mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-31 15:25:57 +00:00
Adding details to Conformance Tests using RFC 2119 standards.
This commit is contained in:
parent
f2c6473e25
commit
aef6cd9bac
@ -37,8 +37,9 @@ var _ = SIGDescribe("DNS", func() {
|
||||
f := framework.NewDefaultFramework("dns")
|
||||
|
||||
/*
|
||||
Testname: dns-for-clusters
|
||||
Description: Make sure that DNS can resolve the names of clusters.
|
||||
Release : v1.9
|
||||
Testname: DNS, cluster
|
||||
Description: When a Pod is created, the pod MUST be able to resolve cluster dns entries such as kubernetes.default via DNS and /etc/hosts.
|
||||
*/
|
||||
framework.ConformanceIt("should provide DNS for the cluster ", func() {
|
||||
// All the names we need to be able to resolve.
|
||||
@ -67,8 +68,9 @@ var _ = SIGDescribe("DNS", func() {
|
||||
})
|
||||
|
||||
/*
|
||||
Testname: dns-for-services
|
||||
Description: Make sure that DNS can resolve the names of services.
|
||||
Release : v1.9
|
||||
Testname: DNS, services
|
||||
Description: When a headless service is created, the service MUST be able to resolve all the required service endpoints. When the service is created, any pod in the same namespace must be able to resolve the service by all of the expected DNS names.
|
||||
*/
|
||||
framework.ConformanceIt("should provide DNS for services ", func() {
|
||||
// Create a test headless service.
|
||||
|
@ -61,26 +61,25 @@ var _ = SIGDescribe("Proxy", func() {
|
||||
prefix := "/api/" + version
|
||||
|
||||
/*
|
||||
Testname: proxy-subresource-node-logs-port
|
||||
Description: Ensure that proxy on node logs works with node proxy
|
||||
subresource and explicit kubelet port.
|
||||
Release : v1.9
|
||||
Testname: Proxy, logs port endpoint
|
||||
Description: Select any node in the cluster to invoke /proxy/nodes/<nodeip>:10250/logs endpoint. This endpoint MUST be reachable.
|
||||
*/
|
||||
framework.ConformanceIt("should proxy logs on node with explicit kubelet port using proxy subresource ", func() { nodeProxyTest(f, prefix+"/nodes/", ":10250/proxy/logs/") })
|
||||
|
||||
/*
|
||||
Testname: proxy-subresource-node-logs
|
||||
Description: Ensure that proxy on node logs works with node proxy
|
||||
subresource.
|
||||
Release : v1.9
|
||||
Testname: Proxy, logs endpoint
|
||||
Description: Select any node in the cluster to invoke /proxy/nodes/<nodeip>//logs endpoint. This endpoint MUST be reachable.
|
||||
*/
|
||||
framework.ConformanceIt("should proxy logs on node using proxy subresource ", func() { nodeProxyTest(f, prefix+"/nodes/", "/proxy/logs/") })
|
||||
|
||||
// using the porter image to serve content, access the content
|
||||
// (of multiple pods?) from multiple (endpoints/services?)
|
||||
|
||||
/*
|
||||
Testname: proxy-service-pod
|
||||
Description: Ensure that proxy through a service and a pod works with
|
||||
both generic top level prefix proxy and proxy subresource.
|
||||
Release : v1.9
|
||||
Testname: Proxy, logs service endpoint
|
||||
Description: Select any node in the cluster to invoke /logs endpoint using the /nodes/proxy subresource from the kubelet port. This endpoint MUST be reachable.
|
||||
*/
|
||||
framework.ConformanceIt("should proxy through a service and a pod ", func() {
|
||||
start := time.Now()
|
||||
|
@ -100,8 +100,9 @@ var _ = SIGDescribe("Services", func() {
|
||||
// TODO: We get coverage of TCP/UDP and multi-port services through the DNS test. We should have a simpler test for multi-port TCP here.
|
||||
|
||||
/*
|
||||
Testname: service-kubernetes-exists
|
||||
Description: Make sure kubernetes service does exist.
|
||||
Release : v1.9
|
||||
Testname: Kubernetes Service
|
||||
Description: By default when a kubernetes cluster is running there MUST be a ‘kubernetes’ service running in the cluster.
|
||||
*/
|
||||
framework.ConformanceIt("should provide secure master service ", func() {
|
||||
_, err := cs.CoreV1().Services(metav1.NamespaceDefault).Get("kubernetes", metav1.GetOptions{})
|
||||
@ -109,9 +110,9 @@ var _ = SIGDescribe("Services", func() {
|
||||
})
|
||||
|
||||
/*
|
||||
Testname: service-valid-endpoints
|
||||
Description: Ensure a service with no pod, one pod or two pods has
|
||||
valid/accessible endpoints (same port number for service and pods).
|
||||
Release : v1.9
|
||||
Testname: Service, endpoints
|
||||
Description: Create a service with a endpoint without any Pods, the service MUST run and show empty endpoints. Add a pod to the service and the service MUST validate to show all the endpoints for the ports exposed by the Pod. Add another Pod then the list of all Ports exposed by both the Pods MUST be valid and have corresponding service endpoint. Once the second Pod is deleted then set of endpoint MUST be validated to show only ports from the first container that are exposed. Once both pods are deleted the endpoints from the service MUST be empty.
|
||||
*/
|
||||
framework.ConformanceIt("should serve a basic endpoint from pods ", func() {
|
||||
serviceName := "endpoint-test2"
|
||||
@ -166,9 +167,9 @@ var _ = SIGDescribe("Services", func() {
|
||||
})
|
||||
|
||||
/*
|
||||
Testname: service-valid-endpoints-multiple-ports
|
||||
Description: Ensure a service with no pod, one pod or two pods has
|
||||
valid/accessible endpoints (different port number for pods).
|
||||
Release : v1.9
|
||||
Testname: Service, endpoints with multiple ports
|
||||
Description: Create a service with two ports but no Pods are added to the service yet. The service MUST run and show empty set of endpoints. Add a Pod to the first port, service MUST list one endpoint for the Pod on that port. Add another Pod to the second port, service MUST list both the endpoints. Delete the first Pod and the service MUST list only the endpoint to the second Pod. Delete the second Pod and the service must now have empty set of endpoints.
|
||||
*/
|
||||
framework.ConformanceIt("should serve multiport endpoints from pods ", func() {
|
||||
// repacking functionality is intentionally not tested here - it's better to test it in an integration test.
|
||||
|
@ -47,10 +47,9 @@ var _ = SIGDescribe("Service endpoints latency", func() {
|
||||
f := framework.NewDefaultFramework("svc-latency")
|
||||
|
||||
/*
|
||||
Testname: service-endpoint-latency
|
||||
Description: Ensure service endpoint's latency is not high
|
||||
(e.g. p50 < 20 seconds and p99 < 50 seconds). If any call to the
|
||||
service endpoint fails, the test will also fail.
|
||||
Release : v1.9
|
||||
Testname: Service endpoint latency, thresholds
|
||||
Description: Run 100 iterations of create service with the Pod running the pause image, measure the time it takes for creating the service and the endpoint with the service name is available. These durations are captured for 100 iterations, then the durations are sorted to compue 50th, 90th and 99th percentile. The single server latency MUST not exceed liberally set thresholds of 20s for 50th percentile and 50s for the 90th percentile.
|
||||
*/
|
||||
framework.ConformanceIt("should not be very high ", func() {
|
||||
const (
|
||||
|
Loading…
Reference in New Issue
Block a user