Skip to content

Commit 52f708d

Browse files
authored
Merge pull request kubernetes#81855 from oomichi/replace-e2elog-framework-perf-replicaset
Use log functions of core framework on sub p*
2 parents 038e5fa + 9e9c170 commit 52f708d

File tree

10 files changed

+57
-67
lines changed

10 files changed

+57
-67
lines changed

test/e2e/framework/providers/aws/BUILD

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@ go_library(
99
"//staging/src/k8s.io/api/core/v1:go_default_library",
1010
"//staging/src/k8s.io/legacy-cloud-providers/aws:go_default_library",
1111
"//test/e2e/framework:go_default_library",
12-
"//test/e2e/framework/log:go_default_library",
1312
"//vendor/github.com/aws/aws-sdk-go/aws:go_default_library",
1413
"//vendor/github.com/aws/aws-sdk-go/aws/awserr:go_default_library",
1514
"//vendor/github.com/aws/aws-sdk-go/aws/session:go_default_library",

test/e2e/framework/providers/aws/aws.go

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,6 @@ import (
2828

2929
"k8s.io/api/core/v1"
3030
"k8s.io/kubernetes/test/e2e/framework"
31-
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
3231
awscloud "k8s.io/legacy-cloud-providers/aws"
3332
)
3433

@@ -123,7 +122,7 @@ func (p *Provider) DeletePD(pdName string) error {
123122
_, err := client.DeleteVolume(request)
124123
if err != nil {
125124
if awsError, ok := err.(awserr.Error); ok && awsError.Code() == "InvalidVolume.NotFound" {
126-
e2elog.Logf("volume deletion implicitly succeeded because volume %q does not exist.", pdName)
125+
framework.Logf("volume deletion implicitly succeeded because volume %q does not exist.", pdName)
127126
} else {
128127
return fmt.Errorf("error deleting EBS volumes: %v", err)
129128
}
@@ -153,15 +152,15 @@ func newAWSClient(zone string) *ec2.EC2 {
153152
zone = framework.TestContext.CloudConfig.Zone
154153
}
155154
if zone == "" {
156-
e2elog.Logf("Warning: No AWS zone configured!")
155+
framework.Logf("Warning: No AWS zone configured!")
157156
cfg = nil
158157
} else {
159158
region := zone[:len(zone)-1]
160159
cfg = &aws.Config{Region: aws.String(region)}
161160
}
162161
session, err := session.NewSession()
163162
if err != nil {
164-
e2elog.Logf("Warning: failed to create aws session")
163+
framework.Logf("Warning: failed to create aws session")
165164
}
166165
return ec2.New(session, cfg)
167166
}

test/e2e/framework/providers/azure/BUILD

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,6 @@ go_library(
1010
"//staging/src/k8s.io/apimachinery/pkg/util/uuid:go_default_library",
1111
"//staging/src/k8s.io/legacy-cloud-providers/azure:go_default_library",
1212
"//test/e2e/framework:go_default_library",
13-
"//test/e2e/framework/log:go_default_library",
1413
],
1514
)
1615

test/e2e/framework/providers/azure/azure.go

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ import (
2424
v1 "k8s.io/api/core/v1"
2525
"k8s.io/apimachinery/pkg/util/uuid"
2626
"k8s.io/kubernetes/test/e2e/framework"
27-
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
2827
"k8s.io/legacy-cloud-providers/azure"
2928
)
3029

@@ -38,7 +37,7 @@ func newProvider() (framework.ProviderInterface, error) {
3837
}
3938
config, err := os.Open(framework.TestContext.CloudConfig.ConfigFile)
4039
if err != nil {
41-
e2elog.Logf("Couldn't open cloud provider configuration %s: %#v",
40+
framework.Logf("Couldn't open cloud provider configuration %s: %#v",
4241
framework.TestContext.CloudConfig.ConfigFile, err)
4342
}
4443
defer config.Close()
@@ -73,7 +72,7 @@ func (p *Provider) CreatePD(zone string) (string, error) {
7372
// DeletePD deletes a persistent volume
7473
func (p *Provider) DeletePD(pdName string) error {
7574
if err := p.azureCloud.DeleteVolume(pdName); err != nil {
76-
e2elog.Logf("failed to delete Azure volume %q: %v", pdName, err)
75+
framework.Logf("failed to delete Azure volume %q: %v", pdName, err)
7776
return err
7877
}
7978
return nil

