Merge pull request #67084 from spiffxp/rm-conformance-from-e2e_node

Automatic merge from submit-queue (batch tested with PRs 63572, 67084). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

Remove [Conformance] from tests in test/e2e_node

Conformance tests live inside of test/e2e, none of the tests currently
tagged as `[Conformance]` in test/e2e_node actually get run when you run
the conformance tests with e2e.test (either directly or indirectly with
sonobuoy)

If these tests make sense as both `[NodeConformance]` and `[Conformance]`
tests, they should be ported to test/e2e/common

/kind cleanup
/area conformance
/sig architecture
/cc @bgrant0607 @smarterclayton @timothysc
/sig node
/cc @yujuhong

ref: https://github.com/kubernetes/kubernetes/issues/66875

```release-note
NONE
```
This commit is contained in:
Kubernetes Submit Queue 2018-08-07 21:06:04 -07:00 committed by GitHub
commit 81c6b735fa
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 18 additions and 28 deletions

View File

@ -34,7 +34,7 @@ genrule(
"//test/e2e_node:all-srcs", "//test/e2e_node:all-srcs",
], ],
outs = ["conformance.txt"], outs = ["conformance.txt"],
cmd = "./$(location :conformance) $(locations //test/e2e:all-srcs) $(locations //test/e2e_node:all-srcs) > $@", cmd = "./$(location :conformance) $(locations //test/e2e:all-srcs) > $@",
message = "Listing all conformance tests.", message = "Listing all conformance tests.",
tools = [":conformance"], tools = [":conformance"],
) )

View File

@ -181,13 +181,3 @@ test/e2e/storage/subpath.go: "should support subpaths with configmap pod"
test/e2e/storage/subpath.go: "should support subpaths with configmap pod with mountPath of existing file" test/e2e/storage/subpath.go: "should support subpaths with configmap pod with mountPath of existing file"
test/e2e/storage/subpath.go: "should support subpaths with downward pod" test/e2e/storage/subpath.go: "should support subpaths with downward pod"
test/e2e/storage/subpath.go: "should support subpaths with projected pod" test/e2e/storage/subpath.go: "should support subpaths with projected pod"
test/e2e_node/kubelet_test.go: "it should print the output to logs"
test/e2e_node/kubelet_test.go: "it should not write to root filesystem"
test/e2e_node/lifecycle_hook_test.go: "should execute poststart exec hook properly"
test/e2e_node/lifecycle_hook_test.go: "should execute prestop exec hook properly"
test/e2e_node/lifecycle_hook_test.go: "should execute poststart http hook properly"
test/e2e_node/lifecycle_hook_test.go: "should execute prestop http hook properly"
test/e2e_node/mirror_pod_test.go: "should be updated when static pod updated"
test/e2e_node/mirror_pod_test.go: "should be recreated when mirror pod gracefully deleted"
test/e2e_node/mirror_pod_test.go: "should be recreated when mirror pod forcibly deleted"
test/e2e_node/runtime_conformance_test.go: "it should run with the expected status"

View File

@ -311,7 +311,7 @@ func checkDockerStorageDriver() error {
return fmt.Errorf("failed to find storage driver") return fmt.Errorf("failed to find storage driver")
} }
var _ = framework.KubeDescribe("GKE system requirements [Conformance][NodeConformance][Feature:GKEEnv][NodeFeature:GKEEnv]", func() { var _ = framework.KubeDescribe("GKE system requirements [NodeConformance][Feature:GKEEnv][NodeFeature:GKEEnv]", func() {
BeforeEach(func() { BeforeEach(func() {
framework.RunIfSystemSpecNameIs("gke") framework.RunIfSystemSpecNameIs("gke")
}) })

