e2e tests: set all PSa labels instead of just enforcing
This commit is contained in:
@@ -69,7 +69,7 @@ var _ = SIGDescribe("Aggregator", func() {
|
||||
var aggrclient *aggregatorclient.Clientset
|
||||
|
||||
f := framework.NewDefaultFramework("aggregator")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
// We want namespace initialization BeforeEach inserted by
|
||||
// NewDefaultFramework to happen before this, so we put this BeforeEach
|
||||
|
@@ -81,7 +81,7 @@ func restartAPIServer(ctx context.Context, node *v1.Node) error {
|
||||
// This test requires that --feature-gates=APIServerIdentity=true be set on the apiserver
|
||||
var _ = SIGDescribe("kube-apiserver identity [Feature:APIServerIdentity]", func() {
|
||||
f := framework.NewDefaultFramework("kube-apiserver-identity")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.It("kube-apiserver identity should persist after restart [Disruptive]", func(ctx context.Context) {
|
||||
e2eskipper.SkipUnlessProviderIs("gce")
|
||||
|
@@ -46,7 +46,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("ServerSideApply", func() {
|
||||
f := framework.NewDefaultFramework("apply")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
var client clientset.Interface
|
||||
var ns string
|
||||
|
@@ -46,7 +46,7 @@ const numberOfTotalResources = 400
|
||||
|
||||
var _ = SIGDescribe("Servers with support for API chunking", func() {
|
||||
f := framework.NewDefaultFramework("chunking")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.BeforeEach(func(ctx context.Context) {
|
||||
ns := f.Namespace.Name
|
||||
|
@@ -118,7 +118,7 @@ var alternativeAPIVersions = []apiextensionsv1.CustomResourceDefinitionVersion{
|
||||
var _ = SIGDescribe("CustomResourceConversionWebhook [Privileged:ClusterAdmin]", func() {
|
||||
var certCtx *certContext
|
||||
f := framework.NewDefaultFramework("crd-webhook")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
servicePort := int32(9443)
|
||||
containerPort := int32(9444)
|
||||
|
||||
|
@@ -53,7 +53,7 @@ var (
|
||||
|
||||
var _ = SIGDescribe("CustomResourcePublishOpenAPI [Privileged:ClusterAdmin]", func() {
|
||||
f := framework.NewDefaultFramework("crd-publish-openapi")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
/*
|
||||
Release: v1.16
|
||||
|
@@ -37,7 +37,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("CustomResourceValidationRules [Privileged:ClusterAdmin]", func() {
|
||||
f := framework.NewDefaultFramework("crd-validation-expressions")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
var apiExtensionClient *clientset.Clientset
|
||||
ginkgo.BeforeEach(func() {
|
||||
|
@@ -39,7 +39,7 @@ import (
|
||||
var _ = SIGDescribe("CustomResourceDefinition Watch [Privileged:ClusterAdmin]", func() {
|
||||
|
||||
f := framework.NewDefaultFramework("crd-watch")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.Context("CustomResourceDefinition Watch", func() {
|
||||
/*
|
||||
|
@@ -45,7 +45,7 @@ import (
|
||||
var _ = SIGDescribe("CustomResourceDefinition resources [Privileged:ClusterAdmin]", func() {
|
||||
|
||||
f := framework.NewDefaultFramework("custom-resource-definition")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.Context("Simple CustomResourceDefinition", func() {
|
||||
/*
|
||||
|
@@ -39,7 +39,7 @@ import (
|
||||
var storageVersionServerVersion = utilversion.MustParseSemantic("v1.13.99")
|
||||
var _ = SIGDescribe("Discovery", func() {
|
||||
f := framework.NewDefaultFramework("discovery")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
var namespaceName string
|
||||
|
||||
|
@@ -39,7 +39,7 @@ import (
|
||||
var _ = SIGDescribe("Etcd failure [Disruptive]", func() {
|
||||
|
||||
f := framework.NewDefaultFramework("etcd-failure")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.BeforeEach(func(ctx context.Context) {
|
||||
// This test requires:
|
||||
|
@@ -39,7 +39,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("FieldValidation", func() {
|
||||
f := framework.NewDefaultFramework("field-validation")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
var client clientset.Interface
|
||||
var ns string
|
||||
|
@@ -53,7 +53,7 @@ var (
|
||||
|
||||
var _ = SIGDescribe("API priority and fairness", func() {
|
||||
f := framework.NewDefaultFramework("apf")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.It("should ensure that requests can be classified by adding FlowSchema and PriorityLevelConfiguration", func(ctx context.Context) {
|
||||
testingFlowSchemaName := "e2e-testing-flowschema"
|
||||
|
