|
|
@ -485,7 +485,7 @@
|
|
|
|
Container will execute curl command to reach the service port within specified
|
|
|
|
Container will execute curl command to reach the service port within specified
|
|
|
|
max retry limit and MUST result in reporting unique hostnames.
|
|
|
|
max retry limit and MUST result in reporting unique hostnames.
|
|
|
|
release: v1.9, v1.18
|
|
|
|
release: v1.9, v1.18
|
|
|
|
file: test/e2e/common/networking.go
|
|
|
|
file: test/e2e/common/network/networking.go
|
|
|
|
- testname: Networking, intra pod udp
|
|
|
|
- testname: Networking, intra pod udp
|
|
|
|
codename: '[k8s.io] [sig-network] Networking Granular Checks: Pods should function
|
|
|
|
codename: '[k8s.io] [sig-network] Networking Granular Checks: Pods should function
|
|
|
|
for intra-pod communication: udp [NodeConformance] [Conformance]'
|
|
|
|
for intra-pod communication: udp [NodeConformance] [Conformance]'
|
|
|
@ -497,7 +497,7 @@
|
|
|
|
Container will execute curl command to reach the service port within specified
|
|
|
|
Container will execute curl command to reach the service port within specified
|
|
|
|
max retry limit and MUST result in reporting unique hostnames.
|
|
|
|
max retry limit and MUST result in reporting unique hostnames.
|
|
|
|
release: v1.9, v1.18
|
|
|
|
release: v1.9, v1.18
|
|
|
|
file: test/e2e/common/networking.go
|
|
|
|
file: test/e2e/common/network/networking.go
|
|
|
|
- testname: Networking, intra pod http, from node
|
|
|
|
- testname: Networking, intra pod http, from node
|
|
|
|
codename: '[k8s.io] [sig-network] Networking Granular Checks: Pods should function
|
|
|
|
codename: '[k8s.io] [sig-network] Networking Granular Checks: Pods should function
|
|
|
|
for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -511,7 +511,7 @@
|
|
|
|
hostnames. This test is marked LinuxOnly since HostNetwork is not supported on
|
|
|
|
hostnames. This test is marked LinuxOnly since HostNetwork is not supported on
|
|
|
|
other platforms like Windows.
|
|
|
|
other platforms like Windows.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/networking.go
|
|
|
|
file: test/e2e/common/network/networking.go
|
|
|
|
- testname: Networking, intra pod http, from node
|
|
|
|
- testname: Networking, intra pod http, from node
|
|
|
|
codename: '[k8s.io] [sig-network] Networking Granular Checks: Pods should function
|
|
|
|
codename: '[k8s.io] [sig-network] Networking Granular Checks: Pods should function
|
|
|
|
for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -525,28 +525,28 @@
|
|
|
|
hostnames. This test is marked LinuxOnly since HostNetwork is not supported on
|
|
|
|
hostnames. This test is marked LinuxOnly since HostNetwork is not supported on
|
|
|
|
other platforms like Windows.
|
|
|
|
other platforms like Windows.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/networking.go
|
|
|
|
file: test/e2e/common/network/networking.go
|
|
|
|
- testname: ConfigMap, from environment field
|
|
|
|
- testname: ConfigMap, from environment field
|
|
|
|
codename: '[k8s.io] [sig-node] ConfigMap should be consumable via environment variable
|
|
|
|
codename: '[k8s.io] [sig-node] ConfigMap should be consumable via environment variable
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
|
description: Create a Pod with an environment variable value set using a value from
|
|
|
|
description: Create a Pod with an environment variable value set using a value from
|
|
|
|
ConfigMap. A ConfigMap value MUST be accessible in the container environment.
|
|
|
|
ConfigMap. A ConfigMap value MUST be accessible in the container environment.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/configmap.go
|
|
|
|
file: test/e2e/common/node/configmap.go
|
|
|
|
- testname: ConfigMap, from environment variables
|
|
|
|
- testname: ConfigMap, from environment variables
|
|
|
|
codename: '[k8s.io] [sig-node] ConfigMap should be consumable via the environment
|
|
|
|
codename: '[k8s.io] [sig-node] ConfigMap should be consumable via the environment
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
|
description: Create a Pod with a environment source from ConfigMap. All ConfigMap
|
|
|
|
description: Create a Pod with a environment source from ConfigMap. All ConfigMap
|
|
|
|
values MUST be available as environment variables in the container.
|
|
|
|
values MUST be available as environment variables in the container.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/configmap.go
|
|
|
|
file: test/e2e/common/node/configmap.go
|
|
|
|
- testname: ConfigMap, with empty-key
|
|
|
|
- testname: ConfigMap, with empty-key
|
|
|
|
codename: '[k8s.io] [sig-node] ConfigMap should fail to create ConfigMap with empty
|
|
|
|
codename: '[k8s.io] [sig-node] ConfigMap should fail to create ConfigMap with empty
|
|
|
|
key [Conformance]'
|
|
|
|
key [Conformance]'
|
|
|
|
description: Attempt to create a ConfigMap with an empty key. The creation MUST
|
|
|
|
description: Attempt to create a ConfigMap with an empty key. The creation MUST
|
|
|
|
fail.
|
|
|
|
fail.
|
|
|
|
release: v1.14
|
|
|
|
release: v1.14
|
|
|
|
file: test/e2e/common/configmap.go
|
|
|
|
file: test/e2e/common/node/configmap.go
|
|
|
|
- testname: ConfigMap lifecycle
|
|
|
|
- testname: ConfigMap lifecycle
|
|
|
|
codename: '[k8s.io] [sig-node] ConfigMap should run through a ConfigMap lifecycle
|
|
|
|
codename: '[k8s.io] [sig-node] ConfigMap should run through a ConfigMap lifecycle
|
|
|
|
[Conformance]'
|
|
|
|
[Conformance]'
|
|
|
@ -555,21 +555,21 @@
|
|
|
|
selector it MUST find the ConfigMap by it's static label and updated value. The
|
|
|
|
selector it MUST find the ConfigMap by it's static label and updated value. The
|
|
|
|
ConfigMap must be deleted by Collection.
|
|
|
|
ConfigMap must be deleted by Collection.
|
|
|
|
release: v1.19
|
|
|
|
release: v1.19
|
|
|
|
file: test/e2e/common/configmap.go
|
|
|
|
file: test/e2e/common/node/configmap.go
|
|
|
|
- testname: DownwardAPI, environment for CPU and memory limits and requests
|
|
|
|
- testname: DownwardAPI, environment for CPU and memory limits and requests
|
|
|
|
codename: '[k8s.io] [sig-node] Downward API should provide container''s limits.cpu/memory
|
|
|
|
codename: '[k8s.io] [sig-node] Downward API should provide container''s limits.cpu/memory
|
|
|
|
and requests.cpu/memory as env vars [NodeConformance] [Conformance]'
|
|
|
|
and requests.cpu/memory as env vars [NodeConformance] [Conformance]'
|
|
|
|
description: Downward API MUST expose CPU request and Memory request set through
|
|
|
|
description: Downward API MUST expose CPU request and Memory request set through
|
|
|
|
environment variables at runtime in the container.
|
|
|
|
environment variables at runtime in the container.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downward_api.go
|
|
|
|
file: test/e2e/common/downwardapi.go
|
|
|
|
- testname: DownwardAPI, environment for default CPU and memory limits and requests
|
|
|
|
- testname: DownwardAPI, environment for default CPU and memory limits and requests
|
|
|
|
codename: '[k8s.io] [sig-node] Downward API should provide default limits.cpu/memory
|
|
|
|
codename: '[k8s.io] [sig-node] Downward API should provide default limits.cpu/memory
|
|
|
|
from node allocatable [NodeConformance] [Conformance]'
|
|
|
|
from node allocatable [NodeConformance] [Conformance]'
|
|
|
|
description: Downward API MUST expose CPU request and Memory limits set through
|
|
|
|
description: Downward API MUST expose CPU request and Memory limits set through
|
|
|
|
environment variables at runtime in the container.
