Cleanup tests/e2e/common directory - part 1

This commit is contained in:
wojtekt 2021-02-23 21:24:24 +01:00
parent 7322dff5b5
commit 7b2458ac01
29 changed files with 466 additions and 180 deletions

View File

@ -485,7 +485,7 @@
Container will execute curl command to reach the service port within specified Container will execute curl command to reach the service port within specified
max retry limit and MUST result in reporting unique hostnames. max retry limit and MUST result in reporting unique hostnames.
release: v1.9, v1.18 release: v1.9, v1.18
file: test/e2e/common/networking.go file: test/e2e/common/network/networking.go
- testname: Networking, intra pod udp - testname: Networking, intra pod udp
codename: '[k8s.io] [sig-network] Networking Granular Checks: Pods should function codename: '[k8s.io] [sig-network] Networking Granular Checks: Pods should function
for intra-pod communication: udp [NodeConformance] [Conformance]' for intra-pod communication: udp [NodeConformance] [Conformance]'
@ -497,7 +497,7 @@
Container will execute curl command to reach the service port within specified Container will execute curl command to reach the service port within specified
max retry limit and MUST result in reporting unique hostnames. max retry limit and MUST result in reporting unique hostnames.
release: v1.9, v1.18 release: v1.9, v1.18
file: test/e2e/common/networking.go file: test/e2e/common/network/networking.go
- testname: Networking, intra pod http, from node - testname: Networking, intra pod http, from node
codename: '[k8s.io] [sig-network] Networking Granular Checks: Pods should function codename: '[k8s.io] [sig-network] Networking Granular Checks: Pods should function
for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance]' for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance]'
@ -511,7 +511,7 @@
hostnames. This test is marked LinuxOnly since HostNetwork is not supported on hostnames. This test is marked LinuxOnly since HostNetwork is not supported on
other platforms like Windows. other platforms like Windows.
release: v1.9 release: v1.9
file: test/e2e/common/networking.go file: test/e2e/common/network/networking.go
- testname: Networking, intra pod http, from node - testname: Networking, intra pod http, from node
codename: '[k8s.io] [sig-network] Networking Granular Checks: Pods should function codename: '[k8s.io] [sig-network] Networking Granular Checks: Pods should function
for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance]' for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance]'
@ -525,28 +525,28 @@
hostnames. This test is marked LinuxOnly since HostNetwork is not supported on hostnames. This test is marked LinuxOnly since HostNetwork is not supported on
other platforms like Windows. other platforms like Windows.
release: v1.9 release: v1.9
file: test/e2e/common/networking.go file: test/e2e/common/network/networking.go
- testname: ConfigMap, from environment field - testname: ConfigMap, from environment field
codename: '[k8s.io] [sig-node] ConfigMap should be consumable via environment variable codename: '[k8s.io] [sig-node] ConfigMap should be consumable via environment variable
[NodeConformance] [Conformance]' [NodeConformance] [Conformance]'
description: Create a Pod with an environment variable value set using a value from description: Create a Pod with an environment variable value set using a value from
ConfigMap. A ConfigMap value MUST be accessible in the container environment. ConfigMap. A ConfigMap value MUST be accessible in the container environment.
release: v1.9 release: v1.9
file: test/e2e/common/configmap.go file: test/e2e/common/node/configmap.go
- testname: ConfigMap, from environment variables - testname: ConfigMap, from environment variables
codename: '[k8s.io] [sig-node] ConfigMap should be consumable via the environment codename: '[k8s.io] [sig-node] ConfigMap should be consumable via the environment
[NodeConformance] [Conformance]' [NodeConformance] [Conformance]'
description: Create a Pod with a environment source from ConfigMap. All ConfigMap description: Create a Pod with a environment source from ConfigMap. All ConfigMap
values MUST be available as environment variables in the container. values MUST be available as environment variables in the container.
release: v1.9 release: v1.9
file: test/e2e/common/configmap.go file: test/e2e/common/node/configmap.go
- testname: ConfigMap, with empty-key - testname: ConfigMap, with empty-key
codename: '[k8s.io] [sig-node] ConfigMap should fail to create ConfigMap with empty codename: '[k8s.io] [sig-node] ConfigMap should fail to create ConfigMap with empty
key [Conformance]' key [Conformance]'
description: Attempt to create a ConfigMap with an empty key. The creation MUST description: Attempt to create a ConfigMap with an empty key. The creation MUST
fail. fail.
release: v1.14 release: v1.14
file: test/e2e/common/configmap.go file: test/e2e/common/node/configmap.go
- testname: ConfigMap lifecycle - testname: ConfigMap lifecycle
codename: '[k8s.io] [sig-node] ConfigMap should run through a ConfigMap lifecycle codename: '[k8s.io] [sig-node] ConfigMap should run through a ConfigMap lifecycle
[Conformance]' [Conformance]'
@ -555,21 +555,21 @@
selector it MUST find the ConfigMap by it's static label and updated value. The selector it MUST find the ConfigMap by it's static label and updated value. The
ConfigMap must be deleted by Collection. ConfigMap must be deleted by Collection.
release: v1.19 release: v1.19
file: test/e2e/common/configmap.go file: test/e2e/common/node/configmap.go
- testname: DownwardAPI, environment for CPU and memory limits and requests - testname: DownwardAPI, environment for CPU and memory limits and requests
codename: '[k8s.io] [sig-node] Downward API should provide container''s limits.cpu/memory codename: '[k8s.io] [sig-node] Downward API should provide container''s limits.cpu/memory
and requests.cpu/memory as env vars [NodeConformance] [Conformance]' and requests.cpu/memory as env vars [NodeConformance] [Conformance]'
description: Downward API MUST expose CPU request and Memory request set through description: Downward API MUST expose CPU request and Memory request set through
environment variables at runtime in the container. environment variables at runtime in the container.
release: v1.9 release: v1.9
file: test/e2e/common/downward_api.go file: test/e2e/common/downwardapi.go
- testname: DownwardAPI, environment for default CPU and memory limits and requests - testname: DownwardAPI, environment for default CPU and memory limits and requests
codename: '[k8s.io] [sig-node] Downward API should provide default limits.cpu/memory codename: '[k8s.io] [sig-node] Downward API should provide default limits.cpu/memory
from node allocatable [NodeConformance] [Conformance]' from node allocatable [NodeConformance] [Conformance]'
description: Downward API MUST expose CPU request and Memory limits set through description: Downward API MUST expose CPU request and Memory limits set through
environment variables at runtime in the container. environment variables at runtime in the container.
release: v1.9 release: v1.9
file: test/e2e/common/downward_api.go file: test/e2e/common/downwardapi.go
- testname: DownwardAPI, environment for host ip - testname: DownwardAPI, environment for host ip
codename: '[k8s.io] [sig-node] Downward API should provide host IP as an env var codename: '[k8s.io] [sig-node] Downward API should provide host IP as an env var
[NodeConformance] [Conformance]' [NodeConformance] [Conformance]'
@ -577,14 +577,14 @@
Specify host IP as environment variable in the Pod Spec are visible at runtime Specify host IP as environment variable in the Pod Spec are visible at runtime
in the container. in the container.
release: v1.9 release: v1.9
file: test/e2e/common/downward_api.go file: test/e2e/common/downwardapi.go
- testname: DownwardAPI, environment for Pod UID - testname: DownwardAPI, environment for Pod UID
codename: '[k8s.io] [sig-node] Downward API should provide pod UID as env vars [NodeConformance] codename: '[k8s.io] [sig-node] Downward API should provide pod UID as env vars [NodeConformance]
[Conformance]' [Conformance]'
description: Downward API MUST expose Pod UID set through environment variables description: Downward API MUST expose Pod UID set through environment variables
at runtime in the container. at runtime in the container.
release: v1.9 release: v1.9
file: test/e2e/common/downward_api.go file: test/e2e/common/downwardapi.go
- testname: DownwardAPI, environment for name, namespace and ip - testname: DownwardAPI, environment for name, namespace and ip
codename: '[k8s.io] [sig-node] Downward API should provide pod name, namespace and codename: '[k8s.io] [sig-node] Downward API should provide pod name, namespace and
IP address as env vars [NodeConformance] [Conformance]' IP address as env vars [NodeConformance] [Conformance]'
@ -592,7 +592,7 @@
Specify Pod Name, namespace and IP as environment variable in the Pod Spec are Specify Pod Name, namespace and IP as environment variable in the Pod Spec are
visible at runtime in the container. visible at runtime in the container.
release: v1.9 release: v1.9
file: test/e2e/common/downward_api.go file: test/e2e/common/downwardapi.go
- testname: Pod events, verify event from Scheduler and Kubelet - testname: Pod events, verify event from Scheduler and Kubelet
codename: '[k8s.io] [sig-node] Events should be sent by kubelets and the scheduler codename: '[k8s.io] [sig-node] Events should be sent by kubelets and the scheduler
about pods scheduling and running [Conformance]' about pods scheduling and running [Conformance]'
@ -624,7 +624,7 @@
be found when listed. The set of Pod Templates is deleted and MUST NOT show up be found when listed. The set of Pod Templates is deleted and MUST NOT show up
when listed by its label selector. when listed by its label selector.
release: v1.19 release: v1.19
file: test/e2e/common/podtemplates.go file: test/e2e/common/node/podtemplates.go
- testname: PodTemplate lifecycle - testname: PodTemplate lifecycle
codename: '[k8s.io] [sig-node] PodTemplates should run the lifecycle of PodTemplates codename: '[k8s.io] [sig-node] PodTemplates should run the lifecycle of PodTemplates
[Conformance]' [Conformance]'
@ -633,7 +633,7 @@
selector it MUST find the PodTemplate by it's static label and updated value. selector it MUST find the PodTemplate by it's static label and updated value.
The PodTemplate must be deleted. The PodTemplate must be deleted.
release: v1.19 release: v1.19
file: test/e2e/common/podtemplates.go file: test/e2e/common/node/podtemplates.go
- testname: Pods, QOS - testname: Pods, QOS
codename: '[k8s.io] [sig-node] Pods Extended [k8s.io] Pods Set QOS Class should codename: '[k8s.io] [sig-node] Pods Extended [k8s.io] Pods Set QOS Class should
be set on Pods with matching resource requests and limits for memory and cpu [Conformance]' be set on Pods with matching resource requests and limits for memory and cpu [Conformance]'
@ -660,7 +660,7 @@
document. The runtimeclasses resource must support create, get, list, watch, update, document. The runtimeclasses resource must support create, get, list, watch, update,
patch, delete, and deletecollection.' patch, delete, and deletecollection.'
release: v1.20 release: v1.20
file: test/e2e/common/runtimeclass.go file: test/e2e/common/node/runtimeclass.go
- testname: Security Context, test RunAsGroup at container level - testname: Security Context, test RunAsGroup at container level
codename: '[k8s.io] [sig-node] Security Context should support container.SecurityContext.RunAsUser codename: '[k8s.io] [sig-node] Security Context should support container.SecurityContext.RunAsUser
And container.SecurityContext.RunAsGroup [LinuxOnly] [Conformance]' And container.SecurityContext.RunAsGroup [LinuxOnly] [Conformance]'
@ -687,7 +687,7 @@
to custom path in the Pod. ConfigMap's text data and binary data MUST be verified to custom path in the Pod. ConfigMap's text data and binary data MUST be verified
by reading the content from the mounted files in the Pod. by reading the content from the mounted files in the Pod.
release: v1.12 release: v1.12
file: test/e2e/common/configmap_volume.go file: test/e2e/common/storage/configmap_volume.go
- testname: ConfigMap Volume, create, update and delete - testname: ConfigMap Volume, create, update and delete
codename: '[k8s.io] [sig-storage] ConfigMap optional updates should be reflected codename: '[k8s.io] [sig-storage] ConfigMap optional updates should be reflected
in volume [NodeConformance] [Conformance]' in volume [NodeConformance] [Conformance]'
@ -697,7 +697,7 @@
