mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-21 10:51:29 +00:00
test/ : fix non-ascii characters
This commit is contained in:
parent
b3ba969756
commit
e96b037be3
@ -47,7 +47,7 @@ var _ = ginkgo.Describe("[sig-storage] ConfigMap", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: ConfigMap Volume, without mapping, volume mode set
|
Testname: ConfigMap Volume, without mapping, volume mode set
|
||||||
Description: Create a ConfigMap, create a Pod that mounts a volume and populates the volume with data stored in the ConfigMap. File mode is changed to a custom value of '0x400'. The ConfigMap that is created MUST be accessible to read from the newly created Pod using the volume mount. The data content of the file MUST be readable and verified and file modes MUST be set to the custom value of ‘0x400’
|
Description: Create a ConfigMap, create a Pod that mounts a volume and populates the volume with data stored in the ConfigMap. File mode is changed to a custom value of '0x400'. The ConfigMap that is created MUST be accessible to read from the newly created Pod using the volume mount. The data content of the file MUST be readable and verified and file modes MUST be set to the custom value of '0x400'
|
||||||
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance]", func() {
|
framework.ConformanceIt("should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance]", func() {
|
||||||
@ -89,7 +89,7 @@ var _ = ginkgo.Describe("[sig-storage] ConfigMap", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: ConfigMap Volume, with mapping, volume mode set
|
Testname: ConfigMap Volume, with mapping, volume mode set
|
||||||
Description: Create a ConfigMap, create a Pod that mounts a volume and populates the volume with data stored in the ConfigMap. Files are mapped to a path in the volume. File mode is changed to a custom value of '0x400'. The ConfigMap that is created MUST be accessible to read from the newly created Pod using the volume mount. The data content of the file MUST be readable and verified and file modes MUST be set to the custom value of ‘0x400’
|
Description: Create a ConfigMap, create a Pod that mounts a volume and populates the volume with data stored in the ConfigMap. Files are mapped to a path in the volume. File mode is changed to a custom value of '0x400'. The ConfigMap that is created MUST be accessible to read from the newly created Pod using the volume mount. The data content of the file MUST be readable and verified and file modes MUST be set to the custom value of '0x400'
|
||||||
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance]", func() {
|
framework.ConformanceIt("should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance]", func() {
|
||||||
|
@ -132,7 +132,7 @@ var _ = framework.KubeDescribe("Probing container", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Pod liveness probe, using local file, no restart
|
Testname: Pod liveness probe, using local file, no restart
|
||||||
Description: Pod is created with liveness probe that uses ‘exec’ command to cat /temp/health file. Liveness probe MUST not fail to check health and the restart count should remain 0.
|
Description: Pod is created with liveness probe that uses 'exec' command to cat /temp/health file. Liveness probe MUST not fail to check health and the restart count should remain 0.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should *not* be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance]", func() {
|
framework.ConformanceIt("should *not* be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance]", func() {
|
||||||
cmd := []string{"/bin/sh", "-c", "echo ok >/tmp/health; sleep 600"}
|
cmd := []string{"/bin/sh", "-c", "echo ok >/tmp/health; sleep 600"}
|
||||||
@ -193,7 +193,7 @@ var _ = framework.KubeDescribe("Probing container", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Pod liveness probe, using http endpoint, failure
|
Testname: Pod liveness probe, using http endpoint, failure
|
||||||
Description: A Pod is created with liveness probe on http endpoint ‘/’. Liveness probe on this endpoint will not fail. When liveness probe does not fail then the restart count MUST remain zero.
|
Description: A Pod is created with liveness probe on http endpoint '/'. Liveness probe on this endpoint will not fail. When liveness probe does not fail then the restart count MUST remain zero.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should *not* be restarted with a /healthz http liveness probe [NodeConformance]", func() {
|
framework.ConformanceIt("should *not* be restarted with a /healthz http liveness probe [NodeConformance]", func() {
|
||||||
livenessProbe := &v1.Probe{
|
livenessProbe := &v1.Probe{
|
||||||
|
@ -94,7 +94,7 @@ var _ = framework.KubeDescribe("Container Lifecycle Hook", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Pod Lifecycle, post start exec hook
|
Testname: Pod Lifecycle, post start exec hook
|
||||||
Description: When a post start handler is specified in the container lifecycle using a ‘Exec’ action, then the handler MUST be invoked after the start of the container. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a post start that invokes the server pod using ExecAction to validate that the post start is executed.
