mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-23 19:56:01 +00:00
Merge pull request #36299 from Random-Liu/mark-more-conformance-test
Automatic merge from submit-queue Node Conformance Test: Mark more conformance test For https://github.com/kubernetes/kubernetes/issues/30122. This PR: 1) Removes unused image test. 2) Marks more conformance tests based on https://docs.google.com/spreadsheets/d/1yib6ypfdWuq8Ikyo-rTcBGHe76Xur7tGqCKD9dkzx0Y/edit?usp=sharing. Notice that 2 tests are not marked conformance for now: 1. **OOM score test:** The test is serial and is verifying host PID directly. The test should start a pod with PID=host and verify inside the pod. @vishh 2. **Summary api test:** The assumption made in the test doesn't always make sense for arbitrary image, for example: The fs capacity bounds is only [(100mb, 100gb)](https://github.com/kubernetes/kubernetes/blob/master/test/e2e_node/summary_test.go#L62). @timstclair 3. We should consider mark **[cgroup manager test](https://github.com/kubernetes/kubernetes/blob/master/test/e2e_node/cgroup_manager_test.go)** as conformance test. @dchen1107 @vishh @timstclair /cc @kubernetes/sig-node
This commit is contained in:
commit
356230f8a1
@ -191,7 +191,7 @@ var _ = framework.KubeDescribe("ConfigMap", func() {
|
|||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should be consumable in multiple volumes in the same pod", func() {
|
It("should be consumable in multiple volumes in the same pod [Conformance]", func() {
|
||||||
var (
|
var (
|
||||||
name = "configmap-test-volume-" + string(uuid.NewUUID())
|
name = "configmap-test-volume-" + string(uuid.NewUUID())
|
||||||
volumeName = "configmap-volume"
|
volumeName = "configmap-volume"
|
||||||
|
@ -61,7 +61,7 @@ var _ = framework.KubeDescribe("Downward API", func() {
|
|||||||
testDownwardAPI(f, podName, env, expectations)
|
testDownwardAPI(f, podName, env, expectations)
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should provide pod IP as an env var", func() {
|
It("should provide pod IP as an env var [Conformance]", func() {
|
||||||
podName := "downward-api-" + string(uuid.NewUUID())
|
podName := "downward-api-" + string(uuid.NewUUID())
|
||||||
env := []api.EnvVar{
|
env := []api.EnvVar{
|
||||||
{
|
{
|
||||||
@ -82,7 +82,7 @@ var _ = framework.KubeDescribe("Downward API", func() {
|
|||||||
testDownwardAPI(f, podName, env, expectations)
|
testDownwardAPI(f, podName, env, expectations)
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should provide container's limits.cpu/memory and requests.cpu/memory as env vars", func() {
|
It("should provide container's limits.cpu/memory and requests.cpu/memory as env vars [Conformance]", func() {
|
||||||
podName := "downward-api-" + string(uuid.NewUUID())
|
podName := "downward-api-" + string(uuid.NewUUID())
|
||||||
env := []api.EnvVar{
|
env := []api.EnvVar{
|
||||||
{
|
{
|
||||||
@ -128,7 +128,7 @@ var _ = framework.KubeDescribe("Downward API", func() {
|
|||||||
testDownwardAPI(f, podName, env, expectations)
|
testDownwardAPI(f, podName, env, expectations)
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should provide default limits.cpu/memory from node allocatable", func() {
|
It("should provide default limits.cpu/memory from node allocatable [Conformance]", func() {
|
||||||
podName := "downward-api-" + string(uuid.NewUUID())
|
podName := "downward-api-" + string(uuid.NewUUID())
|
||||||
env := []api.EnvVar{
|
env := []api.EnvVar{
|
||||||
{
|
{
|
