test/e2e/common: add NodeConformance tag to all Conformance tests

This commit is contained in:
Yu-Ju Hong 2018-05-21 18:09:33 -07:00
parent 2a989c60ff
commit 3815dfe478
15 changed files with 103 additions and 103 deletions

View File

@ -34,7 +34,7 @@ var _ = Describe("[sig-api-machinery] ConfigMap", func() {
Description: Make sure config map value can be used as an environment Description: Make sure config map value can be used as an environment
variable in the container (on container.env field) variable in the container (on container.env field)
*/ */
framework.ConformanceIt("should be consumable via environment variable ", func() { framework.ConformanceIt("should be consumable via environment variable [NodeConformance]", func() {
name := "configmap-test-" + string(uuid.NewUUID()) name := "configmap-test-" + string(uuid.NewUUID())
configMap := newConfigMap(f, name) configMap := newConfigMap(f, name)
By(fmt.Sprintf("Creating configMap %v/%v", f.Namespace.Name, configMap.Name)) By(fmt.Sprintf("Creating configMap %v/%v", f.Namespace.Name, configMap.Name))
@ -82,7 +82,7 @@ var _ = Describe("[sig-api-machinery] ConfigMap", func() {
Description: Make sure config map value can be used as an source for Description: Make sure config map value can be used as an source for
environment variables in the container (on container.envFrom field) environment variables in the container (on container.envFrom field)
*/ */
framework.ConformanceIt("should be consumable via the environment ", func() { framework.ConformanceIt("should be consumable via the environment [NodeConformance]", func() {
name := "configmap-test-" + string(uuid.NewUUID()) name := "configmap-test-" + string(uuid.NewUUID())
configMap := newEnvFromConfigMap(f, name) configMap := newEnvFromConfigMap(f, name)
By(fmt.Sprintf("Creating configMap %v/%v", f.Namespace.Name, configMap.Name)) By(fmt.Sprintf("Creating configMap %v/%v", f.Namespace.Name, configMap.Name))

View File

@ -37,7 +37,7 @@ var _ = Describe("[sig-storage] ConfigMap", func() {
Description: Make sure config map without mappings works by mounting it Description: Make sure config map without mappings works by mounting it
to a volume with a custom path (mapping) on the pod with no other settings. to a volume with a custom path (mapping) on the pod with no other settings.
*/ */
framework.ConformanceIt("should be consumable from pods in volume ", func() { framework.ConformanceIt("should be consumable from pods in volume [NodeConformance]", func() {
doConfigMapE2EWithoutMappings(f, 0, 0, nil) doConfigMapE2EWithoutMappings(f, 0, 0, nil)
}) })
@ -46,7 +46,7 @@ var _ = Describe("[sig-storage] ConfigMap", func() {
Description: Make sure config map without mappings works by mounting it Description: Make sure config map without mappings works by mounting it
to a volume with a custom path (mapping) on the pod with defaultMode set to a volume with a custom path (mapping) on the pod with defaultMode set
*/ */
framework.ConformanceIt("should be consumable from pods in volume with defaultMode set ", func() { framework.ConformanceIt("should be consumable from pods in volume with defaultMode set [NodeConformance]", func() {
defaultMode := int32(0400) defaultMode := int32(0400)
doConfigMapE2EWithoutMappings(f, 0, 0, &defaultMode) doConfigMapE2EWithoutMappings(f, 0, 0, &defaultMode)
}) })
@ -61,7 +61,7 @@ var _ = Describe("[sig-storage] ConfigMap", func() {
Description: Make sure config map without mappings works by mounting it Description: Make sure config map without mappings works by mounting it
to a volume with a custom path (mapping) on the pod as non-root. to a volume with a custom path (mapping) on the pod as non-root.
*/ */
framework.ConformanceIt("should be consumable from pods in volume as non-root ", func() { framework.ConformanceIt("should be consumable from pods in volume as non-root [NodeConformance]", func() {
doConfigMapE2EWithoutMappings(f, 1000, 0, nil) doConfigMapE2EWithoutMappings(f, 1000, 0, nil)
}) })
@ -75,7 +75,7 @@ var _ = Describe("[sig-storage] ConfigMap", func() {
a custom path (mapping) on the pod with no other settings and make sure a custom path (mapping) on the pod with no other settings and make sure
the pod actually consumes it. the pod actually consumes it.
*/ */
framework.ConformanceIt("should be consumable from pods in volume with mappings ", func() { framework.ConformanceIt("should be consumable from pods in volume with mappings [NodeConformance]", func() {
doConfigMapE2EWithMappings(f, 0, 0, nil) doConfigMapE2EWithMappings(f, 0, 0, nil)
}) })
@ -84,7 +84,7 @@ var _ = Describe("[sig-storage] ConfigMap", func() {
Description: Make sure config map works with an item mode (e.g. 0400) Description: Make sure config map works with an item mode (e.g. 0400)
for the config map item. for the config map item.
*/ */
framework.ConformanceIt("should be consumable from pods in volume with mappings and Item mode set", func() { framework.ConformanceIt("should be consumable from pods in volume with mappings and Item mode set [NodeConformance]", func() {
mode := int32(0400) mode := int32(0400)
doConfigMapE2EWithMappings(f, 0, 0, &mode) doConfigMapE2EWithMappings(f, 0, 0, &mode)
}) })
@ -93,7 +93,7 @@ var _ = Describe("[sig-storage] ConfigMap", func() {
Testname: configmap-simple-user-mapped Testname: configmap-simple-user-mapped
Description: Make sure config map works when it is mounted as non-root. Description: Make sure config map works when it is mounted as non-root.
*/ */
framework.ConformanceIt("should be consumable from pods in volume with mappings as non-root ", func() { framework.ConformanceIt("should be consumable from pods in volume with mappings as non-root [NodeConformance]", func() {
doConfigMapE2EWithMappings(f, 1000, 0, nil) doConfigMapE2EWithMappings(f, 1000, 0, nil)
}) })
@ -106,7 +106,7 @@ var _ = Describe("[sig-storage] ConfigMap", func() {
Description: Make sure update operation is working on config map and Description: Make sure update operation is working on config map and
the result is observed on volumes mounted in containers. the result is observed on volumes mounted in containers.
*/ */
framework.ConformanceIt("updates should be reflected in volume ", func() { framework.ConformanceIt("updates should be reflected in volume [NodeConformance]", func() {
podLogTimeout := framework.GetPodSecretUpdateTimeout(f.ClientSet) podLogTimeout := framework.GetPodSecretUpdateTimeout(f.ClientSet)
containerTimeoutArg := fmt.Sprintf("--retry_time=%v", int(podLogTimeout.Seconds())) containerTimeoutArg := fmt.Sprintf("--retry_time=%v", int(podLogTimeout.Seconds()))
@ -280,7 +280,7 @@ var _ = Describe("[sig-storage] ConfigMap", func() {
Description: Make sure Create, Update, Delete operations are all working Description: Make sure Create, Update, Delete operations are all working
on config map and the result is observed on volumes mounted in containers. on config map and the result is observed on volumes mounted in containers.
*/ */
framework.ConformanceIt("optional updates should be reflected in volume ", func() { framework.ConformanceIt("optional updates should be reflected in volume [NodeConformance]", func() {
podLogTimeout := framework.GetPodSecretUpdateTimeout(f.ClientSet) podLogTimeout := framework.GetPodSecretUpdateTimeout(f.ClientSet)
containerTimeoutArg := fmt.Sprintf("--retry_time=%v", int(podLogTimeout.Seconds())) containerTimeoutArg := fmt.Sprintf("--retry_time=%v", int(podLogTimeout.Seconds()))
trueVal := true trueVal := true
@ -463,7 +463,7 @@ var _ = Describe("[sig-storage] ConfigMap", func() {
Description: Make sure config map works when it mounted as two different Description: Make sure config map works when it mounted as two different
volumes on the same node. volumes on the same node.
*/ */
framework.ConformanceIt("should be consumable in multiple volumes in the same pod ", func() { framework.ConformanceIt("should be consumable in multiple volumes in the same pod [NodeConformance]", func() {
var ( var (
name = "configmap-test-volume-" + string(uuid.NewUUID()) name = "configmap-test-volume-" + string(uuid.NewUUID())
volumeName = "configmap-volume" volumeName = "configmap-volume"