|
|
|
|
environment variables at runtime in the container.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downward_api.go
|
|
|
|
file: test/e2e/common/downwardapi.go
|
|
|
|
- testname: DownwardAPI, environment for host ip
|
|
|
|
- testname: DownwardAPI, environment for host ip
|
|
|
|
codename: '[k8s.io] [sig-node] Downward API should provide host IP as an env var
|
|
|
|
codename: '[k8s.io] [sig-node] Downward API should provide host IP as an env var
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
@ -577,14 +577,14 @@
|
|
|
|
Specify host IP as environment variable in the Pod Spec are visible at runtime
|
|
|
|
Specify host IP as environment variable in the Pod Spec are visible at runtime
|
|
|
|
in the container.
|
|
|
|
in the container.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downward_api.go
|
|
|
|
file: test/e2e/common/downwardapi.go
|
|
|
|
- testname: DownwardAPI, environment for Pod UID
|
|
|
|
- testname: DownwardAPI, environment for Pod UID
|
|
|
|
codename: '[k8s.io] [sig-node] Downward API should provide pod UID as env vars [NodeConformance]
|
|
|
|
codename: '[k8s.io] [sig-node] Downward API should provide pod UID as env vars [NodeConformance]
|
|
|
|
[Conformance]'
|
|
|
|
[Conformance]'
|
|
|
|
description: Downward API MUST expose Pod UID set through environment variables
|
|
|
|
description: Downward API MUST expose Pod UID set through environment variables
|
|
|
|
at runtime in the container.
|
|
|
|
at runtime in the container.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downward_api.go
|
|
|
|
file: test/e2e/common/downwardapi.go
|
|
|
|
- testname: DownwardAPI, environment for name, namespace and ip
|
|
|
|
- testname: DownwardAPI, environment for name, namespace and ip
|
|
|
|
codename: '[k8s.io] [sig-node] Downward API should provide pod name, namespace and
|
|
|
|
codename: '[k8s.io] [sig-node] Downward API should provide pod name, namespace and
|
|
|
|
IP address as env vars [NodeConformance] [Conformance]'
|
|
|
|
IP address as env vars [NodeConformance] [Conformance]'
|
|
|
@ -592,7 +592,7 @@
|
|
|
|
Specify Pod Name, namespace and IP as environment variable in the Pod Spec are
|
|
|
|
Specify Pod Name, namespace and IP as environment variable in the Pod Spec are
|
|
|
|
visible at runtime in the container.
|
|
|
|
visible at runtime in the container.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downward_api.go
|
|
|
|
file: test/e2e/common/downwardapi.go
|
|
|
|
- testname: Pod events, verify event from Scheduler and Kubelet
|
|
|
|
- testname: Pod events, verify event from Scheduler and Kubelet
|
|
|
|
codename: '[k8s.io] [sig-node] Events should be sent by kubelets and the scheduler
|
|
|
|
codename: '[k8s.io] [sig-node] Events should be sent by kubelets and the scheduler
|
|
|
|
about pods scheduling and running [Conformance]'
|
|
|
|
about pods scheduling and running [Conformance]'
|
|
|
@ -624,7 +624,7 @@
|
|
|
|
be found when listed. The set of Pod Templates is deleted and MUST NOT show up
|
|
|
|
be found when listed. The set of Pod Templates is deleted and MUST NOT show up
|
|
|
|
when listed by its label selector.
|
|
|
|
when listed by its label selector.
|
|
|
|
release: v1.19
|
|
|
|
release: v1.19
|
|
|
|
file: test/e2e/common/podtemplates.go
|
|
|
|
file: test/e2e/common/node/podtemplates.go
|
|
|
|
- testname: PodTemplate lifecycle
|
|
|
|
- testname: PodTemplate lifecycle
|
|
|
|
codename: '[k8s.io] [sig-node] PodTemplates should run the lifecycle of PodTemplates
|
|
|
|
codename: '[k8s.io] [sig-node] PodTemplates should run the lifecycle of PodTemplates
|
|
|
|
[Conformance]'
|
|
|
|
[Conformance]'
|
|
|
@ -633,7 +633,7 @@
|
|
|
|
selector it MUST find the PodTemplate by it's static label and updated value.
|
|
|
|
selector it MUST find the PodTemplate by it's static label and updated value.
|
|
|
|
The PodTemplate must be deleted.
|
|
|
|
The PodTemplate must be deleted.
|
|
|
|
release: v1.19
|
|
|
|
release: v1.19
|
|
|
|
file: test/e2e/common/podtemplates.go
|
|
|
|
file: test/e2e/common/node/podtemplates.go
|
|
|
|
- testname: Pods, QOS
|
|
|
|
- testname: Pods, QOS
|
|
|
|
codename: '[k8s.io] [sig-node] Pods Extended [k8s.io] Pods Set QOS Class should
|
|
|
|
codename: '[k8s.io] [sig-node] Pods Extended [k8s.io] Pods Set QOS Class should
|
|
|
|
be set on Pods with matching resource requests and limits for memory and cpu [Conformance]'
|
|
|
|
be set on Pods with matching resource requests and limits for memory and cpu [Conformance]'
|
|
|
@ -660,7 +660,7 @@
|
|
|
|
document. The runtimeclasses resource must support create, get, list, watch, update,
|
|
|
|
document. The runtimeclasses resource must support create, get, list, watch, update,
|
|
|
|
patch, delete, and deletecollection.'
|
|
|
|
patch, delete, and deletecollection.'
|
|
|
|
release: v1.20
|
|
|
|
release: v1.20
|
|
|
|
file: test/e2e/common/runtimeclass.go
|
|
|
|
file: test/e2e/common/node/runtimeclass.go
|
|
|
|
- testname: Security Context, test RunAsGroup at container level
|
|
|
|
- testname: Security Context, test RunAsGroup at container level
|
|
|
|
codename: '[k8s.io] [sig-node] Security Context should support container.SecurityContext.RunAsUser
|
|
|
|
codename: '[k8s.io] [sig-node] Security Context should support container.SecurityContext.RunAsUser
|
|
|
|
And container.SecurityContext.RunAsGroup [LinuxOnly] [Conformance]'
|
|
|
|
And container.SecurityContext.RunAsGroup [LinuxOnly] [Conformance]'
|
|
|
@ -687,7 +687,7 @@
|
|
|
|
to custom path in the Pod. ConfigMap's text data and binary data MUST be verified
|
|
|
|
to custom path in the Pod. ConfigMap's text data and binary data MUST be verified
|
|
|
|
by reading the content from the mounted files in the Pod.
|
|
|
|
by reading the content from the mounted files in the Pod.
|
|
|
|
release: v1.12
|
|
|
|
release: v1.12
|
|
|
|
file: test/e2e/common/configmap_volume.go
|
|
|
|
file: test/e2e/common/storage/configmap_volume.go
|
|
|
|
- testname: ConfigMap Volume, create, update and delete
|
|
|
|
- testname: ConfigMap Volume, create, update and delete
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap optional updates should be reflected
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap optional updates should be reflected
|
|
|
|
in volume [NodeConformance] [Conformance]'
|
|
|
|
in volume [NodeConformance] [Conformance]'
|
|
|
@ -697,7 +697,7 @@
|
|
|
|
the content from the mounted file in the Pod. Also when the item(file) is deleted
|
|
|
|
the content from the mounted file in the Pod. Also when the item(file) is deleted
|
|
|
|
from the map that MUST result in a error reading that item(file).
|
|
|
|
from the map that MUST result in a error reading that item(file).