||||||
|
@ -137,7 +137,7 @@ var _ = framework.KubeDescribe("Downward API volume", func() {
|
|||||||
podLogTimeout, framework.Poll).Should(ContainSubstring("builder=\"foo\"\n"))
|
podLogTimeout, framework.Poll).Should(ContainSubstring("builder=\"foo\"\n"))
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should provide container's cpu limit", func() {
|
It("should provide container's cpu limit [Conformance]", func() {
|
||||||
podName := "downwardapi-volume-" + string(uuid.NewUUID())
|
podName := "downwardapi-volume-" + string(uuid.NewUUID())
|
||||||
pod := downwardAPIVolumeForContainerResources(podName, "/etc/cpu_limit")
|
pod := downwardAPIVolumeForContainerResources(podName, "/etc/cpu_limit")
|
||||||
|
|
||||||
@ -146,7 +146,7 @@ var _ = framework.KubeDescribe("Downward API volume", func() {
|
|||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should provide container's memory limit", func() {
|
It("should provide container's memory limit [Conformance]", func() {
|
||||||
podName := "downwardapi-volume-" + string(uuid.NewUUID())
|
podName := "downwardapi-volume-" + string(uuid.NewUUID())
|
||||||
pod := downwardAPIVolumeForContainerResources(podName, "/etc/memory_limit")
|
pod := downwardAPIVolumeForContainerResources(podName, "/etc/memory_limit")
|
||||||
|
|
||||||
@ -155,7 +155,7 @@ var _ = framework.KubeDescribe("Downward API volume", func() {
|
|||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should provide container's cpu request", func() {
|
It("should provide container's cpu request [Conformance]", func() {
|
||||||
podName := "downwardapi-volume-" + string(uuid.NewUUID())
|
podName := "downwardapi-volume-" + string(uuid.NewUUID())
|
||||||
pod := downwardAPIVolumeForContainerResources(podName, "/etc/cpu_request")
|
pod := downwardAPIVolumeForContainerResources(podName, "/etc/cpu_request")
|
||||||
|
|
||||||
@ -164,7 +164,7 @@ var _ = framework.KubeDescribe("Downward API volume", func() {
|
|||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should provide container's memory request", func() {
|
It("should provide container's memory request [Conformance]", func() {
|
||||||
podName := "downwardapi-volume-" + string(uuid.NewUUID())
|
podName := "downwardapi-volume-" + string(uuid.NewUUID())
|
||||||
pod := downwardAPIVolumeForContainerResources(podName, "/etc/memory_request")
|
pod := downwardAPIVolumeForContainerResources(podName, "/etc/memory_request")
|
||||||
|
|
||||||
@ -173,14 +173,14 @@ var _ = framework.KubeDescribe("Downward API volume", func() {
|
|||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should provide node allocatable (cpu) as default cpu limit if the limit is not set", func() {
|
It("should provide node allocatable (cpu) as default cpu limit if the limit is not set [Conformance]", func() {
|
||||||
podName := "downwardapi-volume-" + string(uuid.NewUUID())
|
podName := "downwardapi-volume-" + string(uuid.NewUUID())
|
||||||
pod := downwardAPIVolumeForDefaultContainerResources(podName, "/etc/cpu_limit")
|
pod := downwardAPIVolumeForDefaultContainerResources(podName, "/etc/cpu_limit")
|
||||||
|
|
||||||
f.TestContainerOutputRegexp("downward API volume plugin", pod, 0, []string{"[1-9]"})
|
f.TestContainerOutputRegexp("downward API volume plugin", pod, 0, []string{"[1-9]"})
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should provide node allocatable (memory) as default memory limit if the limit is not set", func() {
|