@@ -311,7 +311,7 @@ func getUniqLabel(labelkey, labelvalue string) map[string]string {
|
||||
|
||||
var _ = SIGDescribe("Garbage collector", func() {
|
||||
f := framework.NewDefaultFramework("gc")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
/*
|
||||
Release: v1.9
|
||||
|
@@ -120,7 +120,7 @@ func testPath(ctx context.Context, client clientset.Interface, path string, requ
|
||||
|
||||
var _ = SIGDescribe("health handlers", func() {
|
||||
f := framework.NewDefaultFramework("health")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.It("should contain necessary checks", func(ctx context.Context) {
|
||||
ginkgo.By("/health")
|
||||
|
@@ -233,7 +233,7 @@ func ensureServicesAreRemovedWhenNamespaceIsDeleted(ctx context.Context, f *fram
|
||||
var _ = SIGDescribe("Namespaces [Serial]", func() {
|
||||
|
||||
f := framework.NewDefaultFramework("namespaces")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
/*
|
||||
Release: v1.11
|
||||
|
@@ -46,7 +46,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("OpenAPIV3", func() {
|
||||
f := framework.NewDefaultFramework("openapiv3")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
/*
|
||||
Release : v1.27
|
||||
|
@@ -36,7 +36,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("client-go should negotiate", func() {
|
||||
f := framework.NewDefaultFramework("protocol")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
for _, s := range []string{
|
||||
"application/json",
|
||||
|
@@ -34,7 +34,7 @@ const (
|
||||
|
||||
var _ = SIGDescribe("Server request timeout", func() {
|
||||
f := framework.NewDefaultFramework("request-timeout")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.It("should return HTTP status code 400 if the user specifies an invalid timeout in the request URL", func(ctx context.Context) {
|
||||
rt := getRoundTripper(f)
|
||||
|
@@ -66,7 +66,7 @@ var extendedResourceName = "example.com/dongle"
|
||||
|
||||
var _ = SIGDescribe("ResourceQuota", func() {
|
||||
f := framework.NewDefaultFramework("resourcequota")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
/*
|
||||
Release: v1.16
|
||||
@@ -1204,7 +1204,7 @@ var _ = SIGDescribe("ResourceQuota", func() {
|
||||
|
||||
var _ = SIGDescribe("ResourceQuota [Feature:ScopeSelectors]", func() {
|
||||
f := framework.NewDefaultFramework("scope-selectors")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
ginkgo.It("should verify ResourceQuota with best effort scope using scope-selectors.", func(ctx context.Context) {
|
||||
ginkgo.By("Creating a ResourceQuota with best effort scope")
|
||||
resourceQuotaBestEffort, err := createResourceQuota(ctx, f.ClientSet, f.Namespace.Name, newTestResourceQuotaWithScopeSelector("quota-besteffort", v1.ResourceQuotaScopeBestEffort))
|
||||
@@ -1385,7 +1385,7 @@ var _ = SIGDescribe("ResourceQuota [Feature:ScopeSelectors]", func() {
|
||||
|
||||
var _ = SIGDescribe("ResourceQuota [Feature:PodPriority]", func() {
|
||||
f := framework.NewDefaultFramework("resourcequota-priorityclass")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
ginkgo.It("should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with same priority class.", func(ctx context.Context) {
|
||||
|
||||
@@ -1727,7 +1727,7 @@ var _ = SIGDescribe("ResourceQuota [Feature:PodPriority]", func() {
|
||||
|
||||
var _ = SIGDescribe("ResourceQuota", func() {
|
||||
f := framework.NewDefaultFramework("cross-namespace-pod-affinity")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
ginkgo.It("should verify ResourceQuota with cross namespace pod affinity scope using scope-selectors.", func(ctx context.Context) {
|
||||
ginkgo.By("Creating a ResourceQuota with cross namespace pod affinity scope")
|
||||
quota, err := createResourceQuota(
|
||||
|
@@ -29,7 +29,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("server version", func() {
|
||||
f := framework.NewDefaultFramework("server-version")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
/*
|
||||
Release: v1.19
|
||||
|
@@ -38,7 +38,7 @@ const (
|
||||
// This test requires that --feature-gates=APIServerIdentity=true,StorageVersionAPI=true be set on the apiserver and the controller manager
|
||||
var _ = SIGDescribe("StorageVersion resources [Feature:StorageVersionAPI]", func() {
|
||||
f := framework.NewDefaultFramework("storage-version")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.It("storage version with non-existing id should be GC'ed", func(ctx context.Context) {
|
||||
client := f.ClientSet
|
||||
|
