mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-23 11:50:44 +00:00
Merge pull request #101013 from pacoxu/mac-ut/skips
skip some UT on mac for dockershim
This commit is contained in:
commit
63014d87cd
38
pkg/kubelet/dockershim/docker_sandbox_linux_test.go
Normal file
38
pkg/kubelet/dockershim/docker_sandbox_linux_test.go
Normal file
@ -0,0 +1,38 @@
|
||||
// +build linux,!dockerless
|
||||
|
||||
/*
|
||||
Copyright 2021 The Kubernetes Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package dockershim
|
||||
|
||||
import (
|
||||
"testing"
|
||||
|
||||
"github.com/stretchr/testify/assert"
|
||||
)
|
||||
|
||||
// TestSandboxHasLeastPrivilegesConfig tests that the sandbox is set with no-new-privileges
|
||||
// and it uses runtime/default seccomp profile.
|
||||
func TestSandboxHasLeastPrivilegesConfig(t *testing.T) {
|
||||
ds, _, _ := newTestDockerService()
|
||||
config := makeSandboxConfig("foo", "bar", "1", 0)
|
||||
|
||||
// test the default
|
||||
createConfig, err := ds.makeSandboxDockerConfig(config, defaultSandboxImage)
|
||||
assert.NoError(t, err)
|
||||
assert.Equal(t, len(createConfig.HostConfig.SecurityOpt), 1, "sandbox should use runtime/default")
|
||||
assert.Equal(t, "no-new-privileges", createConfig.HostConfig.SecurityOpt[0], "no-new-privileges not set")
|
||||
}
|
@ -156,19 +156,6 @@ func TestSandboxStatus(t *testing.T) {
|
||||
assert.Error(t, err, fmt.Sprintf("status of sandbox: %+v", statusResp))
|
||||
}
|
||||
|
||||
// TestSandboxHasLeastPrivilegesConfig tests that the sandbox is set with no-new-privileges
|
||||
// and it uses runtime/default seccomp profile.
|
||||
func TestSandboxHasLeastPrivilegesConfig(t *testing.T) {
|
||||
ds, _, _ := newTestDockerService()
|
||||
config := makeSandboxConfig("foo", "bar", "1", 0)
|
||||
|
||||
// test the default
|
||||
createConfig, err := ds.makeSandboxDockerConfig(config, defaultSandboxImage)
|
||||
assert.NoError(t, err)
|
||||
assert.Equal(t, len(createConfig.HostConfig.SecurityOpt), 1, "sandbox should use runtime/default")
|
||||
assert.Equal(t, "no-new-privileges", createConfig.HostConfig.SecurityOpt[0], "no-new-privileges not set")
|
||||
}
|
||||
|
||||
// TestSandboxStatusAfterRestart tests that retrieving sandbox status returns
|
||||
// an IP address even if RunPodSandbox() was not yet called for this pod, as
|
||||
// would happen on kubelet restart
|
||||
|
@ -1,4 +1,4 @@
|
||||
// +build !dockerless
|
||||
// +build linux,!dockerless
|
||||
|
||||
/*
|
||||
Copyright 2019 The Kubernetes Authors.
|
||||
|
Loading…
Reference in New Issue
Block a user