It("should provide node allocatable (memory) as default memory limit if the limit is not set [Conformance]", func() {
|
||||||
podName := "downwardapi-volume-" + string(uuid.NewUUID())
|
podName := "downwardapi-volume-" + string(uuid.NewUUID())
|
||||||
pod := downwardAPIVolumeForDefaultContainerResources(podName, "/etc/memory_limit")
|
pod := downwardAPIVolumeForDefaultContainerResources(podName, "/etc/memory_limit")
|
||||||
|
|
||||||
|
@ -45,7 +45,7 @@ var _ = framework.KubeDescribe("KubeletManagedEtcHosts", func() {
|
|||||||
f: f,
|
f: f,
|
||||||
}
|
}
|
||||||
|
|
||||||
It("should test kubelet managed /etc/hosts file", func() {
|
It("should test kubelet managed /etc/hosts file [Conformance]", func() {
|
||||||
By("Setting up the test")
|
By("Setting up the test")
|
||||||
config.setup()
|
config.setup()
|
||||||
|
|
||||||
|
@ -16,7 +16,6 @@ go_library(
|
|||||||
"benchmark_util.go",
|
"benchmark_util.go",
|
||||||
"container.go",
|
"container.go",
|
||||||
"doc.go",
|
"doc.go",
|
||||||
"image.go",
|
|
||||||
"image_list.go",
|
"image_list.go",
|
||||||
"resource_collector.go",
|
"resource_collector.go",
|
||||||
"simple_mount.go",
|
"simple_mount.go",
|
||||||
@ -30,9 +29,6 @@ go_library(
|
|||||||
"//pkg/apis/componentconfig:go_default_library",
|
"//pkg/apis/componentconfig:go_default_library",
|
||||||
"//pkg/apis/componentconfig/v1alpha1:go_default_library",
|
"//pkg/apis/componentconfig/v1alpha1:go_default_library",
|
||||||
"//pkg/kubelet/api/v1alpha1/stats:go_default_library",
|
"//pkg/kubelet/api/v1alpha1/stats:go_default_library",
|
||||||
"//pkg/kubelet/container:go_default_library",
|
|
||||||
"//pkg/kubelet/dockertools:go_default_library",
|
|
||||||
"//pkg/kubelet/pod:go_default_library",
|
|
||||||
"//pkg/labels:go_default_library",
|
"//pkg/labels:go_default_library",
|
||||||
"//pkg/util/procfs:go_default_library",
|
"//pkg/util/procfs:go_default_library",
|
||||||
"//pkg/util/runtime:go_default_library",
|
"//pkg/util/runtime:go_default_library",
|
||||||
@ -61,7 +57,6 @@ go_test(
|
|||||||
"disk_eviction_test.go",
|
"disk_eviction_test.go",
|
||||||
"dynamic_kubelet_configuration_test.go",
|
"dynamic_kubelet_configuration_test.go",
|
||||||
"e2e_node_suite_test.go",
|
"e2e_node_suite_test.go",
|
||||||
"image_conformance_test.go",
|
|
||||||
"image_id_test.go",
|
"image_id_test.go",
|
||||||
"kubelet_test.go",
|
"kubelet_test.go",
|
||||||
"lifecycle_hook_test.go",
|
"lifecycle_hook_test.go",
|
||||||
|
@ -1,82 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright 2016 The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package e2e_node
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
|
|
||||||
kubecontainer "k8s.io/kubernetes/pkg/kubelet/container"
|
|
||||||
"k8s.io/kubernetes/pkg/kubelet/dockertools"
|
|
||||||
kubepod "k8s.io/kubernetes/pkg/kubelet/pod"
|
|
||||||
)
|
|
||||||
|
|
||||||
type ConformanceImage struct {
|
|
||||||
Image kubecontainer.ImageSpec
|
|
||||||
Runtime kubecontainer.Runtime
|
|
||||||
}
|
|
||||||
|
|
||||||
func NewConformanceImage(containerRuntime string, image string) (ci ConformanceImage, err error) {
|
|
||||||
ci.Image = kubecontainer.ImageSpec{Image: image}
|
|
||||||
if containerRuntime == "docker" {
|
|
||||||
ci.Runtime = dockerRuntime()
|
|
||||||
return ci, nil
|
|
||||||
}
|
|
||||||
return ci, fmt.Errorf("Unsupported runtime : %s.", containerRuntime)
|
|
||||||
}
|
|
||||||
|
|
||||||
//TODO: do not expose kubelet implementation details after we refactor the runtime API.
