploymentName, reason string, condType appsv1.DeploymentConditionType) error {
46-
return testutils.WaitForDeploymentWithCondition(c, ns, deploymentName, reason, condType, e2elog.Logf, poll, pollLongTimeout)
46+
return testutils.WaitForDeploymentWithCondition(c, ns, deploymentName, reason, condType, framework.Logf, poll, pollLongTimeout)
4747
}
4848

4949
// WaitForDeploymentRevisionAndImage waits for the deployment's and its new RS's revision and container image to match the given revision and image.
5050
// Note that deployment revision and its new RS revision should be updated shortly most of the time, but an overwhelmed RS controller
5151
// may result in taking longer to relabel a RS.
5252
func WaitForDeploymentRevisionAndImage(c clientset.Interface, ns, deploymentName string, revision, image string) error {
53-
return testutils.WaitForDeploymentRevisionAndImage(c, ns, deploymentName, revision, image, e2elog.Logf, poll, pollLongTimeout)
53+
return testutils.WaitForDeploymentRevisionAndImage(c, ns, deploymentName, revision, image, framework.Logf, poll, pollLongTimeout)
5454
}
5555

5656
// WaitForDeploymentComplete waits for the deployment to complete, and don't check if rolling update strategy is broken.
5757
// Rolling update strategy is used only during a rolling update, and can be violated in other situations,
5858
// such as shortly after a scaling event or the deployment is just created.
5959
func WaitForDeploymentComplete(c clientset.Interface, d *appsv1.Deployment) error {
60-
return testutils.WaitForDeploymentComplete(c, d, e2elog.Logf, poll, pollLongTimeout)
60+
return testutils.WaitForDeploymentComplete(c, d, framework.Logf, poll, pollLongTimeout)
6161
}
6262

6363
// WaitForDeploymentCompleteAndCheckRolling waits for the deployment to complete, and check rolling update strategy isn't broken at any times.
6464
// Rolling update strategy should not be broken during a rolling update.
6565
func WaitForDeploymentCompleteAndCheckRolling(c clientset.Interface, d *appsv1.Deployment) error {
66-
return testutils.WaitForDeploymentCompleteAndCheckRolling(c, d, e2elog.Logf, poll, pollLongTimeout)
66+
return testutils.WaitForDeploymentCompleteAndCheckRolling(c, d, framework.Logf, poll, pollLongTimeout)
6767
}
6868

6969
// WaitForDeploymentUpdatedReplicasGTE waits for given deployment to be observed by the controller and has at least a number of updatedReplicas

test/e2e/framework/endpoints/BUILD

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ go_library(
1010
"//staging/src/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
1111
"//staging/src/k8s.io/apimachinery/pkg/types:go_default_library",
1212
"//staging/src/k8s.io/client-go/kubernetes:go_default_library",
13-
"//test/e2e/framework/log:go_default_library",
13+
"//test/e2e/framework:go_default_library",
1414
"//vendor/github.com/onsi/ginkgo:go_default_library",
1515
],
1616
)

test/e2e/framework/endpoints/ports.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ import (
3232
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
3333
"k8s.io/apimachinery/pkg/types"
3434
clientset "k8s.io/client-go/kubernetes"
35-
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
35+
"k8s.io/kubernetes/test/e2e/framework"
3636
)
3737

3838
// ServiceStartTimeout is how long to wait for a service endpoint to be resolvable.
@@ -103,7 +103,7 @@ func ValidateEndpointsPorts(c clientset.Interface, namespace, serviceName string
103103
for start := time.Now(); time.Since(start) < ServiceStartTimeout; time.Sleep(1 * time.Second) {
104104
ep, err := c.CoreV1().Endpoints(namespace).Get(serviceName, metav1.GetOptions{})
105105
if err != nil {
106-
e2elog.Logf("Get endpoints failed (%v elapsed, ignoring for 5s): %v", time.Since(start), err)
106+
framework.Logf("Get endpoints failed (%v elapsed, ignoring for 5s): %v", time.Since(start), err)
107107
continue
108108
}
109109
portsByPodUID := GetContainerPortsByPodUID(ep)
@@ -116,21 +116,21 @@ func ValidateEndpointsPorts(c clientset.Interface, namespace, serviceName string
116116
if err != nil {
117117
return err
118118
}
119-
e2elog.Logf("successfully validated that service %s in namespace %s exposes endpoints %v (%v elapsed)",
119+
framework.Logf("successfully validated that service %s in namespace %s exposes endpoints %v (%v elapsed)",
120120
serviceName, namespace, expectedEndpoints, time.Since(start))
121121
return nil
122122
}
123123
if i%5 == 0 {
124-
e2elog.Logf("Unexpected endpoints: found %v, expected %v (%v elapsed, will retry)", portsByPodUID, expectedEndpoints, time.Since(start))
124+
framework.Logf("Unexpected endpoints: found %v, expected %v (%v elapsed, will retry)", portsByPodUID, expectedEndpoints, time.Since(start))
125125
}
126126
i++
127127
}
128128
if pods, err := c.CoreV1().Pods(metav1.NamespaceAll).List(metav1.ListOptions{}); err == nil {
129129
for _, pod := range pods.Items {
130-
e2elog.Logf("Pod %s\t%s\t%s\t%s", pod.Namespace, pod.Name, pod.Spec.NodeName, pod.DeletionTimestamp)
130+
framework.Logf("Pod %s\t%s\t%s\t%s", pod.Namespace, pod.Name, pod.Spec.NodeName, pod.DeletionTimestamp)
131131
}
132132
} else {
133-
e2elog.Logf("Can't list pod debug info: %v", err)
133+
framework.Logf("Can't list pod debug info: %v", err)
134134
}
135135
return fmt.Errorf("Timed out waiting for service %s in namespace %s to expose endpoints %v (%v elapsed)", serviceName, namespace, expectedEndpoints, ServiceStartTimeout)
136136
}