View File

@ -54,7 +54,7 @@ var _ = framework.KubeDescribe("Probing container", func() {
Description: Make sure that pod with readiness probe should not be Description: Make sure that pod with readiness probe should not be
ready before initial delay and never restart. ready before initial delay and never restart.
*/ */
framework.ConformanceIt("with readiness probe should not be ready before initial delay and never restart ", func() { framework.ConformanceIt("with readiness probe should not be ready before initial delay and never restart [NodeConformance]", func() {
p := podClient.Create(makePodSpec(probe.withInitialDelay().build(), nil)) p := podClient.Create(makePodSpec(probe.withInitialDelay().build(), nil))
f.WaitForPodReady(p.Name) f.WaitForPodReady(p.Name)
@ -86,7 +86,7 @@ var _ = framework.KubeDescribe("Probing container", func() {
Description: Make sure that pod with readiness probe that fails should Description: Make sure that pod with readiness probe that fails should
never be ready and never restart. never be ready and never restart.
*/ */
framework.ConformanceIt("with readiness probe that fails should never be ready and never restart ", func() { framework.ConformanceIt("with readiness probe that fails should never be ready and never restart [NodeConformance]", func() {
p := podClient.Create(makePodSpec(probe.withFailing().build(), nil)) p := podClient.Create(makePodSpec(probe.withFailing().build(), nil))
Consistently(func() (bool, error) { Consistently(func() (bool, error) {
p, err := podClient.Get(p.Name, metav1.GetOptions{}) p, err := podClient.Get(p.Name, metav1.GetOptions{})
@ -111,7 +111,7 @@ var _ = framework.KubeDescribe("Probing container", func() {
Description: Make sure the pod is restarted with a cat /tmp/health Description: Make sure the pod is restarted with a cat /tmp/health
liveness probe. liveness probe.
*/ */
framework.ConformanceIt("should be restarted with a exec \"cat /tmp/health\" liveness probe", func() { framework.ConformanceIt("should be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance]", func() {
runLivenessTest(f, &v1.Pod{ runLivenessTest(f, &v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: "liveness-exec", Name: "liveness-exec",
@ -143,7 +143,7 @@ var _ = framework.KubeDescribe("Probing container", func() {
Description: Make sure the pod is not restarted with a cat /tmp/health Description: Make sure the pod is not restarted with a cat /tmp/health
liveness probe. liveness probe.
*/ */
framework.ConformanceIt("should *not* be restarted with a exec \"cat /tmp/health\" liveness probe", func() { framework.ConformanceIt("should *not* be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance]", func() {
runLivenessTest(f, &v1.Pod{ runLivenessTest(f, &v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: "liveness-exec", Name: "liveness-exec",
@ -175,7 +175,7 @@ var _ = framework.KubeDescribe("Probing container", func() {
Description: Make sure when http liveness probe fails, the pod should Description: Make sure when http liveness probe fails, the pod should
be restarted. be restarted.
*/ */
framework.ConformanceIt("should be restarted with a /healthz http liveness probe ", func() { framework.ConformanceIt("should be restarted with a /healthz http liveness probe [NodeConformance]", func() {
runLivenessTest(f, &v1.Pod{ runLivenessTest(f, &v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: "liveness-http", Name: "liveness-http",
@ -209,7 +209,7 @@ var _ = framework.KubeDescribe("Probing container", func() {
Description: Make sure when a pod gets restarted, its start count Description: Make sure when a pod gets restarted, its start count
should increase. should increase.
*/ */
framework.ConformanceIt("should have monotonically increasing restart count [Slow]", func() { framework.ConformanceIt("should have monotonically increasing restart count [Slow][NodeConformance]", func() {
runLivenessTest(f, &v1.Pod{ runLivenessTest(f, &v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: "liveness-http", Name: "liveness-http",
@ -242,7 +242,7 @@ var _ = framework.KubeDescribe("Probing container", func() {
Description: Make sure when http liveness probe succeeds, the pod Description: Make sure when http liveness probe succeeds, the pod
should not be restarted. should not be restarted.
*/ */
framework.ConformanceIt("should *not* be restarted with a /healthz http liveness probe ", func() { framework.ConformanceIt("should *not* be restarted with a /healthz http liveness probe [NodeConformance]", func() {
runLivenessTest(f, &v1.Pod{ runLivenessTest(f, &v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: "liveness-http", Name: "liveness-http",

View File

@ -33,7 +33,7 @@ var _ = framework.KubeDescribe("Docker Containers", func() {
provided for a Container, ensure that the docker image's default provided for a Container, ensure that the docker image's default
command and args are used. command and args are used.
*/ */
framework.ConformanceIt("should use the image defaults if command and args are blank ", func() { framework.ConformanceIt("should use the image defaults if command and args are blank [NodeConformance]", func() {
f.TestContainerOutput("use defaults", entrypointTestPod(), 0, []string{ f.TestContainerOutput("use defaults", entrypointTestPod(), 0, []string{
"[/ep default arguments]", "[/ep default arguments]",
}) })
@ -45,7 +45,7 @@ var _ = framework.KubeDescribe("Docker Containers", func() {
Container, ensure that they take precedent to the docker image's Container, ensure that they take precedent to the docker image's
default arguments, but that the default command is used. default arguments, but that the default command is used.
*/ */
framework.ConformanceIt("should be able to override the image's default arguments (docker cmd) ", func() { framework.ConformanceIt("should be able to override the image's default arguments (docker cmd) [NodeConformance]", func() {
pod := entrypointTestPod() pod := entrypointTestPod()
pod.Spec.Containers[0].Args = []string{"override", "arguments"} pod.Spec.Containers[0].Args = []string{"override", "arguments"}
@ -62,7 +62,7 @@ var _ = framework.KubeDescribe("Docker Containers", func() {
Container, ensure that it takes precedent to the docker image's default Container, ensure that it takes precedent to the docker image's default
command. command.
*/ */
framework.ConformanceIt("should be able to override the image's default command (docker entrypoint) ", func() { framework.ConformanceIt("should be able to override the image's default command (docker entrypoint) [NodeConformance]", func() {
pod := entrypointTestPod() pod := entrypointTestPod()
pod.Spec.Containers[0].Command = []string{"/ep-2"} pod.Spec.Containers[0].Command = []string{"/ep-2"}
@ -77,7 +77,7 @@ var _ = framework.KubeDescribe("Docker Containers", func() {
provided for a Container, ensure that they take precedent to the docker provided for a Container, ensure that they take precedent to the docker
image's default command and arguments. image's default command and arguments.
*/ */
framework.ConformanceIt("should be able to override the image's default command and arguments ", func() { framework.ConformanceIt("should be able to override the image's default command and arguments [NodeConformance]", func() {
pod := entrypointTestPod() pod := entrypointTestPod()
pod.Spec.Containers[0].Command = []string{"/ep-2"} pod.Spec.Containers[0].Command = []string{"/ep-2"}
pod.Spec.Containers[0].Args = []string{"override", "arguments"} pod.Spec.Containers[0].Args = []string{"override", "arguments"}

View File

@ -42,7 +42,7 @@ var _ = Describe("[sig-api-machinery] Downward API", func() {
Description: Ensure that downward API can provide pod's name, namespace Description: Ensure that downward API can provide pod's name, namespace
and IP address as environment variables. and IP address as environment variables.
*/ */
framework.ConformanceIt("should provide pod name, namespace and IP address as env vars ", func() { framework.ConformanceIt("should provide pod name, namespace and IP address as env vars [NodeConformance]", func() {
podName := "downward-api-" + string(uuid.NewUUID()) podName := "downward-api-" + string(uuid.NewUUID())
env := []v1.EnvVar{ env := []v1.EnvVar{
{ {
@ -88,7 +88,7 @@ var _ = Describe("[sig-api-machinery] Downward API", func() {
Description: Ensure that downward API can provide an IP address for Description: Ensure that downward API can provide an IP address for
host node as an environment variable. host node as an environment variable.
*/ */
framework.ConformanceIt("should provide host IP as an env var ", func() { framework.ConformanceIt("should provide host IP as an env var [NodeConformance]", func() {
framework.SkipUnlessServerVersionGTE(hostIPVersion, f.ClientSet.Discovery()) framework.SkipUnlessServerVersionGTE(hostIPVersion, f.ClientSet.Discovery())
podName := "downward-api-" + string(uuid.NewUUID()) podName := "downward-api-" + string(uuid.NewUUID())
env := []v1.EnvVar{ env := []v1.EnvVar{
@ -115,7 +115,7 @@ var _ = Describe("[sig-api-machinery] Downward API", func() {
Description: Ensure that downward API can provide CPU/memory limit Description: Ensure that downward API can provide CPU/memory limit
and CPU/memory request as environment variables. and CPU/memory request as environment variables.
*/ */
framework.ConformanceIt("should provide container's limits.cpu/memory and requests.cpu/memory as env vars ", func() { framework.ConformanceIt("should provide container's limits.cpu/memory and requests.cpu/memory as env vars [NodeConformance]", func() {
podName := "downward-api-" + string(uuid.NewUUID()) podName := "downward-api-" + string(uuid.NewUUID())
env := []v1.EnvVar{ env := []v1.EnvVar{
{ {
@ -167,7 +167,7 @@ var _ = Describe("[sig-api-machinery] Downward API", func() {
allocatable values for CPU and memory as environment variables if CPU allocatable values for CPU and memory as environment variables if CPU
and memory limits are not specified for a container. and memory limits are not specified for a container.
*/ */
framework.ConformanceIt("should provide default limits.cpu/memory from node allocatable ", func() { framework.ConformanceIt("should provide default limits.cpu/memory from node allocatable [NodeConformance]", func() {
podName := "downward-api-" + string(uuid.NewUUID()) podName := "downward-api-" + string(uuid.NewUUID())
env := []v1.EnvVar{ env := []v1.EnvVar{
{ {
@ -217,7 +217,7 @@ var _ = Describe("[sig-api-machinery] Downward API", func() {
Description: Ensure that downward API can provide pod UID as an Description: Ensure that downward API can provide pod UID as an
environment variable. environment variable.
*/ */
framework.ConformanceIt("should provide pod UID as env vars ", func() { framework.ConformanceIt("should provide pod UID as env vars [NodeConformance]", func() {
framework.SkipUnlessServerVersionGTE(podUIDVersion, f.ClientSet.Discovery()) framework.SkipUnlessServerVersionGTE(podUIDVersion, f.ClientSet.Discovery())
podName := "downward-api-" + string(uuid.NewUUID()) podName := "downward-api-" + string(uuid.NewUUID())
env := []v1.EnvVar{ env := []v1.EnvVar{