|
|
||||||
func dockerRuntime() kubecontainer.Runtime {
|
|
||||||
dockerClient := dockertools.ConnectToDockerOrDie("", 0)
|
|
||||||
pm := kubepod.NewBasicPodManager(nil)
|
|
||||||
dm := dockertools.NewDockerManager(
|
|
||||||
dockerClient,
|
|
||||||
nil, nil, nil, pm, nil,
|
|
||||||
"", 0, 0, "",
|
|
||||||
nil, nil, nil, nil, nil, nil, nil,
|
|
||||||
false, nil, true, false, false, "",
|
|
||||||
)
|
|
||||||
|
|
||||||
return dm
|
|
||||||
}
|
|
||||||
|
|
||||||
func (ci *ConformanceImage) Pull() error {
|
|
||||||
return ci.Runtime.PullImage(ci.Image, nil)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (ci *ConformanceImage) Present() (bool, error) {
|
|
||||||
return ci.Runtime.IsImagePresent(ci.Image)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (ci *ConformanceImage) List() ([]string, error) {
|
|
||||||
if images, err := ci.Runtime.ListImages(); err != nil {
|
|
||||||
return nil, err
|
|
||||||
} else {
|
|
||||||
var tags []string
|
|
||||||
for _, image := range images {
|
|
||||||
tags = append(tags, image.RepoTags...)
|
|
||||||
}
|
|
||||||
return tags, nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (ci *ConformanceImage) Remove() error {
|
|
||||||
return ci.Runtime.RemoveImage(ci.Image)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (ci *ConformanceImage) GetTag() string {
|
|
||||||
return ci.Image.Image
|
|
||||||
}
|
|
@ -1,120 +0,0 @@
|
|||||||
/*
|
|
||||||
Copyright 2016 The Kubernetes Authors.
|
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
you may not use this file except in compliance with the License.
|
|
||||||
You may obtain a copy of the License at
|
|
||||||
|
|
||||||
http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
|
|
||||||
Unless required by applicable law or agreed to in writing, software
|
|
||||||
distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
See the License for the specific language governing permissions and
|
|
||||||
limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package e2e_node
|
|
||||||
|
|
||||||
import (
|
|
||||||
"time"
|
|
||||||
|
|
||||||
. "github.com/onsi/ginkgo"
|
|
||||||
. "github.com/onsi/gomega"
|
|
||||||
)
|
|
||||||
|
|
||||||
const (
|
|
||||||
imageRetryTimeout = time.Minute * 10 // Image pulls can take a long time and shouldn't cause flakes
|
|
||||||
imagePullInterval = time.Second * 15
|
|
||||||
imageConsistentlyTimeout = time.Second * 30
|
|
||||||
imageConsistentlyInterval = time.Second * 5
|
|
||||||
)
|
|
||||||
|
|
||||||
var _ = Describe("Image Container Conformance Test", func() {
|
|
||||||
Describe("[Flaky] image conformance blackbox test", func() {
|
|
||||||
Context("when testing images that exist", func() {
|
|
||||||
var conformImages []ConformanceImage
|
|
||||||
BeforeEach(func() {
|
|
||||||
existImageTags := []string{
|
|
||||||
"gcr.io/google_containers/exechealthz:1.0",
|
|
||||||
"gcr.io/google_containers/alpine-with-bash:1.0",
|
|
||||||
}
|
|
||||||
for _, existImageTag := range existImageTags {
|
|
||||||
conformImage, _ := NewConformanceImage("docker", existImageTag)
|
|
||||||
// Pulling images from gcr.io is flaky, so retry failures
|
|
||||||
Eventually(func() error {
|
|
||||||
return conformImage.Pull()
|
|
||||||