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/configmap_volume.go
|
|
|
|
file: test/e2e/common/storage/configmap_volume.go
|
|
|
|
- testname: ConfigMap Volume, without mapping
|
|
|
|
- testname: ConfigMap Volume, without mapping
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
@ -707,7 +707,7 @@
|
|
|
|
content of the file MUST be readable and verified and file modes MUST default
|
|
|
|
content of the file MUST be readable and verified and file modes MUST default
|
|
|
|
to 0x644.
|
|
|
|
to 0x644.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/configmap_volume.go
|
|
|
|
file: test/e2e/common/storage/configmap_volume.go
|
|
|
|
- testname: ConfigMap Volume, without mapping, non-root user
|
|
|
|
- testname: ConfigMap Volume, without mapping, non-root user
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
|
|
|
|
as non-root [NodeConformance] [Conformance]'
|
|
|
|
as non-root [NodeConformance] [Conformance]'
|
|
|
@ -717,7 +717,7 @@
|
|
|
|
created Pod using the volume mount. The file on the volume MUST have file mode
|
|
|
|
created Pod using the volume mount. The file on the volume MUST have file mode
|
|
|
|
set to default value of 0x644.
|
|
|
|
set to default value of 0x644.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/configmap_volume.go
|
|
|
|
file: test/e2e/common/storage/configmap_volume.go
|
|
|
|
- testname: ConfigMap Volume, without mapping, volume mode set
|
|
|
|
- testname: ConfigMap Volume, without mapping, volume mode set
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
|
|
|
|
with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -729,7 +729,7 @@
|
|
|
|
This test is marked LinuxOnly since Windows does not support setting specific
|
|
|
|
This test is marked LinuxOnly since Windows does not support setting specific
|
|
|
|
file permissions.
|
|
|
|
file permissions.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/configmap_volume.go
|
|
|
|
file: test/e2e/common/storage/configmap_volume.go
|
|
|
|
- testname: ConfigMap Volume, with mapping
|
|
|
|
- testname: ConfigMap Volume, with mapping
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
|
|
|
|
with mappings [NodeConformance] [Conformance]'
|
|
|
|
with mappings [NodeConformance] [Conformance]'
|
|
|
@ -739,7 +739,7 @@
|
|
|
|
created Pod using the volume mount. The data content of the file MUST be readable
|
|
|
|
created Pod using the volume mount. The data content of the file MUST be readable
|
|
|
|
and verified and file modes MUST default to 0x644.
|
|
|
|
and verified and file modes MUST default to 0x644.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/configmap_volume.go
|
|
|
|
file: test/e2e/common/storage/configmap_volume.go
|
|
|
|
- testname: ConfigMap Volume, with mapping, volume mode set
|
|
|
|
- testname: ConfigMap Volume, with mapping, volume mode set
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
|
|
|
|
with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -751,7 +751,7 @@
|
|
|
|
MUST be set to the custom value of '0x400' This test is marked LinuxOnly since
|
|
|
|
MUST be set to the custom value of '0x400' This test is marked LinuxOnly since
|
|
|
|
Windows does not support setting specific file permissions.
|
|
|
|
Windows does not support setting specific file permissions.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/configmap_volume.go
|
|
|
|
file: test/e2e/common/storage/configmap_volume.go
|
|
|
|
- testname: ConfigMap Volume, with mapping, non-root user
|
|
|
|
- testname: ConfigMap Volume, with mapping, non-root user
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable from pods in volume
|
|
|
|
with mappings as non-root [NodeConformance] [Conformance]'
|
|
|
|
with mappings as non-root [NodeConformance] [Conformance]'
|
|
|
@ -761,7 +761,7 @@
|
|
|
|
MUST be accessible to read from the newly created Pod using the volume mount.
|
|
|
|
MUST be accessible to read from the newly created Pod using the volume mount.
|
|
|
|
The file on the volume MUST have file mode set to default value of 0x644.
|
|
|
|
The file on the volume MUST have file mode set to default value of 0x644.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/configmap_volume.go
|
|
|
|
file: test/e2e/common/storage/configmap_volume.go
|
|
|
|
- testname: ConfigMap Volume, multiple volume maps
|
|
|
|
- testname: ConfigMap Volume, multiple volume maps
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable in multiple volumes
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be consumable in multiple volumes
|
|
|
|
in the same pod [NodeConformance] [Conformance]'
|
|
|
|
in the same pod [NodeConformance] [Conformance]'
|
|
|
@ -769,7 +769,7 @@
|
|
|
|
created Pod using the volume mount that is mapped to multiple paths in the Pod.
|
|
|
|
created Pod using the volume mount that is mapped to multiple paths in the Pod.
|
|
|
|
The content MUST be accessible from all the mapped volume mounts.
|
|
|
|
The content MUST be accessible from all the mapped volume mounts.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/configmap_volume.go
|
|
|
|
file: test/e2e/common/storage/configmap_volume.go
|
|
|
|
- testname: ConfigMap Volume, immutability
|
|
|
|
- testname: ConfigMap Volume, immutability
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be immutable if `immutable` field
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap should be immutable if `immutable` field
|
|
|
|
is set [Conformance]'
|
|
|
|
is set [Conformance]'
|
|
|
@ -779,7 +779,7 @@
|
|
|
|
MUST fail. Try to update the ConfigMap`s metadata (labels), the update must succeed.
|
|
|
|
MUST fail. Try to update the ConfigMap`s metadata (labels), the update must succeed.
|
|
|
|
Try to delete the ConfigMap, the deletion must succeed.
|
|
|
|
Try to delete the ConfigMap, the deletion must succeed.
|
|
|
|
release: v1.21
|
|
|
|
release: v1.21
|
|
|
|
file: test/e2e/common/configmap_volume.go
|
|
|
|
file: test/e2e/common/storage/configmap_volume.go
|
|
|
|
- testname: ConfigMap Volume, update
|
|
|
|
- testname: ConfigMap Volume, update
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap updates should be reflected in volume
|
|
|
|
codename: '[k8s.io] [sig-storage] ConfigMap updates should be reflected in volume
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
@ -788,7 +788,7 @@
|
|
|
|
the ConfigMap is updated the change to the config map MUST be verified by reading
|
|
|
|
the ConfigMap is updated the change to the config map MUST be verified by reading
|
|
|
|
the content from the mounted file in the Pod.
|
|
|
|
the content from the mounted file in the Pod.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/configmap_volume.go
|
|
|
|
file: test/e2e/common/storage/configmap_volume.go
|
|
|
|
- testname: DownwardAPI volume, CPU limits
|
|
|
|
- testname: DownwardAPI volume, CPU limits
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s
|
|
|
|
cpu limit [NodeConformance] [Conformance]'
|
|
|
|
cpu limit [NodeConformance] [Conformance]'
|
|
|
@ -796,7 +796,7 @@
|
|
|
|
contains a item for the CPU limits. The container runtime MUST be able to access
|
|
|
|
contains a item for the CPU limits. The container runtime MUST be able to access
|
|
|
|
CPU limits from the specified path on the mounted volume.
|
|
|
|
CPU limits from the specified path on the mounted volume.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downwardapi_volume.go
|
|
|
|
file: test/e2e/common/storage/downwardapi_volume.go
|
|
|
|
- testname: DownwardAPI volume, CPU request
|
|
|
|
- testname: DownwardAPI volume, CPU request
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s
|
|
|
|
cpu request [NodeConformance] [Conformance]'
|
|
|
|
cpu request [NodeConformance] [Conformance]'
|
|
|
@ -804,7 +804,7 @@
|
|
|
|
contains a item for the CPU request. The container runtime MUST be able to access
|
|
|
|
contains a item for the CPU request. The container runtime MUST be able to access
|
|
|
|
CPU request from the specified path on the mounted volume.
|
|
|
|
CPU request from the specified path on the mounted volume.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downwardapi_volume.go
|
|
|
|
file: test/e2e/common/storage/downwardapi_volume.go
|
|
|
|
- testname: DownwardAPI volume, memory limits
|
|
|
|
- testname: DownwardAPI volume, memory limits
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s
|
|
|
|
memory limit [NodeConformance] [Conformance]'
|
|
|
|
memory limit [NodeConformance] [Conformance]'
|
|
|
@ -812,7 +812,7 @@
|
|
|
|
contains a item for the memory limits. The container runtime MUST be able to access
|
|
|
|
contains a item for the memory limits. The container runtime MUST be able to access
|
|
|
|
memory limits from the specified path on the mounted volume.
|
|
|
|
memory limits from the specified path on the mounted volume.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downwardapi_volume.go
|
|
|
|
file: test/e2e/common/storage/downwardapi_volume.go
|
|
|
|
- testname: DownwardAPI volume, memory request
|
|
|
|
- testname: DownwardAPI volume, memory request
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should provide container''s
|
|
|
|
memory request [NodeConformance] [Conformance]'
|
|
|
|
memory request [NodeConformance] [Conformance]'
|
|
|
@ -820,7 +820,7 @@
|
|
|
|
contains a item for the memory request. The container runtime MUST be able to
|
|
|
|
contains a item for the memory request. The container runtime MUST be able to
|
|
|
|
access memory request from the specified path on the mounted volume.