View File

@ -44,7 +44,7 @@ var _ = Describe("[sig-storage] Downward API volume", func() {
Description: Ensure that downward API can provide pod's name through Description: Ensure that downward API can provide pod's name through
DownwardAPIVolumeFiles. DownwardAPIVolumeFiles.
*/ */
framework.ConformanceIt("should provide podname only ", func() { framework.ConformanceIt("should provide podname only [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
pod := downwardAPIVolumePodForSimpleTest(podName, "/etc/podinfo/podname") pod := downwardAPIVolumePodForSimpleTest(podName, "/etc/podinfo/podname")
@ -58,7 +58,7 @@ var _ = Describe("[sig-storage] Downward API volume", func() {
Description: Ensure that downward API can set default file permission Description: Ensure that downward API can set default file permission
mode for DownwardAPIVolumeFiles if no mode is specified. mode for DownwardAPIVolumeFiles if no mode is specified.
*/ */
framework.ConformanceIt("should set DefaultMode on files ", func() { framework.ConformanceIt("should set DefaultMode on files [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
defaultMode := int32(0400) defaultMode := int32(0400)
pod := downwardAPIVolumePodForModeTest(podName, "/etc/podinfo/podname", nil, &defaultMode) pod := downwardAPIVolumePodForModeTest(podName, "/etc/podinfo/podname", nil, &defaultMode)
@ -73,7 +73,7 @@ var _ = Describe("[sig-storage] Downward API volume", func() {
Description: Ensure that downward API can set file permission mode for Description: Ensure that downward API can set file permission mode for
DownwardAPIVolumeFiles. DownwardAPIVolumeFiles.
*/ */
framework.ConformanceIt("should set mode on item file ", func() { framework.ConformanceIt("should set mode on item file [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
mode := int32(0400) mode := int32(0400)
pod := downwardAPIVolumePodForModeTest(podName, "/etc/podinfo/podname", &mode, nil) pod := downwardAPIVolumePodForModeTest(podName, "/etc/podinfo/podname", &mode, nil)
@ -117,7 +117,7 @@ var _ = Describe("[sig-storage] Downward API volume", func() {
Description: Ensure that downward API updates labels in Description: Ensure that downward API updates labels in
DownwardAPIVolumeFiles when pod's labels get modified. DownwardAPIVolumeFiles when pod's labels get modified.
*/ */
framework.ConformanceIt("should update labels on modification ", func() { framework.ConformanceIt("should update labels on modification [NodeConformance]", func() {
labels := map[string]string{} labels := map[string]string{}
labels["key1"] = "value1" labels["key1"] = "value1"
labels["key2"] = "value2" labels["key2"] = "value2"
@ -149,7 +149,7 @@ var _ = Describe("[sig-storage] Downward API volume", func() {
Description: Ensure that downward API updates annotations in Description: Ensure that downward API updates annotations in
DownwardAPIVolumeFiles when pod's annotations get modified. DownwardAPIVolumeFiles when pod's annotations get modified.
*/ */
framework.ConformanceIt("should update annotations on modification ", func() { framework.ConformanceIt("should update annotations on modification [NodeConformance]", func() {
annotations := map[string]string{} annotations := map[string]string{}
annotations["builder"] = "bar" annotations["builder"] = "bar"
podName := "annotationupdate" + string(uuid.NewUUID()) podName := "annotationupdate" + string(uuid.NewUUID())
@ -183,7 +183,7 @@ var _ = Describe("[sig-storage] Downward API volume", func() {
Description: Ensure that downward API can provide container's CPU limit Description: Ensure that downward API can provide container's CPU limit
through DownwardAPIVolumeFiles. through DownwardAPIVolumeFiles.
*/ */
framework.ConformanceIt("should provide container's cpu limit ", func() { framework.ConformanceIt("should provide container's cpu limit [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/cpu_limit") pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/cpu_limit")
@ -197,7 +197,7 @@ var _ = Describe("[sig-storage] Downward API volume", func() {
Description: Ensure that downward API can provide container's memory Description: Ensure that downward API can provide container's memory
limit through DownwardAPIVolumeFiles. limit through DownwardAPIVolumeFiles.
*/ */
framework.ConformanceIt("should provide container's memory limit ", func() { framework.ConformanceIt("should provide container's memory limit [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/memory_limit") pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/memory_limit")
@ -211,7 +211,7 @@ var _ = Describe("[sig-storage] Downward API volume", func() {
Description: Ensure that downward API can provide container's CPU Description: Ensure that downward API can provide container's CPU
request through DownwardAPIVolumeFiles. request through DownwardAPIVolumeFiles.
*/ */
framework.ConformanceIt("should provide container's cpu request ", func() { framework.ConformanceIt("should provide container's cpu request [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/cpu_request") pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/cpu_request")
@ -225,7 +225,7 @@ var _ = Describe("[sig-storage] Downward API volume", func() {
Description: Ensure that downward API can provide container's memory Description: Ensure that downward API can provide container's memory
request through DownwardAPIVolumeFiles. request through DownwardAPIVolumeFiles.
*/ */
framework.ConformanceIt("should provide container's memory request ", func() { framework.ConformanceIt("should provide container's memory request [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/memory_request") pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/memory_request")
@ -240,7 +240,7 @@ var _ = Describe("[sig-storage] Downward API volume", func() {
allocatable value for CPU through DownwardAPIVolumeFiles if CPU allocatable value for CPU through DownwardAPIVolumeFiles if CPU
limit is not specified for a container. limit is not specified for a container.
*/ */
framework.ConformanceIt("should provide node allocatable (cpu) as default cpu limit if the limit is not set ", func() { framework.ConformanceIt("should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
pod := downwardAPIVolumeForDefaultContainerResources(podName, "/etc/podinfo/cpu_limit") pod := downwardAPIVolumeForDefaultContainerResources(podName, "/etc/podinfo/cpu_limit")
@ -253,7 +253,7 @@ var _ = Describe("[sig-storage] Downward API volume", func() {
allocatable value for memory through DownwardAPIVolumeFiles if memory allocatable value for memory through DownwardAPIVolumeFiles if memory
limit is not specified for a container. limit is not specified for a container.
*/ */
framework.ConformanceIt("should provide node allocatable (memory) as default memory limit if the limit is not set ", func() { framework.ConformanceIt("should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
pod := downwardAPIVolumeForDefaultContainerResources(podName, "/etc/podinfo/memory_limit") pod := downwardAPIVolumeForDefaultContainerResources(podName, "/etc/podinfo/memory_limit")