}, imageRetryTimeout, imagePullInterval).ShouldNot(HaveOccurred())
|
|
||||||
conformImages = append(conformImages, conformImage)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
|
|
||||||
It("It should present successfully", func() {
|
|
||||||
for _, conformImage := range conformImages {
|
|
||||||
present, err := conformImage.Present()
|
|
||||||
Expect(err).ShouldNot(HaveOccurred())
|
|
||||||
Expect(present).To(BeTrue())
|
|
||||||
}
|
|
||||||
})
|
|
||||||
|
|
||||||
It("should list pulled images", func() {
|
|
||||||
image, _ := NewConformanceImage("docker", "")
|
|
||||||
tags, err := image.List()
|
|
||||||
Expect(err).ShouldNot(HaveOccurred())
|
|
||||||
for _, conformImage := range conformImages {
|
|
||||||
Expect(tags).To(ContainElement(conformImage.GetTag()))
|
|
||||||
}
|
|
||||||
})
|
|
||||||
|
|
||||||
AfterEach(func() {
|
|
||||||
for _, conformImage := range conformImages {
|
|
||||||
conformImage.Remove()
|
|
||||||
}
|
|
||||||
conformImages = []ConformanceImage{}
|
|
||||||
})
|
|
||||||
|
|
||||||
})
|
|
||||||
Context("when testing image that does not exist", func() {
|
|
||||||
var conformImages []ConformanceImage
|
|
||||||
invalidImageTags := []string{
|
|
||||||
// nonexistent image registry
|
|
||||||
"foo.com/foo/fooimage",
|
|
||||||
// nonexistent image
|
|
||||||
"gcr.io/google_containers/not_exist",
|
|
||||||
// TODO(random-liu): Add test for image pulling credential
|
|
||||||
}
|
|
||||||
It("should ignore pull failures", func() {
|
|
||||||
for _, invalidImageTag := range invalidImageTags {
|
|
||||||
conformImage, _ := NewConformanceImage("docker", invalidImageTag)
|
|
||||||
// Pulling images from gcr.io is flaky, so retry to make sure failure is not caused by flaky.
|
|
||||||
Expect(conformImage.Pull()).Should(HaveOccurred())
|
|
||||||
conformImages = append(conformImages, conformImage)
|
|
||||||
}
|
|
||||||
|
|
||||||
By("not presenting images", func() {
|
|
||||||
for _, conformImage := range conformImages {
|
|
||||||
present, err := conformImage.Present()
|
|
||||||
Expect(err).ShouldNot(HaveOccurred())
|
|
||||||
Expect(present).To(BeFalse())
|
|
||||||
}
|
|
||||||
})
|
|
||||||
|
|
||||||
By("not listing pulled images", func() {
|
|
||||||
image, _ := NewConformanceImage("docker", "")
|
|
||||||
tags, err := image.List()
|
|
||||||
Expect(err).ShouldNot(HaveOccurred())
|
|
||||||
for _, conformImage := range conformImages {
|
|
||||||
Expect(tags).NotTo(ContainElement(conformImage.GetTag()))
|
|
||||||
}
|
|
||||||
})
|
|
||||||
|
|
||||||
By("not removing non-exist images", func() {
|
|
||||||
for _, conformImage := range conformImages {
|
|
||||||
err := conformImage.Remove()
|
|
||||||
Expect(err).Should(HaveOccurred())
|
|
||||||
}
|
|
||||||
})
|
|
||||||
})
|
|
||||||
})
|
|
||||||
})
|
|
||||||
})
|
|
@ -38,7 +38,7 @@ var _ = framework.KubeDescribe("Kubelet", func() {
|
|||||||
})
|
})
|
||||||
Context("when scheduling a busybox command in a pod", func() {
|
Context("when scheduling a busybox command in a pod", func() {
|
||||||
podName := "busybox-scheduling-" + string(uuid.NewUUID())
|
podName := "busybox-scheduling-" + string(uuid.NewUUID())
|
||||||
It("it should print the output to logs", func() {
|