View File

@ -44,7 +44,7 @@ var _ = framework.KubeDescribe("Kubelet", func() {
Testname: Kubelet, log output, default Testname: Kubelet, log output, default
Description: By default the stdout and stderr from the process being executed in a pod MUST be sent to the pod's logs. Description: By default the stdout and stderr from the process being executed in a pod MUST be sent to the pod's logs.
*/ */
framework.ConformanceIt("it should print the output to logs [NodeConformance]", func() { It("it should print the output to logs [NodeConformance]", func() {
podClient.CreateSync(&v1.Pod{ podClient.CreateSync(&v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{
Name: podName, Name: podName,
@ -174,7 +174,7 @@ var _ = framework.KubeDescribe("Kubelet", func() {
Testname: Kubelet, Pod with read only root file system Testname: Kubelet, Pod with read only root file system
Description: Create a Pod with security context set with ReadOnlyRootFileSystem set to true. The Pod then tries to write to the /file on the root, write operation to the root filesystem MUST fail as expected. Description: Create a Pod with security context set with ReadOnlyRootFileSystem set to true. The Pod then tries to write to the /file on the root, write operation to the root filesystem MUST fail as expected.
*/ */
framework.ConformanceIt("it should not write to root filesystem [NodeConformance]", func() { It("it should not write to root filesystem [NodeConformance]", func() {
isReadOnly := true isReadOnly := true
podClient.CreateSync(&v1.Pod{ podClient.CreateSync(&v1.Pod{
ObjectMeta: metav1.ObjectMeta{ ObjectMeta: metav1.ObjectMeta{

View File

@ -89,7 +89,7 @@ var _ = framework.KubeDescribe("Container Lifecycle Hook", func() {
Testname: Pod Lifecycle, post start exec hook Testname: Pod Lifecycle, post start exec hook
Description: When a post start handler is specified in the container lifecycle using a Exec action, then the handler MUST be invoked after the start of the container. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a post start that invokes the server pod using ExecAction to validate that the post start is executed. Description: When a post start handler is specified in the container lifecycle using a Exec action, then the handler MUST be invoked after the start of the container. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a post start that invokes the server pod using ExecAction to validate that the post start is executed.
*/ */
framework.ConformanceIt("should execute poststart exec hook properly [NodeConformance]", func() { It("should execute poststart exec hook properly [NodeConformance]", func() {
lifecycle := &v1.Lifecycle{ lifecycle := &v1.Lifecycle{
PostStart: &v1.Handler{ PostStart: &v1.Handler{
Exec: &v1.ExecAction{ Exec: &v1.ExecAction{
@ -105,7 +105,7 @@ var _ = framework.KubeDescribe("Container Lifecycle Hook", func() {
Testname: Pod Lifecycle, prestop exec hook Testname: Pod Lifecycle, prestop exec hook
Description: When a pre-stop handler is specified in the container lifecycle using a Exec action, then the handler MUST be invoked before the container is terminated. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a pre-stop that invokes the server pod using ExecAction to validate that the pre-stop is executed. Description: When a pre-stop handler is specified in the container lifecycle using a Exec action, then the handler MUST be invoked before the container is terminated. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a pre-stop that invokes the server pod using ExecAction to validate that the pre-stop is executed.
*/ */
framework.ConformanceIt("should execute prestop exec hook properly [NodeConformance]", func() { It("should execute prestop exec hook properly [NodeConformance]", func() {
lifecycle := &v1.Lifecycle{ lifecycle := &v1.Lifecycle{
PreStop: &v1.Handler{ PreStop: &v1.Handler{
Exec: &v1.ExecAction{ Exec: &v1.ExecAction{
@ -121,7 +121,7 @@ var _ = framework.KubeDescribe("Container Lifecycle Hook", func() {
Testname: Pod Lifecycle, post start http hook Testname: Pod Lifecycle, post start http hook
Description: When a post start handler is specified in the container lifecycle using a HttpGet action, then the handler MUST be invoked after the start of the container. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a post start that invokes the server pod to validate that the post start is executed. Description: When a post start handler is specified in the container lifecycle using a HttpGet action, then the handler MUST be invoked after the start of the container. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a post start that invokes the server pod to validate that the post start is executed.
*/ */
framework.ConformanceIt("should execute poststart http hook properly [NodeConformance]", func() { It("should execute poststart http hook properly [NodeConformance]", func() {
lifecycle := &v1.Lifecycle{ lifecycle := &v1.Lifecycle{
PostStart: &v1.Handler{ PostStart: &v1.Handler{
HTTPGet: &v1.HTTPGetAction{ HTTPGet: &v1.HTTPGetAction{
@ -139,7 +139,7 @@ var _ = framework.KubeDescribe("Container Lifecycle Hook", func() {
Testname: Pod Lifecycle, prestop http hook Testname: Pod Lifecycle, prestop http hook
Description: When a pre-stop handler is specified in the container lifecycle using a HttpGet action, then the handler MUST be invoked before the container is terminated. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a pre-stop that invokes the server pod to validate that the pre-stop is executed. Description: When a pre-stop handler is specified in the container lifecycle using a HttpGet action, then the handler MUST be invoked before the container is terminated. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a pre-stop that invokes the server pod to validate that the pre-stop is executed.
*/ */
framework.ConformanceIt("should execute prestop http hook properly [NodeConformance]", func() { It("should execute prestop http hook properly [NodeConformance]", func() {
lifecycle := &v1.Lifecycle{ lifecycle := &v1.Lifecycle{
PreStop: &v1.Handler{ PreStop: &v1.Handler{
HTTPGet: &v1.HTTPGetAction{ HTTPGet: &v1.HTTPGetAction{