the content from the mounted file in the Pod. Also when the item(file) is deleted the content from the mounted file in the Pod. Also when the item(file) is deleted
from the map that MUST result in a error reading that item(file). from the map that MUST result in a error reading that item(file).
release: v1.9 release: v1.9
file: test/e2e/common/configmap_volume.go file: test/e2e/common/storage/configmap_volume.go
- testname: ConfigMap Volume, without mapping - testname: ConfigMap Volume, without mapping
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
[NodeConformance] [Conformance]' [NodeConformance] [Conformance]'
@ -707,7 +707,7 @@
content of the file MUST be readable and verified and file modes MUST default content of the file MUST be readable and verified and file modes MUST default
to 0x644. to 0x644.
release: v1.9 release: v1.9
file: test/e2e/common/configmap_volume.go file: test/e2e/common/storage/configmap_volume.go
- testname: ConfigMap Volume, without mapping, non-root user - testname: ConfigMap Volume, without mapping, non-root user
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
as non-root [NodeConformance] [Conformance]' as non-root [NodeConformance] [Conformance]'
@ -717,7 +717,7 @@
created Pod using the volume mount. The file on the volume MUST have file mode created Pod using the volume mount. The file on the volume MUST have file mode
set to default value of 0x644. set to default value of 0x644.
release: v1.9 release: v1.9
file: test/e2e/common/configmap_volume.go file: test/e2e/common/storage/configmap_volume.go
- testname: ConfigMap Volume, without mapping, volume mode set - testname: ConfigMap Volume, without mapping, volume mode set
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]' with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]'
@ -729,7 +729,7 @@
This test is marked LinuxOnly since Windows does not support setting specific This test is marked LinuxOnly since Windows does not support setting specific
file permissions. file permissions.
release: v1.9 release: v1.9
file: test/e2e/common/configmap_volume.go file: test/e2e/common/storage/configmap_volume.go
- testname: ConfigMap Volume, with mapping - testname: ConfigMap Volume, with mapping
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
with mappings [NodeConformance] [Conformance]' with mappings [NodeConformance] [Conformance]'
@ -739,7 +739,7 @@
created Pod using the volume mount. The data content of the file MUST be readable created Pod using the volume mount. The data content of the file MUST be readable
and verified and file modes MUST default to 0x644. and verified and file modes MUST default to 0x644.
release: v1.9 release: v1.9
file: test/e2e/common/configmap_volume.go file: test/e2e/common/storage/configmap_volume.go
- testname: ConfigMap Volume, with mapping, volume mode set - testname: ConfigMap Volume, with mapping, volume mode set
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]' with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]'
@ -751,7 +751,7 @@
MUST be set to the custom value of '0x400' This test is marked LinuxOnly since MUST be set to the custom value of '0x400' This test is marked LinuxOnly since
Windows does not support setting specific file permissions. Windows does not support setting specific file permissions.
release: v1.9 release: v1.9
file: test/e2e/common/configmap_volume.go file: test/e2e/common/storage/configmap_volume.go
- testname: ConfigMap Volume, with mapping, non-root user - testname: ConfigMap Volume, with mapping, non-root user
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
with mappings as non-root [NodeConformance] [Conformance]' with mappings as non-root [NodeConformance] [Conformance]'
@ -761,7 +761,7 @@
MUST be accessible to read from the newly created Pod using the volume mount. MUST be accessible to read from the newly created Pod using the volume mount.
The file on the volume MUST have file mode set to default value of 0x644. The file on the volume MUST have file mode set to default value of 0x644.
release: v1.9 release: v1.9
file: test/e2e/common/configmap_volume.go file: test/e2e/common/storage/configmap_volume.go
- testname: ConfigMap Volume, multiple volume maps - testname: ConfigMap Volume, multiple volume maps
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable in multiple volumes codename: '[k8s.io] [sig-storage] ConfigMap should be consumable in multiple volumes
in the same pod [NodeConformance] [Conformance]' in the same pod [NodeConformance] [Conformance]'
@ -769,7 +769,7 @@
created Pod using the volume mount that is mapped to multiple paths in the Pod. created Pod using the volume mount that is mapped to multiple paths in the Pod.
The content MUST be accessible from all the mapped volume mounts. The content MUST be accessible from all the mapped volume mounts.
release: v1.9 release: v1.9
file: test/e2e/common/configmap_volume.go file: test/e2e/common/storage/configmap_volume.go
- testname: ConfigMap Volume, immutability - testname: ConfigMap Volume, immutability
codename: '[k8s.io] [sig-storage] ConfigMap should be immutable if `immutable` field codename: '[k8s.io] [sig-storage] ConfigMap should be immutable if `immutable` field
is set [Conformance]' is set [Conformance]'
@ -779,7 +779,7 @@
MUST fail. Try to update the ConfigMap`s metadata (labels), the update must succeed. MUST fail. Try to update the ConfigMap`s metadata (labels), the update must succeed.
Try to delete the ConfigMap, the deletion must succeed. Try to delete the ConfigMap, the deletion must succeed.
release: v1.21 release: v1.21
file: test/e2e/common/configmap_volume.go file: test/e2e/common/storage/configmap_volume.go
- testname: ConfigMap Volume, update - testname: ConfigMap Volume, update
codename: '[k8s.io] [sig-storage] ConfigMap updates should be reflected in volume codename: '[k8s.io] [sig-storage] ConfigMap updates should be reflected in volume
[NodeConformance] [Conformance]' [NodeConformance] [Conformance]'
@ -788,7 +788,7 @@
the ConfigMap is updated the change to the config map MUST be verified by reading the ConfigMap is updated the change to the config map MUST be verified by reading
the content from the mounted file in the Pod. the content from the mounted file in the Pod.
release: v1.9 release: v1.9
file: test/e2e/common/configmap_volume.go file: test/e2e/common/storage/configmap_volume.go
- testname: DownwardAPI volume, CPU limits - testname: DownwardAPI volume, CPU limits
codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s
cpu limit [NodeConformance] [Conformance]' cpu limit [NodeConformance] [Conformance]'
@ -796,7 +796,7 @@
contains a item for the CPU limits. The container runtime MUST be able to access contains a item for the CPU limits. The container runtime MUST be able to access
CPU limits from the specified path on the mounted volume. CPU limits from the specified path on the mounted volume.
release: v1.9 release: v1.9
file: test/e2e/common/downwardapi_volume.go file: test/e2e/common/storage/downwardapi_volume.go
- testname: DownwardAPI volume, CPU request - testname: DownwardAPI volume, CPU request
codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s
cpu request [NodeConformance] [Conformance]' cpu request [NodeConformance] [Conformance]'
@ -804,7 +804,7 @@
contains a item for the CPU request. The container runtime MUST be able to access contains a item for the CPU request. The container runtime MUST be able to access
CPU request from the specified path on the mounted volume. CPU request from the specified path on the mounted volume.
release: v1.9 release: v1.9
file: test/e2e/common/downwardapi_volume.go file: test/e2e/common/storage/downwardapi_volume.go
- testname: DownwardAPI volume, memory limits - testname: DownwardAPI volume, memory limits
codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s
memory limit [NodeConformance] [Conformance]' memory limit [NodeConformance] [Conformance]'
@ -812,7 +812,7 @@
contains a item for the memory limits. The container runtime MUST be able to access contains a item for the memory limits. The container runtime MUST be able to access
memory limits from the specified path on the mounted volume. memory limits from the specified path on the mounted volume.
release: v1.9 release: v1.9
file: test/e2e/common/downwardapi_volume.go file: test/e2e/common/storage/downwardapi_volume.go
- testname: DownwardAPI volume, memory request - testname: DownwardAPI volume, memory request
codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s
memory request [NodeConformance] [Conformance]' memory request [NodeConformance] [Conformance]'
@ -820,7 +820,7 @@
contains a item for the memory request. The container runtime MUST be able to contains a item for the memory request. The container runtime MUST be able to
access memory request from the specified path on the mounted volume. access memory request from the specified path on the mounted volume.
release: v1.9 release: v1.9
file: test/e2e/common/downwardapi_volume.go file: test/e2e/common/storage/downwardapi_volume.go
- testname: DownwardAPI volume, CPU limit, default node allocatable - testname: DownwardAPI volume, CPU limit, default node allocatable
codename: '[k8s.io] [sig-storage] Downward API volume should provide node allocatable codename: '[k8s.io] [sig-storage] Downward API volume should provide node allocatable
(cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]' (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]'
@ -829,7 +829,7 @@
The container runtime MUST be able to access CPU limits from the specified path The container runtime MUST be able to access CPU limits from the specified path
on the mounted volume and the value MUST be default node allocatable. on the mounted volume and the value MUST be default node allocatable.
release: v1.9 release: v1.9
file: test/e2e/common/downwardapi_volume.go file: test/e2e/common/storage/downwardapi_volume.go
- testname: DownwardAPI volume, memory limit, default node allocatable - testname: DownwardAPI volume, memory limit, default node allocatable
codename: '[k8s.io] [sig-storage] Downward API volume should provide node allocatable codename: '[k8s.io] [sig-storage] Downward API volume should provide node allocatable
(memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]' (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]'
@ -838,7 +838,7 @@
container. The container runtime MUST be able to access memory limits from the container. The container runtime MUST be able to access memory limits from the
specified path on the mounted volume and the value MUST be default node allocatable. specified path on the mounted volume and the value MUST be default node allocatable.
release: v1.9 release: v1.9
file: test/e2e/common/downwardapi_volume.go file: test/e2e/common/storage/downwardapi_volume.go
- testname: DownwardAPI volume, pod name - testname: DownwardAPI volume, pod name
codename: '[k8s.io] [sig-storage] Downward API volume should provide podname only codename: '[k8s.io] [sig-storage] Downward API volume should provide podname only
[NodeConformance] [Conformance]' [NodeConformance] [Conformance]'
@ -846,7 +846,7 @@
contains a item for the Pod name. The container runtime MUST be able to access contains a item for the Pod name. The container runtime MUST be able to access
Pod name from the specified path on the mounted volume. Pod name from the specified path on the mounted volume.
release: v1.9 release: v1.9
file: test/e2e/common/downwardapi_volume.go file: test/e2e/common/storage/downwardapi_volume.go
- testname: DownwardAPI volume, volume mode 0400 - testname: DownwardAPI volume, volume mode 0400
codename: '[k8s.io] [sig-storage] Downward API volume should set DefaultMode on codename: '[k8s.io] [sig-storage] Downward API volume should set DefaultMode on
files [LinuxOnly] [NodeConformance] [Conformance]' files [LinuxOnly] [NodeConformance] [Conformance]'
@ -856,7 +856,7 @@
path on the mounted volume. This test is marked LinuxOnly since Windows does not path on the mounted volume. This test is marked LinuxOnly since Windows does not
support setting specific file permissions. support setting specific file permissions.
release: v1.9 release: v1.9
file: test/e2e/common/downwardapi_volume.go file: test/e2e/common/storage/downwardapi_volume.go
- testname: DownwardAPI volume, file mode 0400 - testname: DownwardAPI volume, file mode 0400
codename: '[k8s.io] [sig-storage] Downward API volume should set mode on item file codename: '[k8s.io] [sig-storage] Downward API volume should set mode on item file
[LinuxOnly] [NodeConformance] [Conformance]' [LinuxOnly] [NodeConformance] [Conformance]'
@ -866,7 +866,7 @@
volume. This test is marked LinuxOnly since Windows does not support setting specific volume. This test is marked LinuxOnly since Windows does not support setting specific