It("it should print the output to logs [Conformance]", func() {
|
||||||
podClient.CreateSync(&api.Pod{
|
podClient.CreateSync(&api.Pod{
|
||||||
ObjectMeta: api.ObjectMeta{
|
ObjectMeta: api.ObjectMeta{
|
||||||
Name: podName,
|
Name: podName,
|
||||||
@ -118,7 +118,7 @@ var _ = framework.KubeDescribe("Kubelet", func() {
|
|||||||
})
|
})
|
||||||
Context("when scheduling a read only busybox container", func() {
|
Context("when scheduling a read only busybox container", func() {
|
||||||
podName := "busybox-readonly-fs" + string(uuid.NewUUID())
|
podName := "busybox-readonly-fs" + string(uuid.NewUUID())
|
||||||
It("it should not write to root filesystem", func() {
|
It("it should not write to root filesystem [Conformance]", func() {
|
||||||
isReadOnly := true
|
isReadOnly := true
|
||||||
podClient.CreateSync(&api.Pod{
|
podClient.CreateSync(&api.Pod{
|
||||||
ObjectMeta: api.ObjectMeta{
|
ObjectMeta: api.ObjectMeta{
|
||||||
|
@ -71,7 +71,7 @@ var _ = framework.KubeDescribe("Container Lifecycle Hook", func() {
|
|||||||
})
|
})
|
||||||
|
|
||||||
Context("when it is exec hook", func() {
|
Context("when it is exec hook", func() {
|
||||||
It("should execute poststart exec hook properly", func() {
|
It("should execute poststart exec hook properly [Conformance]", func() {
|
||||||
podWithHook := getLifecycleHookTestPod("pod-with-poststart-exec-hook",
|
podWithHook := getLifecycleHookTestPod("pod-with-poststart-exec-hook",
|
||||||
// Block forever
|
// Block forever
|
||||||
[]string{"tail", "-f", "/dev/null"},
|
[]string{"tail", "-f", "/dev/null"},
|
||||||
@ -84,7 +84,7 @@ var _ = framework.KubeDescribe("Container Lifecycle Hook", func() {
|
|||||||
testPodWithHook(podWithHook)
|
testPodWithHook(podWithHook)
|
||||||
})
|
})
|
||||||
|
|
||||||
It("should execute prestop exec hook properly", func() {
|
It("should execute prestop exec hook properly [Conformance]", func() {
|
||||||
podWithHook := getLifecycleHookTestPod("pod-with-prestop-exec-hook",
|
podWithHook := getLifecycleHookTestPod("pod-with-prestop-exec-hook",
|
||||||
// Block forever
|
// Block forever
|
||||||
[]string{"tail", "-f", "/dev/null"},
|
[]string{"tail", "-f", "/dev/null"},
|
||||||
@ -117,7 +117,7 @@ var _ = framework.KubeDescribe("Container Lifecycle Hook", func() {
|
|||||||
podHandleHookRequest = podClient.CreateSync(podHandleHookRequest)
|
podHandleHookRequest = podClient.CreateSync(podHandleHookRequest)
|
||||||
targetIP = podHandleHookRequest.Status.PodIP
|
targetIP = podHandleHookRequest.Status.PodIP
|
||||||
})
|
})
|
||||||
It("should execute poststart http hook properly", func() {
|
It("should execute poststart http hook properly [Conformance]", func() {
|
||||||
podWithHook := getLifecycleHookTestPod("pod-with-poststart-http-hook",
|
podWithHook := getLifecycleHookTestPod("pod-with-poststart-http-hook",
|
||||||
// Block forever
|
// Block forever
|
||||||
[]string{"tail", "-f", "/dev/null"},
|
[]string{"tail", "-f", "/dev/null"},
|
||||||
@ -132,7 +132,7 @@ var _ = framework.KubeDescribe("Container Lifecycle Hook", func() {
|
|||||||
}
|
}
|
||||||
testPodWithHook(podWithHook)
|
testPodWithHook(podWithHook)
|
||||||
})
|
})
|
||||||
It("should execute prestop http hook properly", func() {
|
It("should execute prestop http hook properly [Conformance]", func() {