View File

@ -62,7 +62,7 @@ var _ = framework.KubeDescribe("MirrorPod", func() {
Testname: Mirror Pod, update Testname: Mirror Pod, update
Description: Updating a static Pod MUST recreate an updated mirror Pod. Create a static pod, verify that a mirror pod is created. Update the static pod by changing the container image, the mirror pod MUST be re-created and updated with the new image. Description: Updating a static Pod MUST recreate an updated mirror Pod. Create a static pod, verify that a mirror pod is created. Update the static pod by changing the container image, the mirror pod MUST be re-created and updated with the new image.
*/ */
framework.ConformanceIt("should be updated when static pod updated [NodeConformance]", func() { It("should be updated when static pod updated [NodeConformance]", func() {
By("get mirror pod uid") By("get mirror pod uid")
pod, err := f.ClientSet.CoreV1().Pods(ns).Get(mirrorPodName, metav1.GetOptions{}) pod, err := f.ClientSet.CoreV1().Pods(ns).Get(mirrorPodName, metav1.GetOptions{})
Expect(err).ShouldNot(HaveOccurred()) Expect(err).ShouldNot(HaveOccurred())
@ -89,7 +89,7 @@ var _ = framework.KubeDescribe("MirrorPod", func() {
Testname: Mirror Pod, delete Testname: Mirror Pod, delete
Description: When a mirror-Pod is deleted then the mirror pod MUST be re-created. Create a static pod, verify that a mirror pod is created. Delete the mirror pod, the mirror pod MUST be re-created and running. Description: When a mirror-Pod is deleted then the mirror pod MUST be re-created. Create a static pod, verify that a mirror pod is created. Delete the mirror pod, the mirror pod MUST be re-created and running.
*/ */
framework.ConformanceIt("should be recreated when mirror pod gracefully deleted [NodeConformance]", func() { It("should be recreated when mirror pod gracefully deleted [NodeConformance]", func() {
By("get mirror pod uid") By("get mirror pod uid")
pod, err := f.ClientSet.CoreV1().Pods(ns).Get(mirrorPodName, metav1.GetOptions{}) pod, err := f.ClientSet.CoreV1().Pods(ns).Get(mirrorPodName, metav1.GetOptions{})
Expect(err).ShouldNot(HaveOccurred()) Expect(err).ShouldNot(HaveOccurred())
@ -109,7 +109,7 @@ var _ = framework.KubeDescribe("MirrorPod", func() {
Testname: Mirror Pod, force delete Testname: Mirror Pod, force delete
Description: When a mirror-Pod is deleted, forcibly, then the mirror pod MUST be re-created. Create a static pod, verify that a mirror pod is created. Delete the mirror pod with delete wait time set to zero forcing immediate deletion, the mirror pod MUST be re-created and running. Description: When a mirror-Pod is deleted, forcibly, then the mirror pod MUST be re-created. Create a static pod, verify that a mirror pod is created. Delete the mirror pod with delete wait time set to zero forcing immediate deletion, the mirror pod MUST be re-created and running.
*/ */
framework.ConformanceIt("should be recreated when mirror pod forcibly deleted [NodeConformance]", func() { It("should be recreated when mirror pod forcibly deleted [NodeConformance]", func() {
By("get mirror pod uid") By("get mirror pod uid")
pod, err := f.ClientSet.CoreV1().Pods(ns).Get(mirrorPodName, metav1.GetOptions{}) pod, err := f.ClientSet.CoreV1().Pods(ns).Get(mirrorPodName, metav1.GetOptions{})
Expect(err).ShouldNot(HaveOccurred()) Expect(err).ShouldNot(HaveOccurred())

