mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-07 11:13:48 +00:00
promote match conditions e2e tests to conformance
This commit is contained in:
parent
055b51728c
commit
dde48918dd
50
test/conformance/testdata/conformance.yaml
vendored
50
test/conformance/testdata/conformance.yaml
vendored
@ -60,6 +60,28 @@
|
||||
and attempt to create an object; the webhook MUST deny the create.
|
||||
release: v1.16
|
||||
file: test/e2e/apimachinery/webhook.go
|
||||
- testname: Mutating Admission webhook, create and update mutating webhook configuration
|
||||
with matchConditions
|
||||
codename: '[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should
|
||||
be able to create and update mutating webhook configurations with match conditions
|
||||
[Conformance]'
|
||||
description: Register a mutating webhook configuration. Verify that the match conditions
|
||||
field are properly stored in the api-server. Update the mutating webhook configuration
|
||||
and retrieve it; the retrieved object must contain the newly update matchConditions
|
||||
fields.
|
||||
release: v1.28
|
||||
file: test/e2e/apimachinery/webhook.go
|
||||
- testname: Validating Admission webhook, create and update validating webhook configuration
|
||||
with matchConditions
|
||||
codename: '[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should
|
||||
be able to create and update validating webhook configurations with match conditions
|
||||
[Conformance]'
|
||||
description: Register a validating webhook configuration. Verify that the match
|
||||
conditions field are properly stored in the api-server. Update the validating
|
||||
webhook configuration and retrieve it; the retrieved object must contain the newly
|
||||
update matchConditions fields.
|
||||
release: v1.28
|
||||
file: test/e2e/apimachinery/webhook.go
|
||||
- testname: Admission webhook, deny attach
|
||||
codename: '[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should
|
||||
be able to deny attaching pod [Conformance]'
|
||||
@ -150,6 +172,16 @@
|
||||
present.
|
||||
release: v1.16
|
||||
file: test/e2e/apimachinery/webhook.go
|
||||
- testname: Mutating Admission webhook, mutating webhook excluding object with specific
|
||||
name
|
||||
codename: '[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should
|
||||
mutate everything except ''skip-me'' configmaps [Conformance]'
|
||||
description: Create a mutating webhook configuration with matchConditions field
|
||||
that will reject all resources except ones with a specific name 'skip-me'. Create
|
||||
a configMap with the name 'skip-me' and verify that it's mutated. Create a configMap
|
||||
with a different name than 'skip-me' and verify that it's mustated.
|
||||
release: v1.28
|
||||
file: test/e2e/apimachinery/webhook.go
|
||||
- testname: Admission webhook, mutation with defaulting
|
||||
codename: '[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should
|
||||
mutate pod and apply defaults after mutation [Conformance]'
|
||||
@ -167,6 +199,24 @@
|
||||
MUST be allowed and the webhook configuration object MUST NOT be mutated the webhooks.
|
||||
release: v1.16
|
||||
file: test/e2e/apimachinery/webhook.go
|
||||
- testname: Mutating Admission webhook, reject mutating webhook configurations with
|
||||
invalid matchConditions
|
||||
codename: '[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should
|
||||
reject mutating webhook configurations with invalid match conditions [Conformance]'
|
||||
description: Creates a mutating webhook configuration with an invalid CEL expression
|
||||
in it's matchConditions field. The api-server server should reject the create
|
||||
request with a "compilation failed" error message.
|
||||
release: v1.28
|
||||
file: test/e2e/apimachinery/webhook.go
|
||||
- testname: Validing Admission webhook, reject validating webhook configurations with
|
||||
invalid matchConditions
|
||||
codename: '[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should
|
||||
reject validating webhook configurations with invalid match conditions [Conformance]'
|
||||
description: Creates a validating webhook configuration with an invalid CEL expression
|
||||
in it's matchConditions field. The api-server server should reject the create
|
||||
request with a "compilation failed" error message.
|
||||
release: v1.28
|
||||
file: test/e2e/apimachinery/webhook.go
|
||||
- testname: Admission webhook, fail closed
|
||||
codename: '[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should
|
||||
unconditionally reject operations on fail closed webhook [Conformance]'
|
||||
|
@ -712,7 +712,7 @@ var _ = SIGDescribe("AdmissionWebhook [Privileged:ClusterAdmin]", func() {
|
||||
properly stored in the api-server. Update the validating webhook configuration and retrieve it; the
|
||||
retrieved object must contain the newly update matchConditions fields.
|
||||
*/
|
||||
ginkgo.It("should be able to create and update validating webhook configurations with match conditions", func(ctx context.Context) {
|
||||
framework.ConformanceIt("should be able to create and update validating webhook configurations with match conditions", func(ctx context.Context) {
|
||||
initalMatchConditions := []admissionregistrationv1.MatchCondition{
|
||||
{
|
||||
Name: "expression-1",
|
||||
@ -763,7 +763,7 @@ var _ = SIGDescribe("AdmissionWebhook [Privileged:ClusterAdmin]", func() {
|
||||
properly stored in the api-server. Update the mutating webhook configuration and retrieve it; the
|
||||
retrieved object must contain the newly update matchConditions fields.
|
||||
*/
|
||||
ginkgo.It("should be able to create and update mutating webhook configurations with match conditions", func(ctx context.Context) {
|
||||
framework.ConformanceIt("should be able to create and update mutating webhook configurations with match conditions", func(ctx context.Context) {
|
||||
initalMatchConditions := []admissionregistrationv1.MatchCondition{
|
||||
{
|
||||
Name: "expression-1",
|
||||
@ -814,7 +814,7 @@ var _ = SIGDescribe("AdmissionWebhook [Privileged:ClusterAdmin]", func() {
|
||||
matchConditions field. The api-server server should reject the create request with a "compilation
|
||||
failed" error message.
|
||||
*/
|
||||
ginkgo.It("should reject validating webhook configurations with invalid match conditions", func(ctx context.Context) {
|
||||
framework.ConformanceIt("should reject validating webhook configurations with invalid match conditions", func(ctx context.Context) {
|
||||
initalMatchConditions := []admissionregistrationv1.MatchCondition{
|
||||
{
|
||||
Name: "invalid-expression-1",
|
||||
@ -838,7 +838,7 @@ var _ = SIGDescribe("AdmissionWebhook [Privileged:ClusterAdmin]", func() {
|
||||
matchConditions field. The api-server server should reject the create request with a "compilation
|
||||
failed" error message.
|
||||
*/
|
||||
ginkgo.It("should reject mutating webhook configurations with invalid match conditions", func(ctx context.Context) {
|
||||
framework.ConformanceIt("should reject mutating webhook configurations with invalid match conditions", func(ctx context.Context) {
|
||||
initalMatchConditions := []admissionregistrationv1.MatchCondition{
|
||||
{
|
||||
Name: "invalid-expression-1",
|
||||
@ -863,7 +863,7 @@ var _ = SIGDescribe("AdmissionWebhook [Privileged:ClusterAdmin]", func() {
|
||||
a configMap with the name 'skip-me' and verify that it's mutated. Create a
|
||||
configMap with a different name than 'skip-me' and verify that it's mustated.
|
||||
*/
|
||||
ginkgo.It("should mutate everything except 'skip-me' configmaps", func(ctx context.Context) {
|
||||
framework.ConformanceIt("should mutate everything except 'skip-me' configmaps", func(ctx context.Context) {
|
||||
skipMeMatchConditions := []admissionregistrationv1.MatchCondition{
|
||||
{
|
||||
Name: "skip-me",
|
||||
|
Loading…
Reference in New Issue
Block a user