file permissions. file permissions.
release: v1.9 release: v1.9
file: test/e2e/common/downwardapi_volume.go file: test/e2e/common/storage/downwardapi_volume.go
- testname: DownwardAPI volume, update annotations - testname: DownwardAPI volume, update annotations
codename: '[k8s.io] [sig-storage] Downward API volume should update annotations codename: '[k8s.io] [sig-storage] Downward API volume should update annotations
on modification [NodeConformance] [Conformance]' on modification [NodeConformance] [Conformance]'
@ -876,7 +876,7 @@
volume. Update the annotations by adding a new annotation to the running Pod. volume. Update the annotations by adding a new annotation to the running Pod.
The new annotation MUST be available from the mounted volume. The new annotation MUST be available from the mounted volume.
release: v1.9 release: v1.9
file: test/e2e/common/downwardapi_volume.go file: test/e2e/common/storage/downwardapi_volume.go
- testname: DownwardAPI volume, update label - testname: DownwardAPI volume, update label
codename: '[k8s.io] [sig-storage] Downward API volume should update labels on modification codename: '[k8s.io] [sig-storage] Downward API volume should update labels on modification
[NodeConformance] [Conformance]' [NodeConformance] [Conformance]'
@ -886,7 +886,7 @@
the labels by adding a new label to the running Pod. The new label MUST be available the labels by adding a new label to the running Pod. The new label MUST be available
from the mounted volume. from the mounted volume.
release: v1.9 release: v1.9
file: test/e2e/common/downwardapi_volume.go file: test/e2e/common/storage/downwardapi_volume.go
- testname: EmptyDir, Shared volumes between containers - testname: EmptyDir, Shared volumes between containers
codename: '[k8s.io] [sig-storage] EmptyDir volumes pod should support shared volumes codename: '[k8s.io] [sig-storage] EmptyDir volumes pod should support shared volumes
between containers [Conformance]' between containers [Conformance]'
@ -895,7 +895,7 @@
mounted to the pod. The main container shoud wait until the sub container drops mounted to the pod. The main container shoud wait until the sub container drops
a file, and main container acess the shared data. a file, and main container acess the shared data.
release: v1.15 release: v1.15
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: EmptyDir, medium default, volume mode 0644 - testname: EmptyDir, medium default, volume mode 0644
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0644,default) codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0644,default)
[LinuxOnly] [NodeConformance] [Conformance]' [LinuxOnly] [NodeConformance] [Conformance]'
@ -905,7 +905,7 @@
MUST be readable. This test is marked LinuxOnly since Windows does not support MUST be readable. This test is marked LinuxOnly since Windows does not support
setting specific file permissions, or running as UID / GID. setting specific file permissions, or running as UID / GID.
release: v1.9 release: v1.9
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: EmptyDir, medium memory, volume mode 0644, non-root user - testname: EmptyDir, medium memory, volume mode 0644, non-root user
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0644,tmpfs) codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0644,tmpfs)
[LinuxOnly] [NodeConformance] [Conformance]' [LinuxOnly] [NodeConformance] [Conformance]'
@ -916,7 +916,7 @@
since Windows does not support setting specific file permissions, or running as since Windows does not support setting specific file permissions, or running as
UID / GID, or the medium = 'Memory'. UID / GID, or the medium = 'Memory'.
release: v1.9 release: v1.9
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: EmptyDir, medium default, volume mode 0666 - testname: EmptyDir, medium default, volume mode 0666
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0666,default) codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0666,default)
[LinuxOnly] [NodeConformance] [Conformance]' [LinuxOnly] [NodeConformance] [Conformance]'
@ -926,7 +926,7 @@
MUST be readable. This test is marked LinuxOnly since Windows does not support MUST be readable. This test is marked LinuxOnly since Windows does not support
setting specific file permissions, or running as UID / GID. setting specific file permissions, or running as UID / GID.
release: v1.9 release: v1.9
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: EmptyDir, medium memory, volume mode 0666,, non-root user - testname: EmptyDir, medium memory, volume mode 0666,, non-root user
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0666,tmpfs) codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0666,tmpfs)
[LinuxOnly] [NodeConformance] [Conformance]' [LinuxOnly] [NodeConformance] [Conformance]'
@ -937,7 +937,7 @@
since Windows does not support setting specific file permissions, or running as since Windows does not support setting specific file permissions, or running as
UID / GID, or the medium = 'Memory'. UID / GID, or the medium = 'Memory'.
release: v1.9 release: v1.9
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: EmptyDir, medium default, volume mode 0777 - testname: EmptyDir, medium default, volume mode 0777
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0777,default) codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0777,default)
[LinuxOnly] [NodeConformance] [Conformance]' [LinuxOnly] [NodeConformance] [Conformance]'
@ -947,7 +947,7 @@
MUST be readable. This test is marked LinuxOnly since Windows does not support MUST be readable. This test is marked LinuxOnly since Windows does not support
setting specific file permissions, or running as UID / GID. setting specific file permissions, or running as UID / GID.
release: v1.9 release: v1.9
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: EmptyDir, medium memory, volume mode 0777, non-root user - testname: EmptyDir, medium memory, volume mode 0777, non-root user
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0777,tmpfs) codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0777,tmpfs)
[LinuxOnly] [NodeConformance] [Conformance]' [LinuxOnly] [NodeConformance] [Conformance]'
@ -958,7 +958,7 @@
since Windows does not support setting specific file permissions, or running as since Windows does not support setting specific file permissions, or running as
UID / GID, or the medium = 'Memory'. UID / GID, or the medium = 'Memory'.
release: v1.9 release: v1.9
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: EmptyDir, medium default, volume mode 0644 - testname: EmptyDir, medium default, volume mode 0644
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0644,default) codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0644,default)
[LinuxOnly] [NodeConformance] [Conformance]' [LinuxOnly] [NodeConformance] [Conformance]'
@ -967,7 +967,7 @@
MUST be readable. This test is marked LinuxOnly since Windows does not support MUST be readable. This test is marked LinuxOnly since Windows does not support
setting specific file permissions, or running as UID / GID. setting specific file permissions, or running as UID / GID.
release: v1.9 release: v1.9
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: EmptyDir, medium memory, volume mode 0644 - testname: EmptyDir, medium memory, volume mode 0644
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0644,tmpfs) codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0644,tmpfs)
[LinuxOnly] [NodeConformance] [Conformance]' [LinuxOnly] [NodeConformance] [Conformance]'
@ -977,7 +977,7 @@
Windows does not support setting specific file permissions, or running as UID Windows does not support setting specific file permissions, or running as UID
/ GID, or the medium = 'Memory'. / GID, or the medium = 'Memory'.
release: v1.9 release: v1.9
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: EmptyDir, medium default, volume mode 0666 - testname: EmptyDir, medium default, volume mode 0666
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0666,default) codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0666,default)
[LinuxOnly] [NodeConformance] [Conformance]' [LinuxOnly] [NodeConformance] [Conformance]'
@ -986,7 +986,7 @@
MUST be readable. This test is marked LinuxOnly since Windows does not support MUST be readable. This test is marked LinuxOnly since Windows does not support
setting specific file permissions, or running as UID / GID. setting specific file permissions, or running as UID / GID.
release: v1.9 release: v1.9
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: EmptyDir, medium memory, volume mode 0666 - testname: EmptyDir, medium memory, volume mode 0666
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0666,tmpfs) codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0666,tmpfs)
[LinuxOnly] [NodeConformance] [Conformance]' [LinuxOnly] [NodeConformance] [Conformance]'
@ -996,7 +996,7 @@
Windows does not support setting specific file permissions, or running as UID Windows does not support setting specific file permissions, or running as UID
/ GID, or the medium = 'Memory'. / GID, or the medium = 'Memory'.
release: v1.9 release: v1.9
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: EmptyDir, medium default, volume mode 0777 - testname: EmptyDir, medium default, volume mode 0777
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0777,default) codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0777,default)
[LinuxOnly] [NodeConformance] [Conformance]' [LinuxOnly] [NodeConformance] [Conformance]'
@ -1005,7 +1005,7 @@
MUST be readable. This test is marked LinuxOnly since Windows does not support MUST be readable. This test is marked LinuxOnly since Windows does not support
setting specific file permissions, or running as UID / GID. setting specific file permissions, or running as UID / GID.
release: v1.9 release: v1.9
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: EmptyDir, medium memory, volume mode 0777 - testname: EmptyDir, medium memory, volume mode 0777
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0777,tmpfs) codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0777,tmpfs)
[LinuxOnly] [NodeConformance] [Conformance]' [LinuxOnly] [NodeConformance] [Conformance]'
@ -1015,7 +1015,7 @@
since Windows does not support setting specific file permissions, or running as since Windows does not support setting specific file permissions, or running as
UID / GID, or the medium = 'Memory'. UID / GID, or the medium = 'Memory'.
release: v1.9 release: v1.9
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: EmptyDir, medium default, volume mode default - testname: EmptyDir, medium default, volume mode default
codename: '[k8s.io] [sig-storage] EmptyDir volumes volume on default medium should codename: '[k8s.io] [sig-storage] EmptyDir volumes volume on default medium should
have the correct mode [LinuxOnly] [NodeConformance] [Conformance]' have the correct mode [LinuxOnly] [NodeConformance] [Conformance]'
@ -1023,7 +1023,7 @@
set as -rwxrwxrwx and mount type set to tmpfs. This test is marked LinuxOnly since set as -rwxrwxrwx and mount type set to tmpfs. This test is marked LinuxOnly since
Windows does not support setting specific file permissions. Windows does not support setting specific file permissions.
release: v1.9 release: v1.9
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: EmptyDir, medium memory, volume mode default - testname: EmptyDir, medium memory, volume mode default
codename: '[k8s.io] [sig-storage] EmptyDir volumes volume on tmpfs should have the codename: '[k8s.io] [sig-storage] EmptyDir volumes volume on tmpfs should have the
correct mode [LinuxOnly] [NodeConformance] [Conformance]' correct mode [LinuxOnly] [NodeConformance] [Conformance]'
@ -1032,7 +1032,7 @@
is marked LinuxOnly since Windows does not support setting specific file permissions, is marked LinuxOnly since Windows does not support setting specific file permissions,
or the medium = 'Memory'. or the medium = 'Memory'.
release: v1.9 release: v1.9
file: test/e2e/common/empty_dir.go file: test/e2e/common/storage/empty_dir.go
- testname: Projected Volume, multiple projections - testname: Projected Volume, multiple projections
codename: '[k8s.io] [sig-storage] Projected combined should project all components codename: '[k8s.io] [sig-storage] Projected combined should project all components
that make up the projection API [Projection][NodeConformance] [Conformance]' that make up the projection API [Projection][NodeConformance] [Conformance]'
@ -1041,7 +1041,7 @@
Pod MUST be able to read the secrets, configMap values and the cpu and memory Pod MUST be able to read the secrets, configMap values and the cpu and memory
