Merge branch 'main' into chrome_cors

This commit is contained in:
Ryan Richard 2022-02-07 16:35:44 -08:00
commit f1962ccf86
2 changed files with 36 additions and 42 deletions

View File

@ -1,4 +1,4 @@
// Copyright 2020-2021 the Pinniped contributors. All Rights Reserved. // Copyright 2020-2022 the Pinniped contributors. All Rights Reserved.
// SPDX-License-Identifier: Apache-2.0 // SPDX-License-Identifier: Apache-2.0
package integration package integration
@ -299,7 +299,7 @@ func runPinnipedLoginOIDC(
}) })
// Start a background goroutine to read stderr from the CLI and parse out the login URL. // Start a background goroutine to read stderr from the CLI and parse out the login URL.
loginURLChan := make(chan string) loginURLChan := make(chan string, 1)
spawnTestGoroutine(t, func() (err error) { spawnTestGoroutine(t, func() (err error) {
t.Helper() t.Helper()
defer func() { defer func() {
@ -318,7 +318,7 @@ func runPinnipedLoginOIDC(
for scanner.Scan() { for scanner.Scan() {
loginURL, err := url.Parse(strings.TrimSpace(scanner.Text())) loginURL, err := url.Parse(strings.TrimSpace(scanner.Text()))
if err == nil && loginURL.Scheme == "https" { if err == nil && loginURL.Scheme == "https" {
loginURLChan <- loginURL.String() loginURLChan <- loginURL.String() // this channel is buffered so this will not block
return nil return nil
} }
} }
@ -327,7 +327,7 @@ func runPinnipedLoginOIDC(
}) })
// Start a background goroutine to read stdout from the CLI and parse out an ExecCredential. // Start a background goroutine to read stdout from the CLI and parse out an ExecCredential.
credOutputChan := make(chan clientauthenticationv1beta1.ExecCredential) credOutputChan := make(chan clientauthenticationv1beta1.ExecCredential, 1)
spawnTestGoroutine(t, func() (err error) { spawnTestGoroutine(t, func() (err error) {
defer func() { defer func() {
closeErr := stdout.Close() closeErr := stdout.Close()
@ -343,7 +343,7 @@ func runPinnipedLoginOIDC(
if err := json.NewDecoder(reader).Decode(&out); err != nil { if err := json.NewDecoder(reader).Decode(&out); err != nil {
return fmt.Errorf("could not read ExecCredential from stdout: %w", err) return fmt.Errorf("could not read ExecCredential from stdout: %w", err)
} }
credOutputChan <- out credOutputChan <- out // this channel is buffered so this will not block
return readAndExpectEmpty(reader) return readAndExpectEmpty(reader)
}) })
@ -398,6 +398,7 @@ func readAndExpectEmpty(r io.Reader) (err error) {
return nil return nil
} }
// Note: Callers should ensure that f eventually returns, otherwise this helper will hang forever in t.Cleanup.
func spawnTestGoroutine(t *testing.T, f func() error) { func spawnTestGoroutine(t *testing.T, f func() error) {
t.Helper() t.Helper()
var eg errgroup.Group var eg errgroup.Group

