mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-21 02:41:25 +00:00
test/e2e_node: Add Node-exclusive feature tags to existing tests
This commit is contained in:
parent
4ad9aedb04
commit
7cbd897e3e
@ -40,7 +40,7 @@ import (
|
|||||||
. "github.com/onsi/gomega"
|
. "github.com/onsi/gomega"
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ = framework.KubeDescribe("AppArmor [Feature:AppArmor]", func() {
|
var _ = framework.KubeDescribe("AppArmor [Feature:AppArmor][NodeFeature:AppArmor]", func() {
|
||||||
if isAppArmorEnabled() {
|
if isAppArmorEnabled() {
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
By("Loading AppArmor profiles for testing")
|
By("Loading AppArmor profiles for testing")
|
||||||
|
@ -438,7 +438,7 @@ func runCPUManagerTests(f *framework.Framework) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Serial because the test updates kubelet configuration.
|
// Serial because the test updates kubelet configuration.
|
||||||
var _ = SIGDescribe("CPU Manager [Serial] [Feature:CPUManager]", func() {
|
var _ = SIGDescribe("CPU Manager [Serial] [Feature:CPUManager][NodeAlphaFeature:CPUManager]", func() {
|
||||||
f := framework.NewDefaultFramework("cpu-manager-test")
|
f := framework.NewDefaultFramework("cpu-manager-test")
|
||||||
|
|
||||||
Context("With kubeconfig updated with static CPU Manager policy run the CPU Manager tests", func() {
|
Context("With kubeconfig updated with static CPU Manager policy run the CPU Manager tests", func() {
|
||||||
|
@ -44,7 +44,7 @@ const (
|
|||||||
)
|
)
|
||||||
|
|
||||||
// Serial because the test restarts Kubelet
|
// Serial because the test restarts Kubelet
|
||||||
var _ = framework.KubeDescribe("Device Plugin [Feature:DevicePlugin] [Serial]", func() {
|
var _ = framework.KubeDescribe("Device Plugin [Feature:DevicePlugin][NodeFeature:DevicePlugin][Serial]", func() {
|
||||||
f := framework.NewDefaultFramework("device-plugin-errors")
|
f := framework.NewDefaultFramework("device-plugin-errors")
|
||||||
|
|
||||||
Context("DevicePlugin", func() {
|
Context("DevicePlugin", func() {
|
||||||
|
@ -30,7 +30,7 @@ import (
|
|||||||
. "github.com/onsi/gomega"
|
. "github.com/onsi/gomega"
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ = framework.KubeDescribe("Docker features [Feature:Docker]", func() {
|
var _ = framework.KubeDescribe("Docker features [Feature:Docker][Legacy:Docker]", func() {
|
||||||
f := framework.NewDefaultFramework("docker-feature-test")
|
f := framework.NewDefaultFramework("docker-feature-test")
|
||||||
|
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
|
@ -43,7 +43,7 @@ const (
|
|||||||
testCheckpointContent = `{"version":"v1","name":"fluentd-gcp-v2.0-vmnqx","namespace":"kube-system","data":{},"checksum":1799154314}`
|
testCheckpointContent = `{"version":"v1","name":"fluentd-gcp-v2.0-vmnqx","namespace":"kube-system","data":{},"checksum":1799154314}`
|
||||||
)
|
)
|
||||||
|
|
||||||
var _ = SIGDescribe("Dockershim [Serial] [Disruptive] [Feature:Docker]", func() {
|
var _ = SIGDescribe("Dockershim [Serial] [Disruptive] [Feature:Docker][Legacy:Docker]", func() {
|
||||||
f := framework.NewDefaultFramework("dockerhism-checkpoint-test")
|
f := framework.NewDefaultFramework("dockerhism-checkpoint-test")
|
||||||
|
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
|
@ -65,7 +65,7 @@ type nodeConfigTestCase struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// This test is marked [Disruptive] because the Kubelet restarts several times during this test.
|
// This test is marked [Disruptive] because the Kubelet restarts several times during this test.