limits as well as cpu and memory requests from the mounted DownwardAPIVolumeFiles. limits as well as cpu and memory requests from the mounted DownwardAPIVolumeFiles.
release: v1.9 release: v1.9
file: test/e2e/common/projected_combined.go file: test/e2e/common/storage/projected_combined.go
- testname: Projected Volume, ConfigMap, create, update and delete - testname: Projected Volume, ConfigMap, create, update and delete
codename: '[k8s.io] [sig-storage] Projected configMap optional updates should be codename: '[k8s.io] [sig-storage] Projected configMap optional updates should be
reflected in volume [NodeConformance] [Conformance]' reflected in volume [NodeConformance] [Conformance]'
@ -1053,7 +1053,7 @@
be able to read the updated configMap value. Delete the configMap in the delete be able to read the updated configMap value. Delete the configMap in the delete
container. Pod MUST fail to read the configMap from the delete container. container. Pod MUST fail to read the configMap from the delete container.
release: v1.9 release: v1.9
file: test/e2e/common/projected_configmap.go file: test/e2e/common/storage/projected_configmap.go
- testname: Projected Volume, ConfigMap, volume mode default - testname: Projected Volume, ConfigMap, volume mode default
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
pods in volume [NodeConformance] [Conformance]' pods in volume [NodeConformance] [Conformance]'
@ -1061,7 +1061,7 @@
a configMap with default permission mode. Pod MUST be able to read the content a configMap with default permission mode. Pod MUST be able to read the content
of the ConfigMap successfully and the mode on the volume MUST be -rw-r--r--. of the ConfigMap successfully and the mode on the volume MUST be -rw-r--r--.
release: v1.9 release: v1.9
file: test/e2e/common/projected_configmap.go file: test/e2e/common/storage/projected_configmap.go
- testname: Projected Volume, ConfigMap, non-root user - testname: Projected Volume, ConfigMap, non-root user
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
pods in volume as non-root [NodeConformance] [Conformance]' pods in volume as non-root [NodeConformance] [Conformance]'
@ -1069,7 +1069,7 @@
a configMap as non-root user with uid 1000. Pod MUST be able to read the content a configMap as non-root user with uid 1000. Pod MUST be able to read the content
of the ConfigMap successfully and the mode on the volume MUST be -rw-r--r--. of the ConfigMap successfully and the mode on the volume MUST be -rw-r--r--.
release: v1.9 release: v1.9
file: test/e2e/common/projected_configmap.go file: test/e2e/common/storage/projected_configmap.go
- testname: Projected Volume, ConfigMap, volume mode 0400 - testname: Projected Volume, ConfigMap, volume mode 0400
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]' pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]'
@ -1079,7 +1079,7 @@
test is marked LinuxOnly since Windows does not support setting specific file test is marked LinuxOnly since Windows does not support setting specific file
permissions. permissions.
release: v1.9 release: v1.9
file: test/e2e/common/projected_configmap.go file: test/e2e/common/storage/projected_configmap.go
- testname: Projected Volume, ConfigMap, mapped - testname: Projected Volume, ConfigMap, mapped
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
pods in volume with mappings [NodeConformance] [Conformance]' pods in volume with mappings [NodeConformance] [Conformance]'
@ -1088,7 +1088,7 @@
path. Pod MUST be able to read the content of the ConfigMap from the custom location path. Pod MUST be able to read the content of the ConfigMap from the custom location
successfully and the mode on the volume MUST be -rw-r--r--. successfully and the mode on the volume MUST be -rw-r--r--.
release: v1.9 release: v1.9
file: test/e2e/common/projected_configmap.go file: test/e2e/common/storage/projected_configmap.go
- testname: Projected Volume, ConfigMap, mapped, volume mode 0400 - testname: Projected Volume, ConfigMap, mapped, volume mode 0400
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]' pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]'
@ -1099,7 +1099,7 @@
test is marked LinuxOnly since Windows does not support setting specific file test is marked LinuxOnly since Windows does not support setting specific file
permissions. permissions.
release: v1.9 release: v1.9
file: test/e2e/common/projected_configmap.go file: test/e2e/common/storage/projected_configmap.go
- testname: Projected Volume, ConfigMap, mapped, non-root user - testname: Projected Volume, ConfigMap, mapped, non-root user
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
pods in volume with mappings as non-root [NodeConformance] [Conformance]' pods in volume with mappings as non-root [NodeConformance] [Conformance]'
@ -1108,7 +1108,7 @@
custom path. Pod MUST be able to read the content of the ConfigMap from the custom custom path. Pod MUST be able to read the content of the ConfigMap from the custom
location successfully and the mode on the volume MUST be -r--r--r--. location successfully and the mode on the volume MUST be -r--r--r--.
release: v1.9 release: v1.9
file: test/e2e/common/projected_configmap.go file: test/e2e/common/storage/projected_configmap.go
- testname: Projected Volume, ConfigMap, multiple volume paths - testname: Projected Volume, ConfigMap, multiple volume paths
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable in multiple codename: '[k8s.io] [sig-storage] Projected configMap should be consumable in multiple
volumes in the same pod [NodeConformance] [Conformance]' volumes in the same pod [NodeConformance] [Conformance]'
@ -1117,7 +1117,7 @@
be able to read the content of the configMap successfully from the two volume be able to read the content of the configMap successfully from the two volume
mounts. mounts.
release: v1.9 release: v1.9
file: test/e2e/common/projected_configmap.go file: test/e2e/common/storage/projected_configmap.go
- testname: Projected Volume, ConfigMap, update - testname: Projected Volume, ConfigMap, update
codename: '[k8s.io] [sig-storage] Projected configMap updates should be reflected codename: '[k8s.io] [sig-storage] Projected configMap updates should be reflected
in volume [NodeConformance] [Conformance]' in volume [NodeConformance] [Conformance]'
@ -1126,7 +1126,7 @@
create the configMap with value-1. Pod MUST be able to update the value in the create the configMap with value-1. Pod MUST be able to update the value in the
confgiMap to value-2. confgiMap to value-2.
release: v1.9 release: v1.9
file: test/e2e/common/projected_configmap.go file: test/e2e/common/storage/projected_configmap.go
- testname: Projected Volume, DownwardAPI, CPU limits - testname: Projected Volume, DownwardAPI, CPU limits
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s
cpu limit [NodeConformance] [Conformance]' cpu limit [NodeConformance] [Conformance]'
@ -1134,7 +1134,7 @@
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
to read the cpu limits from the mounted DownwardAPIVolumeFiles. to read the cpu limits from the mounted DownwardAPIVolumeFiles.
release: v1.9 release: v1.9
file: test/e2e/common/projected_downwardapi.go file: test/e2e/common/storage/projected_downwardapi.go
- testname: Projected Volume, DownwardAPI, CPU request - testname: Projected Volume, DownwardAPI, CPU request
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s
cpu request [NodeConformance] [Conformance]' cpu request [NodeConformance] [Conformance]'
@ -1142,7 +1142,7 @@
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
to read the cpu request from the mounted DownwardAPIVolumeFiles. to read the cpu request from the mounted DownwardAPIVolumeFiles.
release: v1.9 release: v1.9
file: test/e2e/common/projected_downwardapi.go file: test/e2e/common/storage/projected_downwardapi.go
- testname: Projected Volume, DownwardAPI, memory limits - testname: Projected Volume, DownwardAPI, memory limits
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s
memory limit [NodeConformance] [Conformance]' memory limit [NodeConformance] [Conformance]'
@ -1150,7 +1150,7 @@
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
to read the memory limits from the mounted DownwardAPIVolumeFiles. to read the memory limits from the mounted DownwardAPIVolumeFiles.
release: v1.9 release: v1.9
file: test/e2e/common/projected_downwardapi.go file: test/e2e/common/storage/projected_downwardapi.go
- testname: Projected Volume, DownwardAPI, memory request - testname: Projected Volume, DownwardAPI, memory request
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s
memory request [NodeConformance] [Conformance]' memory request [NodeConformance] [Conformance]'
@ -1158,7 +1158,7 @@
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
to read the memory request from the mounted DownwardAPIVolumeFiles. to read the memory request from the mounted DownwardAPIVolumeFiles.
release: v1.9 release: v1.9
file: test/e2e/common/projected_downwardapi.go file: test/e2e/common/storage/projected_downwardapi.go
- testname: Projected Volume, DownwardAPI, CPU limit, node allocatable - testname: Projected Volume, DownwardAPI, CPU limit, node allocatable
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide node allocatable codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide node allocatable
(cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]' (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]'
@ -1167,7 +1167,7 @@
resources for requests and limits are NOT specified for the container. Pod MUST resources for requests and limits are NOT specified for the container. Pod MUST
be able to read the default cpu limits from the mounted DownwardAPIVolumeFiles. be able to read the default cpu limits from the mounted DownwardAPIVolumeFiles.
release: v1.9 release: v1.9
file: test/e2e/common/projected_downwardapi.go file: test/e2e/common/storage/projected_downwardapi.go
- testname: Projected Volume, DownwardAPI, memory limit, node allocatable - testname: Projected Volume, DownwardAPI, memory limit, node allocatable
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide node allocatable codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide node allocatable
(memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]' (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]'
@ -1176,7 +1176,7 @@
resources for requests and limits are NOT specified for the container. Pod MUST resources for requests and limits are NOT specified for the container. Pod MUST
be able to read the default memory limits from the mounted DownwardAPIVolumeFiles. be able to read the default memory limits from the mounted DownwardAPIVolumeFiles.
release: v1.9 release: v1.9
file: test/e2e/common/projected_downwardapi.go file: test/e2e/common/storage/projected_downwardapi.go
- testname: Projected Volume, DownwardAPI, pod name - testname: Projected Volume, DownwardAPI, pod name
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide podname only codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide podname only
[NodeConformance] [Conformance]' [NodeConformance] [Conformance]'
@ -1184,7 +1184,7 @@
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
to read the pod name from the mounted DownwardAPIVolumeFiles. to read the pod name from the mounted DownwardAPIVolumeFiles.
release: v1.9 release: v1.9
file: test/e2e/common/projected_downwardapi.go file: test/e2e/common/storage/projected_downwardapi.go
- testname: Projected Volume, DownwardAPI, volume mode 0400 - testname: Projected Volume, DownwardAPI, volume mode 0400
codename: '[k8s.io] [sig-storage] Projected downwardAPI should set DefaultMode on codename: '[k8s.io] [sig-storage] Projected downwardAPI should set DefaultMode on
files [LinuxOnly] [NodeConformance] [Conformance]' files [LinuxOnly] [NodeConformance] [Conformance]'
@ -1195,7 +1195,7 @@
test is marked LinuxOnly since Windows does not support setting specific file test is marked LinuxOnly since Windows does not support setting specific file
permissions. permissions.
release: v1.9 release: v1.9
file: test/e2e/common/projected_downwardapi.go file: test/e2e/common/storage/projected_downwardapi.go
- testname: Projected Volume, DownwardAPI, volume mode 0400 - testname: Projected Volume, DownwardAPI, volume mode 0400
codename: '[k8s.io] [sig-storage] Projected downwardAPI should set mode on item codename: '[k8s.io] [sig-storage] Projected downwardAPI should set mode on item
file [LinuxOnly] [NodeConformance] [Conformance]' file [LinuxOnly] [NodeConformance] [Conformance]'
@ -1206,7 +1206,7 @@
test is marked LinuxOnly since Windows does not support setting specific file test is marked LinuxOnly since Windows does not support setting specific file
permissions. permissions.
release: v1.9 release: v1.9