View File

@ -72,7 +72,7 @@ var _ = Describe("[sig-storage] EmptyDir volumes", func() {
of 'Memory', ensure the volume has 0777 unix file permissions and tmpfs of 'Memory', ensure the volume has 0777 unix file permissions and tmpfs
mount type. mount type.
*/ */
framework.ConformanceIt("volume on tmpfs should have the correct mode", func() { framework.ConformanceIt("volume on tmpfs should have the correct mode [NodeConformance]", func() {
doTestVolumeMode(f, testImageRootUid, v1.StorageMediumMemory) doTestVolumeMode(f, testImageRootUid, v1.StorageMediumMemory)
}) })
@ -82,7 +82,7 @@ var _ = Describe("[sig-storage] EmptyDir volumes", func() {
of 'Memory', ensure a root owned file with 0644 unix file permissions of 'Memory', ensure a root owned file with 0644 unix file permissions
is created correctly, has tmpfs mount type, and enforces the permissions. is created correctly, has tmpfs mount type, and enforces the permissions.
*/ */
framework.ConformanceIt("should support (root,0644,tmpfs)", func() { framework.ConformanceIt("should support (root,0644,tmpfs) [NodeConformance]", func() {
doTest0644(f, testImageRootUid, v1.StorageMediumMemory) doTest0644(f, testImageRootUid, v1.StorageMediumMemory)
}) })
@ -92,7 +92,7 @@ var _ = Describe("[sig-storage] EmptyDir volumes", func() {
of 'Memory', ensure a root owned file with 0666 unix file permissions of 'Memory', ensure a root owned file with 0666 unix file permissions
is created correctly, has tmpfs mount type, and enforces the permissions. is created correctly, has tmpfs mount type, and enforces the permissions.
*/ */
framework.ConformanceIt("should support (root,0666,tmpfs)", func() { framework.ConformanceIt("should support (root,0666,tmpfs) [NodeConformance]", func() {
doTest0666(f, testImageRootUid, v1.StorageMediumMemory) doTest0666(f, testImageRootUid, v1.StorageMediumMemory)
}) })
@ -102,7 +102,7 @@ var _ = Describe("[sig-storage] EmptyDir volumes", func() {
of 'Memory', ensure a root owned file with 0777 unix file permissions of 'Memory', ensure a root owned file with 0777 unix file permissions
is created correctly, has tmpfs mount type, and enforces the permissions. is created correctly, has tmpfs mount type, and enforces the permissions.
*/ */
framework.ConformanceIt("should support (root,0777,tmpfs)", func() { framework.ConformanceIt("should support (root,0777,tmpfs) [NodeConformance]", func() {
doTest0777(f, testImageRootUid, v1.StorageMediumMemory) doTest0777(f, testImageRootUid, v1.StorageMediumMemory)
}) })
@ -112,7 +112,7 @@ var _ = Describe("[sig-storage] EmptyDir volumes", func() {
of 'Memory', ensure a user owned file with 0644 unix file permissions of 'Memory', ensure a user owned file with 0644 unix file permissions
is created correctly, has tmpfs mount type, and enforces the permissions. is created correctly, has tmpfs mount type, and enforces the permissions.
*/ */
framework.ConformanceIt("should support (non-root,0644,tmpfs)", func() { framework.ConformanceIt("should support (non-root,0644,tmpfs) [NodeConformance]", func() {
doTest0644(f, testImageNonRootUid, v1.StorageMediumMemory) doTest0644(f, testImageNonRootUid, v1.StorageMediumMemory)
}) })
@ -122,7 +122,7 @@ var _ = Describe("[sig-storage] EmptyDir volumes", func() {
of 'Memory', ensure a user owned file with 0666 unix file permissions of 'Memory', ensure a user owned file with 0666 unix file permissions
is created correctly, has tmpfs mount type, and enforces the permissions. is created correctly, has tmpfs mount type, and enforces the permissions.
*/ */
framework.ConformanceIt("should support (non-root,0666,tmpfs)", func() { framework.ConformanceIt("should support (non-root,0666,tmpfs) [NodeConformance]", func() {
doTest0666(f, testImageNonRootUid, v1.StorageMediumMemory) doTest0666(f, testImageNonRootUid, v1.StorageMediumMemory)
}) })
@ -132,7 +132,7 @@ var _ = Describe("[sig-storage] EmptyDir volumes", func() {
of 'Memory', ensure a user owned file with 0777 unix file permissions of 'Memory', ensure a user owned file with 0777 unix file permissions
is created correctly, has tmpfs mount type, and enforces the permissions. is created correctly, has tmpfs mount type, and enforces the permissions.
*/ */
framework.ConformanceIt("should support (non-root,0777,tmpfs)", func() { framework.ConformanceIt("should support (non-root,0777,tmpfs) [NodeConformance]", func() {
doTest0777(f, testImageNonRootUid, v1.StorageMediumMemory) doTest0777(f, testImageNonRootUid, v1.StorageMediumMemory)
}) })
@ -141,7 +141,7 @@ var _ = Describe("[sig-storage] EmptyDir volumes", func() {
Description: For a Pod created with an 'emptyDir' Volume, ensure the Description: For a Pod created with an 'emptyDir' Volume, ensure the
volume has 0777 unix file permissions. volume has 0777 unix file permissions.
*/ */
framework.ConformanceIt("volume on default medium should have the correct mode", func() { framework.ConformanceIt("volume on default medium should have the correct mode [NodeConformance]", func() {
doTestVolumeMode(f, testImageRootUid, v1.StorageMediumDefault) doTestVolumeMode(f, testImageRootUid, v1.StorageMediumDefault)
}) })
@ -151,7 +151,7 @@ var _ = Describe("[sig-storage] EmptyDir volumes", func() {
root owned file with 0644 unix file permissions is created and enforced root owned file with 0644 unix file permissions is created and enforced
correctly. correctly.
*/ */
framework.ConformanceIt("should support (root,0644,default)", func() { framework.ConformanceIt("should support (root,0644,default) [NodeConformance]", func() {
doTest0644(f, testImageRootUid, v1.StorageMediumDefault) doTest0644(f, testImageRootUid, v1.StorageMediumDefault)
}) })
@ -161,7 +161,7 @@ var _ = Describe("[sig-storage] EmptyDir volumes", func() {
root owned file with 0666 unix file permissions is created and enforced root owned file with 0666 unix file permissions is created and enforced
correctly. correctly.
*/ */
framework.ConformanceIt("should support (root,0666,default)", func() { framework.ConformanceIt("should support (root,0666,default) [NodeConformance]", func() {
doTest0666(f, testImageRootUid, v1.StorageMediumDefault) doTest0666(f, testImageRootUid, v1.StorageMediumDefault)
}) })
@ -171,7 +171,7 @@ var _ = Describe("[sig-storage] EmptyDir volumes", func() {
root owned file with 0777 unix file permissions is created and enforced root owned file with 0777 unix file permissions is created and enforced
correctly. correctly.
*/ */
framework.ConformanceIt("should support (root,0777,default)", func() { framework.ConformanceIt("should support (root,0777,default) [NodeConformance]", func() {
doTest0777(f, testImageRootUid, v1.StorageMediumDefault) doTest0777(f, testImageRootUid, v1.StorageMediumDefault)
}) })
@ -181,7 +181,7 @@ var _ = Describe("[sig-storage] EmptyDir volumes", func() {
user owned file with 0644 unix file permissions is created and enforced user owned file with 0644 unix file permissions is created and enforced
correctly. correctly.
*/ */
framework.ConformanceIt("should support (non-root,0644,default)", func() { framework.ConformanceIt("should support (non-root,0644,default) [NodeConformance]", func() {
doTest0644(f, testImageNonRootUid, v1.StorageMediumDefault) doTest0644(f, testImageNonRootUid, v1.StorageMediumDefault)
}) })
@ -191,7 +191,7 @@ var _ = Describe("[sig-storage] EmptyDir volumes", func() {
user owned file with 0666 unix file permissions is created and enforced user owned file with 0666 unix file permissions is created and enforced
correctly. correctly.
*/ */
framework.ConformanceIt("should support (non-root,0666,default)", func() { framework.ConformanceIt("should support (non-root,0666,default) [NodeConformance]", func() {
doTest0666(f, testImageNonRootUid, v1.StorageMediumDefault) doTest0666(f, testImageNonRootUid, v1.StorageMediumDefault)
}) })
@ -201,7 +201,7 @@ var _ = Describe("[sig-storage] EmptyDir volumes", func() {
user owned file with 0777 unix file permissions is created and enforced user owned file with 0777 unix file permissions is created and enforced
correctly. correctly.
*/ */
framework.ConformanceIt("should support (non-root,0777,default)", func() { framework.ConformanceIt("should support (non-root,0777,default) [NodeConformance]", func() {
doTest0777(f, testImageNonRootUid, v1.StorageMediumDefault) doTest0777(f, testImageNonRootUid, v1.StorageMediumDefault)
}) })
}) })