|
Description: When a post start handler is specified in the container lifecycle using a 'Exec' action, then the handler MUST be invoked after the start of the container. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a post start that invokes the server pod using ExecAction to validate that the post start is executed.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should execute poststart exec hook properly [NodeConformance]", func() {
|
framework.ConformanceIt("should execute poststart exec hook properly [NodeConformance]", func() {
|
||||||
lifecycle := &v1.Lifecycle{
|
lifecycle := &v1.Lifecycle{
|
||||||
@ -110,7 +110,7 @@ var _ = framework.KubeDescribe("Container Lifecycle Hook", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Pod Lifecycle, prestop exec hook
|
Testname: Pod Lifecycle, prestop exec hook
|
||||||
Description: When a pre-stop handler is specified in the container lifecycle using a ‘Exec’ action, then the handler MUST be invoked before the container is terminated. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a pre-stop that invokes the server pod using ExecAction to validate that the pre-stop is executed.
|
Description: When a pre-stop handler is specified in the container lifecycle using a 'Exec' action, then the handler MUST be invoked before the container is terminated. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a pre-stop that invokes the server pod using ExecAction to validate that the pre-stop is executed.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should execute prestop exec hook properly [NodeConformance]", func() {
|
framework.ConformanceIt("should execute prestop exec hook properly [NodeConformance]", func() {
|
||||||
lifecycle := &v1.Lifecycle{
|
lifecycle := &v1.Lifecycle{
|
||||||
@ -144,7 +144,7 @@ var _ = framework.KubeDescribe("Container Lifecycle Hook", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Pod Lifecycle, prestop http hook
|
Testname: Pod Lifecycle, prestop http hook
|
||||||
Description: When a pre-stop handler is specified in the container lifecycle using a ‘HttpGet’ action, then the handler MUST be invoked before the container is terminated. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a pre-stop that invokes the server pod to validate that the pre-stop is executed.
|
Description: When a pre-stop handler is specified in the container lifecycle using a 'HttpGet' action, then the handler MUST be invoked before the container is terminated. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a pre-stop that invokes the server pod to validate that the pre-stop is executed.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should execute prestop http hook properly [NodeConformance]", func() {
|
framework.ConformanceIt("should execute prestop http hook properly [NodeConformance]", func() {
|
||||||
lifecycle := &v1.Lifecycle{
|
lifecycle := &v1.Lifecycle{
|
||||||
|
@ -59,7 +59,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected downwardAPI", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Projected Volume, DownwardAPI, volume mode 0400
|
Testname: Projected Volume, DownwardAPI, volume mode 0400
|
||||||
Description: A Pod is created with a projected volume source for downwardAPI with pod name, cpu and memory limits and cpu and memory requests. The default mode for the volume mount is set to 0400. Pod MUST be able to read the pod name from the mounted DownwardAPIVolumeFiles and the volume mode must be -r—-—————.
|
Description: A Pod is created with a projected volume source for downwardAPI with pod name, cpu and memory limits and cpu and memory requests. The default mode for the volume mount is set to 0400. Pod MUST be able to read the pod name from the mounted DownwardAPIVolumeFiles and the volume mode must be -r--------.
|
||||||
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should set DefaultMode on files [LinuxOnly] [NodeConformance]", func() {
|
framework.ConformanceIt("should set DefaultMode on files [LinuxOnly] [NodeConformance]", func() {
|
||||||
@ -75,7 +75,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected downwardAPI", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Projected Volume, DownwardAPI, volume mode 0400
|
Testname: Projected Volume, DownwardAPI, volume mode 0400
|
||||||
Description: A Pod is created with a projected volume source for downwardAPI with pod name, cpu and memory limits and cpu and memory requests. The default mode for the volume mount is set to 0400. Pod MUST be able to read the pod name from the mounted DownwardAPIVolumeFiles and the volume mode must be -r—-—————.