@@ -44,7 +44,7 @@ var serverPrintVersion = utilversion.MustParseSemantic("v1.10.0")
|
||||
|
||||
var _ = SIGDescribe("Servers with support for Table transformation", func() {
|
||||
f := framework.NewDefaultFramework("tables")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
ginkgo.BeforeEach(func() {
|
||||
e2eskipper.SkipUnlessServerVersionGTE(serverPrintVersion, f.ClientSet.Discovery())
|
||||
|
@@ -37,7 +37,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("ValidatingAdmissionPolicy [Privileged:ClusterAdmin][Alpha][Feature:ValidatingAdmissionPolicy]", func() {
|
||||
f := framework.NewDefaultFramework("validating-admission-policy")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
var client clientset.Interface
|
||||
|
||||
|
@@ -48,7 +48,7 @@ const (
|
||||
|
||||
var _ = SIGDescribe("Watchers", func() {
|
||||
f := framework.NewDefaultFramework("watch")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
/*
|
||||
Release: v1.11
|
||||
|
@@ -80,7 +80,7 @@ const (
|
||||
var _ = SIGDescribe("AdmissionWebhook [Privileged:ClusterAdmin]", func() {
|
||||
var certCtx *certContext
|
||||
f := framework.NewDefaultFramework("webhook")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
servicePort := int32(8443)
|
||||
containerPort := int32(8444)
|
||||
|
||||
|
@@ -82,7 +82,7 @@ var _ = SIGDescribe("ControllerRevision [Serial]", func() {
|
||||
})
|
||||
|
||||
f = framework.NewDefaultFramework("controllerrevisions")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
image := WebserverImage
|
||||
dsName := "e2e-" + utilrand.String(5) + "-daemon-set"
|
||||
|
@@ -54,7 +54,7 @@ const (
|
||||
|
||||
var _ = SIGDescribe("CronJob", func() {
|
||||
f := framework.NewDefaultFramework("cronjob")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
sleepCommand := []string{"sleep", "300"}
|
||||
|
||||
|
@@ -208,7 +208,7 @@ func getContainerRestarts(ctx context.Context, c clientset.Interface, ns string,
|
||||
var _ = SIGDescribe("DaemonRestart [Disruptive]", func() {
|
||||
|
||||
f := framework.NewDefaultFramework("daemonrestart")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
rcName := "daemonrestart" + strconv.Itoa(numPods) + "-" + string(uuid.NewUUID())
|
||||
labelSelector := labels.Set(map[string]string{"name": rcName}).AsSelector()
|
||||
existingPods := cache.NewStore(cache.MetaNamespaceKeyFunc)
|
||||
|
@@ -135,7 +135,7 @@ var _ = SIGDescribe("Daemon set [Serial]", func() {
|
||||
})
|
||||
|
||||
f = framework.NewDefaultFramework("daemonsets")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
image := WebserverImage
|
||||
dsName := "daemon-set"
|
||||
|
@@ -86,7 +86,7 @@ var _ = SIGDescribe("Deployment", func() {
|
||||
})
|
||||
|
||||
f := framework.NewDefaultFramework("deployment")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
ginkgo.BeforeEach(func() {
|
||||
c = f.ClientSet
|
||||
|
@@ -64,7 +64,7 @@ var defaultLabels = map[string]string{"foo": "bar"}
|
||||
|
||||
var _ = SIGDescribe("DisruptionController", func() {
|
||||
f := framework.NewDefaultFramework("disruption")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var ns string
|
||||
var cs kubernetes.Interface
|
||||
var dc dynamic.Interface
|
||||
@@ -77,7 +77,7 @@ var _ = SIGDescribe("DisruptionController", func() {
|
||||
|
||||
ginkgo.Context("Listing PodDisruptionBudgets for all namespaces", func() {
|
||||
anotherFramework := framework.NewDefaultFramework("disruption-2")
|
||||
anotherFramework.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
anotherFramework.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
/*
|
||||
Release : v1.21
|
||||
|
@@ -69,7 +69,7 @@ type watchEventConfig struct {
|
||||
|
||||
var _ = SIGDescribe("Job", func() {
|
||||
f := framework.NewDefaultFramework("job")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
parallelism := int32(2)
|
||||
completions := int32(4)
|
||||
|
||||
|
@@ -51,7 +51,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("ReplicationController", func() {
|
||||
f := framework.NewDefaultFramework("replication-controller")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
var ns string
|
||||
var dc dynamic.Interface
|
||||
|
@@ -101,7 +101,7 @@ func newPodQuota(name, number string) *v1.ResourceQuota {
|
||||
|
||||
var _ = SIGDescribe("ReplicaSet", func() {
|
||||
f := framework.NewDefaultFramework("replicaset")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
/*
|
||||
Release: v1.9
|
||||
|
@@ -95,7 +95,7 @@ var httpProbe = &v1.Probe{
|
||||
// GCE Api requirements: nodes and master need storage r/w permissions.
