mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-20 01:01:22 +00:00
Use log functions of core framework on test/e2e/freamwork/psp.go
Signed-off-by: clarklee92 <clarklee1992@hotmail.com>
This commit is contained in:
parent
c7bb076ade
commit
358dec9f3d
@ -58,7 +58,6 @@ go_library(
|
|||||||
"//test/e2e/framework/job:go_default_library",
|
"//test/e2e/framework/job:go_default_library",
|
||||||
"//test/e2e/framework/node:go_default_library",
|
"//test/e2e/framework/node:go_default_library",
|
||||||
"//test/e2e/framework/pod:go_default_library",
|
"//test/e2e/framework/pod:go_default_library",
|
||||||
"//test/e2e/framework/psp:go_default_library",
|
|
||||||
"//test/utils:go_default_library",
|
"//test/utils:go_default_library",
|
||||||
"//test/utils/image:go_default_library",
|
"//test/utils/image:go_default_library",
|
||||||
"//vendor/github.com/evanphx/json-patch:go_default_library",
|
"//vendor/github.com/evanphx/json-patch:go_default_library",
|
||||||
|
@ -35,7 +35,6 @@ import (
|
|||||||
"k8s.io/kubernetes/test/e2e/framework"
|
"k8s.io/kubernetes/test/e2e/framework"
|
||||||
"k8s.io/kubernetes/test/e2e/framework/auth"
|
"k8s.io/kubernetes/test/e2e/framework/auth"
|
||||||
e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
|
e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
|
||||||
e2epsp "k8s.io/kubernetes/test/e2e/framework/psp"
|
|
||||||
imageutils "k8s.io/kubernetes/test/utils/image"
|
imageutils "k8s.io/kubernetes/test/utils/image"
|
||||||
utilpointer "k8s.io/utils/pointer"
|
utilpointer "k8s.io/utils/pointer"
|
||||||
|
|
||||||
@ -54,7 +53,7 @@ var _ = SIGDescribe("PodSecurityPolicy", func() {
|
|||||||
var c clientset.Interface
|
var c clientset.Interface
|
||||||
var ns string // Test namespace, for convenience
|
var ns string // Test namespace, for convenience
|
||||||
ginkgo.BeforeEach(func() {
|
ginkgo.BeforeEach(func() {
|
||||||
if !e2epsp.IsPodSecurityPolicyEnabled(f.ClientSet) {
|
if !framework.IsPodSecurityPolicyEnabled(f.ClientSet) {
|
||||||
framework.Skipf("PodSecurityPolicy not enabled")
|
framework.Skipf("PodSecurityPolicy not enabled")
|
||||||
}
|
}
|
||||||
if !auth.IsRBACEnabled(f.ClientSet.RbacV1()) {
|
if !auth.IsRBACEnabled(f.ClientSet.RbacV1()) {
|
||||||
|
@ -18,6 +18,7 @@ go_library(
|
|||||||
"pods.go",
|
"pods.go",
|
||||||
"profile_gatherer.go",
|
"profile_gatherer.go",
|
||||||
"provider.go",
|
"provider.go",
|
||||||
|
"psp.go",
|
||||||
"rc_util.go",
|
"rc_util.go",
|
||||||
"resource_usage_gatherer.go",
|
"resource_usage_gatherer.go",
|
||||||
"size.go",
|
"size.go",
|
||||||
@ -38,9 +39,11 @@ go_library(
|
|||||||
"//pkg/kubelet/events:go_default_library",
|
"//pkg/kubelet/events:go_default_library",
|
||||||
"//pkg/kubelet/sysctl:go_default_library",
|
"//pkg/kubelet/sysctl:go_default_library",
|
||||||
"//pkg/master/ports:go_default_library",
|
"//pkg/master/ports:go_default_library",
|
||||||
|
"//pkg/security/podsecuritypolicy/seccomp:go_default_library",
|
||||||
"//pkg/util/taints:go_default_library",
|
"//pkg/util/taints:go_default_library",
|
||||||
"//staging/src/k8s.io/api/apps/v1:go_default_library",
|
"//staging/src/k8s.io/api/apps/v1:go_default_library",
|
||||||
"//staging/src/k8s.io/api/core/v1:go_default_library",
|