|
Description: A Pod is created with a projected volume source for downwardAPI with pod name, cpu and memory limits and cpu and memory requests. The default mode for the volume mount is set to 0400. Pod MUST be able to read the pod name from the mounted DownwardAPIVolumeFiles and the volume mode must be -r--------.
|
||||||
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should set mode on item file [LinuxOnly] [NodeConformance]", func() {
|
framework.ConformanceIt("should set mode on item file [LinuxOnly] [NodeConformance]", func() {
|
||||||
|
@ -37,7 +37,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected secret", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Projected Volume, Secrets, volume mode default
|
Testname: Projected Volume, Secrets, volume mode default
|
||||||
Description: A Pod is created with a projected volume source ‘secret’ to store a secret with a specified key with default permission mode. Pod MUST be able to read the content of the key successfully and the mode MUST be -rw-r--r-- by default.
|
Description: A Pod is created with a projected volume source 'secret' to store a secret with a specified key with default permission mode. Pod MUST be able to read the content of the key successfully and the mode MUST be -rw-r--r-- by default.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should be consumable from pods in volume [NodeConformance]", func() {
|
framework.ConformanceIt("should be consumable from pods in volume [NodeConformance]", func() {
|
||||||
doProjectedSecretE2EWithoutMapping(f, nil /* default mode */, "projected-secret-test-"+string(uuid.NewUUID()), nil, nil)
|
doProjectedSecretE2EWithoutMapping(f, nil /* default mode */, "projected-secret-test-"+string(uuid.NewUUID()), nil, nil)
|
||||||
@ -46,7 +46,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected secret", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Projected Volume, Secrets, volume mode 0400
|
Testname: Projected Volume, Secrets, volume mode 0400
|
||||||
Description: A Pod is created with a projected volume source ‘secret’ to store a secret with a specified key with permission mode set to 0x400 on the Pod. Pod MUST be able to read the content of the key successfully and the mode MUST be -r—-—————.
|
Description: A Pod is created with a projected volume source 'secret' to store a secret with a specified key with permission mode set to 0x400 on the Pod. Pod MUST be able to read the content of the key successfully and the mode MUST be -r--------.
|
||||||
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance]", func() {
|
framework.ConformanceIt("should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance]", func() {
|
||||||
@ -57,7 +57,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected secret", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Project Volume, Secrets, non-root, custom fsGroup
|
Testname: Project Volume, Secrets, non-root, custom fsGroup
|
||||||
Description: A Pod is created with a projected volume source ‘secret’ to store a secret with a specified key. The volume has permission mode set to 0440, fsgroup set to 1001 and user set to non-root uid of 1000. Pod MUST be able to read the content of the key successfully and the mode MUST be -r—-r————-.
|
Description: A Pod is created with a projected volume source 'secret' to store a secret with a specified key. The volume has permission mode set to 0440, fsgroup set to 1001 and user set to non-root uid of 1000. Pod MUST be able to read the content of the key successfully and the mode MUST be -r--r-----.
|
||||||
This test is marked LinuxOnly since Windows does not support setting specific file permissions, or running as UID / GID.
|
This test is marked LinuxOnly since Windows does not support setting specific file permissions, or running as UID / GID.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance]", func() {
|
framework.ConformanceIt("should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance]", func() {
|
||||||
@ -69,7 +69,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected secret", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Projected Volume, Secrets, mapped
|
Testname: Projected Volume, Secrets, mapped
|
||||||
Description: A Pod is created with a projected volume source ‘secret’ to store a secret with a specified key with default permission mode. The secret is also mapped to a custom path. Pod MUST be able to read the content of the key successfully and the mode MUST be -r—-—————— on the mapped volume.
|
Description: A Pod is created with a projected volume source 'secret' to store a secret with a specified key with default permission mode. The secret is also mapped to a custom path. Pod MUST be able to read the content of the key successfully and the mode MUST be -r--------on the mapped volume.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should be consumable from pods in volume with mappings [NodeConformance]", func() {
|
framework.ConformanceIt("should be consumable from pods in volume with mappings [NodeConformance]", func() {
|
||||||
doProjectedSecretE2EWithMapping(f, nil)
|
doProjectedSecretE2EWithMapping(f, nil)
|
||||||
@ -78,7 +78,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected secret", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Projected Volume, Secrets, mapped, volume mode 0400
|
Testname: Projected Volume, Secrets, mapped, volume mode 0400
|
||||||
Description: A Pod is created with a projected volume source ‘secret’ to store a secret with a specified key with permission mode set to 0400. The secret is also mapped to a specific name. Pod MUST be able to read the content of the key successfully and the mode MUST be -r—-—————— on the mapped volume.
