test/e2e_node: mark more tests with [NodeConformance]
This commit is contained in:
parent
7cbd897e3e
commit
5802f18283
@ -92,7 +92,7 @@ var _ = framework.KubeDescribe("Kubelet", func() {
|
|||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should have an error terminated reason", func() {
|
It("should have an error terminated reason [NodeConformance]", func() {
|
||||||
Eventually(func() error {
|
Eventually(func() error {
|
||||||
podData, err := podClient.Get(podName, metav1.GetOptions{})
|
podData, err := podClient.Get(podName, metav1.GetOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -112,7 +112,7 @@ var _ = framework.KubeDescribe("Kubelet", func() {
|
|||||||
}, time.Minute, time.Second*4).Should(BeNil())
|
}, time.Minute, time.Second*4).Should(BeNil())
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should be possible to delete", func() {
|
It("should be possible to delete [NodeConformance]", func() {
|
||||||
err := podClient.Delete(podName, &metav1.DeleteOptions{})
|
err := podClient.Delete(podName, &metav1.DeleteOptions{})
|
||||||
Expect(err).To(BeNil(), fmt.Sprintf("Error deleting Pod %v", err))
|
Expect(err).To(BeNil(), fmt.Sprintf("Error deleting Pod %v", err))
|
||||||
})
|
})
|
||||||
@ -120,7 +120,7 @@ var _ = framework.KubeDescribe("Kubelet", func() {
|
|||||||
Context("when scheduling a busybox Pod with hostAliases", func() {
|
Context("when scheduling a busybox Pod with hostAliases", func() {
|
||||||
podName := "busybox-host-aliases" + string(uuid.NewUUID())
|
podName := "busybox-host-aliases" + string(uuid.NewUUID())
|
||||||
|
|
||||||
It("it should write entries to /etc/hosts", func() {
|
It("it should write entries to /etc/hosts [NodeConformance]", func() {
|
||||||
podClient.CreateSync(&v1.Pod{
|
podClient.CreateSync(&v1.Pod{
|
||||||
ObjectMeta: metav1.ObjectMeta{
|
ObjectMeta: metav1.ObjectMeta{
|
||||||
Name: podName,
|
Name: podName,
|
||||||
|
@ -35,7 +35,7 @@ const (
|
|||||||
checkContName = "checker-container"
|
checkContName = "checker-container"
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ = framework.KubeDescribe("ContainerLogPath", func() {
|
var _ = framework.KubeDescribe("ContainerLogPath [NodeConformance]", func() {
|
||||||
f := framework.NewDefaultFramework("kubelet-container-log-path")
|
f := framework.NewDefaultFramework("kubelet-container-log-path")
|
||||||
Describe("Pod with a container", func() {
|
Describe("Pod with a container", func() {
|
||||||
Context("printed log to stdout", func() {
|
Context("printed log to stdout", func() {
|
||||||
|
@ -165,7 +165,7 @@ var _ = framework.KubeDescribe("Kubelet Cgroup Manager", func() {
|
|||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
Describe("Pod containers", func() {
|
Describe("Pod containers [NodeConformance]", func() {
|
||||||
Context("On scheduling a Guaranteed Pod", func() {
|
Context("On scheduling a Guaranteed Pod", func() {
|
||||||
It("Pod containers should have been created under the cgroup-root", func() {
|
It("Pod containers should have been created under the cgroup-root", func() {
|
||||||
if !framework.TestContext.KubeletConfig.CgroupsPerQOS {
|
if !framework.TestContext.KubeletConfig.CgroupsPerQOS {
|
||||||
|
@ -185,7 +185,7 @@ while true; do sleep 1; done
|
|||||||
},
|
},
|
||||||
|
|
||||||
{
|
{
|
||||||
name: "as empty when pod succeeds and TerminationMessagePolicy FallbackToLogOnError is set",
|
name: "as empty when pod succeeds and TerminationMessagePolicy FallbackToLogOnError is set [NodeConformance]",
|
||||||
container: v1.Container{
|
container: v1.Container{
|
||||||
Image: busyboxImage,
|
Image: busyboxImage,
|
||||||
Command: []string{"/bin/sh", "-c"},
|
Command: []string{"/bin/sh", "-c"},
|
||||||
|
@ -382,11 +382,11 @@ var _ = framework.KubeDescribe("Security Context", func() {
|
|||||||
podClient.WaitForSuccess(podName, framework.PodStartTimeout)
|
podClient.WaitForSuccess(podName, framework.PodStartTimeout)
|
||||||
}
|
}
|
||||||
|
|
||||||
It("should run the container with uid 65534", func() {
|
It("should run the container with uid 65534 [NodeConformance]", func() {
|
||||||
createAndWaitUserPod(65534)
|
createAndWaitUserPod(65534)
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should run the container with uid 0", func() {
|
It("should run the container with uid 0 [NodeConformance]", func() {
|
||||||
createAndWaitUserPod(0)
|
createAndWaitUserPod(0)
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
@ -429,11 +429,11 @@ var _ = framework.KubeDescribe("Security Context", func() {
|
|||||||
return podName
|
return podName
|
||||||
}
|
}
|