View File

@ -51,7 +51,7 @@ var _ = framework.KubeDescribe("Container Runtime Conformance Test", func() {
Testname: Container Runtime, restart policy Testname: Container Runtime, restart policy
Description: If the restart policy is set to Always, Pod MUST be started when terminated, If restart policy is OnFailure, Pod MUST be started only if it is terminated with non-zero exit code. If the restart policy is Never, Pod MUST never be restarted. All these three test cases MUST verify the restart counts accordingly. Description: If the restart policy is set to Always, Pod MUST be started when terminated, If restart policy is OnFailure, Pod MUST be started only if it is terminated with non-zero exit code. If the restart policy is Never, Pod MUST never be restarted. All these three test cases MUST verify the restart counts accordingly.
*/ */
framework.ConformanceIt("it should run with the expected status [NodeConformance]", func() { It("it should run with the expected status [NodeConformance]", func() {
restartCountVolumeName := "restart-count" restartCountVolumeName := "restart-count"
restartCountVolumePath := "/restart-count" restartCountVolumePath := "/restart-count"
testContainer := v1.Container{ testContainer := v1.Container{
@ -132,7 +132,7 @@ while true; do sleep 1; done
By("it should get the expected 'State'") By("it should get the expected 'State'")
Expect(GetContainerState(status.State)).To(Equal(testCase.State)) Expect(GetContainerState(status.State)).To(Equal(testCase.State))
By("it should be possible to delete [Conformance][NodeConformance]") By("it should be possible to delete [NodeConformance]")
Expect(terminateContainer.Delete()).To(Succeed()) Expect(terminateContainer.Delete()).To(Succeed())
Eventually(terminateContainer.Present, retryTimeout, pollInterval).Should(BeFalse()) Eventually(terminateContainer.Present, retryTimeout, pollInterval).Should(BeFalse())
} }
@ -147,7 +147,7 @@ while true; do sleep 1; done
message gomegatypes.GomegaMatcher message gomegatypes.GomegaMatcher
}{ }{
{ {
name: "if TerminationMessagePath is set [Conformance][NodeConformance]", name: "if TerminationMessagePath is set [NodeConformance]",
container: v1.Container{ container: v1.Container{
Image: busyboxImage, Image: busyboxImage,
Command: []string{"/bin/sh", "-c"}, Command: []string{"/bin/sh", "-c"},
@ -162,7 +162,7 @@ while true; do sleep 1; done
}, },
{ {
name: "if TerminationMessagePath is set as non-root user and at a non-default path [Conformance][NodeConformance]", name: "if TerminationMessagePath is set as non-root user and at a non-default path [NodeConformance]",
container: v1.Container{ container: v1.Container{
Image: busyboxImage, Image: busyboxImage,
Command: []string{"/bin/sh", "-c"}, Command: []string{"/bin/sh", "-c"},
@ -177,7 +177,7 @@ while true; do sleep 1; done
}, },
{ {
name: "from log output if TerminationMessagePolicy FallbackToLogOnError is set [Conformance][NodeConformance]", name: "from log output if TerminationMessagePolicy FallbackToLogOnError is set [NodeConformance]",
container: v1.Container{ container: v1.Container{
Image: busyboxImage, Image: busyboxImage,
Command: []string{"/bin/sh", "-c"}, Command: []string{"/bin/sh", "-c"},
@ -203,7 +203,7 @@ while true; do sleep 1; done
}, },
{ {
name: "from file when pod succeeds and TerminationMessagePolicy FallbackToLogOnError is set [Conformance][NodeConformance]", name: "from file when pod succeeds and TerminationMessagePolicy FallbackToLogOnError is set [NodeConformance]",
container: v1.Container{ container: v1.Container{
Image: busyboxImage, Image: busyboxImage,
Command: []string{"/bin/sh", "-c"}, Command: []string{"/bin/sh", "-c"},
@ -318,7 +318,7 @@ while true; do sleep 1; done
}, },
} { } {
testCase := testCase testCase := testCase
It(testCase.description+" [Conformance][NodeConformance]", func() { It(testCase.description+" [NodeConformance]", func() {
name := "image-pull-test" name := "image-pull-test"
command := []string{"/bin/sh", "-c", "while true; do sleep 1; done"} command := []string{"/bin/sh", "-c", "while true; do sleep 1; done"}
container := ConformanceContainer{ container := ConformanceContainer{