|
Description: A Pod is created with a projected volume source 'secret' to store a secret with a specified key with permission mode set to 0400. The secret is also mapped to a specific name. Pod MUST be able to read the content of the key successfully and the mode MUST be -r-------- on the mapped volume.
|
||||||
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance]", func() {
|
framework.ConformanceIt("should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance]", func() {
|
||||||
@ -110,7 +110,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected secret", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Projected Volume, Secrets, mapped, multiple paths
|
Testname: Projected Volume, Secrets, mapped, multiple paths
|
||||||
Description: A Pod is created with a projected volume source ‘secret’ to store a secret with a specified key. The secret is mapped to two different volume mounts. Pod MUST be able to read the content of the key successfully from the two volume mounts and the mode MUST be -r—-—————— on the mapped volumes.
|
Description: A Pod is created with a projected volume source 'secret' to store a secret with a specified key. The secret is mapped to two different volume mounts. Pod MUST be able to read the content of the key successfully from the two volume mounts and the mode MUST be -r-------- on the mapped volumes.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should be consumable in multiple volumes in a pod [NodeConformance]", func() {
|
framework.ConformanceIt("should be consumable in multiple volumes in a pod [NodeConformance]", func() {
|
||||||
// This test ensures that the same secret can be mounted in multiple
|
// This test ensures that the same secret can be mounted in multiple
|
||||||
|
@ -86,7 +86,7 @@ var _ = ginkgo.Describe("[sig-api-machinery] Secrets", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Secrets, pod environment from source
|
Testname: Secrets, pod environment from source
|
||||||
Description: Create a secret. Create a Pod with Container that declares a environment variable using ‘EnvFrom’ which references the secret created to extract a key value from the secret. Pod MUST have the environment variable that contains proper value for the key to the secret.
|
Description: Create a secret. Create a Pod with Container that declares a environment variable using 'EnvFrom' which references the secret created to extract a key value from the secret. Pod MUST have the environment variable that contains proper value for the key to the secret.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should be consumable via the environment [NodeConformance]", func() {
|
framework.ConformanceIt("should be consumable via the environment [NodeConformance]", func() {
|
||||||
name := "secret-test-" + string(uuid.NewUUID())
|
name := "secret-test-" + string(uuid.NewUUID())
|
||||||
|
@ -47,7 +47,7 @@ var _ = ginkgo.Describe("[sig-storage] Secrets", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Secrets Volume, volume mode 0400
|
Testname: Secrets Volume, volume mode 0400
|
||||||
Description: Create a secret. Create a Pod with secret volume source configured into the container with file mode set to 0x400. Pod MUST be able to read the secret from the mounted volume from the container runtime and the file mode of the secret MUST be -r——--—-—- by default.
|
Description: Create a secret. Create a Pod with secret volume source configured into the container with file mode set to 0x400. Pod MUST be able to read the secret from the mounted volume from the container runtime and the file mode of the secret MUST be -r-------- by default.
|
||||||
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance]", func() {
|
framework.ConformanceIt("should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance]", func() {
|
||||||
@ -58,7 +58,7 @@ var _ = ginkgo.Describe("[sig-storage] Secrets", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Secrets Volume, volume mode 0440, fsGroup 1001 and uid 1000
|
Testname: Secrets Volume, volume mode 0440, fsGroup 1001 and uid 1000
|
||||||
Description: Create a secret. Create a Pod with secret volume source configured into the container with file mode set to 0x440 as a non-root user with uid 1000 and fsGroup id 1001. Pod MUST be able to read the secret from the mounted volume from the container runtime and the file mode of the secret MUST be -r——r-—-—- by default.
|
Description: Create a secret. Create a Pod with secret volume source configured into the container with file mode set to 0x440 as a non-root user with uid 1000 and fsGroup id 1001. Pod MUST be able to read the secret from the mounted volume from the container runtime and the file mode of the secret MUST be -r--r-----by default.