|
||||||
podWithHook := getLifecycleHookTestPod("pod-with-prestop-http-hook",
|
podWithHook := getLifecycleHookTestPod("pod-with-prestop-http-hook",
|
||||||
// Block forever
|
// Block forever
|
||||||
[]string{"tail", "-f", "/dev/null"},
|
[]string{"tail", "-f", "/dev/null"},
|
||||||
|
@ -53,7 +53,7 @@ var _ = framework.KubeDescribe("MirrorPod", func() {
|
|||||||
return checkMirrorPodRunning(f.ClientSet, mirrorPodName, ns)
|
return checkMirrorPodRunning(f.ClientSet, mirrorPodName, ns)
|
||||||
}, 2*time.Minute, time.Second*4).Should(BeNil())
|
}, 2*time.Minute, time.Second*4).Should(BeNil())
|
||||||
})
|
})
|
||||||
It("should be updated when static pod updated", func() {
|
It("should be updated when static pod updated [Conformance]", func() {
|
||||||
By("get mirror pod uid")
|
By("get mirror pod uid")
|
||||||
pod, err := f.ClientSet.Core().Pods(ns).Get(mirrorPodName)
|
pod, err := f.ClientSet.Core().Pods(ns).Get(mirrorPodName)
|
||||||
Expect(err).ShouldNot(HaveOccurred())
|
Expect(err).ShouldNot(HaveOccurred())
|
||||||
@ -75,7 +75,7 @@ var _ = framework.KubeDescribe("MirrorPod", func() {
|
|||||||
Expect(len(pod.Spec.Containers)).Should(Equal(1))
|
Expect(len(pod.Spec.Containers)).Should(Equal(1))
|
||||||
Expect(pod.Spec.Containers[0].Image).Should(Equal(image))
|
Expect(pod.Spec.Containers[0].Image).Should(Equal(image))
|
||||||
})
|
})
|
||||||
It("should be recreated when mirror pod gracefully deleted", func() {
|
It("should be recreated when mirror pod gracefully deleted [Conformance]", func() {
|
||||||
By("get mirror pod uid")
|
By("get mirror pod uid")
|
||||||
pod, err := f.ClientSet.Core().Pods(ns).Get(mirrorPodName)
|
pod, err := f.ClientSet.Core().Pods(ns).Get(mirrorPodName)
|
||||||
Expect(err).ShouldNot(HaveOccurred())
|
Expect(err).ShouldNot(HaveOccurred())
|
||||||
@ -90,7 +90,7 @@ var _ = framework.KubeDescribe("MirrorPod", func() {
|
|||||||
return checkMirrorPodRecreatedAndRunnig(f.ClientSet, mirrorPodName, ns, uid)
|
return checkMirrorPodRecreatedAndRunnig(f.ClientSet, mirrorPodName, ns, uid)
|
||||||
}, 2*time.Minute, time.Second*4).Should(BeNil())
|
}, 2*time.Minute, time.Second*4).Should(BeNil())
|
||||||
})
|
})
|
||||||
It("should be recreated when mirror pod forcibly deleted", func() {
|
It("should be recreated when mirror pod forcibly deleted [Conformance]", func() {
|
||||||
By("get mirror pod uid")
|
By("get mirror pod uid")
|
||||||
pod, err := f.ClientSet.Core().Pods(ns).Get(mirrorPodName)
|
pod, err := f.ClientSet.Core().Pods(ns).Get(mirrorPodName)
|
||||||
Expect(err).ShouldNot(HaveOccurred())
|
Expect(err).ShouldNot(HaveOccurred())
|
||||||
|
@ -234,7 +234,7 @@ while true; do sleep 1; done
|
|||||||
},
|
},
|
||||||
} {
|
} {
|
||||||
testCase := testCase
|
testCase := testCase
|
||||||
It(testCase.description, func() {
|
It(testCase.description+" [Conformance]", func() {
|
||||||
name := "image-pull-test"
|
name := "image-pull-test"
|
||||||
command := []string{"/bin/sh", "-c", "while true; do sleep 1; done"}
|
command := []string{"/bin/sh", "-c", "while true; do sleep 1; done"}
|
||||||
container := ConformanceContainer{
|
container := ConformanceContainer{
|
||||||
|
Loading…
Reference in New Issue
Block a user