test/e2e_node: mark more tests with [NodeConformance]

This commit is contained in:
Yu-Ju Hong 2018-05-21 17:10:08 -07:00
parent 7cbd897e3e
commit 5802f18283
7 changed files with 16 additions and 16 deletions

View File

@ -92,7 +92,7 @@ var _ = framework.KubeDescribe("Kubelet", func() {
}) })
}) })
It("should have an error terminated reason", func() { It("should have an error terminated reason [NodeConformance]", func() {
Eventually(func() error { Eventually(func() error {
podData, err := podClient.Get(podName, metav1.GetOptions{}) podData, err := podClient.Get(podName, metav1.GetOptions{})
if err != nil { if err != nil {
@ -112,7 +112,7 @@ var _ = framework.KubeDescribe("Kubelet", func() {
}, time.Minute, time.Second*4).Should(BeNil()) }, time.Minute, time.Second*4).Should(BeNil())
}) })
It("should be possible to delete", func() { It("should be possible to delete [NodeConformance]", func() {
err := podClient.Delete(podName, &metav1.DeleteOptions{}) err := podClient.Delete(podName, &metav1.DeleteOptions{})
Expect(err).To(BeNil(), fmt.Sprintf("Error deleting Pod %v", err)) Expect(err).To(BeNil(), fmt.Sprintf("Error deleting Pod %v", err))
}) })
@ -120,7 +120,7 @@ var _ = framework.KubeDescribe("Kubelet", func() {
Context("when scheduling a busybox Pod with hostAliases", func() { Context("when scheduling a busybox Pod with hostAliases", func() {
podName := "busybox-host-aliases" + string(uuid.NewUUID()) podName := "busybox-host-aliases" + string(uuid.NewUUID())
It("it should write entries to /etc/hosts", func() { It("it should write entries to /etc/hosts [NodeConformance]", func() {
podClient.CreateSync(&v1.Pod{ podClient.CreateSync(&v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: podName, Name: podName,

View File

@ -35,7 +35,7 @@ const (
checkContName = "checker-container" checkContName = "checker-container"
) )
var _ = framework.KubeDescribe("ContainerLogPath", func() { var _ = framework.KubeDescribe("ContainerLogPath [NodeConformance]", func() {
f := framework.NewDefaultFramework("kubelet-container-log-path") f := framework.NewDefaultFramework("kubelet-container-log-path")
Describe("Pod with a container", func() { Describe("Pod with a container", func() {
Context("printed log to stdout", func() { Context("printed log to stdout", func() {

View File

@ -165,7 +165,7 @@ var _ = framework.KubeDescribe("Kubelet Cgroup Manager", func() {
}) })
}) })
Describe("Pod containers", func() { Describe("Pod containers [NodeConformance]", func() {
Context("On scheduling a Guaranteed Pod", func() { Context("On scheduling a Guaranteed Pod", func() {
It("Pod containers should have been created under the cgroup-root", func() { It("Pod containers should have been created under the cgroup-root", func() {
if !framework.TestContext.KubeletConfig.CgroupsPerQOS { if !framework.TestContext.KubeletConfig.CgroupsPerQOS {

View File

@ -185,7 +185,7 @@ while true; do sleep 1; done
}, },
{ {
name: "as empty when pod succeeds and TerminationMessagePolicy FallbackToLogOnError is set", name: "as empty when pod succeeds and TerminationMessagePolicy FallbackToLogOnError is set [NodeConformance]",
container: v1.Container{ container: v1.Container{
Image: busyboxImage, Image: busyboxImage,
Command: []string{"/bin/sh", "-c"}, Command: []string{"/bin/sh", "-c"},