|
||||
var _ = SIGDescribe("StatefulSet", func() {
|
||||
f := framework.NewDefaultFramework("statefulset")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var ns string
|
||||
var c clientset.Interface
|
||||
|
||||
|
@@ -43,7 +43,7 @@ const (
|
||||
|
||||
var _ = SIGDescribe("TTLAfterFinished", func() {
|
||||
f := framework.NewDefaultFramework("ttlafterfinished")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
ginkgo.It("job should be deleted once it finishes after TTL seconds", func(ctx context.Context) {
|
||||
testFinishedJob(ctx, f)
|
||||
|
@@ -29,7 +29,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Conformance Tests", func() {
|
||||
f := framework.NewDefaultFramework("conformance-tests")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
/*
|
||||
Release: v1.23
|
||||
|
@@ -47,7 +47,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Certificates API [Privileged:ClusterAdmin]", func() {
|
||||
f := framework.NewDefaultFramework("certificates")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
/*
|
||||
Release: v1.19
|
||||
|
@@ -38,7 +38,7 @@ import (
|
||||
var _ = SIGDescribe("[Feature:NodeAuthenticator]", func() {
|
||||
|
||||
f := framework.NewDefaultFramework("node-authn")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
var ns string
|
||||
var nodeIPs []string
|
||||
ginkgo.BeforeEach(func(ctx context.Context) {
|
||||
|
@@ -43,7 +43,7 @@ const (
|
||||
var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
|
||||
|
||||
f := framework.NewDefaultFramework("node-authz")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
// client that will impersonate a node
|
||||
var c clientset.Interface
|
||||
var ns string
|
||||
|
@@ -35,7 +35,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("SelfSubjectReview", func() {
|
||||
f := framework.NewDefaultFramework("selfsubjectreviews")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
/*
|
||||
Release: v1.28
|
||||
|
@@ -54,7 +54,7 @@ const rootCAConfigMapName = "kube-root-ca.crt"
|
||||
|
||||
var _ = SIGDescribe("ServiceAccounts", func() {
|
||||
f := framework.NewDefaultFramework("svcaccounts")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
ginkgo.It("no secret-based service account token should be auto-generated", func(ctx context.Context) {
|
||||
{
|
||||
|
@@ -35,7 +35,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("[Feature:ClusterSizeAutoscalingScaleUp] [Slow] Autoscaling", func() {
|
||||
f := framework.NewDefaultFramework("autoscaling")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var experiment *gmeasure.Experiment
|
||||
|
||||
ginkgo.Describe("Autoscaling a service", func() {
|
||||
|
@@ -62,7 +62,7 @@ type scaleUpTestConfig struct {
|
||||
|
||||
var _ = SIGDescribe("Cluster size autoscaler scalability [Slow]", func() {
|
||||
f := framework.NewDefaultFramework("autoscaling")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var c clientset.Interface
|
||||
var nodeCount int
|
||||
var coresPerNode int
|
||||
|
@@ -95,7 +95,7 @@ const (
|
||||
|
||||
var _ = SIGDescribe("Cluster size autoscaling [Slow]", func() {
|
||||
f := framework.NewDefaultFramework("autoscaling")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var c clientset.Interface
|
||||
var nodeCount int
|
||||
var memAllocatableMb int
|
||||
|
@@ -59,7 +59,7 @@ var _ = SIGDescribe("[HPA] [Feature:CustomMetricsAutoscaling] Horizontal pod aut
|
||||
})
|
||||
|
||||
f := framework.NewDefaultFramework("horizontal-pod-autoscaling")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.Describe("with Custom Metric of type Pod from Stackdriver", func() {
|
||||
ginkgo.It("should scale down", func(ctx context.Context) {
|
||||
|
@@ -48,7 +48,7 @@ const (
|
||||
|
||||
var _ = SIGDescribe("DNS horizontal autoscaling", func() {
|
||||
f := framework.NewDefaultFramework("dns-autoscaling")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var c clientset.Interface
|
||||
var previousParams map[string]string
|
||||
var originDNSReplicasCount int
|
||||
|
@@ -44,7 +44,7 @@ const (
|
||||
// These tests don't seem to be running properly in parallel: issue: #20338.
