Merge pull request #77093 from oomichi/use-ExpectError-e2e-auth

Use framework.ExpectNoError() for e2e/auth
This commit is contained in:
Kubernetes Prow Robot 2019-05-04 13:47:37 -07:00 committed by GitHub
commit 80bbb0cde1
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 13 additions and 14 deletions

View File

@ -24,7 +24,6 @@ import (
jobutil "k8s.io/kubernetes/test/e2e/framework/job" jobutil "k8s.io/kubernetes/test/e2e/framework/job"
. "github.com/onsi/ginkgo" . "github.com/onsi/ginkgo"
. "github.com/onsi/gomega"
imageutil "k8s.io/kubernetes/test/utils/image" imageutil "k8s.io/kubernetes/test/utils/image"
) )
@ -56,10 +55,10 @@ var _ = SIGDescribe("Metadata Concealment", func() {
}, },
} }
job, err := jobutil.CreateJob(f.ClientSet, f.Namespace.Name, job) job, err := jobutil.CreateJob(f.ClientSet, f.Namespace.Name, job)
Expect(err).NotTo(HaveOccurred(), "failed to create job (%s:%s)", f.Namespace.Name, job.Name) framework.ExpectNoError(err, "failed to create job (%s:%s)", f.Namespace.Name, job.Name)
By("Ensuring job reaches completions") By("Ensuring job reaches completions")
err = jobutil.WaitForJobComplete(f.ClientSet, f.Namespace.Name, job.Name, int32(1)) err = jobutil.WaitForJobComplete(f.ClientSet, f.Namespace.Name, job.Name, int32(1))
Expect(err).NotTo(HaveOccurred(), "failed to ensure job completion (%s:%s)", f.Namespace.Name, job.Name) framework.ExpectNoError(err, "failed to ensure job completion (%s:%s)", f.Namespace.Name, job.Name)
}) })
}) })

View File

@ -38,7 +38,7 @@ var _ = SIGDescribe("[Feature:NodeAuthenticator]", func() {
ns = f.Namespace.Name ns = f.Namespace.Name
nodeList, err := f.ClientSet.CoreV1().Nodes().List(metav1.ListOptions{}) nodeList, err := f.ClientSet.CoreV1().Nodes().List(metav1.ListOptions{})
Expect(err).NotTo(HaveOccurred(), "failed to list nodes in namespace: %s", ns) framework.ExpectNoError(err, "failed to list nodes in namespace: %s", ns)
Expect(len(nodeList.Items)).NotTo(BeZero()) Expect(len(nodeList.Items)).NotTo(BeZero())
pickedNode := nodeList.Items[0] pickedNode := nodeList.Items[0]
@ -49,7 +49,7 @@ var _ = SIGDescribe("[Feature:NodeAuthenticator]", func() {
// make sure ServiceAccount admission controller is enabled, so secret generation on SA creation works // make sure ServiceAccount admission controller is enabled, so secret generation on SA creation works
saName := "default" saName := "default"
sa, err := f.ClientSet.CoreV1().ServiceAccounts(ns).Get(saName, metav1.GetOptions{}) sa, err := f.ClientSet.CoreV1().ServiceAccounts(ns).Get(saName, metav1.GetOptions{})
Expect(err).NotTo(HaveOccurred(), "failed to retrieve service account (%s:%s)", ns, saName) framework.ExpectNoError(err, "failed to retrieve service account (%s:%s)", ns, saName)
Expect(len(sa.Secrets)).NotTo(BeZero()) Expect(len(sa.Secrets)).NotTo(BeZero())
}) })
@ -73,7 +73,7 @@ var _ = SIGDescribe("[Feature:NodeAuthenticator]", func() {
AutomountServiceAccountToken: &trueValue, AutomountServiceAccountToken: &trueValue,
} }
_, err := f.ClientSet.CoreV1().ServiceAccounts(ns).Create(newSA) _, err := f.ClientSet.CoreV1().ServiceAccounts(ns).Create(newSA)
Expect(err).NotTo(HaveOccurred(), "failed to create service account (%s:%s)", ns, newSA.Name) framework.ExpectNoError(err, "failed to create service account (%s:%s)", ns, newSA.Name)
pod := createNodeAuthTestPod(f) pod := createNodeAuthTestPod(f)