test/e2e/framework/ingress/BUILD

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,6 @@ go_library(
1818
"//staging/src/k8s.io/apimachinery/pkg/util/wait:go_default_library",
1919
"//staging/src/k8s.io/client-go/kubernetes:go_default_library",
2020
"//test/e2e/framework:go_default_library",
21-
"//test/e2e/framework/log:go_default_library",
2221
"//test/e2e/framework/node:go_default_library",
2322
"//test/e2e/framework/service:go_default_library",
2423
"//test/e2e/framework/testfiles:go_default_library",

test/e2e/framework/ingress/ingress_utils.go

Lines changed: 17 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,6 @@ import (
4949
"k8s.io/apimachinery/pkg/util/wait"
5050
clientset "k8s.io/client-go/kubernetes"
5151
"k8s.io/kubernetes/test/e2e/framework"
52-
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
5352
e2enode "k8s.io/kubernetes/test/e2e/framework/node"
5453
e2eservice "k8s.io/kubernetes/test/e2e/framework/service"
5554
"k8s.io/kubernetes/test/e2e/framework/testfiles"
@@ -131,12 +130,12 @@ type E2ELogger struct{}
131130

132131
// Infof outputs log.
133132
func (l *E2ELogger) Infof(format string, args ...interface{}) {
134-
e2elog.Logf(format, args...)
133+
framework.Logf(format, args...)
135134
}
136135

137136
// Errorf outputs log.
138137
func (l *E2ELogger) Errorf(format string, args ...interface{}) {
139-
e2elog.Logf(format, args...)
138+
framework.Logf(format, args...)
140139
}
141140

142141
// ConformanceTests contains a closure with an entry and exit log line.
@@ -331,7 +330,7 @@ func BuildInsecureClient(timeout time.Duration) *http.Client {
331330
// Ingress, it's updated.
332331
func createTLSSecret(kubeClient clientset.Interface, namespace, secretName string, hosts ...string) (host string, rootCA, privKey []byte, err error) {
333332
host = strings.Join(hosts, ",")
334-
e2elog.Logf("Generating RSA cert for host %v", host)
333+
framework.Logf("Generating RSA cert for host %v", host)
335334
cert, key, err := GenerateRSACerts(host, true)
336335
if err != nil {
337336
return
@@ -348,11 +347,11 @@ func createTLSSecret(kubeClient clientset.Interface, namespace, secretName strin
348347
var s *v1.Secret
349348
if s, err = kubeClient.CoreV1().Secrets(namespace).Get(secretName, metav1.GetOptions{}); err == nil {
350349
// TODO: Retry the update. We don't really expect anything to conflict though.
351-
e2elog.Logf("Updating secret %v in ns %v with hosts %v", secret.Name, namespace, host)
350+
framework.Logf("Updating secret %v in ns %v with hosts %v", secret.Name, namespace, host)
352351
s.Data = secret.Data
353352
_, err = kubeClient.CoreV1().Secrets(namespace).Update(s)
354353
} else {
355-
e2elog.Logf("Creating secret %v in ns %v with hosts %v", secret.Name, namespace, host)
354+
framework.Logf("Creating secret %v in ns %v with hosts %v", secret.Name, namespace, host)
356355
_, err = kubeClient.CoreV1().Secrets(namespace).Create(secret)
357356
}
358357
return host, cert, key, err
@@ -468,7 +467,7 @@ func (j *TestJig) Update(update func(ing *networkingv1beta1.Ingress)) {
468467
for i := 0; i < 3; i++ {
469468
j.Ingress, err = j.Client.NetworkingV1beta1().Ingresses(ns).Get(name, metav1.GetOptions{})
470469
if err != nil {
471-
e2elog.Failf("failed to get ingress %s/%s: %v", ns, name, err)
470+
framework.Failf("failed to get ingress %s/%s: %v", ns, name, err)
472471
}
473472
update(j.Ingress)
474473
j.Ingress, err = j.runUpdate(j.Ingress)
@@ -477,10 +476,10 @@ func (j *TestJig) Update(update func(ing *networkingv1beta1.Ingress)) {
477476
return
478477
}
479478
if !apierrs.IsConflict(err) && !apierrs.IsServerTimeout(err) {
480-
e2elog.Failf("failed to update ingress %s/%s: %v", ns, name, err)
479+
framework.Failf("failed to update ingress %s/%s: %v", ns, name, err)
481480
}
482481
}
483-
e2elog.Failf("too many retries updating ingress %s/%s", ns, name)
482+
framework.Failf("too many retries updating ingress %s/%s", ns, name)
484483
}
485484