|
||||
var _ = SIGDescribe("[Feature:HPA] Horizontal pod autoscaling (scale resource: CPU)", func() {
|
||||
f := framework.NewDefaultFramework("horizontal-pod-autoscaling")
|
||||
f.NamespacePodSecurityEnforceLevel = api.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = api.LevelBaseline
|
||||
|
||||
ginkgo.Describe("[Serial] [Slow] Deployment (Pod Resource)", func() {
|
||||
ginkgo.It(titleUp+titleAverageUtilization, func(ctx context.Context) {
|
||||
@@ -149,7 +149,7 @@ var _ = SIGDescribe("[Feature:HPA] Horizontal pod autoscaling (scale resource: C
|
||||
|
||||
var _ = SIGDescribe("[Feature:HPA] Horizontal pod autoscaling (scale resource: Memory)", func() {
|
||||
f := framework.NewDefaultFramework("horizontal-pod-autoscaling")
|
||||
f.NamespacePodSecurityEnforceLevel = api.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = api.LevelBaseline
|
||||
|
||||
ginkgo.Describe("[Serial] [Slow] Deployment (Pod Resource)", func() {
|
||||
ginkgo.It(titleUp+titleAverageUtilization, func(ctx context.Context) {
|
||||
|
@@ -31,7 +31,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("[Feature:HPA] [Serial] [Slow] Horizontal pod autoscaling (non-default behavior)", func() {
|
||||
f := framework.NewDefaultFramework("horizontal-pod-autoscaling")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
hpaName := "consumer"
|
||||
|
||||
|
@@ -218,7 +218,7 @@ var _ = SIGDescribe("Addon update", func() {
|
||||
var dir string
|
||||
var sshClient *ssh.Client
|
||||
f := framework.NewDefaultFramework("addon-update-test")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.BeforeEach(func() {
|
||||
// This test requires:
|
||||
|
@@ -38,7 +38,7 @@ var upgradeTests = []upgrades.Test{
|
||||
|
||||
var _ = SIGDescribe("stateful Upgrade [Feature:StatefulUpgrade]", func() {
|
||||
f := framework.NewDefaultFramework("stateful-upgrade")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests)
|
||||
|
||||
ginkgo.Describe("stateful upgrade", func() {
|
||||
|
@@ -35,7 +35,7 @@ var upgradeTests = []upgrades.Test{
|
||||
|
||||
var _ = SIGDescribe("ServiceAccount admission controller migration [Feature:BoundServiceAccountTokenVolume]", func() {
|
||||
f := framework.NewDefaultFramework("serviceaccount-admission-controller-migration")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests)
|
||||
|
||||
ginkgo.Describe("master upgrade", func() {
|
||||
|
@@ -54,7 +54,7 @@ var upgradeTests = []upgrades.Test{
|
||||
|
||||
var _ = SIGDescribe("Upgrade [Feature:Upgrade]", func() {
|
||||
f := framework.NewDefaultFramework("cluster-upgrade")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests)
|
||||
|
||||
// Create the frameworks here because we can only create them
|
||||
@@ -93,7 +93,7 @@ var _ = SIGDescribe("Upgrade [Feature:Upgrade]", func() {
|
||||
|
||||
var _ = SIGDescribe("Downgrade [Feature:Downgrade]", func() {
|
||||
f := framework.NewDefaultFramework("cluster-downgrade")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests)
|
||||
|
||||
ginkgo.Describe("cluster downgrade", func() {
|
||||
|
@@ -32,7 +32,7 @@ import (
|
||||
var _ = SIGDescribe("GKE node pools [Feature:GKENodePool]", func() {
|
||||
|
||||
f := framework.NewDefaultFramework("node-pools")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.BeforeEach(func() {
|
||||
e2eskipper.SkipUnlessProviderIs("gke")
|
||||
|
@@ -162,7 +162,7 @@ func waitForMasters(ctx context.Context, masterPrefix string, c clientset.Interf
|
||||
|
||||
var _ = SIGDescribe("HA-master [Feature:HAMaster]", func() {
|
||||
f := framework.NewDefaultFramework("ha-master")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var c clientset.Interface
|
||||
var ns string
|
||||
var additionalReplicaZones []string
|
||||
|
@@ -35,7 +35,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Ports Security Check [Feature:KubeletSecurity]", func() {
|
||||
f := framework.NewDefaultFramework("kubelet-security")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
var node *v1.Node
|
||||
var nodeName string
|
||||
|
@@ -47,7 +47,7 @@ func kubeProxyDaemonSetExtraEnvs(enableKubeProxyDaemonSet bool) []string {
|
||||
|
||||
var _ = SIGDescribe("kube-proxy migration [Feature:KubeProxyDaemonSetMigration]", func() {
|
||||
f := framework.NewDefaultFramework("kube-proxy-ds-migration")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
upgradeTestFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests)
|
||||
downgradeTestsFrameworks := upgrades.CreateUpgradeFrameworks(downgradeTests)
|
||||
|
||||
|
@@ -35,7 +35,7 @@ var upgradeTests = []upgrades.Test{
|
||||
