mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-20 18:31:15 +00:00
Disable node->pod tests for Windows
This commit is contained in:
parent
8cd689e40d
commit
3d09201dbd
10
test/conformance/testdata/conformance.yaml
vendored
10
test/conformance/testdata/conformance.yaml
vendored
@ -1372,7 +1372,7 @@
|
||||
file: test/e2e/common/network/networking.go
|
||||
- testname: Networking, intra pod http, from node
|
||||
codename: '[sig-network] Networking Granular Checks: Pods should function for node-pod
|
||||
communication: http [NodeConformance] [Conformance]'
|
||||
communication: http [LinuxOnly] [NodeConformance] [Conformance]'
|
||||
description: Create a hostexec pod that is capable of curl to netcat commands. Create
|
||||
a test Pod that will act as a webserver front end exposing ports 8080 for tcp
|
||||
and 8081 for udp. The netserver service proxies are created on specified number
|
||||
@ -1380,12 +1380,13 @@
|
||||
the each of service proxy endpoints in the cluster using a http post(protocol=tcp) and
|
||||
the request MUST be successful. Container will execute curl command to reach the
|
||||
service port within specified max retry limit and MUST result in reporting unique
|
||||
hostnames.
|
||||
hostnames. This test is marked LinuxOnly it breaks when using Overlay networking
|
||||
with Windows.
|
||||
release: v1.9
|
||||
file: test/e2e/common/network/networking.go
|
||||
- testname: Networking, intra pod http, from node
|
||||
codename: '[sig-network] Networking Granular Checks: Pods should function for node-pod
|
||||
communication: udp [NodeConformance] [Conformance]'
|
||||
communication: udp [LinuxOnly] [NodeConformance] [Conformance]'
|
||||
description: Create a hostexec pod that is capable of curl to netcat commands. Create
|
||||
a test Pod that will act as a webserver front end exposing ports 8080 for tcp
|
||||
and 8081 for udp. The netserver service proxies are created on specified number
|
||||
@ -1393,7 +1394,8 @@
|
||||
the each of service proxy endpoints in the cluster using a http post(protocol=udp) and
|
||||
the request MUST be successful. Container will execute curl command to reach the
|
||||
service port within specified max retry limit and MUST result in reporting unique
|
||||
hostnames.
|
||||
hostnames. This test is marked LinuxOnly it breaks when using Overlay networking
|
||||
with Windows.
|
||||
release: v1.9
|
||||
file: test/e2e/common/network/networking.go
|
||||
- testname: Proxy, validate Proxy responses
|
||||
|
@ -100,8 +100,9 @@ var _ = SIGDescribe("Networking", func() {
|
||||
Testname: Networking, intra pod http, from node
|
||||
Description: Create a hostexec pod that is capable of curl to netcat commands. Create a test Pod that will act as a webserver front end exposing ports 8080 for tcp and 8081 for udp. The netserver service proxies are created on specified number of nodes.
|
||||
The kubectl exec on the webserver container MUST reach a http port on the each of service proxy endpoints in the cluster using a http post(protocol=tcp) and the request MUST be successful. Container will execute curl command to reach the service port within specified max retry limit and MUST result in reporting unique hostnames.
|
||||
This test is marked LinuxOnly it breaks when using Overlay networking with Windows.
|
||||
*/
|
||||
framework.ConformanceIt("should function for node-pod communication: http [NodeConformance]", func() {
|
||||
framework.ConformanceIt("should function for node-pod communication: http [LinuxOnly] [NodeConformance]", func() {
|
||||
config := e2enetwork.NewCoreNetworkingTestConfig(f, true)
|
||||
for _, endpointPod := range config.EndpointPods {
|
||||
err := config.DialFromNode("http", endpointPod.Status.PodIP, e2enetwork.EndpointHTTPPort, config.MaxTries, 0, sets.NewString(endpointPod.Name))
|
||||
@ -116,8 +117,9 @@ var _ = SIGDescribe("Networking", func() {
|
||||
Testname: Networking, intra pod http, from node
|
||||
Description: Create a hostexec pod that is capable of curl to netcat commands. Create a test Pod that will act as a webserver front end exposing ports 8080 for tcp and 8081 for udp. The netserver service proxies are created on specified number of nodes.
|
||||
The kubectl exec on the webserver container MUST reach a http port on the each of service proxy endpoints in the cluster using a http post(protocol=udp) and the request MUST be successful. Container will execute curl command to reach the service port within specified max retry limit and MUST result in reporting unique hostnames.
|
||||
This test is marked LinuxOnly it breaks when using Overlay networking with Windows.
|
||||
*/
|
||||
framework.ConformanceIt("should function for node-pod communication: udp [NodeConformance]", func() {
|
||||
framework.ConformanceIt("should function for node-pod communication: udp [LinuxOnly] [NodeConformance]", func() {
|
||||
config := e2enetwork.NewCoreNetworkingTestConfig(f, true)
|
||||
for _, endpointPod := range config.EndpointPods {
|
||||
err := config.DialFromNode("udp", endpointPod.Status.PodIP, e2enetwork.EndpointUDPPort, config.MaxTries, 0, sets.NewString(endpointPod.Name))
|
||||
|
Loading…
Reference in New Issue
Block a user