||||||
|
|
||||||
It("should run the container with readonly rootfs when readOnlyRootFilesystem=true", func() {
|
It("should run the container with readonly rootfs when readOnlyRootFilesystem=true [NodeConformance]", func() {
|
||||||
createAndWaitUserPod(true)
|
createAndWaitUserPod(true)
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should run the container with writable rootfs when readOnlyRootFilesystem=false", func() {
|
It("should run the container with writable rootfs when readOnlyRootFilesystem=false [NodeConformance]", func() {
|
||||||
createAndWaitUserPod(false)
|
createAndWaitUserPod(false)
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
@ -497,14 +497,14 @@ var _ = framework.KubeDescribe("Security Context", func() {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
It("should allow privilege escalation when not explicitly set and uid != 0", func() {
|
It("should allow privilege escalation when not explicitly set and uid != 0 [NodeConformance]", func() {
|
||||||
podName := "alpine-nnp-nil-" + string(uuid.NewUUID())
|
podName := "alpine-nnp-nil-" + string(uuid.NewUUID())
|
||||||
if err := createAndMatchOutput(podName, "Effective uid: 0", nil, 1000); err != nil {
|
if err := createAndMatchOutput(podName, "Effective uid: 0", nil, 1000); err != nil {
|
||||||
framework.Failf("Match output for pod %q failed: %v", podName, err)
|
framework.Failf("Match output for pod %q failed: %v", podName, err)
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should not allow privilege escalation when false", func() {
|
It("should not allow privilege escalation when false [NodeConformance]", func() {
|
||||||
podName := "alpine-nnp-false-" + string(uuid.NewUUID())
|
podName := "alpine-nnp-false-" + string(uuid.NewUUID())
|
||||||
apeFalse := false
|
apeFalse := false
|
||||||
if err := createAndMatchOutput(podName, "Effective uid: 1000", &apeFalse, 1000); err != nil {
|
if err := createAndMatchOutput(podName, "Effective uid: 1000", &apeFalse, 1000); err != nil {
|
||||||
@ -512,7 +512,7 @@ var _ = framework.KubeDescribe("Security Context", func() {
|
|||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should allow privilege escalation when true", func() {
|
It("should allow privilege escalation when true [NodeConformance]", func() {
|
||||||
podName := "alpine-nnp-true-" + string(uuid.NewUUID())
|
podName := "alpine-nnp-true-" + string(uuid.NewUUID())
|
||||||
apeTrue := true
|
apeTrue := true
|
||||||
if err := createAndMatchOutput(podName, "Effective uid: 0", &apeTrue, 1000); err != nil {
|
if err := createAndMatchOutput(podName, "Effective uid: 0", &apeTrue, 1000); err != nil {
|
||||||
@ -568,7 +568,7 @@ var _ = framework.KubeDescribe("Security Context", func() {
|
|||||||
}
|
}
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should run the container as unprivileged when false", func() {
|
It("should run the container as unprivileged when false [NodeConformance]", func() {
|
||||||
podName := createAndWaitUserPod(false)
|
podName := createAndWaitUserPod(false)
|
||||||
logs, err := framework.GetPodLogs(f.ClientSet, f.Namespace.Name, podName, podName)
|
logs, err := framework.GetPodLogs(f.ClientSet, f.Namespace.Name, podName, podName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -36,7 +36,7 @@ import (
|
|||||||
"github.com/onsi/gomega/types"
|
"github.com/onsi/gomega/types"
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ = framework.KubeDescribe("Summary API", func() {
|
var _ = framework.KubeDescribe("Summary API [NodeConformance]", func() {
|
||||||
f := framework.NewDefaultFramework("summary-test")
|
f := framework.NewDefaultFramework("summary-test")
|
||||||
Context("when querying /stats/summary", func() {
|
Context("when querying /stats/summary", func() {
|
||||||
AfterEach(func() {
|
AfterEach(func() {
|
||||||
|
@ -34,7 +34,7 @@ var _ = framework.KubeDescribe("Kubelet Volume Manager", func() {
|
|||||||
f := framework.NewDefaultFramework("kubelet-volume-manager")
|
f := framework.NewDefaultFramework("kubelet-volume-manager")
|
||||||
Describe("Volume Manager", func() {
|
Describe("Volume Manager", func() {
|
||||||
Context("On terminatation of pod with memory backed volume", func() {
|
Context("On terminatation of pod with memory backed volume", func() {
|
||||||
It("should remove the volume from the node", func() {
|
It("should remove the volume from the node [NodeConformance]", func() {
|
||||||
var (
|
var (
|
||||||
memoryBackedPod *v1.Pod
|
memoryBackedPod *v1.Pod
|
||||||
volumeName string
|
volumeName string
|
||||||
|
Loading…
Reference in New Issue
Block a user