|
|
|
|
access memory request from the specified path on the mounted volume.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downwardapi_volume.go
|
|
|
|
file: test/e2e/common/storage/downwardapi_volume.go
|
|
|
|
- testname: DownwardAPI volume, CPU limit, default node allocatable
|
|
|
|
- testname: DownwardAPI volume, CPU limit, default node allocatable
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should provide node allocatable
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should provide node allocatable
|
|
|
|
(cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]'
|
|
|
|
(cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]'
|
|
|
@ -829,7 +829,7 @@
|
|
|
|
The container runtime MUST be able to access CPU limits from the specified path
|
|
|
|
The container runtime MUST be able to access CPU limits from the specified path
|
|
|
|
on the mounted volume and the value MUST be default node allocatable.
|
|
|
|
on the mounted volume and the value MUST be default node allocatable.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downwardapi_volume.go
|
|
|
|
file: test/e2e/common/storage/downwardapi_volume.go
|
|
|
|
- testname: DownwardAPI volume, memory limit, default node allocatable
|
|
|
|
- testname: DownwardAPI volume, memory limit, default node allocatable
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should provide node allocatable
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should provide node allocatable
|
|
|
|
(memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]'
|
|
|
|
(memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]'
|
|
|
@ -838,7 +838,7 @@
|
|
|
|
container. The container runtime MUST be able to access memory limits from the
|
|
|
|
container. The container runtime MUST be able to access memory limits from the
|
|
|
|
specified path on the mounted volume and the value MUST be default node allocatable.
|
|
|
|
specified path on the mounted volume and the value MUST be default node allocatable.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downwardapi_volume.go
|
|
|
|
file: test/e2e/common/storage/downwardapi_volume.go
|
|
|
|
- testname: DownwardAPI volume, pod name
|
|
|
|
- testname: DownwardAPI volume, pod name
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should provide podname only
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should provide podname only
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
@ -846,7 +846,7 @@
|
|
|
|
contains a item for the Pod name. The container runtime MUST be able to access
|
|
|
|
contains a item for the Pod name. The container runtime MUST be able to access
|
|
|
|
Pod name from the specified path on the mounted volume.
|
|
|
|
Pod name from the specified path on the mounted volume.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downwardapi_volume.go
|
|
|
|
file: test/e2e/common/storage/downwardapi_volume.go
|
|
|
|
- testname: DownwardAPI volume, volume mode 0400
|
|
|
|
- testname: DownwardAPI volume, volume mode 0400
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should set DefaultMode on
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should set DefaultMode on
|
|
|
|
files [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
files [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -856,7 +856,7 @@
|
|
|
|
path on the mounted volume. This test is marked LinuxOnly since Windows does not
|
|
|
|
path on the mounted volume. This test is marked LinuxOnly since Windows does not
|
|
|
|
support setting specific file permissions.
|
|
|
|
support setting specific file permissions.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downwardapi_volume.go
|
|
|
|
file: test/e2e/common/storage/downwardapi_volume.go
|
|
|
|
- testname: DownwardAPI volume, file mode 0400
|
|
|
|
- testname: DownwardAPI volume, file mode 0400
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should set mode on item file
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should set mode on item file
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -866,7 +866,7 @@
|
|
|
|
volume. This test is marked LinuxOnly since Windows does not support setting specific
|
|
|
|
volume. This test is marked LinuxOnly since Windows does not support setting specific
|
|
|
|
file permissions.
|
|
|
|
file permissions.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downwardapi_volume.go
|
|
|
|
file: test/e2e/common/storage/downwardapi_volume.go
|
|
|
|
- testname: DownwardAPI volume, update annotations
|
|
|
|
- testname: DownwardAPI volume, update annotations
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should update annotations
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should update annotations
|
|
|
|
on modification [NodeConformance] [Conformance]'
|
|
|
|
on modification [NodeConformance] [Conformance]'
|
|
|
@ -876,7 +876,7 @@
|
|
|
|
volume. Update the annotations by adding a new annotation to the running Pod.
|
|
|
|
volume. Update the annotations by adding a new annotation to the running Pod.
|
|
|
|
The new annotation MUST be available from the mounted volume.
|
|
|
|
The new annotation MUST be available from the mounted volume.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downwardapi_volume.go
|
|
|
|
file: test/e2e/common/storage/downwardapi_volume.go
|
|
|
|
- testname: DownwardAPI volume, update label
|
|
|
|
- testname: DownwardAPI volume, update label
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should update labels on modification
|
|
|
|
codename: '[k8s.io] [sig-storage] Downward API volume should update labels on modification
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
@ -886,7 +886,7 @@
|
|
|
|
the labels by adding a new label to the running Pod. The new label MUST be available
|
|
|
|
the labels by adding a new label to the running Pod. The new label MUST be available
|
|
|
|
from the mounted volume.
|
|
|
|
from the mounted volume.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/downwardapi_volume.go
|
|
|
|
file: test/e2e/common/storage/downwardapi_volume.go
|
|
|
|
- testname: EmptyDir, Shared volumes between containers
|
|
|
|
- testname: EmptyDir, Shared volumes between containers
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes pod should support shared volumes
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes pod should support shared volumes
|
|
|
|
between containers [Conformance]'
|
|
|
|
between containers [Conformance]'
|
|
|
@ -895,7 +895,7 @@
|
|
|
|
mounted to the pod. The main container shoud wait until the sub container drops
|
|
|
|
mounted to the pod. The main container shoud wait until the sub container drops
|
|
|
|
a file, and main container acess the shared data.
|
|
|
|
a file, and main container acess the shared data.
|
|
|
|
release: v1.15
|
|
|
|
release: v1.15
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: EmptyDir, medium default, volume mode 0644
|
|
|
|
- testname: EmptyDir, medium default, volume mode 0644
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0644,default)
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0644,default)
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -905,7 +905,7 @@
|
|
|
|
MUST be readable. This test is marked LinuxOnly since Windows does not support
|
|
|
|
MUST be readable. This test is marked LinuxOnly since Windows does not support
|
|
|
|
setting specific file permissions, or running as UID / GID.
|
|
|
|
setting specific file permissions, or running as UID / GID.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: EmptyDir, medium memory, volume mode 0644, non-root user
|
|
|
|
- testname: EmptyDir, medium memory, volume mode 0644, non-root user
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0644,tmpfs)
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0644,tmpfs)
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -916,7 +916,7 @@
|
|
|
|
since Windows does not support setting specific file permissions, or running as
|
|
|
|
since Windows does not support setting specific file permissions, or running as
|
|
|
|
UID / GID, or the medium = 'Memory'.
|
|
|
|
UID / GID, or the medium = 'Memory'.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: EmptyDir, medium default, volume mode 0666
|
|
|
|
- testname: EmptyDir, medium default, volume mode 0666
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0666,default)
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0666,default)
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -926,7 +926,7 @@
|
|
|
|
MUST be readable. This test is marked LinuxOnly since Windows does not support
|
|
|
|
MUST be readable. This test is marked LinuxOnly since Windows does not support
|
|
|
|
setting specific file permissions, or running as UID / GID.
|
|
|
|
setting specific file permissions, or running as UID / GID.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: EmptyDir, medium memory, volume mode 0666,, non-root user
|
|
|
|
- testname: EmptyDir, medium memory, volume mode 0666,, non-root user
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0666,tmpfs)
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0666,tmpfs)
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -937,7 +937,7 @@
|
|
|
|
since Windows does not support setting specific file permissions, or running as
|
|
|
|
since Windows does not support setting specific file permissions, or running as
|
|
|
|
UID / GID, or the medium = 'Memory'.
|
|
|
|
UID / GID, or the medium = 'Memory'.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: EmptyDir, medium default, volume mode 0777
|
|
|
|
- testname: EmptyDir, medium default, volume mode 0777
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0777,default)
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0777,default)
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -947,7 +947,7 @@
|
|
|
|
MUST be readable. This test is marked LinuxOnly since Windows does not support
|
|
|
|
MUST be readable. This test is marked LinuxOnly since Windows does not support
|
|
|
|
setting specific file permissions, or running as UID / GID.
