From 3d09201dbd25986abe000ae6e3d6eca5f2a726a8 Mon Sep 17 00:00:00 2001 From: James Sturtevant Date: Tue, 5 Apr 2022 16:17:13 -0700 Subject: [PATCH] Disable node->pod tests for Windows --- test/conformance/testdata/conformance.yaml | 10 ++++++---- test/e2e/common/network/networking.go | 6 ++++-- 2 files changed, 10 insertions(+), 6 deletions(-) diff --git a/test/conformance/testdata/conformance.yaml b/test/conformance/testdata/conformance.yaml index e26223a30d8..0771b39397f 100755 --- a/test/conformance/testdata/conformance.yaml +++ b/test/conformance/testdata/conformance.yaml @@ -1372,7 +1372,7 @@ file: test/e2e/common/network/networking.go - testname: Networking, intra pod http, from node codename: '[sig-network] Networking Granular Checks: Pods should function for node-pod - communication: http [NodeConformance] [Conformance]' + communication: http [LinuxOnly] [NodeConformance] [Conformance]' description: Create a hostexec pod that is capable of curl to netcat commands. Create a test Pod that will act as a webserver front end exposing ports 8080 for tcp and 8081 for udp. The netserver service proxies are created on specified number @@ -1380,12 +1380,13 @@ the each of service proxy endpoints in the cluster using a http post(protocol=tcp) and the request MUST be successful. Container will execute curl command to reach the service port within specified max retry limit and MUST result in reporting unique - hostnames. + hostnames. This test is marked LinuxOnly it breaks when using Overlay networking + with Windows. release: v1.9 file: test/e2e/common/network/networking.go - testname: Networking, intra pod http, from node codename: '[sig-network] Networking Granular Checks: Pods should function for node-pod - communication: udp [NodeConformance] [Conformance]' + communication: udp [LinuxOnly] [NodeConformance] [Conformance]' description: Create a hostexec pod that is capable of curl to netcat commands. Create a test Pod that will act as a webserver front end exposing ports 8080 for tcp and 8081 for udp. The netserver service proxies are created on specified number @@ -1393,7 +1394,8 @@ the each of service proxy endpoints in the cluster using a http post(protocol=udp) and the request MUST be successful. Container will execute curl command to reach the service port within specified max retry limit and MUST result in reporting unique - hostnames. + hostnames. This test is marked LinuxOnly it breaks when using Overlay networking + with Windows. release: v1.9 file: test/e2e/common/network/networking.go - testname: Proxy, validate Proxy responses diff --git a/test/e2e/common/network/networking.go b/test/e2e/common/network/networking.go index 91cc747b3d9..d7f0cb9073c 100644 --- a/test/e2e/common/network/networking.go +++ b/test/e2e/common/network/networking.go @@ -100,8 +100,9 @@ var _ = SIGDescribe("Networking", func() { Testname: Networking, intra pod http, from node Description: Create a hostexec pod that is capable of curl to netcat commands. Create a test Pod that will act as a webserver front end exposing ports 8080 for tcp and 8081 for udp. The netserver service proxies are created on specified number of nodes. The kubectl exec on the webserver container MUST reach a http port on the each of service proxy endpoints in the cluster using a http post(protocol=tcp) and the request MUST be successful. Container will execute curl command to reach the service port within specified max retry limit and MUST result in reporting unique hostnames. + This test is marked LinuxOnly it breaks when using Overlay networking with Windows. */ - framework.ConformanceIt("should function for node-pod communication: http [NodeConformance]", func() { + framework.ConformanceIt("should function for node-pod communication: http [LinuxOnly] [NodeConformance]", func() { config := e2enetwork.NewCoreNetworkingTestConfig(f, true) for _, endpointPod := range config.EndpointPods { err := config.DialFromNode("http", endpointPod.Status.PodIP, e2enetwork.EndpointHTTPPort, config.MaxTries, 0, sets.NewString(endpointPod.Name)) @@ -116,8 +117,9 @@ var _ = SIGDescribe("Networking", func() { Testname: Networking, intra pod http, from node Description: Create a hostexec pod that is capable of curl to netcat commands. Create a test Pod that will act as a webserver front end exposing ports 8080 for tcp and 8081 for udp. The netserver service proxies are created on specified number of nodes. The kubectl exec on the webserver container MUST reach a http port on the each of service proxy endpoints in the cluster using a http post(protocol=udp) and the request MUST be successful. Container will execute curl command to reach the service port within specified max retry limit and MUST result in reporting unique hostnames. + This test is marked LinuxOnly it breaks when using Overlay networking with Windows. */ - framework.ConformanceIt("should function for node-pod communication: udp [NodeConformance]", func() { + framework.ConformanceIt("should function for node-pod communication: udp [LinuxOnly] [NodeConformance]", func() { config := e2enetwork.NewCoreNetworkingTestConfig(f, true) for _, endpointPod := range config.EndpointPods { err := config.DialFromNode("udp", endpointPod.Status.PodIP, e2enetwork.EndpointUDPPort, config.MaxTries, 0, sets.NewString(endpointPod.Name))