file: test/e2e/common/projected_downwardapi.go file: test/e2e/common/storage/projected_downwardapi.go
- testname: Projected Volume, DownwardAPI, update annotation - testname: Projected Volume, DownwardAPI, update annotation
codename: '[k8s.io] [sig-storage] Projected downwardAPI should update annotations codename: '[k8s.io] [sig-storage] Projected downwardAPI should update annotations
on modification [NodeConformance] [Conformance]' on modification [NodeConformance] [Conformance]'
@ -1216,7 +1216,7 @@
Annotations are then updated. Pod MUST be able to read the updated values for Annotations are then updated. Pod MUST be able to read the updated values for
the Annotations. the Annotations.
release: v1.9 release: v1.9
file: test/e2e/common/projected_downwardapi.go file: test/e2e/common/storage/projected_downwardapi.go
- testname: Projected Volume, DownwardAPI, update labels - testname: Projected Volume, DownwardAPI, update labels
codename: '[k8s.io] [sig-storage] Projected downwardAPI should update labels on codename: '[k8s.io] [sig-storage] Projected downwardAPI should update labels on
modification [NodeConformance] [Conformance]' modification [NodeConformance] [Conformance]'
@ -1225,7 +1225,7 @@
MUST be able to read the labels from the mounted DownwardAPIVolumeFiles. Labels MUST be able to read the labels from the mounted DownwardAPIVolumeFiles. Labels
are then updated. Pod MUST be able to read the updated values for the Labels. are then updated. Pod MUST be able to read the updated values for the Labels.
release: v1.9 release: v1.9
file: test/e2e/common/projected_downwardapi.go file: test/e2e/common/storage/projected_downwardapi.go
- testname: Projected Volume, Secrets, create, update delete - testname: Projected Volume, Secrets, create, update delete
codename: '[k8s.io] [sig-storage] Projected secret optional updates should be reflected codename: '[k8s.io] [sig-storage] Projected secret optional updates should be reflected
in volume [NodeConformance] [Conformance]' in volume [NodeConformance] [Conformance]'
@ -1237,7 +1237,7 @@
the updated secret value. Delete the secret in the delete container. Pod MUST the updated secret value. Delete the secret in the delete container. Pod MUST
fail to read the secret from the delete container. fail to read the secret from the delete container.
release: v1.9 release: v1.9
file: test/e2e/common/projected_secret.go file: test/e2e/common/storage/projected_secret.go
- testname: Projected Volume, Secrets, volume mode default - testname: Projected Volume, Secrets, volume mode default
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
in volume [NodeConformance] [Conformance]' in volume [NodeConformance] [Conformance]'
@ -1245,7 +1245,7 @@
secret with a specified key with default permission mode. Pod MUST be able to secret with a specified key with default permission mode. Pod MUST be able to
read the content of the key successfully and the mode MUST be -rw-r--r-- by default. read the content of the key successfully and the mode MUST be -rw-r--r-- by default.
release: v1.9 release: v1.9
file: test/e2e/common/projected_secret.go file: test/e2e/common/storage/projected_secret.go
- testname: Project Volume, Secrets, non-root, custom fsGroup - testname: Project Volume, Secrets, non-root, custom fsGroup
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance]
@ -1257,7 +1257,7 @@
marked LinuxOnly since Windows does not support setting specific file permissions, marked LinuxOnly since Windows does not support setting specific file permissions,
or running as UID / GID. or running as UID / GID.
release: v1.9 release: v1.9
file: test/e2e/common/projected_secret.go file: test/e2e/common/storage/projected_secret.go
- testname: Projected Volume, Secrets, volume mode 0400 - testname: Projected Volume, Secrets, volume mode 0400
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]' in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]'
@ -1267,7 +1267,7 @@
-r--------. This test is marked LinuxOnly since Windows does not support setting -r--------. This test is marked LinuxOnly since Windows does not support setting
specific file permissions. specific file permissions.
release: v1.9 release: v1.9
file: test/e2e/common/projected_secret.go file: test/e2e/common/storage/projected_secret.go
- testname: Projected Volume, Secrets, mapped - testname: Projected Volume, Secrets, mapped
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
in volume with mappings [NodeConformance] [Conformance]' in volume with mappings [NodeConformance] [Conformance]'
@ -1276,7 +1276,7 @@
to a custom path. Pod MUST be able to read the content of the key successfully to a custom path. Pod MUST be able to read the content of the key successfully
and the mode MUST be -r--------on the mapped volume. and the mode MUST be -r--------on the mapped volume.
release: v1.9 release: v1.9
file: test/e2e/common/projected_secret.go file: test/e2e/common/storage/projected_secret.go
- testname: Projected Volume, Secrets, mapped, volume mode 0400 - testname: Projected Volume, Secrets, mapped, volume mode 0400
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]' in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]'
@ -1286,7 +1286,7 @@
and the mode MUST be -r-------- on the mapped volume. This test is marked LinuxOnly and the mode MUST be -r-------- on the mapped volume. This test is marked LinuxOnly
since Windows does not support setting specific file permissions. since Windows does not support setting specific file permissions.
release: v1.9 release: v1.9
file: test/e2e/common/projected_secret.go file: test/e2e/common/storage/projected_secret.go
- testname: Projected Volume, Secrets, mapped, multiple paths - testname: Projected Volume, Secrets, mapped, multiple paths
codename: '[k8s.io] [sig-storage] Projected secret should be consumable in multiple codename: '[k8s.io] [sig-storage] Projected secret should be consumable in multiple
volumes in a pod [NodeConformance] [Conformance]' volumes in a pod [NodeConformance] [Conformance]'
@ -1295,7 +1295,7 @@
Pod MUST be able to read the content of the key successfully from the two volume Pod MUST be able to read the content of the key successfully from the two volume
mounts and the mode MUST be -r-------- on the mapped volumes. mounts and the mode MUST be -r-------- on the mapped volumes.
release: v1.9 release: v1.9
file: test/e2e/common/projected_secret.go file: test/e2e/common/storage/projected_secret.go
- testname: Secrets Volume, create, update and delete - testname: Secrets Volume, create, update and delete
codename: '[k8s.io] [sig-storage] Secrets optional updates should be reflected in codename: '[k8s.io] [sig-storage] Secrets optional updates should be reflected in
volume [NodeConformance] [Conformance]' volume [NodeConformance] [Conformance]'
@ -1307,7 +1307,7 @@
be able to read the updated secret value. Delete the secret in the delete container. be able to read the updated secret value. Delete the secret in the delete container.
Pod MUST fail to read the secret from the delete container. Pod MUST fail to read the secret from the delete container.
release: v1.9 release: v1.9
file: test/e2e/common/secrets_volume.go file: test/e2e/common/storage/secrets_volume.go
- testname: Secrets Volume, volume mode default, secret with same name in different - testname: Secrets Volume, volume mode default, secret with same name in different
namespace namespace
codename: '[k8s.io] [sig-storage] Secrets should be able to mount in a volume regardless codename: '[k8s.io] [sig-storage] Secrets should be able to mount in a volume regardless
@ -1319,7 +1319,7 @@
are associated with namespace where pod is created. The file mode of the secret are associated with namespace where pod is created. The file mode of the secret
MUST be -rw-r--r-- by default. MUST be -rw-r--r-- by default.
release: v1.12 release: v1.12
file: test/e2e/common/secrets_volume.go file: test/e2e/common/storage/secrets_volume.go
- testname: Secrets Volume, default - testname: Secrets Volume, default
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
[NodeConformance] [Conformance]' [NodeConformance] [Conformance]'
@ -1328,7 +1328,7 @@
from the container runtime and the file mode of the secret MUST be -rw-r--r-- from the container runtime and the file mode of the secret MUST be -rw-r--r--
by default. by default.
release: v1.9 release: v1.9
file: test/e2e/common/secrets_volume.go file: test/e2e/common/storage/secrets_volume.go
- testname: Secrets Volume, volume mode 0440, fsGroup 1001 and uid 1000 - testname: Secrets Volume, volume mode 0440, fsGroup 1001 and uid 1000
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]' as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]'
@ -1339,7 +1339,7 @@
default. This test is marked LinuxOnly since Windows does not support setting default. This test is marked LinuxOnly since Windows does not support setting
specific file permissions, or running as UID / GID. specific file permissions, or running as UID / GID.
release: v1.9 release: v1.9
file: test/e2e/common/secrets_volume.go file: test/e2e/common/storage/secrets_volume.go
- testname: Secrets Volume, volume mode 0400 - testname: Secrets Volume, volume mode 0400
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]' with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]'
@ -1349,7 +1349,7 @@
MUST be -r-------- by default. This test is marked LinuxOnly since Windows does MUST be -r-------- by default. This test is marked LinuxOnly since Windows does
not support setting specific file permissions. not support setting specific file permissions.
release: v1.9 release: v1.9
file: test/e2e/common/secrets_volume.go file: test/e2e/common/storage/secrets_volume.go
- testname: Secrets Volume, mapping - testname: Secrets Volume, mapping
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
with mappings [NodeConformance] [Conformance]' with mappings [NodeConformance] [Conformance]'
@ -1358,7 +1358,7 @@
the mounted volume from the specified custom path. The file mode of the secret the mounted volume from the specified custom path. The file mode of the secret
MUST be -rw-r--r-- by default. MUST be -rw-r--r-- by default.
release: v1.9 release: v1.9
file: test/e2e/common/secrets_volume.go file: test/e2e/common/storage/secrets_volume.go
- testname: Secrets Volume, mapping, volume mode 0400 - testname: Secrets Volume, mapping, volume mode 0400
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]' with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]'
@ -1368,7 +1368,7 @@
The file mode of the secret MUST be -r--r--r--. This test is marked LinuxOnly The file mode of the secret MUST be -r--r--r--. This test is marked LinuxOnly
since Windows does not support setting specific file permissions. since Windows does not support setting specific file permissions.
release: v1.9 release: v1.9
file: test/e2e/common/secrets_volume.go file: test/e2e/common/storage/secrets_volume.go
- testname: Secrets Volume, mapping multiple volume paths - testname: Secrets Volume, mapping multiple volume paths
codename: '[k8s.io] [sig-storage] Secrets should be consumable in multiple volumes codename: '[k8s.io] [sig-storage] Secrets should be consumable in multiple volumes
in a pod [NodeConformance] [Conformance]' in a pod [NodeConformance] [Conformance]'
@ -1376,7 +1376,7 @@
into the container in to two different custom paths. Pod MUST be able to read into the container in to two different custom paths. Pod MUST be able to read
the secret from the both the mounted volumes from the two specified custom paths. the secret from the both the mounted volumes from the two specified custom paths.
release: v1.9 release: v1.9
file: test/e2e/common/secrets_volume.go file: test/e2e/common/storage/secrets_volume.go
- testname: Secrets Volume, immutability - testname: Secrets Volume, immutability
codename: '[k8s.io] [sig-storage] Secrets should be immutable if `immutable` field codename: '[k8s.io] [sig-storage] Secrets should be immutable if `immutable` field
is set [Conformance]' is set [Conformance]'
@ -1386,7 +1386,7 @@
fail. Try to update the secret`s metadata (labels), the update must succeed. Try fail. Try to update the secret`s metadata (labels), the update must succeed. Try
to delete the secret, the deletion must succeed. to delete the secret, the deletion must succeed.
release: v1.21 release: v1.21
file: test/e2e/common/secrets_volume.go file: test/e2e/common/storage/secrets_volume.go
- testname: Admission webhook, list mutating webhooks - testname: Admission webhook, list mutating webhooks
codename: '[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing codename: '[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing
mutating webhooks should work [Conformance]' mutating webhooks should work [Conformance]'