|
|
|
|
setting specific file permissions, or running as UID / GID.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: EmptyDir, medium memory, volume mode 0777, non-root user
|
|
|
|
- testname: EmptyDir, medium memory, volume mode 0777, non-root user
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0777,tmpfs)
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (non-root,0777,tmpfs)
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -958,7 +958,7 @@
|
|
|
|
since Windows does not support setting specific file permissions, or running as
|
|
|
|
since Windows does not support setting specific file permissions, or running as
|
|
|
|
UID / GID, or the medium = 'Memory'.
|
|
|
|
UID / GID, or the medium = 'Memory'.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: EmptyDir, medium default, volume mode 0644
|
|
|
|
- testname: EmptyDir, medium default, volume mode 0644
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0644,default)
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0644,default)
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -967,7 +967,7 @@
|
|
|
|
MUST be readable. This test is marked LinuxOnly since Windows does not support
|
|
|
|
MUST be readable. This test is marked LinuxOnly since Windows does not support
|
|
|
|
setting specific file permissions, or running as UID / GID.
|
|
|
|
setting specific file permissions, or running as UID / GID.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: EmptyDir, medium memory, volume mode 0644
|
|
|
|
- testname: EmptyDir, medium memory, volume mode 0644
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0644,tmpfs)
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0644,tmpfs)
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -977,7 +977,7 @@
|
|
|
|
Windows does not support setting specific file permissions, or running as UID
|
|
|
|
Windows does not support setting specific file permissions, or running as UID
|
|
|
|
/ GID, or the medium = 'Memory'.
|
|
|
|
/ GID, or the medium = 'Memory'.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: EmptyDir, medium default, volume mode 0666
|
|
|
|
- testname: EmptyDir, medium default, volume mode 0666
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0666,default)
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0666,default)
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -986,7 +986,7 @@
|
|
|
|
MUST be readable. This test is marked LinuxOnly since Windows does not support
|
|
|
|
MUST be readable. This test is marked LinuxOnly since Windows does not support
|
|
|
|
setting specific file permissions, or running as UID / GID.
|
|
|
|
setting specific file permissions, or running as UID / GID.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: EmptyDir, medium memory, volume mode 0666
|
|
|
|
- testname: EmptyDir, medium memory, volume mode 0666
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0666,tmpfs)
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0666,tmpfs)
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -996,7 +996,7 @@
|
|
|
|
Windows does not support setting specific file permissions, or running as UID
|
|
|
|
Windows does not support setting specific file permissions, or running as UID
|
|
|
|
/ GID, or the medium = 'Memory'.
|
|
|
|
/ GID, or the medium = 'Memory'.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: EmptyDir, medium default, volume mode 0777
|
|
|
|
- testname: EmptyDir, medium default, volume mode 0777
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0777,default)
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0777,default)
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -1005,7 +1005,7 @@
|
|
|
|
MUST be readable. This test is marked LinuxOnly since Windows does not support
|
|
|
|
MUST be readable. This test is marked LinuxOnly since Windows does not support
|
|
|
|
setting specific file permissions, or running as UID / GID.
|
|
|
|
setting specific file permissions, or running as UID / GID.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: EmptyDir, medium memory, volume mode 0777
|
|
|
|
- testname: EmptyDir, medium memory, volume mode 0777
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0777,tmpfs)
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes should support (root,0777,tmpfs)
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
[LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -1015,7 +1015,7 @@
|
|
|
|
since Windows does not support setting specific file permissions, or running as
|
|
|
|
since Windows does not support setting specific file permissions, or running as
|
|
|
|
UID / GID, or the medium = 'Memory'.
|
|
|
|
UID / GID, or the medium = 'Memory'.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: EmptyDir, medium default, volume mode default
|
|
|
|
- testname: EmptyDir, medium default, volume mode default
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes volume on default medium should
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes volume on default medium should
|
|
|
|
have the correct mode [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
have the correct mode [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -1023,7 +1023,7 @@
|
|
|
|
set as -rwxrwxrwx and mount type set to tmpfs. This test is marked LinuxOnly since
|
|
|
|
set as -rwxrwxrwx and mount type set to tmpfs. This test is marked LinuxOnly since
|
|
|
|
Windows does not support setting specific file permissions.
|
|
|
|
Windows does not support setting specific file permissions.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: EmptyDir, medium memory, volume mode default
|
|
|
|
- testname: EmptyDir, medium memory, volume mode default
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes volume on tmpfs should have the
|
|
|
|
codename: '[k8s.io] [sig-storage] EmptyDir volumes volume on tmpfs should have the
|
|
|
|
correct mode [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
correct mode [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -1032,7 +1032,7 @@
|
|
|
|
is marked LinuxOnly since Windows does not support setting specific file permissions,
|
|
|
|
is marked LinuxOnly since Windows does not support setting specific file permissions,
|
|
|
|
or the medium = 'Memory'.
|
|
|
|
or the medium = 'Memory'.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/empty_dir.go
|
|
|
|
file: test/e2e/common/storage/empty_dir.go
|
|
|
|
- testname: Projected Volume, multiple projections
|
|
|
|
- testname: Projected Volume, multiple projections
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected combined should project all components
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected combined should project all components
|
|
|
|
that make up the projection API [Projection][NodeConformance] [Conformance]'
|
|
|
|
that make up the projection API [Projection][NodeConformance] [Conformance]'
|
|
|
@ -1041,7 +1041,7 @@
|
|
|
|
Pod MUST be able to read the secrets, configMap values and the cpu and memory
|
|
|
|
Pod MUST be able to read the secrets, configMap values and the cpu and memory
|
|
|
|
limits as well as cpu and memory requests from the mounted DownwardAPIVolumeFiles.
|
|
|
|
limits as well as cpu and memory requests from the mounted DownwardAPIVolumeFiles.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_combined.go
|
|
|
|
file: test/e2e/common/storage/projected_combined.go
|
|
|
|
- testname: Projected Volume, ConfigMap, create, update and delete
|
|
|
|
- testname: Projected Volume, ConfigMap, create, update and delete
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap optional updates should be
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap optional updates should be
|
|
|
|
reflected in volume [NodeConformance] [Conformance]'
|
|
|
|
reflected in volume [NodeConformance] [Conformance]'
|
|
|
@ -1053,7 +1053,7 @@
|
|
|
|
be able to read the updated configMap value. Delete the configMap in the delete
|
|
|
|
be able to read the updated configMap value. Delete the configMap in the delete
|
|
|
|
container. Pod MUST fail to read the configMap from the delete container.
|
|
|
|
container. Pod MUST fail to read the configMap from the delete container.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_configmap.go
|
|
|
|
file: test/e2e/common/storage/projected_configmap.go
|
|
|
|
- testname: Projected Volume, ConfigMap, volume mode default
|
|
|
|
- testname: Projected Volume, ConfigMap, volume mode default
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
|
|
|
|
pods in volume [NodeConformance] [Conformance]'
|
|
|
|
pods in volume [NodeConformance] [Conformance]'
|
|
|
@ -1061,7 +1061,7 @@
|
|
|
|
a configMap with default permission mode. Pod MUST be able to read the content
|
|
|
|
a configMap with default permission mode. Pod MUST be able to read the content
|
|
|
|
of the ConfigMap successfully and the mode on the volume MUST be -rw-r--r--.
|
|
|
|
of the ConfigMap successfully and the mode on the volume MUST be -rw-r--r--.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_configmap.go
|
|
|
|
file: test/e2e/common/storage/projected_configmap.go
|
|
|
|
- testname: Projected Volume, ConfigMap, non-root user
|
|
|
|
- testname: Projected Volume, ConfigMap, non-root user
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
|
|
|
|
pods in volume as non-root [NodeConformance] [Conformance]'
|
|
|
|
pods in volume as non-root [NodeConformance] [Conformance]'
|
|
|
@ -1069,7 +1069,7 @@
|
|
|
|
a configMap as non-root user with uid 1000. Pod MUST be able to read the content
|
|
|
|
a configMap as non-root user with uid 1000. Pod MUST be able to read the content
|
|
|
|
of the ConfigMap successfully and the mode on the volume MUST be -rw-r--r--.