|
||||||
var _ = framework.KubeDescribe("[Feature:DynamicKubeletConfig] [Serial] [Disruptive]", func() {
|
var _ = framework.KubeDescribe("[Feature:DynamicKubeletConfig][NodeAlphaFeature:DynamicKubeletConfig][Serial] [Disruptive]", func() {
|
||||||
f := framework.NewDefaultFramework("dynamic-kubelet-configuration-test")
|
f := framework.NewDefaultFramework("dynamic-kubelet-configuration-test")
|
||||||
var beforeNode *apiv1.Node
|
var beforeNode *apiv1.Node
|
||||||
var beforeConfigMap *apiv1.ConfigMap
|
var beforeConfigMap *apiv1.ConfigMap
|
||||||
|
@ -218,7 +218,7 @@ var _ = framework.KubeDescribe("LocalStorageSoftEviction [Slow] [Serial] [Disrup
|
|||||||
})
|
})
|
||||||
|
|
||||||
// LocalStorageCapacityIsolationEviction tests that container and volume local storage limits are enforced through evictions
|
// LocalStorageCapacityIsolationEviction tests that container and volume local storage limits are enforced through evictions
|
||||||
var _ = framework.KubeDescribe("LocalStorageCapacityIsolationEviction [Slow] [Serial] [Disruptive] [Feature:LocalStorageCapacityIsolation]", func() {
|
var _ = framework.KubeDescribe("LocalStorageCapacityIsolationEviction [Slow] [Serial] [Disruptive] [Feature:LocalStorageCapacityIsolation][NodeFeature:LocalStorageCapacityIsolation]", func() {
|
||||||
f := framework.NewDefaultFramework("localstorage-eviction-test")
|
f := framework.NewDefaultFramework("localstorage-eviction-test")
|
||||||
evictionTestTimeout := 10 * time.Minute
|
evictionTestTimeout := 10 * time.Minute
|
||||||
Context(fmt.Sprintf(testContextFmt, "evictions due to pod local storage violations"), func() {
|
Context(fmt.Sprintf(testContextFmt, "evictions due to pod local storage violations"), func() {
|
||||||
|
@ -310,7 +310,7 @@ func checkDockerStorageDriver() error {
|
|||||||
return fmt.Errorf("failed to find storage driver")
|
return fmt.Errorf("failed to find storage driver")
|
||||||
}
|
}
|
||||||
|
|
||||||
var _ = framework.KubeDescribe("GKE system requirements [Conformance][NodeConformance][Feature:GKEEnv]", func() {
|
var _ = framework.KubeDescribe("GKE system requirements [Conformance][NodeConformance][Feature:GKEEnv][NodeFeature:GKEEnv]", func() {
|
||||||
BeforeEach(func() {
|
BeforeEach(func() {
|
||||||
framework.RunIfSystemSpecNameIs("gke")
|
framework.RunIfSystemSpecNameIs("gke")
|
||||||
})
|
})
|
||||||
|
@ -37,7 +37,7 @@ const (
|
|||||||
)
|
)
|
||||||
|
|
||||||
// Serial because the test restarts Kubelet
|
// Serial because the test restarts Kubelet
|
||||||
var _ = framework.KubeDescribe("NVIDIA GPU Device Plugin [Feature:GPUDevicePlugin] [Serial] [Disruptive]", func() {
|
var _ = framework.KubeDescribe("NVIDIA GPU Device Plugin [Feature:GPUDevicePlugin][NodeFeature:GPUDevicePlugin][Serial] [Disruptive]", func() {
|
||||||
f := framework.NewDefaultFramework("device-plugin-gpus-errors")
|
f := framework.NewDefaultFramework("device-plugin-gpus-errors")
|
||||||
|
|
||||||
Context("DevicePlugin", func() {
|
Context("DevicePlugin", func() {
|
||||||
|
@ -191,7 +191,7 @@ func runHugePagesTests(f *framework.Framework) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Serial because the test updates kubelet configuration.
|
// Serial because the test updates kubelet configuration.
|
||||||
var _ = SIGDescribe("HugePages [Serial] [Feature:HugePages]", func() {
|
var _ = SIGDescribe("HugePages [Serial] [Feature:HugePages][NodeFeature:HugePages]", func() {
|
||||||
f := framework.NewDefaultFramework("hugepages-test")
|
f := framework.NewDefaultFramework("hugepages-test")
|
||||||
|
|
||||||
Context("With config updated with hugepages feature enabled", func() {
|
Context("With config updated with hugepages feature enabled", func() {
|
||||||
|
@ -41,7 +41,7 @@ var _ = framework.KubeDescribe("Security Context", func() {
|
|||||||
podClient = f.PodClient()
|
podClient = f.PodClient()
|
||||||
})
|
})
|
||||||
|
|
||||||
Context("when pod PID namespace is configurable [Feature:ShareProcessNamespace]", func() {
|
Context("when pod PID namespace is configurable [Feature:ShareProcessNamespace][NodeAlphaFeature:ShareProcessNamespace]", func() {
|
||||||
It("containers in pods using isolated PID namespaces should all receive PID 1", func() {
|
It("containers in pods using isolated PID namespaces should all receive PID 1", func() {
|
||||||
By("Create a pod with isolated PID namespaces.")
|
By("Create a pod with isolated PID namespaces.")
|
||||||
f.PodClient().CreateSync(&v1.Pod{
|
f.PodClient().CreateSync(&v1.Pod{
|
||||||
|
Loading…
Reference in New Issue
Block a user