mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-30 15:05:27 +00:00
Merge pull request #66871 from mkurylec/65721-part-2-conformance-promotion
Automatic merge from submit-queue (batch tested with PRs 66190, 66871, 66617, 66293, 66891). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>. Part 2: Promoting Atomic Writer testcases for Conformance This PR is the result (part 2) of splitting [this PR](https://github.com/kubernetes/kubernetes/pull/65793) into 2 sections: 1) [This PR](https://github.com/kubernetes/kubernetes/pull/66786), addressing the refactor so eligible-test-for-conformance can use get rid of privileged security context. 2) This specific PR, that addresses the promotion of the Atomic Writer testcases to be in conformance suite. Changes: a) promoting Atomic writer volumes tests to be conformance tests. b) added those tests to appear on golden list (conformance master file)
This commit is contained in:
commit
c890116137
5
test/conformance/testdata/conformance.txt
vendored
5
test/conformance/testdata/conformance.txt
vendored
@ -167,6 +167,11 @@ test/e2e/node/pre_stop.go: "should call prestop when killing a pod"
|
||||
test/e2e/scheduling/predicates.go: "validates resource limits of pods that are allowed to run"
|
||||
test/e2e/scheduling/predicates.go: "validates that NodeSelector is respected if not matching"
|
||||
test/e2e/scheduling/predicates.go: "validates that NodeSelector is respected if matching"
|
||||
test/e2e/storage/subpath.go: "should support subpaths with secret pod"
|
||||
test/e2e/storage/subpath.go: "should support subpaths with configmap pod"
|
||||
test/e2e/storage/subpath.go: "should support subpaths with configmap pod with mountPath of existing file"
|
||||
test/e2e/storage/subpath.go: "should support subpaths with downward pod"
|
||||
test/e2e/storage/subpath.go: "should support subpaths with projected pod"
|
||||
test/e2e_node/kubelet_test.go: "it should print the output to logs"
|
||||
test/e2e_node/kubelet_test.go: "it should not write to root filesystem"
|
||||
test/e2e_node/lifecycle_hook_test.go: "should execute poststart exec hook properly"
|
||||
|
@ -103,24 +103,44 @@ var _ = utils.SIGDescribe("Subpath", func() {
|
||||
|
||||
})
|
||||
|
||||
It("should support subpaths with secret pod", func() {
|
||||
/*
|
||||
Release : v1.12
|
||||
Testname: SubPath: Reading content from a secret volume.
|
||||
Description: Containers in a pod can read content from a secret mounted volume which was configured with a subpath.
|
||||
*/
|
||||
framework.ConformanceIt("should support subpaths with secret pod", func() {
|
||||
pod := testPodSubpath(f, "secret-key", "secret", &v1.VolumeSource{Secret: &v1.SecretVolumeSource{SecretName: "my-secret"}}, privilegedSecurityContext)
|
||||
testBasicSubpath(f, "secret-value", pod)
|
||||
})
|
||||
|
||||
It("should support subpaths with configmap pod", func() {
|
||||
/*
|
||||
Release : v1.12
|
||||
Testname: SubPath: Reading content from a configmap volume.
|
||||
Description: Containers in a pod can read content from a configmap mounted volume which was configured with a subpath.
|
||||
*/
|
||||
framework.ConformanceIt("should support subpaths with configmap pod", func() {
|
||||
pod := testPodSubpath(f, "configmap-key", "configmap", &v1.VolumeSource{ConfigMap: &v1.ConfigMapVolumeSource{LocalObjectReference: v1.LocalObjectReference{Name: "my-configmap"}}}, privilegedSecurityContext)
|
||||
testBasicSubpath(f, "configmap-value", pod)
|
||||
})
|
||||
|
||||
It("should support subpaths with configmap pod with mountPath of existing file", func() {
|
||||
/*
|
||||
Release : v1.12
|
||||
Testname: SubPath: Reading content from a configmap volume.
|
||||
Description: Containers in a pod can read content from a configmap mounted volume which was configured with a subpath and also using a mountpath that is a specific file.
|
||||
*/
|
||||
framework.ConformanceIt("should support subpaths with configmap pod with mountPath of existing file", func() {
|
||||
pod := testPodSubpath(f, "configmap-key", "configmap", &v1.VolumeSource{ConfigMap: &v1.ConfigMapVolumeSource{LocalObjectReference: v1.LocalObjectReference{Name: "my-configmap"}}}, privilegedSecurityContext)
|
||||
file := "/etc/resolv.conf"
|
||||
pod.Spec.Containers[0].VolumeMounts[0].MountPath = file
|
||||
testBasicSubpathFile(f, "configmap-value", pod, file)
|
||||
})
|
||||
|
||||
It("should support subpaths with downward pod", func() {
|
||||
/*
|
||||
Release : v1.12
|
||||
Testname: SubPath: Reading content from a downwardAPI volume.
|
||||
Description: Containers in a pod can read content from a downwardAPI mounted volume which was configured with a subpath.
|
||||
*/
|
||||
framework.ConformanceIt("should support subpaths with downward pod", func() {
|
||||
pod := testPodSubpath(f, "downward/podname", "downwardAPI", &v1.VolumeSource{
|
||||
DownwardAPI: &v1.DownwardAPIVolumeSource{
|
||||
Items: []v1.DownwardAPIVolumeFile{{Path: "downward/podname", FieldRef: &v1.ObjectFieldSelector{APIVersion: "v1", FieldPath: "metadata.name"}}},
|
||||
@ -129,7 +149,12 @@ var _ = utils.SIGDescribe("Subpath", func() {
|
||||
testBasicSubpath(f, pod.Name, pod)
|
||||
})
|
||||
|
||||
It("should support subpaths with projected pod", func() {
|
||||
/*
|
||||
Release : v1.12
|
||||
Testname: SubPath: Reading content from a projected volume.
|
||||
Description: Containers in a pod can read content from a projected mounted volume which was configured with a subpath.
|
||||
*/
|
||||
framework.ConformanceIt("should support subpaths with projected pod", func() {
|
||||
pod := testPodSubpath(f, "projected/configmap-key", "projected", &v1.VolumeSource{
|
||||
Projected: &v1.ProjectedVolumeSource{
|
||||
Sources: []v1.VolumeProjection{
|
||||
|
Loading…
Reference in New Issue
Block a user