View File

@ -34,7 +34,7 @@ var _ = framework.KubeDescribe("Variable Expansion", func() {
Description: Make sure environment variables can be set using an Description: Make sure environment variables can be set using an
expansion of previously defined environment variables expansion of previously defined environment variables
*/ */
framework.ConformanceIt("should allow composing env vars into new env vars ", func() { framework.ConformanceIt("should allow composing env vars into new env vars [NodeConformance]", func() {
podName := "var-expansion-" + string(uuid.NewUUID()) podName := "var-expansion-" + string(uuid.NewUUID())
pod := &v1.Pod{ pod := &v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
@ -79,7 +79,7 @@ var _ = framework.KubeDescribe("Variable Expansion", func() {
Description: Make sure a container's commands can be set using an Description: Make sure a container's commands can be set using an
expansion of environment variables. expansion of environment variables.
*/ */
framework.ConformanceIt("should allow substituting values in a container's command ", func() { framework.ConformanceIt("should allow substituting values in a container's command [NodeConformance]", func() {
podName := "var-expansion-" + string(uuid.NewUUID()) podName := "var-expansion-" + string(uuid.NewUUID())
pod := &v1.Pod{ pod := &v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
@ -114,7 +114,7 @@ var _ = framework.KubeDescribe("Variable Expansion", func() {
Description: Make sure a container's args can be set using an Description: Make sure a container's args can be set using an
expansion of environment variables. expansion of environment variables.
*/ */
framework.ConformanceIt("should allow substituting values in a container's args ", func() { framework.ConformanceIt("should allow substituting values in a container's args [NodeConformance]", func() {
podName := "var-expansion-" + string(uuid.NewUUID()) podName := "var-expansion-" + string(uuid.NewUUID())
pod := &v1.Pod{ pod := &v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{

View File

@ -45,7 +45,7 @@ var _ = Describe("[sig-storage] HostPath", func() {
volume is a directory with 0777 unix file permissions and that is has volume is a directory with 0777 unix file permissions and that is has
the sticky bit (mode flag t) set. the sticky bit (mode flag t) set.
*/ */
framework.ConformanceIt("should give a volume the correct mode", func() { framework.ConformanceIt("should give a volume the correct mode [NodeConformance]", func() {
source := &v1.HostPathVolumeSource{ source := &v1.HostPathVolumeSource{
Path: "/tmp", Path: "/tmp",
} }

View File

@ -55,7 +55,7 @@ var _ = framework.KubeDescribe("KubeletManagedEtcHosts", func() {
Description: Make sure Kubelet correctly manages /etc/hosts and mounts Description: Make sure Kubelet correctly manages /etc/hosts and mounts
it into the container. it into the container.
*/ */
framework.ConformanceIt("should test kubelet managed /etc/hosts file ", func() { framework.ConformanceIt("should test kubelet managed /etc/hosts file [NodeConformance]", func() {
By("Setting up the test") By("Setting up the test")
config.setup() config.setup()

View File

@ -35,7 +35,7 @@ var _ = Describe("[sig-network] Networking", func() {
Description: Try to hit test endpoints from a test container and make Description: Try to hit test endpoints from a test container and make
sure each of them can report a unique hostname. sure each of them can report a unique hostname.
*/ */
framework.ConformanceIt("should function for intra-pod communication: http ", func() { framework.ConformanceIt("should function for intra-pod communication: http [NodeConformance]", func() {
config := framework.NewCoreNetworkingTestConfig(f) config := framework.NewCoreNetworkingTestConfig(f)
for _, endpointPod := range config.EndpointPods { for _, endpointPod := range config.EndpointPods {
config.DialFromTestContainer("http", endpointPod.Status.PodIP, framework.EndpointHttpPort, config.MaxTries, 0, sets.NewString(endpointPod.Name)) config.DialFromTestContainer("http", endpointPod.Status.PodIP, framework.EndpointHttpPort, config.MaxTries, 0, sets.NewString(endpointPod.Name))
@ -47,7 +47,7 @@ var _ = Describe("[sig-network] Networking", func() {
Description: Try to hit test endpoints from a test container using udp Description: Try to hit test endpoints from a test container using udp
and make sure each of them can report a unique hostname. and make sure each of them can report a unique hostname.
*/ */
framework.ConformanceIt("should function for intra-pod communication: udp ", func() { framework.ConformanceIt("should function for intra-pod communication: udp [NodeConformance]", func() {
config := framework.NewCoreNetworkingTestConfig(f) config := framework.NewCoreNetworkingTestConfig(f)
for _, endpointPod := range config.EndpointPods { for _, endpointPod := range config.EndpointPods {
config.DialFromTestContainer("udp", endpointPod.Status.PodIP, framework.EndpointUdpPort, config.MaxTries, 0, sets.NewString(endpointPod.Name)) config.DialFromTestContainer("udp", endpointPod.Status.PodIP, framework.EndpointUdpPort, config.MaxTries, 0, sets.NewString(endpointPod.Name))
@ -59,7 +59,7 @@ var _ = Describe("[sig-network] Networking", func() {
Description: Try to hit test endpoints from the pod and make sure each Description: Try to hit test endpoints from the pod and make sure each
of them can report a unique hostname. of them can report a unique hostname.
*/ */
framework.ConformanceIt("should function for node-pod communication: http ", func() { framework.ConformanceIt("should function for node-pod communication: http [NodeConformance]", func() {
config := framework.NewCoreNetworkingTestConfig(f) config := framework.NewCoreNetworkingTestConfig(f)
for _, endpointPod := range config.EndpointPods { for _, endpointPod := range config.EndpointPods {
config.DialFromNode("http", endpointPod.Status.PodIP, framework.EndpointHttpPort, config.MaxTries, 0, sets.NewString(endpointPod.Name)) config.DialFromNode("http", endpointPod.Status.PodIP, framework.EndpointHttpPort, config.MaxTries, 0, sets.NewString(endpointPod.Name))
@ -71,7 +71,7 @@ var _ = Describe("[sig-network] Networking", func() {
Description: Try to hit test endpoints from the pod using udp and make sure Description: Try to hit test endpoints from the pod using udp and make sure
each of them can report a unique hostname. each of them can report a unique hostname.
*/ */
framework.ConformanceIt("should function for node-pod communication: udp ", func() { framework.ConformanceIt("should function for node-pod communication: udp [NodeConformance]", func() {
config := framework.NewCoreNetworkingTestConfig(f) config := framework.NewCoreNetworkingTestConfig(f)
for _, endpointPod := range config.EndpointPods { for _, endpointPod := range config.EndpointPods {
config.DialFromNode("udp", endpointPod.Status.PodIP, framework.EndpointUdpPort, config.MaxTries, 0, sets.NewString(endpointPod.Name)) config.DialFromNode("udp", endpointPod.Status.PodIP, framework.EndpointUdpPort, config.MaxTries, 0, sets.NewString(endpointPod.Name))