|
|
|
|
of the ConfigMap successfully and the mode on the volume MUST be -rw-r--r--.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_configmap.go
|
|
|
|
file: test/e2e/common/storage/projected_configmap.go
|
|
|
|
- testname: Projected Volume, ConfigMap, volume mode 0400
|
|
|
|
- testname: Projected Volume, ConfigMap, volume mode 0400
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
|
|
|
|
pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -1079,7 +1079,7 @@
|
|
|
|
test is marked LinuxOnly since Windows does not support setting specific file
|
|
|
|
test is marked LinuxOnly since Windows does not support setting specific file
|
|
|
|
permissions.
|
|
|
|
permissions.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_configmap.go
|
|
|
|
file: test/e2e/common/storage/projected_configmap.go
|
|
|
|
- testname: Projected Volume, ConfigMap, mapped
|
|
|
|
- testname: Projected Volume, ConfigMap, mapped
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
|
|
|
|
pods in volume with mappings [NodeConformance] [Conformance]'
|
|
|
|
pods in volume with mappings [NodeConformance] [Conformance]'
|
|
|
@ -1088,7 +1088,7 @@
|
|
|
|
path. Pod MUST be able to read the content of the ConfigMap from the custom location
|
|
|
|
path. Pod MUST be able to read the content of the ConfigMap from the custom location
|
|
|
|
successfully and the mode on the volume MUST be -rw-r--r--.
|
|
|
|
successfully and the mode on the volume MUST be -rw-r--r--.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_configmap.go
|
|
|
|
file: test/e2e/common/storage/projected_configmap.go
|
|
|
|
- testname: Projected Volume, ConfigMap, mapped, volume mode 0400
|
|
|
|
- testname: Projected Volume, ConfigMap, mapped, volume mode 0400
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
|
|
|
|
pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -1099,7 +1099,7 @@
|
|
|
|
test is marked LinuxOnly since Windows does not support setting specific file
|
|
|
|
test is marked LinuxOnly since Windows does not support setting specific file
|
|
|
|
permissions.
|
|
|
|
permissions.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_configmap.go
|
|
|
|
file: test/e2e/common/storage/projected_configmap.go
|
|
|
|
- testname: Projected Volume, ConfigMap, mapped, non-root user
|
|
|
|
- testname: Projected Volume, ConfigMap, mapped, non-root user
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable from
|
|
|
|
pods in volume with mappings as non-root [NodeConformance] [Conformance]'
|
|
|
|
pods in volume with mappings as non-root [NodeConformance] [Conformance]'
|
|
|
@ -1108,7 +1108,7 @@
|
|
|
|
custom path. Pod MUST be able to read the content of the ConfigMap from the custom
|
|
|
|
custom path. Pod MUST be able to read the content of the ConfigMap from the custom
|
|
|
|
location successfully and the mode on the volume MUST be -r--r--r--.
|
|
|
|
location successfully and the mode on the volume MUST be -r--r--r--.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_configmap.go
|
|
|
|
file: test/e2e/common/storage/projected_configmap.go
|
|
|
|
- testname: Projected Volume, ConfigMap, multiple volume paths
|
|
|
|
- testname: Projected Volume, ConfigMap, multiple volume paths
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable in multiple
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap should be consumable in multiple
|
|
|
|
volumes in the same pod [NodeConformance] [Conformance]'
|
|
|
|
volumes in the same pod [NodeConformance] [Conformance]'
|
|
|
@ -1117,7 +1117,7 @@
|
|
|
|
be able to read the content of the configMap successfully from the two volume
|
|
|
|
be able to read the content of the configMap successfully from the two volume
|
|
|
|
mounts.
|
|
|
|
mounts.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_configmap.go
|
|
|
|
file: test/e2e/common/storage/projected_configmap.go
|
|
|
|
- testname: Projected Volume, ConfigMap, update
|
|
|
|
- testname: Projected Volume, ConfigMap, update
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap updates should be reflected
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected configMap updates should be reflected
|
|
|
|
in volume [NodeConformance] [Conformance]'
|
|
|
|
in volume [NodeConformance] [Conformance]'
|
|
|
@ -1126,7 +1126,7 @@
|
|
|
|
create the configMap with value-1. Pod MUST be able to update the value in the
|
|
|
|
create the configMap with value-1. Pod MUST be able to update the value in the
|
|
|
|
confgiMap to value-2.
|
|
|
|
confgiMap to value-2.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_configmap.go
|
|
|
|
file: test/e2e/common/storage/projected_configmap.go
|
|
|
|
- testname: Projected Volume, DownwardAPI, CPU limits
|
|
|
|
- testname: Projected Volume, DownwardAPI, CPU limits
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s
|
|
|
|
cpu limit [NodeConformance] [Conformance]'
|
|
|
|
cpu limit [NodeConformance] [Conformance]'
|
|
|
@ -1134,7 +1134,7 @@
|
|
|
|
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
|
|
|
|
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
|
|
|
|
to read the cpu limits from the mounted DownwardAPIVolumeFiles.
|
|
|
|
to read the cpu limits from the mounted DownwardAPIVolumeFiles.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_downwardapi.go
|
|
|
|
file: test/e2e/common/storage/projected_downwardapi.go
|
|
|
|
- testname: Projected Volume, DownwardAPI, CPU request
|
|
|
|
- testname: Projected Volume, DownwardAPI, CPU request
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s
|
|
|
|
cpu request [NodeConformance] [Conformance]'
|
|
|
|
cpu request [NodeConformance] [Conformance]'
|
|
|
@ -1142,7 +1142,7 @@
|
|
|
|
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
|
|
|
|
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
|
|
|
|
to read the cpu request from the mounted DownwardAPIVolumeFiles.
|
|
|
|
to read the cpu request from the mounted DownwardAPIVolumeFiles.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_downwardapi.go
|
|
|
|
file: test/e2e/common/storage/projected_downwardapi.go
|
|
|
|
- testname: Projected Volume, DownwardAPI, memory limits
|
|
|
|
- testname: Projected Volume, DownwardAPI, memory limits
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s
|
|
|
|
memory limit [NodeConformance] [Conformance]'
|
|
|
|
memory limit [NodeConformance] [Conformance]'
|
|
|
@ -1150,7 +1150,7 @@
|
|
|
|
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
|
|
|
|
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
|
|
|
|
to read the memory limits from the mounted DownwardAPIVolumeFiles.
|
|
|
|
to read the memory limits from the mounted DownwardAPIVolumeFiles.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_downwardapi.go
|
|
|
|
file: test/e2e/common/storage/projected_downwardapi.go
|
|
|
|
- testname: Projected Volume, DownwardAPI, memory request
|
|
|
|
- testname: Projected Volume, DownwardAPI, memory request
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide container''s
|
|
|
|
memory request [NodeConformance] [Conformance]'
|
|
|
|
memory request [NodeConformance] [Conformance]'
|
|
|
@ -1158,7 +1158,7 @@
|
|
|
|
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
|
|
|
|
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
|
|
|
|
to read the memory request from the mounted DownwardAPIVolumeFiles.
|
|
|
|
to read the memory request from the mounted DownwardAPIVolumeFiles.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_downwardapi.go
|
|
|
|
file: test/e2e/common/storage/projected_downwardapi.go
|
|
|
|
- testname: Projected Volume, DownwardAPI, CPU limit, node allocatable
|
|
|
|
- testname: Projected Volume, DownwardAPI, CPU limit, node allocatable
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide node allocatable
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide node allocatable
|
|
|
|
(cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]'
|
|
|
|
(cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]'
|
|
|
@ -1167,7 +1167,7 @@
|
|
|
|
resources for requests and limits are NOT specified for the container. Pod MUST
|
|
|
|
resources for requests and limits are NOT specified for the container. Pod MUST
|
|
|
|
be able to read the default cpu limits from the mounted DownwardAPIVolumeFiles.
