mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-28 05:57:25 +00:00
hack/test-cmd.sh did not run any admission control
This commit is contained in:
parent
2a83f5d5c7
commit
c906e9c90a
@ -161,10 +161,15 @@ kube::util::wait_for_url "http://127.0.0.1:${KUBELET_HEALTHZ_PORT}/healthz" "kub
|
|||||||
|
|
||||||
# Start kube-apiserver
|
# Start kube-apiserver
|
||||||
kube::log::status "Starting kube-apiserver"
|
kube::log::status "Starting kube-apiserver"
|
||||||
|
|
||||||
|
# Admission Controllers to invoke prior to persisting objects in cluster
|
||||||
|
ADMISSION_CONTROL="NamespaceLifecycle,LimitRanger,ResourceQuota"
|
||||||
|
|
||||||
KUBE_API_VERSIONS="v1,extensions/v1beta1" "${KUBE_OUTPUT_HOSTBIN}/kube-apiserver" \
|
KUBE_API_VERSIONS="v1,extensions/v1beta1" "${KUBE_OUTPUT_HOSTBIN}/kube-apiserver" \
|
||||||
--address="127.0.0.1" \
|
--address="127.0.0.1" \
|
||||||
--public-address-override="127.0.0.1" \
|
--public-address-override="127.0.0.1" \
|
||||||
--port="${API_PORT}" \
|
--port="${API_PORT}" \
|
||||||
|
--admission-control="${ADMISSION_CONTROL}" \
|
||||||
--etcd-servers="http://${ETCD_HOST}:${ETCD_PORT}" \
|
--etcd-servers="http://${ETCD_HOST}:${ETCD_PORT}" \
|
||||||
--public-address-override="127.0.0.1" \
|
--public-address-override="127.0.0.1" \
|
||||||
--kubelet-port=${KUBELET_PORT} \
|
--kubelet-port=${KUBELET_PORT} \
|
||||||
@ -684,7 +689,7 @@ runTests() {
|
|||||||
|
|
||||||
### Create a new namespace
|
### Create a new namespace
|
||||||
# Pre-condition: only the "default" namespace exists
|
# Pre-condition: only the "default" namespace exists
|
||||||
kube::test::get_object_assert 'namespaces' "{{range.items}}{{$id_field}}:{{end}}" 'default:'
|
kube::test::get_object_assert namespaces "{{range.items}}{{$id_field}}:{{end}}" 'default:'
|
||||||
# Command
|
# Command
|
||||||
kubectl create namespace my-namespace
|
kubectl create namespace my-namespace
|
||||||
# Post-condition: namespace 'my-namespace' is created.
|
# Post-condition: namespace 'my-namespace' is created.
|
||||||
@ -696,6 +701,14 @@ runTests() {
|
|||||||
# Pods in Namespaces #
|
# Pods in Namespaces #
|
||||||
##############
|
##############
|
||||||
|
|
||||||
|
### Create a new namespace
|
||||||
|
# Pre-condition: the other namespace does not exist
|
||||||
|
kube::test::get_object_assert 'namespaces' '{{range.items}}{{ if eq $id_field \"other\" }}found{{end}}{{end}}:' ':'
|
||||||
|
# Command
|
||||||
|
kubectl create namespace other
|
||||||
|
# Post-condition: namespace 'other' is created.
|
||||||
|
kube::test::get_object_assert 'namespaces/other' "{{$id_field}}" 'other'
|
||||||
|
|
||||||
### Create POD valid-pod in specific namespace
|
### Create POD valid-pod in specific namespace
|
||||||
# Pre-condition: no POD exists
|
# Pre-condition: no POD exists
|
||||||
kube::test::get_object_assert 'pods --namespace=other' "{{range.items}}{{$id_field}}:{{end}}" ''
|
kube::test::get_object_assert 'pods --namespace=other' "{{range.items}}{{$id_field}}:{{end}}" ''
|
||||||
@ -711,11 +724,21 @@ runTests() {
|
|||||||
kubectl delete "${kube_flags[@]}" pod --namespace=other valid-pod --grace-period=0
|
kubectl delete "${kube_flags[@]}" pod --namespace=other valid-pod --grace-period=0
|
||||||
# Post-condition: valid-pod POD doesn't exist
|
# Post-condition: valid-pod POD doesn't exist
|
||||||
kube::test::get_object_assert 'pods --namespace=other' "{{range.items}}{{$id_field}}:{{end}}" ''
|
kube::test::get_object_assert 'pods --namespace=other' "{{range.items}}{{$id_field}}:{{end}}" ''
|
||||||
|
# Clean up
|
||||||
|
kubectl delete namespace other
|
||||||
|
|
||||||
##############
|
##############
|
||||||
# Secrets #
|
# Secrets #
|
||||||
##############
|
##############
|
||||||
|
|
||||||
|
### Create a new namespace
|
||||||
|
# Pre-condition: the test-secrets namespace does not exist
|
||||||
|
kube::test::get_object_assert 'namespaces' '{{range.items}}{{ if eq $id_field \"test-secrets\" }}found{{end}}{{end}}:' ':'
|
||||||
|
# Command
|
||||||
|
kubectl create namespace test-secrets
|
||||||
|
# Post-condition: namespace 'test-secrets' is created.
|
||||||
|
kube::test::get_object_assert 'namespaces/test-secrets' "{{$id_field}}" 'test-secrets'
|
||||||
|
|
||||||
### Create a generic secret in a specific namespace
|
### Create a generic secret in a specific namespace
|
||||||
# Pre-condition: no SECRET exists
|
# Pre-condition: no SECRET exists
|
||||||
kube::test::get_object_assert 'secrets --namespace=test-secrets' "{{range.items}}{{$id_field}}:{{end}}" ''
|
kube::test::get_object_assert 'secrets --namespace=test-secrets' "{{range.items}}{{$id_field}}:{{end}}" ''
|
||||||
@ -739,6 +762,8 @@ runTests() {
|
|||||||
[[ "$(kubectl get secret/test-secret --namespace=test-secrets -o yaml "${kube_flags[@]}" | grep '.dockercfg:')" ]]
|
[[ "$(kubectl get secret/test-secret --namespace=test-secrets -o yaml "${kube_flags[@]}" | grep '.dockercfg:')" ]]
|
||||||
# Clean-up
|
# Clean-up
|
||||||
kubectl delete secret test-secret --namespace=test-secrets
|
kubectl delete secret test-secret --namespace=test-secrets
|
||||||
|
# Clean up
|
||||||
|
kubectl delete namespace test-secrets
|
||||||
|
|
||||||
#################
|
#################
|
||||||
# Pod templates #
|
# Pod templates #
|
||||||
|
Loading…
Reference in New Issue
Block a user