486485
// AddHTTPS updates the ingress to add this secret for these hosts.
@@ -538,7 +537,7 @@ func (j *TestJig) GetRootCA(secretName string) (rootCA []byte) {
538537
var ok bool
539538
rootCA, ok = j.RootCAs[secretName]
540539
if !ok {
541-
e2elog.Failf("Failed to retrieve rootCAs, no recorded secret by name %v", secretName)
540+
framework.Failf("Failed to retrieve rootCAs, no recorded secret by name %v", secretName)
542541
}
543542
return
544543
}
@@ -670,7 +669,7 @@ func (j *TestJig) pollIngressWithCert(ing *networkingv1beta1.Ingress, address st
670669
// WaitForIngress returns when it gets the first 200 response
671670
func (j *TestJig) WaitForIngress(waitForNodePort bool) {
672671
if err := j.WaitForGivenIngressWithTimeout(j.Ingress, waitForNodePort, e2eservice.LoadBalancerPollTimeout); err != nil {
673-
e2elog.Failf("error in waiting for ingress to get an address: %s", err)
672+
framework.Failf("error in waiting for ingress to get an address: %s", err)
674673
}
675674
}
676675

@@ -683,7 +682,7 @@ func (j *TestJig) WaitForIngressToStable() {
683682
}
684683
return true, nil
685684
}); err != nil {
686-
e2elog.Failf("error in waiting for ingress to stablize: %v", err)
685+
framework.Failf("error in waiting for ingress to stablize: %v", err)
687686
}
688687
}
689688

@@ -729,7 +728,7 @@ func (j *TestJig) VerifyURL(route, host string, iterations int, interval time.Du
729728
for i := 0; i < iterations; i++ {
730729
b, err := framework.SimpleGET(httpClient, route, host)
731730
if err != nil {
732-
e2elog.Logf(b)
731+
framework.Logf(b)
733732
return err
734733
}
735734
j.Logger.Infof("Verified %v with host %v %d times, sleeping for %v", route, host, i, interval)
@@ -809,7 +808,7 @@ func (j *TestJig) GetDistinctResponseFromIngress() (sets.String, error) {
809808
// Wait for the loadbalancer IP.
810809
address, err := j.WaitForIngressAddress(j.Client, j.Ingress.Namespace, j.Ingress.Name, e2eservice.LoadBalancerPollTimeout)
811810
if err != nil {
812-
e2elog.Failf("Ingress failed to acquire an IP address within %v", e2eservice.LoadBalancerPollTimeout)
811+
framework.Failf("Ingress failed to acquire an IP address within %v", e2eservice.LoadBalancerPollTimeout)
813812
}
814813
responses := sets.NewString()
815814
timeoutClient := &http.Client{Timeout: IngressReqTimeout}
@@ -840,25 +839,25 @@ func (cont *NginxIngressController) Init() {
840839
read := func(file string) string {
841840
return string(testfiles.ReadOrDie(filepath.Join(IngressManifestPath, "nginx", file)))
842841
}
843-
e2elog.Logf("initializing nginx ingress controller")
842+
framework.Logf("initializing nginx ingress controller")
844843
framework.RunKubectlOrDieInput(read("rc.yaml"), "create", "-f", "-", fmt.Sprintf("--namespace=%v", cont.Ns))
845844

846845
rc, err := cont.Client.CoreV1().ReplicationControllers(cont.Ns).Get("nginx-ingress-controller", metav1.GetOptions{})
847846
framework.ExpectNoError(err)
848847
cont.rc = rc
849848

850-
e2elog.Logf("waiting for pods with label %v", rc.Spec.Selector)
849+
framework.Logf("waiting for pods with label %v", rc.Spec.Selector)
851850
sel := labels.SelectorFromSet(labels.Set(rc.Spec.Selector))
852851
framework.ExpectNoError(testutils.WaitForPodsWithLabelRunning(cont.Client, cont.Ns, sel))
853852
pods, err := cont.Client.CoreV1().Pods(cont.Ns).List(metav1.ListOptions{LabelSelector: sel.String()})
854853
framework.ExpectNoError(err)
855854
if len(pods.Items) == 0 {
856-
e2elog.Failf("Failed to find nginx ingress controller pods with selector %v", sel)
855+
framework.Failf("Failed to find nginx ingress controller pods with selector %v", sel)
857856
}
858857
cont.pod = &pods.Items[0]
859858
cont.externalIP, err = framework.GetHostExternalAddress(cont.Client, cont.pod)
860859
framework.ExpectNoError(err)
861-
e2elog.Logf("ingress controller running in pod %v on ip %v", cont.pod.Name, cont.externalIP)
860+
framework.Logf("ingress controller running in pod %v on ip %v", cont.pod.Name, cont.externalIP)
862861
}
863862

864863
func generateBacksideHTTPSIngressSpec(ns string) *networkingv1beta1.Ingress {

0 commit comments

Comments
 (0)