|
|
|
|
be able to read the default cpu limits from the mounted DownwardAPIVolumeFiles.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_downwardapi.go
|
|
|
|
file: test/e2e/common/storage/projected_downwardapi.go
|
|
|
|
- testname: Projected Volume, DownwardAPI, memory limit, node allocatable
|
|
|
|
- testname: Projected Volume, DownwardAPI, memory limit, node allocatable
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide node allocatable
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide node allocatable
|
|
|
|
(memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]'
|
|
|
|
(memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]'
|
|
|
@ -1176,7 +1176,7 @@
|
|
|
|
resources for requests and limits are NOT specified for the container. Pod MUST
|
|
|
|
resources for requests and limits are NOT specified for the container. Pod MUST
|
|
|
|
be able to read the default memory limits from the mounted DownwardAPIVolumeFiles.
|
|
|
|
be able to read the default memory limits from the mounted DownwardAPIVolumeFiles.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_downwardapi.go
|
|
|
|
file: test/e2e/common/storage/projected_downwardapi.go
|
|
|
|
- testname: Projected Volume, DownwardAPI, pod name
|
|
|
|
- testname: Projected Volume, DownwardAPI, pod name
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide podname only
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should provide podname only
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
@ -1184,7 +1184,7 @@
|
|
|
|
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
|
|
|
|
pod name, cpu and memory limits and cpu and memory requests. Pod MUST be able
|
|
|
|
to read the pod name from the mounted DownwardAPIVolumeFiles.
|
|
|
|
to read the pod name from the mounted DownwardAPIVolumeFiles.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_downwardapi.go
|
|
|
|
file: test/e2e/common/storage/projected_downwardapi.go
|
|
|
|
- testname: Projected Volume, DownwardAPI, volume mode 0400
|
|
|
|
- testname: Projected Volume, DownwardAPI, volume mode 0400
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should set DefaultMode on
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should set DefaultMode on
|
|
|
|
files [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
files [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -1195,7 +1195,7 @@
|
|
|
|
test is marked LinuxOnly since Windows does not support setting specific file
|
|
|
|
test is marked LinuxOnly since Windows does not support setting specific file
|
|
|
|
permissions.
|
|
|
|
permissions.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_downwardapi.go
|
|
|
|
file: test/e2e/common/storage/projected_downwardapi.go
|
|
|
|
- testname: Projected Volume, DownwardAPI, volume mode 0400
|
|
|
|
- testname: Projected Volume, DownwardAPI, volume mode 0400
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should set mode on item
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should set mode on item
|
|
|
|
file [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
file [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -1206,7 +1206,7 @@
|
|
|
|
test is marked LinuxOnly since Windows does not support setting specific file
|
|
|
|
test is marked LinuxOnly since Windows does not support setting specific file
|
|
|
|
permissions.
|
|
|
|
permissions.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_downwardapi.go
|
|
|
|
file: test/e2e/common/storage/projected_downwardapi.go
|
|
|
|
- testname: Projected Volume, DownwardAPI, update annotation
|
|
|
|
- testname: Projected Volume, DownwardAPI, update annotation
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should update annotations
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should update annotations
|
|
|
|
on modification [NodeConformance] [Conformance]'
|
|
|
|
on modification [NodeConformance] [Conformance]'
|
|
|
@ -1216,7 +1216,7 @@
|
|
|
|
Annotations are then updated. Pod MUST be able to read the updated values for
|
|
|
|
Annotations are then updated. Pod MUST be able to read the updated values for
|
|
|
|
the Annotations.
|
|
|
|
the Annotations.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_downwardapi.go
|
|
|
|
file: test/e2e/common/storage/projected_downwardapi.go
|
|
|
|
- testname: Projected Volume, DownwardAPI, update labels
|
|
|
|
- testname: Projected Volume, DownwardAPI, update labels
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should update labels on
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected downwardAPI should update labels on
|
|
|
|
modification [NodeConformance] [Conformance]'
|
|
|
|
modification [NodeConformance] [Conformance]'
|
|
|
@ -1225,7 +1225,7 @@
|
|
|
|
MUST be able to read the labels from the mounted DownwardAPIVolumeFiles. Labels
|
|
|
|
MUST be able to read the labels from the mounted DownwardAPIVolumeFiles. Labels
|
|
|
|
are then updated. Pod MUST be able to read the updated values for the Labels.
|
|
|
|
are then updated. Pod MUST be able to read the updated values for the Labels.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_downwardapi.go
|
|
|
|
file: test/e2e/common/storage/projected_downwardapi.go
|
|
|
|
- testname: Projected Volume, Secrets, create, update delete
|
|
|
|
- testname: Projected Volume, Secrets, create, update delete
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected secret optional updates should be reflected
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected secret optional updates should be reflected
|
|
|
|
in volume [NodeConformance] [Conformance]'
|
|
|
|
in volume [NodeConformance] [Conformance]'
|
|
|
@ -1237,7 +1237,7 @@
|
|
|
|
the updated secret value. Delete the secret in the delete container. Pod MUST
|
|
|
|
the updated secret value. Delete the secret in the delete container. Pod MUST
|
|
|
|
fail to read the secret from the delete container.
|
|
|
|
fail to read the secret from the delete container.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_secret.go
|
|
|
|
file: test/e2e/common/storage/projected_secret.go
|
|
|
|
- testname: Projected Volume, Secrets, volume mode default
|
|
|
|
- testname: Projected Volume, Secrets, volume mode default
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
|
|
|
|
in volume [NodeConformance] [Conformance]'
|
|
|
|
in volume [NodeConformance] [Conformance]'
|
|
|
@ -1245,7 +1245,7 @@
|
|
|
|
secret with a specified key with default permission mode. Pod MUST be able to
|
|
|
|
secret with a specified key with default permission mode. Pod MUST be able to
|
|
|
|
read the content of the key successfully and the mode MUST be -rw-r--r-- by default.
|
|
|
|
read the content of the key successfully and the mode MUST be -rw-r--r-- by default.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_secret.go
|
|
|
|
file: test/e2e/common/storage/projected_secret.go
|
|
|
|
- testname: Project Volume, Secrets, non-root, custom fsGroup
|
|
|
|
- testname: Project Volume, Secrets, non-root, custom fsGroup
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
|
|
|
|
in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance]
|
|
|
|
in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance]
|
|
|
@ -1257,7 +1257,7 @@
|
|
|
|
marked LinuxOnly since Windows does not support setting specific file permissions,
|
|
|
|
marked LinuxOnly since Windows does not support setting specific file permissions,
|
|
|
|
or running as UID / GID.
|
|
|
|
or running as UID / GID.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_secret.go
|
|
|
|
file: test/e2e/common/storage/projected_secret.go
|
|
|
|
- testname: Projected Volume, Secrets, volume mode 0400
|
|
|
|
- testname: Projected Volume, Secrets, volume mode 0400
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
|
|
|
|
in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -1267,7 +1267,7 @@
|
|
|
|
-r--------. This test is marked LinuxOnly since Windows does not support setting
|
|
|
|
-r--------. This test is marked LinuxOnly since Windows does not support setting
|
|
|
|
specific file permissions.
|
|
|
|
specific file permissions.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_secret.go
|
|
|
|
file: test/e2e/common/storage/projected_secret.go
|
|
|
|
- testname: Projected Volume, Secrets, mapped
|
|
|
|
- testname: Projected Volume, Secrets, mapped
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
|
|
|
|
in volume with mappings [NodeConformance] [Conformance]'
|
|
|
|
in volume with mappings [NodeConformance] [Conformance]'
|
|
|
@ -1276,7 +1276,7 @@
|
|
|
|
to a custom path. Pod MUST be able to read the content of the key successfully
|
|
|
|
to a custom path. Pod MUST be able to read the content of the key successfully
|
|
|
|
and the mode MUST be -r--------on the mapped volume.
|
|
|
|
and the mode MUST be -r--------on the mapped volume.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_secret.go
|
|
|
|
file: test/e2e/common/storage/projected_secret.go
|
|
|
|
- testname: Projected Volume, Secrets, mapped, volume mode 0400
|
|
|
|
- testname: Projected Volume, Secrets, mapped, volume mode 0400
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected secret should be consumable from pods
|
|
|
|
in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -1286,7 +1286,7 @@
|
|
|
|
and the mode MUST be -r-------- on the mapped volume. This test is marked LinuxOnly
|
|
|
|
and the mode MUST be -r-------- on the mapped volume. This test is marked LinuxOnly
|
|
|
|
since Windows does not support setting specific file permissions.