View File

@ -29,6 +29,7 @@ import (
corev1 "k8s.io/api/core/v1" corev1 "k8s.io/api/core/v1"
rbacv1 "k8s.io/api/rbac/v1" rbacv1 "k8s.io/api/rbac/v1"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
utilerrors "k8s.io/apimachinery/pkg/util/errors"
authv1alpha "go.pinniped.dev/generated/latest/apis/concierge/authentication/v1alpha1" authv1alpha "go.pinniped.dev/generated/latest/apis/concierge/authentication/v1alpha1"
configv1alpha1 "go.pinniped.dev/generated/latest/apis/supervisor/config/v1alpha1" configv1alpha1 "go.pinniped.dev/generated/latest/apis/supervisor/config/v1alpha1"
@ -46,7 +47,7 @@ import (
) )
// TestE2EFullIntegration tests a full integration scenario that combines the supervisor, concierge, and CLI. // TestE2EFullIntegration tests a full integration scenario that combines the supervisor, concierge, and CLI.
func TestE2EFullIntegration(t *testing.T) { // nolint:gocyclo func TestE2EFullIntegration(t *testing.T) {
env := testlib.IntegrationEnv(t) env := testlib.IntegrationEnv(t)
ctx, cancelFunc := context.WithTimeout(context.Background(), 15*time.Minute) ctx, cancelFunc := context.WithTimeout(context.Background(), 15*time.Minute)
@ -159,46 +160,47 @@ func TestE2EFullIntegration(t *testing.T) { // nolint:gocyclo
start := time.Now() start := time.Now()
kubectlCmd := exec.CommandContext(ctx, "kubectl", "get", "namespace", "--kubeconfig", kubeconfigPath) kubectlCmd := exec.CommandContext(ctx, "kubectl", "get", "namespace", "--kubeconfig", kubeconfigPath)
kubectlCmd.Env = append(os.Environ(), env.ProxyEnv()...) kubectlCmd.Env = append(os.Environ(), env.ProxyEnv()...)
stderrPipe, err := kubectlCmd.StderrPipe()
// Wrap the stdout and stderr pipes with TeeReaders which will copy each incremental read to an
// in-memory buffer, so we can have the full output available to us at the end.
originalStderrPipe, err := kubectlCmd.StderrPipe()
require.NoError(t, err) require.NoError(t, err)
stdoutPipe, err := kubectlCmd.StdoutPipe() originalStdoutPipe, err := kubectlCmd.StdoutPipe()
require.NoError(t, err) require.NoError(t, err)
var stderrPipeBuf, stdoutPipeBuf bytes.Buffer
stderrPipe := io.TeeReader(originalStderrPipe, &stderrPipeBuf)
stdoutPipe := io.TeeReader(originalStdoutPipe, &stdoutPipeBuf)
t.Logf("starting kubectl subprocess") t.Logf("starting kubectl subprocess")
require.NoError(t, kubectlCmd.Start()) require.NoError(t, kubectlCmd.Start())
t.Cleanup(func() { t.Cleanup(func() {
err := kubectlCmd.Wait() // Consume readers so that the tee buffers will contain all the output so far.
_, stdoutReadAllErr := ioutil.ReadAll(stdoutPipe)
_, stderrReadAllErr := ioutil.ReadAll(stderrPipe)
// Note that Wait closes the stdout/stderr pipes, so we don't need to close them ourselves.
waitErr := kubectlCmd.Wait()
t.Logf("kubectl subprocess exited with code %d", kubectlCmd.ProcessState.ExitCode()) t.Logf("kubectl subprocess exited with code %d", kubectlCmd.ProcessState.ExitCode())
stdout, stdoutErr := ioutil.ReadAll(stdoutPipe)
if stdoutErr != nil { // Upon failure, print the full output so far of the kubectl command.
stdout = []byte("<error reading stdout: " + stdoutErr.Error() + ">") var testAlreadyFailedErr error
if t.Failed() {
testAlreadyFailedErr = errors.New("test failed prior to clean up function")
} }
stderr, stderrErr := ioutil.ReadAll(stderrPipe) cleanupErrs := utilerrors.NewAggregate([]error{waitErr, stdoutReadAllErr, stderrReadAllErr, testAlreadyFailedErr})
if stderrErr != nil { require.NoErrorf(t, cleanupErrs, "kubectl process did not exit cleanly and/or the test failed\nstdout: %q\nstderr: %q",
stderr = []byte("<error reading stderr: " + stderrErr.Error() + ">") stdoutPipeBuf.String(), stderrPipeBuf.String())
}
require.NoErrorf(t, err, "kubectl process did not exit cleanly, stdout/stderr: %q/%q", string(stdout), string(stderr))
}) })
// Start a background goroutine to read stderr from the CLI and parse out the login URL. // Start a background goroutine to read stderr from the CLI and parse out the login URL.
loginURLChan := make(chan string) loginURLChan := make(chan string, 1)
spawnTestGoroutine(t, func() (err error) { spawnTestGoroutine(t, func() error {
defer func() {
closeErr := stderrPipe.Close()
if closeErr == nil || errors.Is(closeErr, os.ErrClosed) {
return
}
if err == nil {
err = fmt.Errorf("stderr stream closed with error: %w", closeErr)
}
}()
reader := bufio.NewReader(testlib.NewLoggerReader(t, "stderr", stderrPipe)) reader := bufio.NewReader(testlib.NewLoggerReader(t, "stderr", stderrPipe))
scanner := bufio.NewScanner(reader) scanner := bufio.NewScanner(reader)
for scanner.Scan() { for scanner.Scan() {
loginURL, err := url.Parse(strings.TrimSpace(scanner.Text())) loginURL, err := url.Parse(strings.TrimSpace(scanner.Text()))
if err == nil && loginURL.Scheme == "https" { if err == nil && loginURL.Scheme == "https" {
loginURLChan <- loginURL.String() loginURLChan <- loginURL.String() // this channel is buffered so this will not block
return nil return nil
} }
} }
@ -206,23 +208,14 @@ func TestE2EFullIntegration(t *testing.T) { // nolint:gocyclo
}) })
// Start a background goroutine to read stdout from kubectl and return the result as a string. // Start a background goroutine to read stdout from kubectl and return the result as a string.
kubectlOutputChan := make(chan string) kubectlOutputChan := make(chan string, 1)
spawnTestGoroutine(t, func() (err error) { spawnTestGoroutine(t, func() error {
defer func() {
closeErr := stdoutPipe.Close()
if closeErr == nil || errors.Is(closeErr, os.ErrClosed) {
return
}
if err == nil {
err = fmt.Errorf("stdout stream closed with error: %w", closeErr)
}
}()
output, err := ioutil.ReadAll(stdoutPipe) output, err := ioutil.ReadAll(stdoutPipe)
if err != nil { if err != nil {
return err return err
} }
t.Logf("kubectl output:\n%s\n", output) t.Logf("kubectl output:\n%s\n", output)
kubectlOutputChan <- string(output) kubectlOutputChan <- string(output) // this channel is buffered so this will not block
return nil return nil
}) })