View File

@ -8,35 +8,23 @@ load(
go_library( go_library(
name = "go_default_library", name = "go_default_library",
srcs = [ srcs = [
"configmap.go",
"configmap_volume.go",
"container.go", "container.go",
"container_probe.go", "container_probe.go",
"docker_containers.go", "docker_containers.go",
"downward_api.go", "downwardapi.go",
"downwardapi_volume.go",
"empty_dir.go",
"expansion.go", "expansion.go",
"framework.go", "framework.go",
"host_path.go", "imports.go",
"init_container.go", "init_container.go",
"kubelet.go", "kubelet.go",
"kubelet_etc_hosts.go", "kubelet_etc_hosts.go",
"lease.go", "lease.go",
"lifecycle_hook.go", "lifecycle_hook.go",
"networking.go",
"node_lease.go", "node_lease.go",
"pods.go", "pods.go",
"podtemplates.go",
"privileged.go", "privileged.go",
"projected_combined.go",
"projected_configmap.go",
"projected_downwardapi.go",
"projected_secret.go",
"runtime.go", "runtime.go",
"runtimeclass.go",
"secrets.go", "secrets.go",
"secrets_volume.go",
"security_context.go", "security_context.go",
"sysctl.go", "sysctl.go",
"util.go", "util.go",
@ -46,14 +34,11 @@ go_library(
deps = [ deps = [
"//pkg/api/v1/pod:go_default_library", "//pkg/api/v1/pod:go_default_library",
"//pkg/client/conditions:go_default_library", "//pkg/client/conditions:go_default_library",
"//pkg/features:go_default_library",
"//pkg/kubelet:go_default_library", "//pkg/kubelet:go_default_library",
"//pkg/kubelet/events:go_default_library", "//pkg/kubelet/events:go_default_library",
"//pkg/kubelet/images:go_default_library", "//pkg/kubelet/images:go_default_library",
"//pkg/kubelet/runtimeclass/testing:go_default_library",
"//staging/src/k8s.io/api/coordination/v1:go_default_library", "//staging/src/k8s.io/api/coordination/v1:go_default_library",
"//staging/src/k8s.io/api/core/v1:go_default_library", "//staging/src/k8s.io/api/core/v1:go_default_library",
"//staging/src/k8s.io/api/node/v1:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/api/equality:go_default_library", "//staging/src/k8s.io/apimachinery/pkg/api/equality:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/api/errors:go_default_library", "//staging/src/k8s.io/apimachinery/pkg/api/errors:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/api/resource:go_default_library", "//staging/src/k8s.io/apimachinery/pkg/api/resource:go_default_library",
@ -70,11 +55,13 @@ go_library(
"//staging/src/k8s.io/apimachinery/pkg/util/uuid:go_default_library", "//staging/src/k8s.io/apimachinery/pkg/util/uuid:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/util/wait:go_default_library", "//staging/src/k8s.io/apimachinery/pkg/util/wait:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/watch:go_default_library", "//staging/src/k8s.io/apimachinery/pkg/watch:go_default_library",
"//staging/src/k8s.io/apiserver/pkg/util/feature:go_default_library",
"//staging/src/k8s.io/client-go/dynamic:go_default_library", "//staging/src/k8s.io/client-go/dynamic:go_default_library",
"//staging/src/k8s.io/client-go/kubernetes:go_default_library", "//staging/src/k8s.io/client-go/kubernetes:go_default_library",
"//staging/src/k8s.io/client-go/tools/cache:go_default_library", "//staging/src/k8s.io/client-go/tools/cache:go_default_library",
"//staging/src/k8s.io/client-go/tools/watch:go_default_library", "//staging/src/k8s.io/client-go/tools/watch:go_default_library",
"//test/e2e/common/network:go_default_library",
"//test/e2e/common/node:go_default_library",
"//test/e2e/common/storage:go_default_library",
"//test/e2e/framework:go_default_library", "//test/e2e/framework:go_default_library",
"//test/e2e/framework/events:go_default_library", "//test/e2e/framework/events:go_default_library",
"//test/e2e/framework/network:go_default_library", "//test/e2e/framework/network:go_default_library",
@ -104,6 +91,11 @@ filegroup(
filegroup( filegroup(
name = "all-srcs", name = "all-srcs",
srcs = [":package-srcs"], srcs = [
":package-srcs",
"//test/e2e/common/network:all-srcs",
"//test/e2e/common/node:all-srcs",
"//test/e2e/common/storage:all-srcs",
],
tags = ["automanaged"], tags = ["automanaged"],
) )

