mirror of
https://github.com/kata-containers/kata-containers.git
synced 2025-09-02 01:16:27 +00:00
test/k8s: Extend initdata tests to run on s390x
Enable testing of initdata on the qemu-coco-dev and qemu-se runtime classes, so we can validate the function on s390x Signed-off-by: stevenhorsman <steven@uk.ibm.com>
This commit is contained in:
committed by
rafsalrahim
parent
4cc373c06e
commit
8ee80b4c37
@@ -10,7 +10,7 @@
|
||||
# 3. Pull an image from a banned registry
|
||||
# 4. Check if the pulling fails with log `image security validation failed`,
|
||||
# the initdata works.
|
||||
#
|
||||
#
|
||||
# Note that if initdata does not work, the pod still fails to launch (hang at
|
||||
# CreatingContainer status). The error information is
|
||||
# `[CDH] [ERROR]: Get Resource failed` which internally means that the KBS URL
|
||||
@@ -35,7 +35,7 @@ setup() {
|
||||
setup_common || die "setup_common failed"
|
||||
|
||||
FAIL_TEST_IMAGE="quay.io/prometheus/busybox:latest"
|
||||
|
||||
|
||||
SECURITY_POLICY_KBS_URI="kbs:///default/security-policy/test"
|
||||
}
|
||||
|
||||
@@ -45,13 +45,16 @@ function setup_kbs_image_policy_for_initdata() {
|
||||
fi
|
||||
|
||||
export CURRENT_ARCH=$(uname -m)
|
||||
if [ "${CURRENT_ARCH}" != "x86_64" ]; then
|
||||
skip "Test skipped as only x86-64 supports, while current platform is ${CURRENT_ARCH}"
|
||||
fi
|
||||
case "${CURRENT_ARCH}" in
|
||||
"x86_64"|"s390x")
|
||||
;;
|
||||
*)
|
||||
skip "Test skipped as only x86-64 & s390x is supported, while current platform is ${CURRENT_ARCH}"
|
||||
;;
|
||||
esac
|
||||
|
||||
# TODO: Enable for more archs
|
||||
case "$KATA_HYPERVISOR" in
|
||||
"qemu-tdx"|"qemu-coco-dev"|"qemu-snp")
|
||||
"qemu-tdx"|"qemu-coco-dev"|"qemu-snp"|"qemu-se")
|
||||
;;
|
||||
*)
|
||||
skip "Test not supported for ${KATA_HYPERVISOR}."
|
||||
@@ -88,7 +91,7 @@ EOF
|
||||
|
||||
@test "Test that creating a container from an rejected image configured by initdata, fails according to policy reject" {
|
||||
setup_kbs_image_policy_for_initdata
|
||||
|
||||
|
||||
CC_KBS_ADDRESS=$(kbs_k8s_svc_http_addr)
|
||||
|
||||
kernel_parameter="agent.image_policy_file=${SECURITY_POLICY_KBS_URI} agent.enable_signature_verification=true"
|
||||
|
Reference in New Issue
Block a user