test/e2e/framework/providers/gce/BUILD

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,6 @@ go_library(
2323
"//staging/src/k8s.io/cloud-provider:go_default_library",
2424
"//staging/src/k8s.io/legacy-cloud-providers/gce:go_default_library",
2525
"//test/e2e/framework:go_default_library",
26-
"//test/e2e/framework/log:go_default_library",
2726
"//test/e2e/framework/node:go_default_library",
2827
"//test/e2e/framework/pod:go_default_library",
2928
"//test/e2e/framework/service:go_default_library",

test/e2e/framework/providers/gce/firewall.go

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,6 @@ import (
3030
"k8s.io/apimachinery/pkg/util/wait"
3131
cloudprovider "k8s.io/cloud-provider"
3232
"k8s.io/kubernetes/test/e2e/framework"
33-
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
3433
gcecloud "k8s.io/legacy-cloud-providers/gce"
3534
)
3635

@@ -43,7 +42,7 @@ func MakeFirewallNameForLBService(name string) string {
4342
// ConstructFirewallForLBService returns the expected GCE firewall rule for a loadbalancer type service
4443
func ConstructFirewallForLBService(svc *v1.Service, nodeTag string) *compute.Firewall {
4544
if svc.Spec.Type != v1.ServiceTypeLoadBalancer {
46-
e2elog.Failf("can not construct firewall rule for non-loadbalancer type service")
45+
framework.Failf("can not construct firewall rule for non-loadbalancer type service")
4746
}
4847
fw := compute.Firewall{}
4948
fw.Name = MakeFirewallNameForLBService(cloudprovider.DefaultLoadBalancerName(svc))
@@ -71,7 +70,7 @@ func MakeHealthCheckFirewallNameForLBService(clusterID, name string, isNodesHeal
7170
// ConstructHealthCheckFirewallForLBService returns the expected GCE firewall rule for a loadbalancer type service
7271
func ConstructHealthCheckFirewallForLBService(clusterID string, svc *v1.Service, nodeTag string, isNodesHealthCheck bool) *compute.Firewall {
7372
if svc.Spec.Type != v1.ServiceTypeLoadBalancer {
74-
e2elog.Failf("can not construct firewall rule for non-loadbalancer type service")
73+
framework.Failf("can not construct firewall rule for non-loadbalancer type service")
7574
}
7675
fw := compute.Firewall{}
7776
fw.Name = MakeHealthCheckFirewallNameForLBService(clusterID, cloudprovider.DefaultLoadBalancerName(svc), isNodesHealthCheck)
@@ -396,7 +395,7 @@ func VerifyFirewallRule(res, exp *compute.Firewall, network string, portsSubset
396395

397396
// WaitForFirewallRule waits for the specified firewall existence
398397
func WaitForFirewallRule(gceCloud *gcecloud.Cloud, fwName string, exist bool, timeout time.Duration) (*compute.Firewall, error) {
399-
e2elog.Logf("Waiting up to %v for firewall %v exist=%v", timeout, fwName, exist)
398+
framework.Logf("Waiting up to %v for firewall %v exist=%v", timeout, fwName, exist)
400399
var fw *compute.Firewall
401400
var err error
402401

test/e2e/framework/providers/gce/gce.go

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,6 @@ import (
3232
"k8s.io/apimachinery/pkg/util/wait"
3333
clientset "k8s.io/client-go/kubernetes"
3434
"k8s.io/kubernetes/test/e2e/framework"
35-
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
3635
e2eservice "k8s.io/kubernetes/test/e2e/framework/service"
3736
gcecloud "k8s.io/legacy-cloud-providers/gce"
3837
)
@@ -43,7 +42,7 @@ func init() {
4342
}
4443