View File

@ -133,7 +133,7 @@ var _ = framework.KubeDescribe("Pods", func() {
Description: Make sure when a pod is created that it is assigned a host IP Description: Make sure when a pod is created that it is assigned a host IP
Address. Address.
*/ */
framework.ConformanceIt("should get a host IP ", func() { framework.ConformanceIt("should get a host IP [NodeConformance]", func() {
name := "pod-hostip-" + string(uuid.NewUUID()) name := "pod-hostip-" + string(uuid.NewUUID())
testHostIP(podClient, &v1.Pod{ testHostIP(podClient, &v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
@ -155,7 +155,7 @@ var _ = framework.KubeDescribe("Pods", func() {
Description: Makes sure a pod is created, a watch can be setup for the pod, Description: Makes sure a pod is created, a watch can be setup for the pod,
pod creation was observed, pod is deleted, and pod deletion is observed. pod creation was observed, pod is deleted, and pod deletion is observed.
*/ */
framework.ConformanceIt("should be submitted and removed ", func() { framework.ConformanceIt("should be submitted and removed [NodeConformance]", func() {
By("creating the pod") By("creating the pod")
name := "pod-submit-remove-" + string(uuid.NewUUID()) name := "pod-submit-remove-" + string(uuid.NewUUID())
value := strconv.Itoa(time.Now().Nanosecond()) value := strconv.Itoa(time.Now().Nanosecond())
@ -280,7 +280,7 @@ var _ = framework.KubeDescribe("Pods", func() {
Testname: pods-updated-successfully Testname: pods-updated-successfully
Description: Make sure it is possible to successfully update a pod's labels. Description: Make sure it is possible to successfully update a pod's labels.
*/ */
framework.ConformanceIt("should be updated ", func() { framework.ConformanceIt("should be updated [NodeConformance]", func() {
By("creating the pod") By("creating the pod")
name := "pod-update-" + string(uuid.NewUUID()) name := "pod-update-" + string(uuid.NewUUID())
value := strconv.Itoa(time.Now().Nanosecond()) value := strconv.Itoa(time.Now().Nanosecond())
@ -335,7 +335,7 @@ var _ = framework.KubeDescribe("Pods", func() {
activeDeadlineSecondsValue, and then waits for the deadline to pass activeDeadlineSecondsValue, and then waits for the deadline to pass
and verifies the pod is terminated. and verifies the pod is terminated.
*/ */
framework.ConformanceIt("should allow activeDeadlineSeconds to be updated ", func() { framework.ConformanceIt("should allow activeDeadlineSeconds to be updated [NodeConformance]", func() {
By("creating the pod") By("creating the pod")
name := "pod-update-activedeadlineseconds-" + string(uuid.NewUUID()) name := "pod-update-activedeadlineseconds-" + string(uuid.NewUUID())
value := strconv.Itoa(time.Now().Nanosecond()) value := strconv.Itoa(time.Now().Nanosecond())
@ -381,7 +381,7 @@ var _ = framework.KubeDescribe("Pods", func() {
Description: Make sure that when a pod is created it contains environment Description: Make sure that when a pod is created it contains environment
variables for each active service. variables for each active service.
*/ */
framework.ConformanceIt("should contain environment variables for services ", func() { framework.ConformanceIt("should contain environment variables for services [NodeConformance]", func() {
// Make a pod that will be a service. // Make a pod that will be a service.
// This pod serves its hostname via HTTP. // This pod serves its hostname via HTTP.
serverName := "server-envvars-" + string(uuid.NewUUID()) serverName := "server-envvars-" + string(uuid.NewUUID())

