mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-23 03:41:45 +00:00
auth e2e: node_authn test: don't expect a SA secret
The test was expecting an SA token in a secret but pods are getting their SA tokens via projected volumes by default. Also, the SA token controller function is getting reduced so the original check is likely to fail.
This commit is contained in:
parent
4348c8ecaf
commit
914a2a325a
@ -51,13 +51,6 @@ var _ = SIGDescribe("[Feature:NodeAuthenticator]", func() {
|
||||
|
||||
nodeIPs := e2enode.GetAddressesByTypeAndFamily(&nodes.Items[0], v1.NodeInternalIP, family)
|
||||
framework.ExpectNotEqual(len(nodeIPs), 0)
|
||||
|
||||
// make sure ServiceAccount admission controller is enabled, so secret generation on SA creation works
|
||||
saName := "default"
|
||||
sa, err := f.ClientSet.CoreV1().ServiceAccounts(ns).Get(context.TODO(), saName, metav1.GetOptions{})
|
||||
framework.ExpectNoError(err, "failed to retrieve service account (%s:%s)", ns, saName)
|
||||
framework.ExpectNotEqual(len(sa.Secrets), 0)
|
||||
|
||||
})
|
||||
|
||||
ginkgo.It("The kubelet's main port 10250 should reject requests with no credentials", func() {
|
||||
|
Loading…
Reference in New Issue
Block a user