4544
func factory() (framework.ProviderInterface, error) {
46-
e2elog.Logf("Fetching cloud provider for %q\r", framework.TestContext.Provider)
45+
framework.Logf("Fetching cloud provider for %q\r", framework.TestContext.Provider)
4746
zone := framework.TestContext.CloudConfig.Zone
4847
region := framework.TestContext.CloudConfig.Region
4948

@@ -177,7 +176,7 @@ func (p *Provider) EnsureLoadBalancerResourcesDeleted(ip, portRange string) erro
177176
}
178177
for _, item := range list.Items {
179178
if item.PortRange == portRange && item.IPAddress == ip {
180-
e2elog.Logf("found a load balancer: %v", item)
179+
framework.Logf("found a load balancer: %v", item)
181180
return false, nil
182181
}
183182
}
@@ -231,7 +230,7 @@ func (p *Provider) DeletePD(pdName string) error {
231230
return nil
232231
}
233232

234-
e2elog.Logf("error deleting PD %q: %v", pdName, err)
233+
framework.Logf("error deleting PD %q: %v", pdName, err)
235234
}
236235
return err
237236
}
@@ -258,12 +257,12 @@ func (p *Provider) DeletePVSource(pvSource *v1.PersistentVolumeSource) error {
258257
func (p *Provider) CleanupServiceResources(c clientset.Interface, loadBalancerName, region, zone string) {
259258
if pollErr := wait.Poll(5*time.Second, e2eservice.LoadBalancerCleanupTimeout, func() (bool, error) {
260259
if err := p.cleanupGCEResources(c, loadBalancerName, region, zone); err != nil {
261-
e2elog.Logf("Still waiting for glbc to cleanup: %v", err)
260+
framework.Logf("Still waiting for glbc to cleanup: %v", err)
262261
return false, nil
263262
}
264263
return true, nil
265264
}); pollErr != nil {
266-
e2elog.Failf("Failed to cleanup service GCE resources.")
265+
framework.Failf("Failed to cleanup service GCE resources.")
267266
}
268267
}
269268

@@ -333,7 +332,7 @@ func GetInstanceTags(cloudConfig framework.CloudConfig, instanceName string) *co
333332
res, err := gceCloud.ComputeServices().GA.Instances.Get(cloudConfig.ProjectID, cloudConfig.Zone,
334333
instanceName).Do()
335334
if err != nil {
336-
e2elog.Failf("Failed to get instance tags for %v: %v", instanceName, err)
335+
framework.Failf("Failed to get instance tags for %v: %v", instanceName, err)
337336
}
338337
return res.Tags
339338
}
@@ -347,17 +346,17 @@ func SetInstanceTags(cloudConfig framework.CloudConfig, instanceName, zone strin
347346
cloudConfig.ProjectID, zone, instanceName,
348347
&compute.Tags{Fingerprint: resTags.Fingerprint, Items: tags}).Do()
349348
if err != nil {
350-
e2elog.Failf("failed to set instance tags: %v", err)
349+
framework.Failf("failed to set instance tags: %v", err)
351350
}
352-
e2elog.Logf("Sent request to set tags %v on instance: %v", tags, instanceName)
351+
framework.Logf("Sent request to set tags %v on instance: %v", tags, instanceName)
353352
return resTags.Items
354353
}
355354

356355
// GetNodeTags gets k8s node tag from one of the nodes
357356
func GetNodeTags(c clientset.Interface, cloudConfig framework.CloudConfig) []string {
358357
nodes := framework.GetReadySchedulableNodesOrDie(c)
359358
if len(nodes.Items) == 0 {
360-
e2elog.Logf("GetNodeTags: Found 0 node.")
359+
framework.Logf("GetNodeTags: Found 0 node.")
361360
return []string{}
362361
}
363362
return GetInstanceTags(cloudConfig, nodes.Items[0].Name).Items

0 commit comments

Comments
 (0)