|
||||
var _ = SIGDescribe("gpu Upgrade [Feature:GPUUpgrade]", func() {
|
||||
f := framework.NewDefaultFramework("gpu-upgrade")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
testFrameworks := upgrades.CreateUpgradeFrameworks(upgradeTests)
|
||||
|
||||
ginkgo.Describe("master upgrade", func() {
|
||||
|
@@ -37,7 +37,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("[Disruptive]NodeLease", func() {
|
||||
f := framework.NewDefaultFramework("node-lease-test")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var systemPodsNo int32
|
||||
var c clientset.Interface
|
||||
var ns string
|
||||
|
@@ -92,7 +92,7 @@ var _ = SIGDescribe("Reboot [Disruptive] [Feature:Reboot]", func() {
|
||||
})
|
||||
|
||||
f = framework.NewDefaultFramework("reboot")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.It("each node by ordering clean reboot and ensure they function upon restart", func(ctx context.Context) {
|
||||
// clean shutdown and restart
|
||||
|
@@ -44,7 +44,7 @@ const (
|
||||
|
||||
var _ = SIGDescribe("Recreate [Feature:Recreate]", func() {
|
||||
f := framework.NewDefaultFramework("recreate")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var originalNodes []v1.Node
|
||||
var originalPodNames []string
|
||||
var ps *testutils.PodStore
|
||||
|
@@ -46,7 +46,7 @@ func resizeRC(ctx context.Context, c clientset.Interface, ns, name string, repli
|
||||
|
||||
var _ = SIGDescribe("Nodes [Disruptive]", func() {
|
||||
f := framework.NewDefaultFramework("resize-nodes")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var systemPodsNo int32
|
||||
var c clientset.Interface
|
||||
var ns string
|
||||
|
@@ -45,7 +45,7 @@ func nodeNames(nodes []v1.Node) []string {
|
||||
|
||||
var _ = SIGDescribe("Restart [Disruptive]", func() {
|
||||
f := framework.NewDefaultFramework("restart")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var ps *testutils.PodStore
|
||||
var originalNodes []v1.Node
|
||||
var originalPodNames []string
|
||||
|
@@ -34,7 +34,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("[Feature:CloudProvider][Disruptive] Nodes", func() {
|
||||
f := framework.NewDefaultFramework("cloudprovider")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var c clientset.Interface
|
||||
|
||||
ginkgo.BeforeEach(func() {
|
||||
|
@@ -29,7 +29,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Networking", func() {
|
||||
f := framework.NewDefaultFramework("pod-network-test")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.Describe("Granular Checks: Pods", func() {
|
||||
|
||||
|
@@ -35,7 +35,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("ConfigMap", func() {
|
||||
f := framework.NewDefaultFramework("configmap")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
/*
|
||||
Release: v1.9
|
||||
|
@@ -55,7 +55,7 @@ const (
|
||||
|
||||
var _ = SIGDescribe("Probing container", func() {
|
||||
f := framework.NewDefaultFramework("container-probe")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
var podClient *e2epod.PodClient
|
||||
probe := webserverProbeBuilder{}
|
||||
|
||||
|
@@ -31,7 +31,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Containers", func() {
|
||||
f := framework.NewDefaultFramework("containers")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
/*
|
||||
Release: v1.9
|
||||
|
@@ -35,7 +35,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Downward API", func() {
|
||||
f := framework.NewDefaultFramework("downward-api")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
/*
|
||||
Release: v1.9
|
||||
@@ -289,7 +289,7 @@ var _ = SIGDescribe("Downward API", func() {
|
||||
|
||||
var _ = SIGDescribe("Downward API [Serial] [Disruptive] [NodeFeature:DownwardAPIHugePages]", func() {
|
||||
f := framework.NewDefaultFramework("downward-api")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.Context("Downward API tests for hugepages", func() {
|
||||
ginkgo.It("should provide container's limits.hugepages-<pagesize> and requests.hugepages-<pagesize> as env vars", func(ctx context.Context) {
|
||||
|
@@ -39,7 +39,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Ephemeral Containers [NodeConformance]", func() {
|
||||
f := framework.NewDefaultFramework("ephemeral-containers-test")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
var podClient *e2epod.PodClient
|
||||
ginkgo.BeforeEach(func() {
|
||||
podClient = e2epod.NewPodClient(f)
|
||||
|
@@ -37,7 +37,7 @@ import (
|
||||
// https://github.com/kubernetes/community/blob/master/contributors/design-proposals/node/expansion.md
|
||||
var _ = SIGDescribe("Variable Expansion", func() {
