Disable node->pod tests for Windows

This commit is contained in:
James Sturtevant 2022-04-05 16:17:13 -07:00
parent 8cd689e40d
commit 3d09201dbd
2 changed files with 10 additions and 6 deletions

View File

@ -1372,7 +1372,7 @@
file: test/e2e/common/network/networking.go file: test/e2e/common/network/networking.go
- testname: Networking, intra pod http, from node - testname: Networking, intra pod http, from node
codename: '[sig-network] Networking Granular Checks: Pods should function for node-pod codename: '[sig-network] Networking Granular Checks: Pods should function for node-pod
communication: http [NodeConformance] [Conformance]' communication: http [LinuxOnly] [NodeConformance] [Conformance]'
description: Create a hostexec pod that is capable of curl to netcat commands. Create description: Create a hostexec pod that is capable of curl to netcat commands. Create
a test Pod that will act as a webserver front end exposing ports 8080 for tcp a test Pod that will act as a webserver front end exposing ports 8080 for tcp
and 8081 for udp. The netserver service proxies are created on specified number and 8081 for udp. The netserver service proxies are created on specified number
@ -1380,12 +1380,13 @@
the each of service proxy endpoints in the cluster using a http post(protocol=tcp) and the each of service proxy endpoints in the cluster using a http post(protocol=tcp) and
the request MUST be successful. Container will execute curl command to reach the the request MUST be successful. Container will execute curl command to reach the
service port within specified max retry limit and MUST result in reporting unique service port within specified max retry limit and MUST result in reporting unique
hostnames. hostnames. This test is marked LinuxOnly it breaks when using Overlay networking
with Windows.
release: v1.9 release: v1.9
file: test/e2e/common/network/networking.go file: test/e2e/common/network/networking.go
- testname: Networking, intra pod http, from node - testname: Networking, intra pod http, from node
codename: '[sig-network] Networking Granular Checks: Pods should function for node-pod codename: '[sig-network] Networking Granular Checks: Pods should function for node-pod
communication: udp [NodeConformance] [Conformance]' communication: udp [LinuxOnly] [NodeConformance] [Conformance]'
description: Create a hostexec pod that is capable of curl to netcat commands. Create description: Create a hostexec pod that is capable of curl to netcat commands. Create
a test Pod that will act as a webserver front end exposing ports 8080 for tcp a test Pod that will act as a webserver front end exposing ports 8080 for tcp
and 8081 for udp. The netserver service proxies are created on specified number and 8081 for udp. The netserver service proxies are created on specified number
@ -1393,7 +1394,8 @@
the each of service proxy endpoints in the cluster using a http post(protocol=udp) and the each of service proxy endpoints in the cluster using a http post(protocol=udp) and
the request MUST be successful. Container will execute curl command to reach the the request MUST be successful. Container will execute curl command to reach the
service port within specified max retry limit and MUST result in reporting unique service port within specified max retry limit and MUST result in reporting unique
hostnames. hostnames. This test is marked LinuxOnly it breaks when using Overlay networking
with Windows.
release: v1.9 release: v1.9
file: test/e2e/common/network/networking.go file: test/e2e/common/network/networking.go
- testname: Proxy, validate Proxy responses - testname: Proxy, validate Proxy responses

View File

@ -100,8 +100,9 @@ var _ = SIGDescribe("Networking", func() {
Testname: Networking, intra pod http, from node Testname: Networking, intra pod http, from node
Description: Create a hostexec pod that is capable of curl to netcat commands. Create a test Pod that will act as a webserver front end exposing ports 8080 for tcp and 8081 for udp. The netserver service proxies are created on specified number of nodes. Description: Create a hostexec pod that is capable of curl to netcat commands. Create a test Pod that will act as a webserver front end exposing ports 8080 for tcp and 8081 for udp. The netserver service proxies are created on specified number of nodes.
The kubectl exec on the webserver container MUST reach a http port on the each of service proxy endpoints in the cluster using a http post(protocol=tcp) and the request MUST be successful. Container will execute curl command to reach the service port within specified max retry limit and MUST result in reporting unique hostnames. The kubectl exec on the webserver container MUST reach a http port on the each of service proxy endpoints in the cluster using a http post(protocol=tcp) and the request MUST be successful. Container will execute curl command to reach the service port within specified max retry limit and MUST result in reporting unique hostnames.
This test is marked LinuxOnly it breaks when using Overlay networking with Windows.
*/ */
framework.ConformanceIt("should function for node-pod communication: http [NodeConformance]", func() { framework.ConformanceIt("should function for node-pod communication: http [LinuxOnly] [NodeConformance]", func() {
config := e2enetwork.NewCoreNetworkingTestConfig(f, true) config := e2enetwork.NewCoreNetworkingTestConfig(f, true)
for _, endpointPod := range config.EndpointPods { for _, endpointPod := range config.EndpointPods {
err := config.DialFromNode("http", endpointPod.Status.PodIP, e2enetwork.EndpointHTTPPort, config.MaxTries, 0, sets.NewString(endpointPod.Name)) err := config.DialFromNode("http", endpointPod.Status.PodIP, e2enetwork.EndpointHTTPPort, config.MaxTries, 0, sets.NewString(endpointPod.Name))
@ -116,8 +117,9 @@ var _ = SIGDescribe("Networking", func() {
Testname: Networking, intra pod http, from node Testname: Networking, intra pod http, from node
Description: Create a hostexec pod that is capable of curl to netcat commands. Create a test Pod that will act as a webserver front end exposing ports 8080 for tcp and 8081 for udp. The netserver service proxies are created on specified number of nodes. Description: Create a hostexec pod that is capable of curl to netcat commands. Create a test Pod that will act as a webserver front end exposing ports 8080 for tcp and 8081 for udp. The netserver service proxies are created on specified number of nodes.
The kubectl exec on the webserver container MUST reach a http port on the each of service proxy endpoints in the cluster using a http post(protocol=udp) and the request MUST be successful. Container will execute curl command to reach the service port within specified max retry limit and MUST result in reporting unique hostnames. The kubectl exec on the webserver container MUST reach a http port on the each of service proxy endpoints in the cluster using a http post(protocol=udp) and the request MUST be successful. Container will execute curl command to reach the service port within specified max retry limit and MUST result in reporting unique hostnames.
This test is marked LinuxOnly it breaks when using Overlay networking with Windows.
*/ */
framework.ConformanceIt("should function for node-pod communication: udp [NodeConformance]", func() { framework.ConformanceIt("should function for node-pod communication: udp [LinuxOnly] [NodeConformance]", func() {
config := e2enetwork.NewCoreNetworkingTestConfig(f, true) config := e2enetwork.NewCoreNetworkingTestConfig(f, true)
for _, endpointPod := range config.EndpointPods { for _, endpointPod := range config.EndpointPods {
err := config.DialFromNode("udp", endpointPod.Status.PodIP, e2enetwork.EndpointUDPPort, config.MaxTries, 0, sets.NewString(endpointPod.Name)) err := config.DialFromNode("udp", endpointPod.Status.PodIP, e2enetwork.EndpointUDPPort, config.MaxTries, 0, sets.NewString(endpointPod.Name))