View File

@ -52,24 +52,24 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
ns = f.Namespace.Name ns = f.Namespace.Name
nodeList, err := f.ClientSet.CoreV1().Nodes().List(metav1.ListOptions{}) nodeList, err := f.ClientSet.CoreV1().Nodes().List(metav1.ListOptions{})
Expect(err).NotTo(HaveOccurred(), "failed to list nodes in namespace: %s", ns) framework.ExpectNoError(err, "failed to list nodes in namespace: %s", ns)
Expect(len(nodeList.Items)).NotTo(Equal(0)) Expect(len(nodeList.Items)).NotTo(Equal(0))
nodeName = nodeList.Items[0].Name nodeName = nodeList.Items[0].Name
asUser = NodeNamePrefix + nodeName asUser = NodeNamePrefix + nodeName
saName := "default" saName := "default"
sa, err := f.ClientSet.CoreV1().ServiceAccounts(ns).Get(saName, metav1.GetOptions{}) sa, err := f.ClientSet.CoreV1().ServiceAccounts(ns).Get(saName, metav1.GetOptions{})
Expect(len(sa.Secrets)).NotTo(Equal(0)) Expect(len(sa.Secrets)).NotTo(Equal(0))
Expect(err).NotTo(HaveOccurred(), "failed to retrieve service account (%s:%s)", ns, saName) framework.ExpectNoError(err, "failed to retrieve service account (%s:%s)", ns, saName)
defaultSaSecret = sa.Secrets[0].Name defaultSaSecret = sa.Secrets[0].Name
By("Creating a kubernetes client that impersonates a node") By("Creating a kubernetes client that impersonates a node")
config, err := framework.LoadConfig() config, err := framework.LoadConfig()
Expect(err).NotTo(HaveOccurred(), "failed to load kubernetes client config") framework.ExpectNoError(err, "failed to load kubernetes client config")
config.Impersonate = restclient.ImpersonationConfig{ config.Impersonate = restclient.ImpersonationConfig{
UserName: asUser, UserName: asUser,
Groups: []string{NodesGroup}, Groups: []string{NodesGroup},
} }
c, err = clientset.NewForConfig(config) c, err = clientset.NewForConfig(config)
Expect(err).NotTo(HaveOccurred(), "failed to create Clientset for the given config: %+v", *config) framework.ExpectNoError(err, "failed to create Clientset for the given config: %+v", *config)
}) })
It("Getting a non-existent secret should exit with the Forbidden error, not a NotFound error", func() { It("Getting a non-existent secret should exit with the Forbidden error, not a NotFound error", func() {
@ -99,7 +99,7 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
}, },
} }
_, err := f.ClientSet.CoreV1().ConfigMaps(ns).Create(configmap) _, err := f.ClientSet.CoreV1().ConfigMaps(ns).Create(configmap)
Expect(err).NotTo(HaveOccurred(), "failed to create configmap (%s:%s) %+v", ns, configmap.Name, *configmap) framework.ExpectNoError(err, "failed to create configmap (%s:%s) %+v", ns, configmap.Name, *configmap)
_, err = c.CoreV1().ConfigMaps(ns).Get(configmap.Name, metav1.GetOptions{}) _, err = c.CoreV1().ConfigMaps(ns).Get(configmap.Name, metav1.GetOptions{})
Expect(apierrors.IsForbidden(err)).Should(Equal(true)) Expect(apierrors.IsForbidden(err)).Should(Equal(true))
}) })
@ -116,7 +116,7 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
}, },
} }
_, err := f.ClientSet.CoreV1().Secrets(ns).Create(secret) _, err := f.ClientSet.CoreV1().Secrets(ns).Create(secret)
Expect(err).NotTo(HaveOccurred(), "failed to create secret (%s:%s)", ns, secret.Name) framework.ExpectNoError(err, "failed to create secret (%s:%s)", ns, secret.Name)
By("Node should not get the secret") By("Node should not get the secret")
_, err = c.CoreV1().Secrets(ns).Get(secret.Name, metav1.GetOptions{}) _, err = c.CoreV1().Secrets(ns).Get(secret.Name, metav1.GetOptions{})
@ -149,7 +149,7 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
} }
_, err = f.ClientSet.CoreV1().Pods(ns).Create(pod) _, err = f.ClientSet.CoreV1().Pods(ns).Create(pod)
Expect(err).NotTo(HaveOccurred(), "failed to create pod (%s:%s)", ns, pod.Name) framework.ExpectNoError(err, "failed to create pod (%s:%s)", ns, pod.Name)
By("The node should able to access the secret") By("The node should able to access the secret")
itv := framework.Poll itv := framework.Poll
@ -162,7 +162,7 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
} }
return true, nil return true, nil
}) })
Expect(err).NotTo(HaveOccurred(), "failed to get secret after trying every %v for %v (%s:%s)", itv, dur, ns, secret.Name) framework.ExpectNoError(err, "failed to get secret after trying every %v for %v (%s:%s)", itv, dur, ns, secret.Name)
}) })
It("A node shouldn't be able to create another node", func() { It("A node shouldn't be able to create another node", func() {