"//staging/src/k8s.io/api/core/v1:go_default_library",
|
||||||
|
"//staging/src/k8s.io/api/policy/v1beta1:go_default_library",
|
||||||
"//staging/src/k8s.io/api/rbac/v1:go_default_library",
|
"//staging/src/k8s.io/api/rbac/v1:go_default_library",
|
||||||
"//staging/src/k8s.io/api/storage/v1:go_default_library",
|
"//staging/src/k8s.io/api/storage/v1:go_default_library",
|
||||||
"//staging/src/k8s.io/api/storage/v1beta1:go_default_library",
|
"//staging/src/k8s.io/api/storage/v1beta1:go_default_library",
|
||||||
@ -59,6 +62,7 @@ go_library(
|
|||||||
"//staging/src/k8s.io/apimachinery/pkg/util/wait:go_default_library",
|
"//staging/src/k8s.io/apimachinery/pkg/util/wait:go_default_library",
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/util/yaml:go_default_library",
|
"//staging/src/k8s.io/apimachinery/pkg/util/yaml:go_default_library",
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/watch:go_default_library",
|
"//staging/src/k8s.io/apimachinery/pkg/watch:go_default_library",
|
||||||
|
"//staging/src/k8s.io/apiserver/pkg/authentication/serviceaccount:go_default_library",
|
||||||
"//staging/src/k8s.io/apiserver/pkg/util/feature:go_default_library",
|
"//staging/src/k8s.io/apiserver/pkg/util/feature:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/discovery:go_default_library",
|
"//staging/src/k8s.io/client-go/discovery:go_default_library",
|
||||||
"//staging/src/k8s.io/client-go/discovery/cached/memory:go_default_library",
|
"//staging/src/k8s.io/client-go/discovery/cached/memory:go_default_library",
|
||||||
@ -76,12 +80,12 @@ go_library(
|
|||||||
"//staging/src/k8s.io/client-go/tools/watch:go_default_library",
|
"//staging/src/k8s.io/client-go/tools/watch:go_default_library",
|
||||||
"//staging/src/k8s.io/component-base/cli/flag:go_default_library",
|
"//staging/src/k8s.io/component-base/cli/flag:go_default_library",
|
||||||
"//staging/src/k8s.io/component-base/version:go_default_library",
|
"//staging/src/k8s.io/component-base/version:go_default_library",
|
||||||
|
"//test/e2e/framework/auth:go_default_library",
|
||||||
"//test/e2e/framework/ginkgowrapper:go_default_library",
|
"//test/e2e/framework/ginkgowrapper:go_default_library",
|
||||||
"//test/e2e/framework/kubelet:go_default_library",
|
"//test/e2e/framework/kubelet:go_default_library",
|
||||||
"//test/e2e/framework/metrics:go_default_library",
|
"//test/e2e/framework/metrics:go_default_library",
|
||||||
"//test/e2e/framework/node:go_default_library",
|
"//test/e2e/framework/node:go_default_library",
|
||||||
"//test/e2e/framework/pod:go_default_library",
|
"//test/e2e/framework/pod:go_default_library",
|
||||||
"//test/e2e/framework/psp:go_default_library",
|
|
||||||
"//test/e2e/framework/resource:go_default_library",
|
"//test/e2e/framework/resource:go_default_library",
|
||||||
"//test/e2e/framework/ssh:go_default_library",
|
"//test/e2e/framework/ssh:go_default_library",
|
||||||
"//test/e2e/framework/testfiles:go_default_library",
|
"//test/e2e/framework/testfiles:go_default_library",
|
||||||
@ -135,7 +139,6 @@ filegroup(
|
|||||||
"//test/e2e/framework/providers/kubemark:all-srcs",
|
"//test/e2e/framework/providers/kubemark:all-srcs",
|
||||||
"//test/e2e/framework/providers/openstack:all-srcs",
|