View File

@ -0,0 +1,24 @@
/*
Copyright 2021 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package common
import (
// ensure these packages are scanned by ginkgo for e2e tests
_ "k8s.io/kubernetes/test/e2e/common/network"
_ "k8s.io/kubernetes/test/e2e/common/node"
_ "k8s.io/kubernetes/test/e2e/common/storage"
)

View File

@ -0,0 +1,32 @@
load("@io_bazel_rules_go//go:def.bzl", "go_library")
go_library(
name = "go_default_library",
srcs = [
"framework.go",
"networking.go",
],
importpath = "k8s.io/kubernetes/test/e2e/common/network",
visibility = ["//visibility:public"],
deps = [
"//staging/src/k8s.io/api/core/v1:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/util/sets:go_default_library",
"//test/e2e/framework:go_default_library",
"//test/e2e/framework/network:go_default_library",
"//vendor/github.com/onsi/ginkgo:go_default_library",
],
)
filegroup(
name = "package-srcs",
srcs = glob(["**"]),
tags = ["automanaged"],
visibility = ["//visibility:private"],
)
filegroup(
name = "all-srcs",
srcs = [":package-srcs"],
tags = ["automanaged"],
visibility = ["//visibility:public"],
)

View File

@ -0,0 +1,4 @@
# See the OWNERS docs at https://go.k8s.io/owners
labels:
- sig/network

View File

@ -0,0 +1,24 @@
/*
Copyright 2021 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package network
import "k8s.io/kubernetes/test/e2e/framework"
// SIGDescribe annotates the test with the SIG label.
func SIGDescribe(text string, body func()) bool {
return framework.KubeDescribe("[sig-network] "+text, body)
}

View File

@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
limitations under the License. limitations under the License.
*/ */
package common package network
import ( import (
"github.com/onsi/ginkgo" "github.com/onsi/ginkgo"
@ -24,7 +24,7 @@ import (
e2enetwork "k8s.io/kubernetes/test/e2e/framework/network" e2enetwork "k8s.io/kubernetes/test/e2e/framework/network"
) )
var _ = SIGNetworkDescribe("Networking", func() { var _ = SIGDescribe("Networking", func() {
f := framework.NewDefaultFramework("pod-network-test") f := framework.NewDefaultFramework("pod-network-test")
ginkgo.Describe("Granular Checks: Pods", func() { ginkgo.Describe("Granular Checks: Pods", func() {

View File

@ -0,0 +1,46 @@
load("@io_bazel_rules_go//go:def.bzl", "go_library")
go_library(
name = "go_default_library",
srcs = [
"configmap.go",
"framework.go",
"podtemplates.go",
"runtimeclass.go",
],
importpath = "k8s.io/kubernetes/test/e2e/common/node",
visibility = ["//visibility:public"],
deps = [
"//pkg/kubelet/events:go_default_library",
"//pkg/kubelet/runtimeclass/testing:go_default_library",
"//staging/src/k8s.io/api/core/v1:go_default_library",
"//staging/src/k8s.io/api/node/v1:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/api/errors:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/fields:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/types:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/util/uuid:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/util/wait:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/watch:go_default_library",
"//test/e2e/framework:go_default_library",
"//test/e2e/framework/events:go_default_library",
"//test/e2e/framework/node:go_default_library",
"//test/e2e/framework/pod:go_default_library",
"//test/utils/image:go_default_library",
"//vendor/github.com/onsi/ginkgo:go_default_library",
],
)
filegroup(
name = "package-srcs",
srcs = glob(["**"]),
tags = ["automanaged"],
visibility = ["//visibility:private"],
)
filegroup(
name = "all-srcs",
srcs = [":package-srcs"],
tags = ["automanaged"],
visibility = ["//visibility:public"],
)

View File

@ -0,0 +1,4 @@
# See the OWNERS docs at https://go.k8s.io/owners
labels:
- sig/node

View File

@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
limitations under the License. limitations under the License.
*/ */
package common package node
import ( import (
"context" "context"
@ -31,7 +31,7 @@ import (
"github.com/onsi/ginkgo" "github.com/onsi/ginkgo"
) )
var _ = SIGNodeDescribe("ConfigMap", func() { var _ = SIGDescribe("ConfigMap", func() {
f := framework.NewDefaultFramework("configmap") f := framework.NewDefaultFramework("configmap")
/* /*
@ -238,6 +238,21 @@ var _ = SIGNodeDescribe("ConfigMap", func() {
}) })
}) })
func newConfigMap(f *framework.Framework, name string) *v1.ConfigMap {
return &v1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{
Namespace: f.Namespace.Name,
Name: name,
},
Data: map[string]string{
"data-1": "value-1",
"data-2": "value-2",
"data-3": "value-3",
},
}
}
// TODO: Unify with newConfigMap
func newEnvFromConfigMap(f *framework.Framework, name string) *v1.ConfigMap { func newEnvFromConfigMap(f *framework.Framework, name string) *v1.ConfigMap {
return &v1.ConfigMap{ return &v1.ConfigMap{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{

View File

@ -0,0 +1,24 @@
/*
Copyright 2021 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package node
import "k8s.io/kubernetes/test/e2e/framework"
// SIGDescribe annotates the test with the SIG label.
func SIGDescribe(text string, body func()) bool {
return framework.KubeDescribe("[sig-node] "+text, body)
}

View File

@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
limitations under the License. limitations under the License.
*/ */
package common package node
import ( import (
"context" "context"
@ -38,7 +38,7 @@ const (
podTemplateRetryTimeout = 1 * time.Minute podTemplateRetryTimeout = 1 * time.Minute
) )
var _ = SIGNodeDescribe("PodTemplates", func() { var _ = SIGDescribe("PodTemplates", func() {
f := framework.NewDefaultFramework("podtemplate") f := framework.NewDefaultFramework("podtemplate")
/* /*
Release: v1.19 Release: v1.19

View File

@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
limitations under the License. limitations under the License.
*/ */
package common package node
import ( import (
"context" "context"
@ -39,7 +39,7 @@ import (
"github.com/onsi/ginkgo" "github.com/onsi/ginkgo"
) )
var _ = SIGNodeDescribe("RuntimeClass", func() { var _ = SIGDescribe("RuntimeClass", func() {
f := framework.NewDefaultFramework("runtimeclass") f := framework.NewDefaultFramework("runtimeclass")
ginkgo.It("should reject a Pod requesting a non-existent RuntimeClass [NodeFeature:RuntimeHandler]", func() { ginkgo.It("should reject a Pod requesting a non-existent RuntimeClass [NodeFeature:RuntimeHandler]", func() {

View File

@ -233,6 +233,21 @@ var _ = ginkgo.Describe("[sig-api-machinery] Secrets", func() {
}) })
}) })
func secretForTest(namespace, name string) *v1.Secret {
return &v1.Secret{
ObjectMeta: metav1.ObjectMeta{
Namespace: namespace,
Name: name,
},
Data: map[string][]byte{
"data-1": []byte("value-1\n"),
"data-2": []byte("value-2\n"),
"data-3": []byte("value-3\n"),
},
}
}
// TODO: Unify with secretForTest.
func newEnvFromSecret(namespace, name string) *v1.Secret { func newEnvFromSecret(namespace, name string) *v1.Secret {
return &v1.Secret{ return &v1.Secret{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{

View File

@ -0,0 +1,49 @@
load("@io_bazel_rules_go//go:def.bzl", "go_library")
go_library(
name = "go_default_library",
srcs = [
"configmap_volume.go",
"downwardapi_volume.go",
"empty_dir.go",
"framework.go",
"host_path.go",
"projected_combined.go",
"projected_configmap.go",
"projected_downwardapi.go",
"projected_secret.go",
"secrets_volume.go",
"util.go",
],
importpath = "k8s.io/kubernetes/test/e2e/common/storage",
visibility = ["//visibility:public"],
deps = [
"//pkg/features:go_default_library",
"//staging/src/k8s.io/api/core/v1:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/api/errors:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/api/resource:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/apis/meta/v1:go_default_library",
"//staging/src/k8s.io/apimachinery/pkg/util/uuid:go_default_library",
"//staging/src/k8s.io/apiserver/pkg/util/feature:go_default_library",
"//test/e2e/framework:go_default_library",
"//test/e2e/framework/pod:go_default_library",
"//test/e2e/framework/skipper:go_default_library",
"//test/utils/image:go_default_library",
"//vendor/github.com/onsi/ginkgo:go_default_library",
"//vendor/github.com/onsi/gomega:go_default_library",
],
)
filegroup(
name = "package-srcs",
srcs = glob(["**"]),
tags = ["automanaged"],
visibility = ["//visibility:private"],
)
filegroup(
name = "all-srcs",
srcs = [":package-srcs"],
tags = ["automanaged"],
visibility = ["//visibility:public"],
)