|
||||
f := framework.NewDefaultFramework("var-expansion")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
/*
|
||||
Release: v1.9
|
||||
|
@@ -32,7 +32,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("ImageCredentialProvider [Feature:KubeletCredentialProviders]", func() {
|
||||
f := framework.NewDefaultFramework("image-credential-provider")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var podClient *e2epod.PodClient
|
||||
|
||||
ginkgo.BeforeEach(func() {
|
||||
|
@@ -161,7 +161,7 @@ func initContainersInvariants(pod *v1.Pod) error {
|
||||
|
||||
var _ = SIGDescribe("InitContainer [NodeConformance]", func() {
|
||||
f := framework.NewDefaultFramework("init-container")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
var podClient *e2epod.PodClient
|
||||
ginkgo.BeforeEach(func() {
|
||||
podClient = e2epod.NewPodClient(f)
|
||||
|
@@ -36,7 +36,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Kubelet", func() {
|
||||
f := framework.NewDefaultFramework("kubelet-test")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
var podClient *e2epod.PodClient
|
||||
ginkgo.BeforeEach(func() {
|
||||
podClient = e2epod.NewPodClient(f)
|
||||
|
@@ -47,7 +47,7 @@ type KubeletManagedHostConfig struct {
|
||||
|
||||
var _ = SIGDescribe("KubeletManagedEtcHosts", func() {
|
||||
f := framework.NewDefaultFramework("e2e-kubelet-etc-hosts")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
config := &KubeletManagedHostConfig{
|
||||
f: f,
|
||||
}
|
||||
|
@@ -54,7 +54,7 @@ func getPatchBytes(oldLease, newLease *coordinationv1.Lease) ([]byte, error) {
|
||||
|
||||
var _ = SIGDescribe("Lease", func() {
|
||||
f := framework.NewDefaultFramework("lease-test")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
/*
|
||||
Release: v1.17
|
||||
|
@@ -37,7 +37,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Container Lifecycle Hook", func() {
|
||||
f := framework.NewDefaultFramework("container-lifecycle-hook")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
var podClient *e2epod.PodClient
|
||||
const (
|
||||
podCheckInterval = 1 * time.Second
|
||||
|
@@ -40,7 +40,7 @@ import (
|
||||
var _ = SIGDescribe("NodeLease", func() {
|
||||
var nodeName string
|
||||
f := framework.NewDefaultFramework("node-lease-test")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.BeforeEach(func(ctx context.Context) {
|
||||
node, err := e2enode.GetRandomReadySchedulableNode(ctx, f.ClientSet)
|
||||
|
@@ -34,7 +34,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("PodOSRejection [NodeConformance]", func() {
|
||||
f := framework.NewDefaultFramework("pod-os-rejection")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
ginkgo.Context("Kubelet", func() {
|
||||
ginkgo.It("should reject pod when the node OS doesn't match pod's OS", func(ctx context.Context) {
|
||||
linuxNode, err := findLinuxNode(ctx, f)
|
||||
|
@@ -188,7 +188,7 @@ func expectNoErrorWithRetries(fn func() error, maxRetries int, explain ...interf
|
||||
|
||||
var _ = SIGDescribe("Pods", func() {
|
||||
f := framework.NewDefaultFramework("pods")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelRestricted
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelRestricted
|
||||
var podClient *e2epod.PodClient
|
||||
var dc dynamic.Interface
|
||||
|
||||
|
@@ -43,7 +43,7 @@ const (
|
||||
|
||||
var _ = SIGDescribe("PodTemplates", func() {
|
||||
f := framework.NewDefaultFramework("podtemplate")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
/*
|
||||
Release: v1.19
|
||||
Testname: PodTemplate lifecycle
|
||||
|
@@ -43,7 +43,7 @@ type PrivilegedPodTestConfig struct {
|
||||
|
||||
var _ = SIGDescribe("PrivilegedPod [NodeConformance]", func() {
|
||||
f := framework.NewDefaultFramework("e2e-privileged-pod")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
config := &PrivilegedPodTestConfig{
|
||||
f: f,
|
||||
privilegedPod: "privileged-pod",
|
||||
|
@@ -39,7 +39,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Container Runtime", func() {
|
||||
f := framework.NewDefaultFramework("container-runtime")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
ginkgo.Describe("blackbox test", func() {
|
||||
ginkgo.Context("when starting a container that exits", func() {
|
||||
|
@@ -45,7 +45,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("RuntimeClass", func() {
|
||||
f := framework.NewDefaultFramework("runtimeclass")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
/*
|
||||
Release: v1.20
|
||||
|
@@ -36,7 +36,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Secrets", func() {