View File

@ -39,7 +39,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Testname: projected-secret-no-defaultMode Testname: projected-secret-no-defaultMode
Description: Simple projected Secret test with no defaultMode set. Description: Simple projected Secret test with no defaultMode set.
*/ */
framework.ConformanceIt("should be consumable from pods in volume", func() { framework.ConformanceIt("should be consumable from pods in volume [NodeConformance]", func() {
doProjectedSecretE2EWithoutMapping(f, nil /* default mode */, "projected-secret-test-"+string(uuid.NewUUID()), nil, nil) doProjectedSecretE2EWithoutMapping(f, nil /* default mode */, "projected-secret-test-"+string(uuid.NewUUID()), nil, nil)
}) })
@ -47,7 +47,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Testname: projected-secret-with-defaultMode Testname: projected-secret-with-defaultMode
Description: Simple projected Secret test with defaultMode set. Description: Simple projected Secret test with defaultMode set.
*/ */
framework.ConformanceIt("should be consumable from pods in volume with defaultMode set", func() { framework.ConformanceIt("should be consumable from pods in volume with defaultMode set [NodeConformance]", func() {
defaultMode := int32(0400) defaultMode := int32(0400)
doProjectedSecretE2EWithoutMapping(f, &defaultMode, "projected-secret-test-"+string(uuid.NewUUID()), nil, nil) doProjectedSecretE2EWithoutMapping(f, &defaultMode, "projected-secret-test-"+string(uuid.NewUUID()), nil, nil)
}) })
@ -57,7 +57,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Simple projected Secret test as non-root with Description: Simple projected Secret test as non-root with
defaultMode and fsGroup set. defaultMode and fsGroup set.
*/ */
framework.ConformanceIt("should be consumable from pods in volume as non-root with defaultMode and fsGroup set", func() { framework.ConformanceIt("should be consumable from pods in volume as non-root with defaultMode and fsGroup set [NodeConformance]", func() {
defaultMode := int32(0440) /* setting fsGroup sets mode to at least 440 */ defaultMode := int32(0440) /* setting fsGroup sets mode to at least 440 */
fsGroup := int64(1001) fsGroup := int64(1001)
uid := int64(1000) uid := int64(1000)
@ -70,7 +70,7 @@ var _ = Describe("[sig-storage] Projected", func() {
mounting it to a volume with a custom path (mapping) on the pod with mounting it to a volume with a custom path (mapping) on the pod with
no other settings and make sure the pod actually consumes it. no other settings and make sure the pod actually consumes it.
*/ */
framework.ConformanceIt("should be consumable from pods in volume with mappings", func() { framework.ConformanceIt("should be consumable from pods in volume with mappings [NodeConformance]", func() {
doProjectedSecretE2EWithMapping(f, nil) doProjectedSecretE2EWithMapping(f, nil)
}) })
@ -79,7 +79,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Repeat the projected-secret-simple-mapped but this time Description: Repeat the projected-secret-simple-mapped but this time
with an item mode (e.g. 0400) for the secret map item. with an item mode (e.g. 0400) for the secret map item.
*/ */
framework.ConformanceIt("should be consumable from pods in volume with mappings and Item Mode set", func() { framework.ConformanceIt("should be consumable from pods in volume with mappings and Item Mode set [NodeConformance]", func() {
mode := int32(0400) mode := int32(0400)
doProjectedSecretE2EWithMapping(f, &mode) doProjectedSecretE2EWithMapping(f, &mode)
}) })
@ -110,7 +110,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Make sure secrets works when mounted as two different Description: Make sure secrets works when mounted as two different
volumes on the same node. volumes on the same node.
*/ */
framework.ConformanceIt("should be consumable in multiple volumes in a pod", func() { framework.ConformanceIt("should be consumable in multiple volumes in a pod [NodeConformance]", func() {
// This test ensures that the same secret can be mounted in multiple // This test ensures that the same secret can be mounted in multiple
// volumes in the same pod. This test case exists to prevent // volumes in the same pod. This test case exists to prevent
// regressions that break this use-case. // regressions that break this use-case.
@ -203,7 +203,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Testname: projected-secret-simple-optional Testname: projected-secret-simple-optional
Description: Make sure secrets works when optional updates included. Description: Make sure secrets works when optional updates included.
*/ */
framework.ConformanceIt("optional updates should be reflected in volume", func() { framework.ConformanceIt("optional updates should be reflected in volume [NodeConformance]", func() {
podLogTimeout := framework.GetPodSecretUpdateTimeout(f.ClientSet) podLogTimeout := framework.GetPodSecretUpdateTimeout(f.ClientSet)
containerTimeoutArg := fmt.Sprintf("--retry_time=%v", int(podLogTimeout.Seconds())) containerTimeoutArg := fmt.Sprintf("--retry_time=%v", int(podLogTimeout.Seconds()))
trueVal := true trueVal := true
@ -405,7 +405,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Make sure that a projected volume with a configMap with Description: Make sure that a projected volume with a configMap with
no mappings succeeds properly. no mappings succeeds properly.
*/ */
framework.ConformanceIt("should be consumable from pods in volume", func() { framework.ConformanceIt("should be consumable from pods in volume [NodeConformance]", func() {
doProjectedConfigMapE2EWithoutMappings(f, 0, 0, nil) doProjectedConfigMapE2EWithoutMappings(f, 0, 0, nil)
}) })
@ -414,7 +414,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Make sure that a projected volume configMap is consumable Description: Make sure that a projected volume configMap is consumable
with defaultMode set. with defaultMode set.
*/ */
framework.ConformanceIt("should be consumable from pods in volume with defaultMode set", func() { framework.ConformanceIt("should be consumable from pods in volume with defaultMode set [NodeConformance]", func() {
defaultMode := int32(0400) defaultMode := int32(0400)
doProjectedConfigMapE2EWithoutMappings(f, 0, 0, &defaultMode) doProjectedConfigMapE2EWithoutMappings(f, 0, 0, &defaultMode)
}) })
@ -429,7 +429,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Make sure that a projected volume configMap is consumable Description: Make sure that a projected volume configMap is consumable
by a non-root userID. by a non-root userID.
*/ */
framework.ConformanceIt("should be consumable from pods in volume as non-root", func() { framework.ConformanceIt("should be consumable from pods in volume as non-root [NodeConformance]", func() {
doProjectedConfigMapE2EWithoutMappings(f, 1000, 0, nil) doProjectedConfigMapE2EWithoutMappings(f, 1000, 0, nil)
}) })
@ -443,7 +443,7 @@ var _ = Describe("[sig-storage] Projected", func() {
map and mounting it to a volume with a custom path (mapping) on the map and mounting it to a volume with a custom path (mapping) on the
pod with no other settings and make sure the pod actually consumes it. pod with no other settings and make sure the pod actually consumes it.
*/ */
framework.ConformanceIt("should be consumable from pods in volume with mappings", func() { framework.ConformanceIt("should be consumable from pods in volume with mappings [NodeConformance]", func() {
doProjectedConfigMapE2EWithMappings(f, 0, 0, nil) doProjectedConfigMapE2EWithMappings(f, 0, 0, nil)
}) })
@ -452,7 +452,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Repeat the projected-secret-simple-mapped but this time Description: Repeat the projected-secret-simple-mapped but this time
with an item mode (e.g. 0400) for the secret map item with an item mode (e.g. 0400) for the secret map item
*/ */
framework.ConformanceIt("should be consumable from pods in volume with mappings and Item mode set", func() { framework.ConformanceIt("should be consumable from pods in volume with mappings and Item mode set [NodeConformance]", func() {
mode := int32(0400) mode := int32(0400)
doProjectedConfigMapE2EWithMappings(f, 0, 0, &mode) doProjectedConfigMapE2EWithMappings(f, 0, 0, &mode)
}) })
@ -462,7 +462,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Repeat the projected-config-map-simple-mapped but this Description: Repeat the projected-config-map-simple-mapped but this
time with a user other than root. time with a user other than root.
*/ */
framework.ConformanceIt("should be consumable from pods in volume with mappings as non-root", func() { framework.ConformanceIt("should be consumable from pods in volume with mappings as non-root [NodeConformance]", func() {
doProjectedConfigMapE2EWithMappings(f, 1000, 0, nil) doProjectedConfigMapE2EWithMappings(f, 1000, 0, nil)
}) })
@ -476,7 +476,7 @@ var _ = Describe("[sig-storage] Projected", func() {
that the values in these configMaps can be updated, deleted, that the values in these configMaps can be updated, deleted,
and created. and created.
*/ */
framework.ConformanceIt("updates should be reflected in volume", func() { framework.ConformanceIt("updates should be reflected in volume [NodeConformance]", func() {
podLogTimeout := framework.GetPodSecretUpdateTimeout(f.ClientSet) podLogTimeout := framework.GetPodSecretUpdateTimeout(f.ClientSet)
containerTimeoutArg := fmt.Sprintf("--retry_time=%v", int(podLogTimeout.Seconds())) containerTimeoutArg := fmt.Sprintf("--retry_time=%v", int(podLogTimeout.Seconds()))
@ -565,7 +565,7 @@ var _ = Describe("[sig-storage] Projected", func() {
configMaps, that the values in these configMaps can be updated, configMaps, that the values in these configMaps can be updated,
deleted, and created. deleted, and created.
*/ */
framework.ConformanceIt("optional updates should be reflected in volume", func() { framework.ConformanceIt("optional updates should be reflected in volume [NodeConformance]", func() {
podLogTimeout := framework.GetPodSecretUpdateTimeout(f.ClientSet) podLogTimeout := framework.GetPodSecretUpdateTimeout(f.ClientSet)
containerTimeoutArg := fmt.Sprintf("--retry_time=%v", int(podLogTimeout.Seconds())) containerTimeoutArg := fmt.Sprintf("--retry_time=%v", int(podLogTimeout.Seconds()))
trueVal := true trueVal := true
@ -766,7 +766,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Make sure config map works when it mounted as two Description: Make sure config map works when it mounted as two
different volumes on the same node. different volumes on the same node.
*/ */
framework.ConformanceIt("should be consumable in multiple volumes in the same pod", func() { framework.ConformanceIt("should be consumable in multiple volumes in the same pod [NodeConformance]", func() {
var ( var (
name = "projected-configmap-test-volume-" + string(uuid.NewUUID()) name = "projected-configmap-test-volume-" + string(uuid.NewUUID())
volumeName = "projected-configmap-volume" volumeName = "projected-configmap-volume"
@ -864,7 +864,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Ensure that downward API can provide pod's name through Description: Ensure that downward API can provide pod's name through
DownwardAPIVolumeFiles in a projected volume. DownwardAPIVolumeFiles in a projected volume.
*/ */
framework.ConformanceIt("should provide podname only", func() { framework.ConformanceIt("should provide podname only [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
pod := downwardAPIVolumePodForSimpleTest(podName, "/etc/podinfo/podname") pod := downwardAPIVolumePodForSimpleTest(podName, "/etc/podinfo/podname")
@ -879,7 +879,7 @@ var _ = Describe("[sig-storage] Projected", func() {
mode for DownwardAPIVolumeFiles if no mode is specified in a projected mode for DownwardAPIVolumeFiles if no mode is specified in a projected
volume. volume.
*/ */
framework.ConformanceIt("should set DefaultMode on files", func() { framework.ConformanceIt("should set DefaultMode on files [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
defaultMode := int32(0400) defaultMode := int32(0400)
pod := projectedDownwardAPIVolumePodForModeTest(podName, "/etc/podinfo/podname", nil, &defaultMode) pod := projectedDownwardAPIVolumePodForModeTest(podName, "/etc/podinfo/podname", nil, &defaultMode)
@ -894,7 +894,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Ensure that downward API can set file permission mode for Description: Ensure that downward API can set file permission mode for
DownwardAPIVolumeFiles in a projected volume. DownwardAPIVolumeFiles in a projected volume.
*/ */
framework.ConformanceIt("should set mode on item file", func() { framework.ConformanceIt("should set mode on item file [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
mode := int32(0400) mode := int32(0400)
pod := projectedDownwardAPIVolumePodForModeTest(podName, "/etc/podinfo/podname", &mode, nil) pod := projectedDownwardAPIVolumePodForModeTest(podName, "/etc/podinfo/podname", &mode, nil)
@ -939,7 +939,7 @@ var _ = Describe("[sig-storage] Projected", func() {
DownwardAPIVolumeFiles when pod's labels get modified in a projected DownwardAPIVolumeFiles when pod's labels get modified in a projected
volume. volume.
*/ */
framework.ConformanceIt("should update labels on modification", func() { framework.ConformanceIt("should update labels on modification [NodeConformance]", func() {
labels := map[string]string{} labels := map[string]string{}
labels["key1"] = "value1" labels["key1"] = "value1"
labels["key2"] = "value2" labels["key2"] = "value2"
@ -972,7 +972,7 @@ var _ = Describe("[sig-storage] Projected", func() {
DownwardAPIVolumeFiles when pod's annotations get modified in a DownwardAPIVolumeFiles when pod's annotations get modified in a
projected volume. projected volume.
*/ */
framework.ConformanceIt("should update annotations on modification", func() { framework.ConformanceIt("should update annotations on modification [NodeConformance]", func() {
annotations := map[string]string{} annotations := map[string]string{}
annotations["builder"] = "bar" annotations["builder"] = "bar"
podName := "annotationupdate" + string(uuid.NewUUID()) podName := "annotationupdate" + string(uuid.NewUUID())
@ -1006,7 +1006,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Ensure that downward API can provide container's CPU Description: Ensure that downward API can provide container's CPU
limit through DownwardAPIVolumeFiles in a projected volume. limit through DownwardAPIVolumeFiles in a projected volume.
*/ */
framework.ConformanceIt("should provide container's cpu limit", func() { framework.ConformanceIt("should provide container's cpu limit [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/cpu_limit") pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/cpu_limit")
@ -1020,7 +1020,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Ensure that downward API can provide container's memory Description: Ensure that downward API can provide container's memory
limit through DownwardAPIVolumeFiles in a projected volume. limit through DownwardAPIVolumeFiles in a projected volume.
*/ */
framework.ConformanceIt("should provide container's memory limit", func() { framework.ConformanceIt("should provide container's memory limit [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/memory_limit") pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/memory_limit")
@ -1034,7 +1034,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Ensure that downward API can provide container's CPU Description: Ensure that downward API can provide container's CPU
request through DownwardAPIVolumeFiles in a projected volume. request through DownwardAPIVolumeFiles in a projected volume.
*/ */
framework.ConformanceIt("should provide container's cpu request", func() { framework.ConformanceIt("should provide container's cpu request [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/cpu_request") pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/cpu_request")
@ -1048,7 +1048,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: Ensure that downward API can provide container's memory Description: Ensure that downward API can provide container's memory
request through DownwardAPIVolumeFiles in a projected volume. request through DownwardAPIVolumeFiles in a projected volume.
*/ */
framework.ConformanceIt("should provide container's memory request", func() { framework.ConformanceIt("should provide container's memory request [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/memory_request") pod := downwardAPIVolumeForContainerResources(podName, "/etc/podinfo/memory_request")
@ -1063,7 +1063,7 @@ var _ = Describe("[sig-storage] Projected", func() {
allocatable value for CPU through DownwardAPIVolumeFiles if CPU limit allocatable value for CPU through DownwardAPIVolumeFiles if CPU limit
is not specified for a container in a projected volume. is not specified for a container in a projected volume.
*/ */
framework.ConformanceIt("should provide node allocatable (cpu) as default cpu limit if the limit is not set", func() { framework.ConformanceIt("should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
pod := downwardAPIVolumeForDefaultContainerResources(podName, "/etc/podinfo/cpu_limit") pod := downwardAPIVolumeForDefaultContainerResources(podName, "/etc/podinfo/cpu_limit")
@ -1076,7 +1076,7 @@ var _ = Describe("[sig-storage] Projected", func() {
allocatable value for memory through DownwardAPIVolumeFiles if memory allocatable value for memory through DownwardAPIVolumeFiles if memory
limit is not specified for a container in a projected volume. limit is not specified for a container in a projected volume.
*/ */
framework.ConformanceIt("should provide node allocatable (memory) as default memory limit if the limit is not set", func() { framework.ConformanceIt("should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance]", func() {
podName := "downwardapi-volume-" + string(uuid.NewUUID()) podName := "downwardapi-volume-" + string(uuid.NewUUID())
pod := downwardAPIVolumeForDefaultContainerResources(podName, "/etc/podinfo/memory_limit") pod := downwardAPIVolumeForDefaultContainerResources(podName, "/etc/podinfo/memory_limit")
@ -1089,7 +1089,7 @@ var _ = Describe("[sig-storage] Projected", func() {
Description: This test projects a secret and configmap into the same Description: This test projects a secret and configmap into the same
directory to ensure projection is working as intended. directory to ensure projection is working as intended.
*/ */
framework.ConformanceIt("should project all components that make up the projection API [Projection]", func() { framework.ConformanceIt("should project all components that make up the projection API [Projection][NodeConformance]", func() {
var err error var err error
podName := "projected-volume-" + string(uuid.NewUUID()) podName := "projected-volume-" + string(uuid.NewUUID())
secretName := "secret-projected-all-test-volume-" + string(uuid.NewUUID()) secretName := "secret-projected-all-test-volume-" + string(uuid.NewUUID())

