mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-09-12 12:48:51 +00:00
Merge pull request #39263 from cjcullen/forbidden
Automatic merge from submit-queue Tolerate a Forbidden error in e2e RBAC RoleBinding setup. The three tests that require RBAC rolebindings to be set up currently fail if RBAC is not enabled. This allows those tests to work as they did before we added the RBAC setup step. Addresses #39259
This commit is contained in:
@@ -21,6 +21,7 @@ import (
|
|||||||
"path/filepath"
|
"path/filepath"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
apierrors "k8s.io/kubernetes/pkg/api/errors"
|
||||||
legacyv1 "k8s.io/kubernetes/pkg/api/v1"
|
legacyv1 "k8s.io/kubernetes/pkg/api/v1"
|
||||||
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
rbacv1alpha1 "k8s.io/kubernetes/pkg/apis/rbac/v1alpha1"
|
||||||
"k8s.io/kubernetes/pkg/runtime/schema"
|
"k8s.io/kubernetes/pkg/runtime/schema"
|
||||||
@@ -94,6 +95,13 @@ var _ = framework.KubeDescribe("Loadbalancing: L7", func() {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
})
|
})
|
||||||
|
if apierrors.IsForbidden(err) {
|
||||||
|
// The user is not allowed to create ClusterRoleBindings. This
|
||||||
|
// probably means that RBAC is not being used. If RBAC is being
|
||||||
|
// used, this test will probably fail later.
|
||||||
|
framework.Logf("Attempt to create ClusterRoleBinding was forbidden: %v.", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
framework.ExpectNoError(err)
|
framework.ExpectNoError(err)
|
||||||
|
|
||||||
err = framework.WaitForAuthorizationUpdate(jig.client.Authorization(),
|
err = framework.WaitForAuthorizationUpdate(jig.client.Authorization(),
|
||||||
|
@@ -23,6 +23,7 @@ import (
|
|||||||
"time"
|
"time"
|
||||||
|
|
||||||
"k8s.io/kubernetes/pkg/api"
|
"k8s.io/kubernetes/pkg/api"
|
||||||
|
apierrors "k8s.io/kubernetes/pkg/api/errors"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
legacyv1 "k8s.io/kubernetes/pkg/api/v1"
|
legacyv1 "k8s.io/kubernetes/pkg/api/v1"
|
||||||
metav1 "k8s.io/kubernetes/pkg/apis/meta/v1"
|
metav1 "k8s.io/kubernetes/pkg/apis/meta/v1"
|
||||||
@@ -81,6 +82,13 @@ var _ = framework.KubeDescribe("NodeProblemDetector", func() {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
})
|
})
|
||||||
|
if apierrors.IsForbidden(err) {
|
||||||
|
// The user is not allowed to create ClusterRoleBindings. This
|
||||||
|
// probably means that RBAC is not being used. If RBAC is being
|
||||||
|
// used, this test will probably fail later.
|
||||||
|
framework.Logf("Attempt to create ClusterRoleBinding was forbidden: %v.", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
framework.ExpectNoError(err)
|
framework.ExpectNoError(err)
|
||||||
|
|
||||||
err = framework.WaitForAuthorizationUpdate(f.ClientSet.Authorization(),
|
err = framework.WaitForAuthorizationUpdate(f.ClientSet.Authorization(),
|
||||||
|
@@ -21,6 +21,7 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
apierrors "k8s.io/kubernetes/pkg/api/errors"
|
||||||
"k8s.io/kubernetes/pkg/api/v1"
|
"k8s.io/kubernetes/pkg/api/v1"
|
||||||
legacyv1 "k8s.io/kubernetes/pkg/api/v1"
|
legacyv1 "k8s.io/kubernetes/pkg/api/v1"
|
||||||
metav1 "k8s.io/kubernetes/pkg/apis/meta/v1"
|
metav1 "k8s.io/kubernetes/pkg/apis/meta/v1"
|
||||||
@@ -187,6 +188,13 @@ var _ = framework.KubeDescribe("PreStop", func() {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
})
|
})
|
||||||
|
if apierrors.IsForbidden(err) {
|
||||||
|
// The user is not allowed to create ClusterRoleBindings. This
|
||||||
|
// probably means that RBAC is not being used. If RBAC is being
|
||||||
|
// used, this test will probably fail later.
|
||||||
|
framework.Logf("Attempt to create ClusterRoleBinding was forbidden: %v.", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
framework.ExpectNoError(err)
|
framework.ExpectNoError(err)
|
||||||
|
|
||||||
err = framework.WaitForAuthorizationUpdate(f.ClientSet.Authorization(),
|
err = framework.WaitForAuthorizationUpdate(f.ClientSet.Authorization(),
|
||||||
|
Reference in New Issue
Block a user