|
||||
f := framework.NewDefaultFramework("secrets")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
/*
|
||||
Release: v1.9
|
||||
|
@@ -45,7 +45,7 @@ var (
|
||||
|
||||
var _ = SIGDescribe("Security Context", func() {
|
||||
f := framework.NewDefaultFramework("security-context-test")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var podClient *e2epod.PodClient
|
||||
ginkgo.BeforeEach(func() {
|
||||
podClient = e2epod.NewPodClient(f)
|
||||
|
@@ -40,7 +40,7 @@ var _ = SIGDescribe("Sysctls [LinuxOnly] [NodeConformance]", func() {
|
||||
})
|
||||
|
||||
f := framework.NewDefaultFramework("sysctl")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
var podClient *e2epod.PodClient
|
||||
|
||||
testPod := func() *v1.Pod {
|
||||
|
@@ -37,7 +37,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("ConfigMap", func() {
|
||||
f := framework.NewDefaultFramework("configmap")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
/*
|
||||
Release: v1.9
|
||||
|
@@ -34,7 +34,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Downward API [Serial] [Disruptive] [Feature:EphemeralStorage]", func() {
|
||||
f := framework.NewDefaultFramework("downward-api")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.Context("Downward API tests for local ephemeral storage", func() {
|
||||
ginkgo.It("should provide container's limits.ephemeral-storage and requests.ephemeral-storage as env vars", func(ctx context.Context) {
|
||||
|
@@ -40,7 +40,7 @@ var _ = SIGDescribe("Downward API volume", func() {
|
||||
// How long to wait for a log pod to be displayed
|
||||
const podLogTimeout = 3 * time.Minute
|
||||
f := framework.NewDefaultFramework("downward-api")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
var podClient *e2epod.PodClient
|
||||
ginkgo.BeforeEach(func() {
|
||||
podClient = e2epod.NewPodClient(f)
|
||||
|
@@ -44,7 +44,7 @@ var (
|
||||
|
||||
var _ = SIGDescribe("EmptyDir volumes", func() {
|
||||
f := framework.NewDefaultFramework("emptydir")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
ginkgo.Context("when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup]", func() {
|
||||
|
||||
|
@@ -36,7 +36,7 @@ import (
|
||||
// This will require some smart.
|
||||
var _ = SIGDescribe("HostPath", func() {
|
||||
f := framework.NewDefaultFramework("hostpath")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.BeforeEach(func() {
|
||||
// TODO permission denied cleanup failures
|
||||
|
@@ -33,7 +33,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Projected combined", func() {
|
||||
f := framework.NewDefaultFramework("projected")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
// Test multiple projections
|
||||
/*
|
||||
|
@@ -37,7 +37,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Projected configMap", func() {
|
||||
f := framework.NewDefaultFramework("projected")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
/*
|
||||
Release: v1.9
|
||||
|
@@ -37,7 +37,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Projected downwardAPI", func() {
|
||||
f := framework.NewDefaultFramework("projected")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
// How long to wait for a log pod to be displayed
|
||||
const podLogTimeout = 2 * time.Minute
|
||||
|
@@ -36,7 +36,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Projected secret", func() {
|
||||
f := framework.NewDefaultFramework("projected")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
/*
|
||||
Release: v1.9
|
||||
|
@@ -37,7 +37,7 @@ import (
|
||||
|
||||
var _ = SIGDescribe("Secrets", func() {
|
||||
f := framework.NewDefaultFramework("secrets")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelBaseline
|
||||
|
||||
/*
|
||||
Release: v1.9
|
||||
|
@@ -55,7 +55,7 @@ import (
|
||||
// TODO(#99468): Check if these tests are still needed.
|
||||
var _ = SIGDescribe("Volumes", func() {
|
||||
f := framework.NewDefaultFramework("volume")
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
// note that namespace deletion is handled by delete-namespace flag
|
||||
// filled in BeforeEach
|
||||
|
@@ -55,7 +55,7 @@ var _ = ginkgo.Describe("[sig-node] DRA [Feature:DynamicResourceAllocation]", fu
|
||||
|
||||
// The driver containers have to run with sufficient privileges to
|
||||
// modify /var/lib/kubelet/plugins.
|
||||
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
|
||||
f.NamespacePodSecurityLevel = admissionapi.LevelPrivileged
|
||||
|
||||
ginkgo.Context("kubelet", func() {
|
||||
nodes := NewNodes(f, 1, 1)
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user