View File

@ -0,0 +1,4 @@
# See the OWNERS docs at https://go.k8s.io/owners
labels:
- sig/storage

View File

@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
limitations under the License. limitations under the License.
*/ */
package common package storage
import ( import (
"context" "context"
@ -33,7 +33,7 @@ import (
imageutils "k8s.io/kubernetes/test/utils/image" imageutils "k8s.io/kubernetes/test/utils/image"
) )
var _ = SIGStorageDescribe("ConfigMap", func() { var _ = SIGDescribe("ConfigMap", func() {
f := framework.NewDefaultFramework("configmap") f := framework.NewDefaultFramework("configmap")
/* /*

View File

@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
limitations under the License. limitations under the License.
*/ */
package common package storage
import ( import (
"fmt" "fmt"
@ -33,7 +33,7 @@ import (
"github.com/onsi/gomega" "github.com/onsi/gomega"
) )
var _ = SIGStorageDescribe("Downward API volume", func() { var _ = SIGDescribe("Downward API volume", func() {
// How long to wait for a log pod to be displayed // How long to wait for a log pod to be displayed
const podLogTimeout = 3 * time.Minute const podLogTimeout = 3 * time.Minute
f := framework.NewDefaultFramework("downward-api") f := framework.NewDefaultFramework("downward-api")

View File

@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
limitations under the License. limitations under the License.
*/ */
package common package storage
import ( import (
"context" "context"
@ -42,7 +42,7 @@ var (
nonRootUID = int64(1001) nonRootUID = int64(1001)
) )
var _ = SIGStorageDescribe("EmptyDir volumes", func() { var _ = SIGDescribe("EmptyDir volumes", func() {
f := framework.NewDefaultFramework("emptydir") f := framework.NewDefaultFramework("emptydir")
ginkgo.Context("when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup]", func() { ginkgo.Context("when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup]", func() {

View File

@ -0,0 +1,24 @@
/*
Copyright 2021 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package storage
import "k8s.io/kubernetes/test/e2e/framework"
// SIGDescribe annotates the test with the SIG label.
func SIGDescribe(text string, body func()) bool {
return framework.KubeDescribe("[sig-storage] "+text, body)
}

View File

@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
limitations under the License. limitations under the License.
*/ */
package common package storage
import ( import (
"fmt" "fmt"
@ -31,7 +31,7 @@ import (
//TODO : Consolidate this code with the code for emptyDir. //TODO : Consolidate this code with the code for emptyDir.
//This will require some smart. //This will require some smart.
var _ = SIGStorageDescribe("HostPath", func() { var _ = SIGDescribe("HostPath", func() {
f := framework.NewDefaultFramework("hostpath") f := framework.NewDefaultFramework("hostpath")
ginkgo.BeforeEach(func() { ginkgo.BeforeEach(func() {

View File

@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
limitations under the License. limitations under the License.
*/ */
package common package storage
import ( import (
"context" "context"
@ -29,7 +29,7 @@ import (
"github.com/onsi/ginkgo" "github.com/onsi/ginkgo"
) )
var _ = SIGStorageDescribe("Projected combined", func() { var _ = SIGDescribe("Projected combined", func() {
f := framework.NewDefaultFramework("projected") f := framework.NewDefaultFramework("projected")
// Test multiple projections // Test multiple projections

View File

@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
limitations under the License. limitations under the License.
*/ */
package common package storage
import ( import (
"context" "context"
@ -33,7 +33,7 @@ import (
"github.com/onsi/gomega" "github.com/onsi/gomega"
) )
var _ = SIGStorageDescribe("Projected configMap", func() { var _ = SIGDescribe("Projected configMap", func() {
f := framework.NewDefaultFramework("projected") f := framework.NewDefaultFramework("projected")
/* /*

View File

@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
limitations under the License. limitations under the License.
*/ */
package common package storage
import ( import (
"fmt" "fmt"
@ -32,7 +32,7 @@ import (
"github.com/onsi/gomega" "github.com/onsi/gomega"
) )
var _ = SIGStorageDescribe("Projected downwardAPI", func() { var _ = SIGDescribe("Projected downwardAPI", func() {
f := framework.NewDefaultFramework("projected") f := framework.NewDefaultFramework("projected")
// How long to wait for a log pod to be displayed // How long to wait for a log pod to be displayed

View File

@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
limitations under the License. limitations under the License.
*/ */
package common package storage
import ( import (
"context" "context"
@ -32,7 +32,7 @@ import (
"github.com/onsi/gomega" "github.com/onsi/gomega"
) )
var _ = SIGStorageDescribe("Projected secret", func() { var _ = SIGDescribe("Projected secret", func() {
f := framework.NewDefaultFramework("projected") f := framework.NewDefaultFramework("projected")
/* /*

View File

@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
limitations under the License. limitations under the License.
*/ */
package common package storage
import ( import (
"context" "context"
@ -33,7 +33,7 @@ import (
"github.com/onsi/gomega" "github.com/onsi/gomega"
) )
var _ = SIGStorageDescribe("Secrets", func() { var _ = SIGDescribe("Secrets", func() {
f := framework.NewDefaultFramework("secrets") f := framework.NewDefaultFramework("secrets")
/* /*

View File

@ -0,0 +1,74 @@
/*
Copyright 2016 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package storage
import (
"fmt"
"os"
v1 "k8s.io/api/core/v1"
"k8s.io/kubernetes/test/e2e/framework"
)
var (
// non-Administrator Windows user used in tests. This is the Windows equivalent of the Linux non-root UID usage.
nonAdminTestUserName = "ContainerUser"
// non-root UID used in tests.
nonRootTestUserID = int64(1000)
)
// setPodNonRootUser configures the Pod to run as a non-root user.
// For Windows, it sets the RunAsUserName field to ContainerUser, and for Linux, it sets the RunAsUser field to 1000.
func setPodNonRootUser(pod *v1.Pod) {
if framework.NodeOSDistroIs("windows") {
pod.Spec.SecurityContext.WindowsOptions = &v1.WindowsSecurityContextOptions{RunAsUserName: &nonAdminTestUserName}
} else {
pod.Spec.SecurityContext.RunAsUser = &nonRootTestUserID
}
}
// getFileModeRegex returns a file mode related regex which should be matched by the mounttest pods' output.
// If the given mask is nil, then the regex will contain the default OS file modes, which are 0644 for Linux and 0775 for Windows.
func getFileModeRegex(filePath string, mask *int32) string {
var (
linuxMask int32
windowsMask int32
)
if mask == nil {
linuxMask = int32(0644)
windowsMask = int32(0775)
} else {
linuxMask = *mask
windowsMask = *mask
}
linuxOutput := fmt.Sprintf("mode of file \"%s\": %v", filePath, os.FileMode(linuxMask))
windowsOutput := fmt.Sprintf("mode of Windows file \"%v\": %s", filePath, os.FileMode(windowsMask))
return fmt.Sprintf("(%s|%s)", linuxOutput, windowsOutput)
}
// createMounts creates a v1.VolumeMount list with a single element.
func createMounts(volumeName, volumeMountPath string, readOnly bool) []v1.VolumeMount {
return []v1.VolumeMount{
{
Name: volumeName,
MountPath: volumeMountPath,
ReadOnly: readOnly,
},
}
}

View File

@ -20,7 +20,6 @@ import (
"bytes" "bytes"
"context" "context"
"fmt" "fmt"
"os"
"text/template" "text/template"
"time" "time"
@ -48,8 +47,6 @@ const (
) )
var ( var (
// non-Administrator Windows user used in tests. This is the Windows equivalent of the Linux non-root UID usage.
nonAdminTestUserName = "ContainerUser"
// non-root UID used in tests. // non-root UID used in tests.
nonRootTestUserID = int64(1000) nonRootTestUserID = int64(1000)
) )
@ -212,45 +209,3 @@ func rcByNamePort(name string, replicas int32, image string, containerArgs []str
Ports: []v1.ContainerPort{{ContainerPort: int32(port), Protocol: protocol}}, Ports: []v1.ContainerPort{{ContainerPort: int32(port), Protocol: protocol}},
}, gracePeriod) }, gracePeriod)
} }
// setPodNonRootUser configures the Pod to run as a non-root user.
// For Windows, it sets the RunAsUserName field to ContainerUser, and for Linux, it sets the RunAsUser field to 1000.
func setPodNonRootUser(pod *v1.Pod) {
if framework.NodeOSDistroIs("windows") {
pod.Spec.SecurityContext.WindowsOptions = &v1.WindowsSecurityContextOptions{RunAsUserName: &nonAdminTestUserName}
} else {
pod.Spec.SecurityContext.RunAsUser = &nonRootTestUserID
}
}
// getFileModeRegex returns a file mode related regex which should be matched by the mounttest pods' output.
// If the given mask is nil, then the regex will contain the default OS file modes, which are 0644 for Linux and 0775 for Windows.
func getFileModeRegex(filePath string, mask *int32) string {
var (
linuxMask int32
windowsMask int32
)
if mask == nil {
linuxMask = int32(0644)
windowsMask = int32(0775)
} else {
linuxMask = *mask
windowsMask = *mask
}
linuxOutput := fmt.Sprintf("mode of file \"%s\": %v", filePath, os.FileMode(linuxMask))
windowsOutput := fmt.Sprintf("mode of Windows file \"%v\": %s", filePath, os.FileMode(windowsMask))
return fmt.Sprintf("(%s|%s)", linuxOutput, windowsOutput)
}
// createMounts creates a v1.VolumeMount list with a single element.
func createMounts(volumeName, volumeMountPath string, readOnly bool) []v1.VolumeMount {
return []v1.VolumeMount{
{
Name: volumeName,
MountPath: volumeMountPath,
ReadOnly: readOnly,
},
}
}