View File

@ -35,7 +35,7 @@ var _ = Describe("[sig-api-machinery] Secrets", func() {
Description: Ensure that secret can be consumed via environment Description: Ensure that secret can be consumed via environment
variables. variables.
*/ */
framework.ConformanceIt("should be consumable from pods in env vars ", func() { framework.ConformanceIt("should be consumable from pods in env vars [NodeConformance]", func() {
name := "secret-test-" + string(uuid.NewUUID()) name := "secret-test-" + string(uuid.NewUUID())
secret := secretForTest(f.Namespace.Name, name) secret := secretForTest(f.Namespace.Name, name)
@ -84,7 +84,7 @@ var _ = Describe("[sig-api-machinery] Secrets", func() {
Description: Ensure that secret can be consumed via source of a set Description: Ensure that secret can be consumed via source of a set
of ConfigMaps. of ConfigMaps.
*/ */
framework.ConformanceIt("should be consumable via the environment ", func() { framework.ConformanceIt("should be consumable via the environment [NodeConformance]", func() {
name := "secret-test-" + string(uuid.NewUUID()) name := "secret-test-" + string(uuid.NewUUID())
secret := newEnvFromSecret(f.Namespace.Name, name) secret := newEnvFromSecret(f.Namespace.Name, name)
By(fmt.Sprintf("creating secret %v/%v", f.Namespace.Name, secret.Name)) By(fmt.Sprintf("creating secret %v/%v", f.Namespace.Name, secret.Name))

View File

@ -38,7 +38,7 @@ var _ = Describe("[sig-storage] Secrets", func() {
Description: Ensure that secret can be mounted without mapping to a Description: Ensure that secret can be mounted without mapping to a
pod volume. pod volume.
*/ */
framework.ConformanceIt("should be consumable from pods in volume ", func() { framework.ConformanceIt("should be consumable from pods in volume [NodeConformance]", func() {
doSecretE2EWithoutMapping(f, nil /* default mode */, "secret-test-"+string(uuid.NewUUID()), nil, nil) doSecretE2EWithoutMapping(f, nil /* default mode */, "secret-test-"+string(uuid.NewUUID()), nil, nil)
}) })
@ -47,7 +47,7 @@ var _ = Describe("[sig-storage] Secrets", func() {
Description: Ensure that secret can be mounted without mapping to a Description: Ensure that secret can be mounted without mapping to a
pod volume in default mode. pod volume in default mode.
*/ */
framework.ConformanceIt("should be consumable from pods in volume with defaultMode set ", func() { framework.ConformanceIt("should be consumable from pods in volume with defaultMode set [NodeConformance]", func() {
defaultMode := int32(0400) defaultMode := int32(0400)
doSecretE2EWithoutMapping(f, &defaultMode, "secret-test-"+string(uuid.NewUUID()), nil, nil) doSecretE2EWithoutMapping(f, &defaultMode, "secret-test-"+string(uuid.NewUUID()), nil, nil)
}) })
@ -57,7 +57,7 @@ var _ = Describe("[sig-storage] Secrets", func() {
Description: Ensure that secret can be mounted without mapping to a pod Description: Ensure that secret can be mounted without mapping to a pod
volume as non-root in default mode with fsGroup set. volume as non-root in default mode with fsGroup set.
*/ */
framework.ConformanceIt("should be consumable from pods in volume as non-root with defaultMode and fsGroup set ", func() { framework.ConformanceIt("should be consumable from pods in volume as non-root with defaultMode and fsGroup set [NodeConformance]", func() {
defaultMode := int32(0440) /* setting fsGroup sets mode to at least 440 */ defaultMode := int32(0440) /* setting fsGroup sets mode to at least 440 */
fsGroup := int64(1001) fsGroup := int64(1001)
uid := int64(1000) uid := int64(1000)
@ -69,7 +69,7 @@ var _ = Describe("[sig-storage] Secrets", func() {
Description: Ensure that secret can be mounted with mapping to a pod Description: Ensure that secret can be mounted with mapping to a pod
volume. volume.
*/ */
framework.ConformanceIt("should be consumable from pods in volume with mappings ", func() { framework.ConformanceIt("should be consumable from pods in volume with mappings [NodeConformance]", func() {
doSecretE2EWithMapping(f, nil) doSecretE2EWithMapping(f, nil)
}) })
@ -78,7 +78,7 @@ var _ = Describe("[sig-storage] Secrets", func() {
Description: Ensure that secret can be mounted with mapping to a pod Description: Ensure that secret can be mounted with mapping to a pod
volume in item mode. volume in item mode.
*/ */
framework.ConformanceIt("should be consumable from pods in volume with mappings and Item Mode set ", func() { framework.ConformanceIt("should be consumable from pods in volume with mappings and Item Mode set [NodeConformance]", func() {
mode := int32(0400) mode := int32(0400)
doSecretE2EWithMapping(f, &mode) doSecretE2EWithMapping(f, &mode)
}) })
@ -108,7 +108,7 @@ var _ = Describe("[sig-storage] Secrets", func() {
Testname: secret-multiple-volume-mounts Testname: secret-multiple-volume-mounts
Description: Ensure that secret can be mounted to multiple pod volumes. Description: Ensure that secret can be mounted to multiple pod volumes.
*/ */
framework.ConformanceIt("should be consumable in multiple volumes in a pod ", func() { framework.ConformanceIt("should be consumable in multiple volumes in a pod [NodeConformance]", func() {
// This test ensures that the same secret can be mounted in multiple // This test ensures that the same secret can be mounted in multiple
// volumes in the same pod. This test case exists to prevent // volumes in the same pod. This test case exists to prevent
// regressions that break this use-case. // regressions that break this use-case.
@ -186,7 +186,7 @@ var _ = Describe("[sig-storage] Secrets", func() {
Description: Ensure that optional update change to secret can be Description: Ensure that optional update change to secret can be
reflected on a mounted volume. reflected on a mounted volume.
*/ */
framework.ConformanceIt("optional updates should be reflected in volume ", func() { framework.ConformanceIt("optional updates should be reflected in volume [NodeConformance]", func() {
podLogTimeout := framework.GetPodSecretUpdateTimeout(f.ClientSet) podLogTimeout := framework.GetPodSecretUpdateTimeout(f.ClientSet)
containerTimeoutArg := fmt.Sprintf("--retry_time=%v", int(podLogTimeout.Seconds())) containerTimeoutArg := fmt.Sprintf("--retry_time=%v", int(podLogTimeout.Seconds()))
trueVal := true trueVal := true