From 075416cc778c7f28c9a8e9a96390ddddd3f5eb39 Mon Sep 17 00:00:00 2001 From: Michal Minar Date: Mon, 7 Dec 2015 13:20:20 +0100 Subject: [PATCH] Reenabled registry dc's liveness probe Reverts 12f4a35e98f7a358a9763e06444083dddd3a29b0 Signed-off-by: Michal Minar --- pkg/cmd/admin/registry/registry.go | 20 +++++++++----------- pkg/image/prune/imagepruner.go | 12 ++++++------ test/end-to-end/core.sh | 2 +- 3 files changed, 16 insertions(+), 18 deletions(-) diff --git a/pkg/cmd/admin/registry/registry.go b/pkg/cmd/admin/registry/registry.go index 5046fa6a8986..a5f48268f2c9 100644 --- a/pkg/cmd/admin/registry/registry.go +++ b/pkg/cmd/admin/registry/registry.go @@ -13,6 +13,7 @@ import ( kclientcmd "k8s.io/kubernetes/pkg/client/unversioned/clientcmd" cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util" "k8s.io/kubernetes/pkg/runtime" + kutil "k8s.io/kubernetes/pkg/util" "github.com/openshift/origin/pkg/cmd/util/clientcmd" "github.com/openshift/origin/pkg/cmd/util/variable" @@ -250,19 +251,16 @@ func RunCmdRegistry(f *clientcmd.Factory, cmd *cobra.Command, out io.Writer, cfg SecurityContext: &kapi.SecurityContext{ Privileged: &mountHost, }, - // TODO reenable the liveness probe when we no longer support the v1 registry. - /* - LivenessProbe: &kapi.Probe{ - InitialDelaySeconds: 3, - TimeoutSeconds: 5, - Handler: kapi.Handler{ - HTTPGet: &kapi.HTTPGetAction{ - Path: "/healthz", - Port: util.NewIntOrStringFromInt(5000), - }, + LivenessProbe: &kapi.Probe{ + InitialDelaySeconds: 3, + TimeoutSeconds: 5, + Handler: kapi.Handler{ + HTTPGet: &kapi.HTTPGetAction{ + Path: "/", + Port: kutil.NewIntOrStringFromInt(ports[0].ContainerPort), }, }, - */ + }, }, }, Volumes: []kapi.Volume{ diff --git a/pkg/image/prune/imagepruner.go b/pkg/image/prune/imagepruner.go index 6aef3dac8a75..f3f5c014919b 100644 --- a/pkg/image/prune/imagepruner.go +++ b/pkg/image/prune/imagepruner.go @@ -156,15 +156,15 @@ type defaultRegistryPinger struct { } func (drp *defaultRegistryPinger) ping(registry string) error { - healthzCheck := func(proto, registry string) error { - healthzResponse, err := drp.client.Get(fmt.Sprintf("%s://%s/healthz", proto, registry)) + healthCheck := func(proto, registry string) error { + healthResponse, err := drp.client.Get(fmt.Sprintf("%s://%s/", proto, registry)) if err != nil { return err } - defer healthzResponse.Body.Close() + defer healthResponse.Body.Close() - if healthzResponse.StatusCode != http.StatusOK { - return fmt.Errorf("unexpected status code %d", healthzResponse.StatusCode) + if healthResponse.StatusCode != http.StatusOK { + return fmt.Errorf("unexpected status code %d", healthResponse.StatusCode) } return nil @@ -173,7 +173,7 @@ func (drp *defaultRegistryPinger) ping(registry string) error { var err error for _, proto := range []string{"https", "http"} { glog.V(4).Infof("Trying %s for %s", proto, registry) - err = healthzCheck(proto, registry) + err = healthCheck(proto, registry) if err == nil { break } diff --git a/test/end-to-end/core.sh b/test/end-to-end/core.sh index 8b858c67556e..807353be462c 100755 --- a/test/end-to-end/core.sh +++ b/test/end-to-end/core.sh @@ -88,7 +88,7 @@ registry="$(dig @${API_HOST} "docker-registry.default.svc.cluster.local." +short [[ -n "${registry}" && "${registry}:5000" == "${DOCKER_REGISTRY}" ]] echo "[INFO] Verifying the docker-registry is up at ${DOCKER_REGISTRY}" -wait_for_url_timed "http://${DOCKER_REGISTRY}/healthz" "[INFO] Docker registry says: " $((2*TIME_MIN)) +wait_for_url_timed "http://${DOCKER_REGISTRY}/" "[INFO] Docker registry says: " $((2*TIME_MIN)) [ "$(dig @${API_HOST} "docker-registry.default.local." A)" ]