|
|
|
|
since Windows does not support setting specific file permissions.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_secret.go
|
|
|
|
file: test/e2e/common/storage/projected_secret.go
|
|
|
|
- testname: Projected Volume, Secrets, mapped, multiple paths
|
|
|
|
- testname: Projected Volume, Secrets, mapped, multiple paths
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected secret should be consumable in multiple
|
|
|
|
codename: '[k8s.io] [sig-storage] Projected secret should be consumable in multiple
|
|
|
|
volumes in a pod [NodeConformance] [Conformance]'
|
|
|
|
volumes in a pod [NodeConformance] [Conformance]'
|
|
|
@ -1295,7 +1295,7 @@
|
|
|
|
Pod MUST be able to read the content of the key successfully from the two volume
|
|
|
|
Pod MUST be able to read the content of the key successfully from the two volume
|
|
|
|
mounts and the mode MUST be -r-------- on the mapped volumes.
|
|
|
|
mounts and the mode MUST be -r-------- on the mapped volumes.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/projected_secret.go
|
|
|
|
file: test/e2e/common/storage/projected_secret.go
|
|
|
|
- testname: Secrets Volume, create, update and delete
|
|
|
|
- testname: Secrets Volume, create, update and delete
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets optional updates should be reflected in
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets optional updates should be reflected in
|
|
|
|
volume [NodeConformance] [Conformance]'
|
|
|
|
volume [NodeConformance] [Conformance]'
|
|
|
@ -1307,7 +1307,7 @@
|
|
|
|
be able to read the updated secret value. Delete the secret in the delete container.
|
|
|
|
be able to read the updated secret value. Delete the secret in the delete container.
|
|
|
|
Pod MUST fail to read the secret from the delete container.
|
|
|
|
Pod MUST fail to read the secret from the delete container.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/secrets_volume.go
|
|
|
|
file: test/e2e/common/storage/secrets_volume.go
|
|
|
|
- testname: Secrets Volume, volume mode default, secret with same name in different
|
|
|
|
- testname: Secrets Volume, volume mode default, secret with same name in different
|
|
|
|
namespace
|
|
|
|
namespace
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be able to mount in a volume regardless
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be able to mount in a volume regardless
|
|
|
@ -1319,7 +1319,7 @@
|
|
|
|
are associated with namespace where pod is created. The file mode of the secret
|
|
|
|
are associated with namespace where pod is created. The file mode of the secret
|
|
|
|
MUST be -rw-r--r-- by default.
|
|
|
|
MUST be -rw-r--r-- by default.
|
|
|
|
release: v1.12
|
|
|
|
release: v1.12
|
|
|
|
file: test/e2e/common/secrets_volume.go
|
|
|
|
file: test/e2e/common/storage/secrets_volume.go
|
|
|
|
- testname: Secrets Volume, default
|
|
|
|
- testname: Secrets Volume, default
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
|
[NodeConformance] [Conformance]'
|
|
|
@ -1328,7 +1328,7 @@
|
|
|
|
from the container runtime and the file mode of the secret MUST be -rw-r--r--
|
|
|
|
from the container runtime and the file mode of the secret MUST be -rw-r--r--
|
|
|
|
by default.
|
|
|
|
by default.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/secrets_volume.go
|
|
|
|
file: test/e2e/common/storage/secrets_volume.go
|
|
|
|
- testname: Secrets Volume, volume mode 0440, fsGroup 1001 and uid 1000
|
|
|
|
- testname: Secrets Volume, volume mode 0440, fsGroup 1001 and uid 1000
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
|
|
|
|
as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -1339,7 +1339,7 @@
|
|
|
|
default. This test is marked LinuxOnly since Windows does not support setting
|
|
|
|
default. This test is marked LinuxOnly since Windows does not support setting
|
|
|
|
specific file permissions, or running as UID / GID.
|
|
|
|
specific file permissions, or running as UID / GID.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/secrets_volume.go
|
|
|
|
file: test/e2e/common/storage/secrets_volume.go
|
|
|
|
- testname: Secrets Volume, volume mode 0400
|
|
|
|
- testname: Secrets Volume, volume mode 0400
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
|
|
|
|
with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -1349,7 +1349,7 @@
|
|
|
|
MUST be -r-------- by default. This test is marked LinuxOnly since Windows does
|
|
|
|
MUST be -r-------- by default. This test is marked LinuxOnly since Windows does
|
|
|
|
not support setting specific file permissions.
|
|
|
|
not support setting specific file permissions.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/secrets_volume.go
|
|
|
|
file: test/e2e/common/storage/secrets_volume.go
|
|
|
|
- testname: Secrets Volume, mapping
|
|
|
|
- testname: Secrets Volume, mapping
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
|
|
|
|
with mappings [NodeConformance] [Conformance]'
|
|
|
|
with mappings [NodeConformance] [Conformance]'
|
|
|
@ -1358,7 +1358,7 @@
|
|
|
|
the mounted volume from the specified custom path. The file mode of the secret
|
|
|
|
the mounted volume from the specified custom path. The file mode of the secret
|
|
|
|
MUST be -rw-r--r-- by default.
|
|
|
|
MUST be -rw-r--r-- by default.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/secrets_volume.go
|
|
|
|
file: test/e2e/common/storage/secrets_volume.go
|
|
|
|
- testname: Secrets Volume, mapping, volume mode 0400
|
|
|
|
- testname: Secrets Volume, mapping, volume mode 0400
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be consumable from pods in volume
|
|
|
|
with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
|
with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]'
|
|
|
@ -1368,7 +1368,7 @@
|
|
|
|
The file mode of the secret MUST be -r--r--r--. This test is marked LinuxOnly
|
|
|
|
The file mode of the secret MUST be -r--r--r--. This test is marked LinuxOnly
|
|
|
|
since Windows does not support setting specific file permissions.
|
|
|
|
since Windows does not support setting specific file permissions.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/secrets_volume.go
|
|
|
|
file: test/e2e/common/storage/secrets_volume.go
|
|
|
|
- testname: Secrets Volume, mapping multiple volume paths
|
|
|
|
- testname: Secrets Volume, mapping multiple volume paths
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be consumable in multiple volumes
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be consumable in multiple volumes
|
|
|
|
in a pod [NodeConformance] [Conformance]'
|
|
|
|
in a pod [NodeConformance] [Conformance]'
|
|
|
@ -1376,7 +1376,7 @@
|
|
|
|
into the container in to two different custom paths. Pod MUST be able to read
|
|
|
|
into the container in to two different custom paths. Pod MUST be able to read
|
|
|
|
the secret from the both the mounted volumes from the two specified custom paths.
|
|
|
|
the secret from the both the mounted volumes from the two specified custom paths.
|
|
|
|
release: v1.9
|
|
|
|
release: v1.9
|
|
|
|
file: test/e2e/common/secrets_volume.go
|
|
|
|
file: test/e2e/common/storage/secrets_volume.go
|
|
|
|
- testname: Secrets Volume, immutability
|
|
|
|
- testname: Secrets Volume, immutability
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be immutable if `immutable` field
|
|
|
|
codename: '[k8s.io] [sig-storage] Secrets should be immutable if `immutable` field
|
|
|
|
is set [Conformance]'
|
|
|
|
is set [Conformance]'
|
|
|
@ -1386,7 +1386,7 @@
|
|
|
|
fail. Try to update the secret`s metadata (labels), the update must succeed. Try
|
|
|
|
fail. Try to update the secret`s metadata (labels), the update must succeed. Try
|
|
|
|
to delete the secret, the deletion must succeed.
|
|
|
|
to delete the secret, the deletion must succeed.
|
|
|
|
release: v1.21
|
|
|
|
release: v1.21
|
|
|
|
file: test/e2e/common/secrets_volume.go
|
|
|
|
file: test/e2e/common/storage/secrets_volume.go
|
|
|
|
- testname: Admission webhook, list mutating webhooks
|
|
|
|
- testname: Admission webhook, list mutating webhooks
|
|
|
|
codename: '[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing
|
|
|
|
codename: '[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing
|
|
|
|
mutating webhooks should work [Conformance]'
|
|
|
|
mutating webhooks should work [Conformance]'
|
|
|
|