test/e2e/*: default existing tests to privileged pod security policy
This is to ensure that all existing tests don't break when defaulting the pod security policy to restricted in the e2e test framework.
This commit is contained in:
@@ -33,6 +33,7 @@ import (
|
||||
"k8s.io/kubernetes/pkg/kubelet/checkpointmanager"
|
||||
"k8s.io/kubernetes/pkg/kubelet/cm/devicemanager/checkpoint"
|
||||
"k8s.io/kubernetes/pkg/kubelet/util"
|
||||
admissionapi "k8s.io/pod-security-admission/api"
|
||||
|
||||
"k8s.io/kubernetes/test/e2e/framework"
|
||||
e2enode "k8s.io/kubernetes/test/e2e/framework/node"
|
||||
@@ -52,6 +53,7 @@ const (
|
||||
var _ = SIGDescribe("Device Manager [Serial] [Feature:DeviceManager][NodeFeature:DeviceManager]", func() {
|
||||
checkpointFullPath := filepath.Join(devicePluginDir, checkpointName)
|
||||
f := framework.NewDefaultFramework("devicemanager-test")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.Context("With SRIOV devices in the system", func() {
|
||||
// this test wants to reproduce what happened in https://github.com/kubernetes/kubernetes/issues/102880
|
||||
|
Reference in New Issue
Block a user