"//test/e2e/framework/providers/openstack:all-srcs",
|
||||||
"//test/e2e/framework/providers/vsphere:all-srcs",
|
"//test/e2e/framework/providers/vsphere:all-srcs",
|
||||||
"//test/e2e/framework/psp:all-srcs",
|
|
||||||
"//test/e2e/framework/pv:all-srcs",
|
"//test/e2e/framework/pv:all-srcs",
|
||||||
"//test/e2e/framework/replicaset:all-srcs",
|
"//test/e2e/framework/replicaset:all-srcs",
|
||||||
"//test/e2e/framework/resource:all-srcs",
|
"//test/e2e/framework/resource:all-srcs",
|
||||||
|
@ -47,7 +47,6 @@ import (
|
|||||||
e2emetrics "k8s.io/kubernetes/test/e2e/framework/metrics"
|
e2emetrics "k8s.io/kubernetes/test/e2e/framework/metrics"
|
||||||
e2enode "k8s.io/kubernetes/test/e2e/framework/node"
|
e2enode "k8s.io/kubernetes/test/e2e/framework/node"
|
||||||
e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
|
e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
|
||||||
e2epsp "k8s.io/kubernetes/test/e2e/framework/psp"
|
|
||||||
testutils "k8s.io/kubernetes/test/utils"
|
testutils "k8s.io/kubernetes/test/utils"
|
||||||
|
|
||||||
"github.com/onsi/ginkgo"
|
"github.com/onsi/ginkgo"
|
||||||
@ -399,7 +398,7 @@ func (f *Framework) CreateNamespace(baseName string, labels map[string]string) (
|
|||||||
f.AddNamespacesToDelete(ns)
|
f.AddNamespacesToDelete(ns)
|
||||||
|
|
||||||
if err == nil && !f.SkipPrivilegedPSPBinding {
|
if err == nil && !f.SkipPrivilegedPSPBinding {
|
||||||
e2epsp.CreatePrivilegedPSPBinding(f.ClientSet, ns.Name)
|
CreatePrivilegedPSPBinding(f.ClientSet, ns.Name)
|
||||||
}
|
}
|
||||||
|
|
||||||
return ns, err
|
return ns, err
|
||||||
|
@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
|
|||||||
limitations under the License.
|
limitations under the License.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
package psp
|
package framework
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
@ -30,10 +30,8 @@ import (
|
|||||||
clientset "k8s.io/client-go/kubernetes"
|
clientset "k8s.io/client-go/kubernetes"
|
||||||
"k8s.io/kubernetes/pkg/security/podsecuritypolicy/seccomp"
|
"k8s.io/kubernetes/pkg/security/podsecuritypolicy/seccomp"
|
||||||
"k8s.io/kubernetes/test/e2e/framework/auth"
|
"k8s.io/kubernetes/test/e2e/framework/auth"
|
||||||
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
|
|
||||||
|
|
||||||
"github.com/onsi/ginkgo"
|
"github.com/onsi/ginkgo"
|
||||||
"github.com/onsi/gomega"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@ -85,13 +83,13 @@ func IsPodSecurityPolicyEnabled(kubeClient clientset.Interface) bool {
|
|||||||
isPSPEnabledOnce.Do(func() {
|
isPSPEnabledOnce.Do(func() {
|
||||||
psps, err := kubeClient.PolicyV1beta1().PodSecurityPolicies().List(metav1.ListOptions{})
|
psps, err := kubeClient.PolicyV1beta1().PodSecurityPolicies().List(metav1.ListOptions{})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
e2elog.Logf("Error listing PodSecurityPolicies; assuming PodSecurityPolicy is disabled: %v", err)
|
Logf("Error listing PodSecurityPolicies; assuming PodSecurityPolicy is disabled: %v", err)
|
||||||
isPSPEnabled = false
|
isPSPEnabled = false
|
||||||
} else if psps == nil || len(psps.Items) == 0 {
|
} else if psps == nil || len(psps.Items) == 0 {
|
||||||
e2elog.Logf("No PodSecurityPolicies found; assuming PodSecurityPolicy is disabled.")