View File

@ -382,11 +382,11 @@ var _ = framework.KubeDescribe("Security Context", func() {
podClient.WaitForSuccess(podName, framework.PodStartTimeout) podClient.WaitForSuccess(podName, framework.PodStartTimeout)
} }
It("should run the container with uid 65534", func() { It("should run the container with uid 65534 [NodeConformance]", func() {
createAndWaitUserPod(65534) createAndWaitUserPod(65534)
}) })
It("should run the container with uid 0", func() { It("should run the container with uid 0 [NodeConformance]", func() {
createAndWaitUserPod(0) createAndWaitUserPod(0)
}) })
}) })
@ -429,11 +429,11 @@ var _ = framework.KubeDescribe("Security Context", func() {
return podName return podName
} }
It("should run the container with readonly rootfs when readOnlyRootFilesystem=true", func() { It("should run the container with readonly rootfs when readOnlyRootFilesystem=true [NodeConformance]", func() {
createAndWaitUserPod(true) createAndWaitUserPod(true)
}) })
It("should run the container with writable rootfs when readOnlyRootFilesystem=false", func() { It("should run the container with writable rootfs when readOnlyRootFilesystem=false [NodeConformance]", func() {
createAndWaitUserPod(false) createAndWaitUserPod(false)
}) })
}) })
@ -497,14 +497,14 @@ var _ = framework.KubeDescribe("Security Context", func() {
return nil return nil
} }
It("should allow privilege escalation when not explicitly set and uid != 0", func() { It("should allow privilege escalation when not explicitly set and uid != 0 [NodeConformance]", func() {
podName := "alpine-nnp-nil-" + string(uuid.NewUUID()) podName := "alpine-nnp-nil-" + string(uuid.NewUUID())
if err := createAndMatchOutput(podName, "Effective uid: 0", nil, 1000); err != nil { if err := createAndMatchOutput(podName, "Effective uid: 0", nil, 1000); err != nil {
framework.Failf("Match output for pod %q failed: %v", podName, err) framework.Failf("Match output for pod %q failed: %v", podName, err)
} }
}) })
It("should not allow privilege escalation when false", func() { It("should not allow privilege escalation when false [NodeConformance]", func() {
podName := "alpine-nnp-false-" + string(uuid.NewUUID()) podName := "alpine-nnp-false-" + string(uuid.NewUUID())
apeFalse := false apeFalse := false
if err := createAndMatchOutput(podName, "Effective uid: 1000", &apeFalse, 1000); err != nil { if err := createAndMatchOutput(podName, "Effective uid: 1000", &apeFalse, 1000); err != nil {
@ -512,7 +512,7 @@ var _ = framework.KubeDescribe("Security Context", func() {
} }
}) })
It("should allow privilege escalation when true", func() { It("should allow privilege escalation when true [NodeConformance]", func() {
podName := "alpine-nnp-true-" + string(uuid.NewUUID()) podName := "alpine-nnp-true-" + string(uuid.NewUUID())
apeTrue := true apeTrue := true
if err := createAndMatchOutput(podName, "Effective uid: 0", &apeTrue, 1000); err != nil { if err := createAndMatchOutput(podName, "Effective uid: 0", &apeTrue, 1000); err != nil {
@ -568,7 +568,7 @@ var _ = framework.KubeDescribe("Security Context", func() {
} }
}) })
It("should run the container as unprivileged when false", func() { It("should run the container as unprivileged when false [NodeConformance]", func() {
podName := createAndWaitUserPod(false) podName := createAndWaitUserPod(false)
logs, err := framework.GetPodLogs(f.ClientSet, f.Namespace.Name, podName, podName) logs, err := framework.GetPodLogs(f.ClientSet, f.Namespace.Name, podName, podName)
if err != nil { if err != nil {

View File

@ -36,7 +36,7 @@ import (
"github.com/onsi/gomega/types" "github.com/onsi/gomega/types"
) )
var _ = framework.KubeDescribe("Summary API", func() { var _ = framework.KubeDescribe("Summary API [NodeConformance]", func() {
f := framework.NewDefaultFramework("summary-test") f := framework.NewDefaultFramework("summary-test")
Context("when querying /stats/summary", func() { Context("when querying /stats/summary", func() {
AfterEach(func() { AfterEach(func() {

View File

@ -34,7 +34,7 @@ var _ = framework.KubeDescribe("Kubelet Volume Manager", func() {
f := framework.NewDefaultFramework("kubelet-volume-manager") f := framework.NewDefaultFramework("kubelet-volume-manager")
Describe("Volume Manager", func() { Describe("Volume Manager", func() {
Context("On terminatation of pod with memory backed volume", func() { Context("On terminatation of pod with memory backed volume", func() {
It("should remove the volume from the node", func() { It("should remove the volume from the node [NodeConformance]", func() {
var ( var (
memoryBackedPod *v1.Pod memoryBackedPod *v1.Pod
volumeName string volumeName string