Merge pull request #87262 from ii/promote-secret-patching-test
Promote: Secret patching test
This commit is contained in:
commit
7883d93877
1
test/conformance/testdata/conformance.txt
vendored
1
test/conformance/testdata/conformance.txt
vendored
@ -208,6 +208,7 @@ test/e2e/common/runtime.go: "should report termination message from file when p
|
|||||||
test/e2e/common/secrets.go: "should be consumable from pods in env vars"
|
test/e2e/common/secrets.go: "should be consumable from pods in env vars"
|
||||||
test/e2e/common/secrets.go: "should be consumable via the environment"
|
test/e2e/common/secrets.go: "should be consumable via the environment"
|
||||||
test/e2e/common/secrets.go: "should fail to create secret due to empty secret key"
|
test/e2e/common/secrets.go: "should fail to create secret due to empty secret key"
|
||||||
|
test/e2e/common/secrets.go: "should patch a secret"
|
||||||
test/e2e/common/secrets_volume.go: "should be consumable from pods in volume"
|
test/e2e/common/secrets_volume.go: "should be consumable from pods in volume"
|
||||||
test/e2e/common/secrets_volume.go: "should be consumable from pods in volume with defaultMode set"
|
test/e2e/common/secrets_volume.go: "should be consumable from pods in volume with defaultMode set"
|
||||||
test/e2e/common/secrets_volume.go: "should be consumable from pods in volume as non-root with defaultMode and fsGroup set"
|
test/e2e/common/secrets_volume.go: "should be consumable from pods in volume as non-root with defaultMode and fsGroup set"
|
||||||
|
@ -138,7 +138,16 @@ var _ = ginkgo.Describe("[sig-api-machinery] Secrets", func() {
|
|||||||
framework.ExpectError(err, "created secret %q with empty key in namespace %q", secret.Name, f.Namespace.Name)
|
framework.ExpectError(err, "created secret %q with empty key in namespace %q", secret.Name, f.Namespace.Name)
|
||||||
})
|
})
|
||||||
|
|
||||||
ginkgo.It("should patch a secret", func() {
|
/*
|
||||||
|
Release : v1.18
|
||||||
|
Testname: Secret patching
|
||||||
|
Description: A Secret is created.
|
||||||
|
Listing all Secrets MUST return an empty list.
|
||||||
|
Given the patching and fetching of the Secret, the fields MUST equal the new values.
|
||||||
|
The Secret is deleted by it's static Label.
|
||||||
|
Secrets are listed finally, the list MUST NOT include the originally created Secret.
|
||||||
|
*/
|
||||||
|
framework.ConformanceIt("should patch a secret", func() {
|
||||||
ginkgo.By("creating a secret")
|
ginkgo.By("creating a secret")
|
||||||
|
|
||||||
secretTestName := "test-secret-" + string(uuid.NewUUID())
|
secretTestName := "test-secret-" + string(uuid.NewUUID())
|
||||||
|
Loading…
Reference in New Issue
Block a user