|
Logf("No PodSecurityPolicies found; assuming PodSecurityPolicy is disabled.")
|
||||||
isPSPEnabled = false
|
isPSPEnabled = false
|
||||||
} else {
|
} else {
|
||||||
e2elog.Logf("Found PodSecurityPolicies; assuming PodSecurityPolicy is enabled.")
|
Logf("Found PodSecurityPolicies; assuming PodSecurityPolicy is enabled.")
|
||||||
isPSPEnabled = true
|
isPSPEnabled = true
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
@ -157,11 +155,3 @@ func CreatePrivilegedPSPBinding(kubeClient clientset.Interface, namespace string
|
|||||||
schema.GroupResource{Group: "extensions", Resource: "podsecuritypolicies"}, true))
|
schema.GroupResource{Group: "extensions", Resource: "podsecuritypolicies"}, true))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// ExpectNoError is a copy from the same name function in file test/e2e/framework.go
|
|
||||||
func ExpectNoError(err error, explain ...interface{}) {
|
|
||||||
if err != nil {
|
|
||||||
e2elog.Logf("Unexpected error occurred: %v", err)
|
|
||||||
}
|
|
||||||
gomega.ExpectWithOffset(2, err).NotTo(gomega.HaveOccurred(), explain...)
|
|
||||||
}
|
|
@ -1,37 +0,0 @@
|
|||||||
load("@io_bazel_rules_go//go:def.bzl", "go_library")
|
|
||||||
|
|
||||||
go_library(
|
|
||||||
name = "go_default_library",
|
|
||||||
srcs = ["psp.go"],
|
|
||||||
importpath = "k8s.io/kubernetes/test/e2e/framework/psp",
|
|
||||||
visibility = ["//visibility:public"],
|
|
||||||
deps = [
|
|
||||||
"//pkg/security/podsecuritypolicy/seccomp:go_default_library",
|
|
||||||
"//staging/src/k8s.io/api/core/v1:go_default_library",
|
|
||||||
"//staging/src/k8s.io/api/policy/v1beta1:go_default_library",
|
|
||||||
"//staging/src/k8s.io/api/rbac/v1:go_default_library",
|
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/api/errors:go_default_library",
|
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
|
|
||||||
"//staging/src/k8s.io/apimachinery/pkg/runtime/schema:go_default_library",
|
|
||||||
"//staging/src/k8s.io/apiserver/pkg/authentication/serviceaccount:go_default_library",
|
|
||||||
"//staging/src/k8s.io/client-go/kubernetes:go_default_library",
|
|
||||||
"//test/e2e/framework/auth:go_default_library",
|
|
||||||
"//test/e2e/framework/log:go_default_library",
|
|
||||||
"//vendor/github.com/onsi/ginkgo:go_default_library",
|
|
||||||
"//vendor/github.com/onsi/gomega:go_default_library",
|
|
||||||
],
|
|
||||||
)
|
|
||||||
|
|
||||||
filegroup(
|
|
||||||
name = "package-srcs",
|
|
||||||
srcs = glob(["**"]),
|
|
||||||
tags = ["automanaged"],
|
|
||||||
visibility = ["//visibility:private"],
|
|
||||||
)
|
|
||||||
|
|
||||||
filegroup(
|
|
||||||
name = "all-srcs",
|
|
||||||
srcs = [":package-srcs"],
|
|
||||||
tags = ["automanaged"],
|
|
||||||
visibility = ["//visibility:public"],
|
|
||||||
)
|
|
Loading…
Reference in New Issue
Block a user