kubernetes/test/e2e
Kubernetes Prow Robot 07646db483
Merge pull request #118623 from pohly/e2e-storage-stress-test-fix
e2e storage: terminate worker quietly on test completion
2023-06-12 13:47:05 -07:00
..
apimachinery Merge pull request #116933 from haoruan/doc-fix-typo 2023-06-12 13:46:10 -07:00
apps e2e rc: if the pods are running but not ready the test will fail 2023-05-25 07:19:51 +00:00
architecture e2e: use Ginkgo context 2022-12-16 20:14:04 +01:00
auth Fix cmd, integration, and conformance tests 2023-05-03 01:29:37 +02:00
autoscaling e2e: replace ubuntu-slim with agnhost in hpa cm noExporterDeployment 2023-05-17 11:19:23 +02:00
chaosmonkey e2e: use Ginkgo context 2022-12-16 20:14:04 +01:00
cloud Merge pull request #111372 from HeavenTonight/master 2023-03-10 11:44:40 -08:00
common Moving Kubelet Credential Provider test to common so that it can be run both as Node and Cluster test 2023-05-30 20:15:40 +00:00
dra e2e dra: collect and check GRPC calls 2023-06-01 09:58:05 +02:00
framework e2e-framework: remove node-role.kubernetes.io/master taint from non-blocking-taints 2023-06-06 22:19:55 +08:00
instrumentation Replace uses of ObjectReflectDiff with cmp.Diff 2023-04-12 08:48:03 -07:00
kubectl Update gnostic references 2023-06-02 14:34:26 +00:00
lifecycle move luxas as an emeritus approver of test/e2e/lifecycle 2023-06-09 22:06:06 +08:00
network minor fix comments in netpol so its easy to understand the tests for newcomers, remove one misleading comment (#118264) 2023-06-05 05:31:25 -07:00
node Replace diff.ObjectDiff with cmp.Equal 2023-04-12 08:45:32 -07:00
perftype hack/update-bazel.sh 2021-02-28 15:17:29 -08:00
reporters e2e: comment the known limitation of the ProgressReporter 2022-12-23 18:43:49 +08:00
scheduling Use the generic Set in scheduler 2023-04-09 11:34:17 +05:30
storage e2e storage: terminate worker quietly on test completion 2023-06-12 15:41:43 +02:00
testing-manifests [KMSv2] update ci script and add readme 2023-03-27 20:43:37 +00:00
upgrades e2e: use error wrapping with %w 2023-02-06 15:39:13 +01:00
windows Fixing gmsa-webhook install steps for Windows GMSA full tests 2023-05-31 13:59:02 -07:00
e2e_test.go Merge pull request #114417 from chendave/ginkgo_fix_spec 2023-01-12 03:28:56 -08:00
e2e-example-config.json
e2e.go Merge pull request #115678 from pohly/e2e-full-reports 2023-02-10 15:07:29 -08:00
README.md e2e: accept context from Ginkgo 2022-12-10 19:50:18 +01:00
suites.go e2e: use error wrapping with %w 2023-02-06 15:39:13 +01:00

test/e2e

This is home to e2e tests used for presubmit, periodic, and postsubmit jobs.

Some of these jobs are merge-blocking, some are release-blocking.

e2e test ownership

All e2e tests must adhere to the following policies:

  • the test must be owned by one and only one SIG
  • the test must live in/underneath a sig-owned package matching pattern: test/e2e/[{subpath}/]{sig}/..., e.g.
    • test/e2e/auth - all tests owned by sig-auth
    • test/e2e/common/storage - all tests common to cluster-level and node-level e2e tests, owned by sig-node
    • test/e2e/upgrade/apps - all tests used in upgrade testing, owned by sig-apps
  • each sig-owned package should have an OWNERS file defining relevant approvers and labels for the owning sig, e.g.
# test/e2e/node/OWNERS
# See the OWNERS docs at https://go.k8s.io/owners

approvers:
- alice
- bob
- cynthia
emeritus_approvers:
- dave
reviewers:
- sig-node-reviewers
labels:
- sig/node
  • packages that use {subpath} should have an imports.go file importing sig-owned packages (for ginkgo's benefit), e.g.
// test/e2e/common/imports.go
package common

import (
	// ensure these packages are scanned by ginkgo for e2e tests
	_ "k8s.io/kubernetes/test/e2e/common/network"
	_ "k8s.io/kubernetes/test/e2e/common/node"
	_ "k8s.io/kubernetes/test/e2e/common/storage"
)
  • test ownership must be declared via a top-level SIGDescribe call defined in the sig-owned package, e.g.
// test/e2e/lifecycle/framework.go
package lifecycle

import "github.com/onsi/ginkgo"

// SIGDescribe annotates the test with the SIG label.
func SIGDescribe(text string, body func()) bool {
	return ginkgo.Describe("[sig-cluster-lifecycle] "+text, body)
}
// test/e2e/lifecycle/bootstrap/bootstrap_signer.go

package bootstrap

import (
	"github.com/onsi/ginkgo"
	"k8s.io/kubernetes/test/e2e/lifecycle"
)
var _ = lifecycle.SIGDescribe("[Feature:BootstrapTokens]", func() {
  /* ... */
  ginkgo.It("should sign the new added bootstrap tokens", func(ctx context.Context) {
    /* ... */
  })
  /* etc */
})

These polices are enforced:

  • via the merge-blocking presubmit job pull-kubernetes-verify
  • which ends up running hack/verify-e2e-test-ownership.sh
  • which can also be run via make verify WHAT=e2e-test-ownership

more info

See kubernetes/community/.../e2e-tests.md