|
||||||
This test is marked LinuxOnly since Windows does not support setting specific file permissions, or running as UID / GID.
|
This test is marked LinuxOnly since Windows does not support setting specific file permissions, or running as UID / GID.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance]", func() {
|
framework.ConformanceIt("should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance]", func() {
|
||||||
@ -70,7 +70,7 @@ var _ = ginkgo.Describe("[sig-storage] Secrets", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Secrets Volume, mapping
|
Testname: Secrets Volume, mapping
|
||||||
Description: Create a secret. Create a Pod with secret volume source configured into the container with a custom path. Pod MUST be able to read the secret from the mounted volume from the specified custom path. The file mode of the secret MUST be -rw—r-—r—- by default.
|
Description: Create a secret. Create a Pod with secret volume source configured into the container with a custom path. Pod MUST be able to read the secret from the mounted volume from the specified custom path. The file mode of the secret MUST be -rw-r--r-- by default.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should be consumable from pods in volume with mappings [NodeConformance]", func() {
|
framework.ConformanceIt("should be consumable from pods in volume with mappings [NodeConformance]", func() {
|
||||||
doSecretE2EWithMapping(f, nil)
|
doSecretE2EWithMapping(f, nil)
|
||||||
@ -79,7 +79,7 @@ var _ = ginkgo.Describe("[sig-storage] Secrets", func() {
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Secrets Volume, mapping, volume mode 0400
|
Testname: Secrets Volume, mapping, volume mode 0400
|
||||||
Description: Create a secret. Create a Pod with secret volume source configured into the container with a custom path and file mode set to 0x400. Pod MUST be able to read the secret from the mounted volume from the specified custom path. The file mode of the secret MUST be -r-—r-—r—-.
|
Description: Create a secret. Create a Pod with secret volume source configured into the container with a custom path and file mode set to 0x400. Pod MUST be able to read the secret from the mounted volume from the specified custom path. The file mode of the secret MUST be -r--r--r--.
|
||||||
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance]", func() {
|
framework.ConformanceIt("should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance]", func() {
|
||||||
|
@ -47,7 +47,7 @@ func TestInt(t *testing.T) {
|
|||||||
func TestLower(t *testing.T) {
|
func TestLower(t *testing.T) {
|
||||||
flags := flag.NewFlagSet("test", 0)
|
flags := flag.NewFlagSet("test", 0)
|
||||||
var context struct {
|
var context struct {
|
||||||
Ähem string
|
Ahem string
|
||||||
MixedCase string
|
MixedCase string
|
||||||
}
|
}
|
||||||
require.NotPanics(t, func() {
|
require.NotPanics(t, func() {
|
||||||
@ -55,10 +55,10 @@ func TestLower(t *testing.T) {
|
|||||||
})
|
})
|
||||||
require.Equal(t, []simpleFlag{
|
require.Equal(t, []simpleFlag{
|
||||||
{
|
{
|
||||||
name: "mixedCase",
|
name: "ahem",
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "ähem",
|
name: "mixedCase",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
allFlags(flags))
|
allFlags(flags))
|
||||||
|
@ -845,7 +845,7 @@ metadata:
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Kubectl, check version v1
|
Testname: Kubectl, check version v1
|
||||||
Description: Run kubectl to get api versions, output MUST contain returned versions with ‘v1’ listed.
|
Description: Run kubectl to get api versions, output MUST contain returned versions with 'v1' listed.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should check if v1 is in available api versions ", func() {
|
framework.ConformanceIt("should check if v1 is in available api versions ", func() {
|
||||||
ginkgo.By("validating api versions")
|
ginkgo.By("validating api versions")
|
||||||
@ -1345,7 +1345,7 @@ metadata:
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Kubectl, label update
|
Testname: Kubectl, label update
|
||||||
Description: When a Pod is running, update a Label using ‘kubectl label’ command. The label MUST be created in the Pod. A ‘kubectl get pod’ with -l option on the container MUST verify that the label can be read back. Use ‘kubectl label label-’ to remove the label. ‘kubectl get pod’ with -l option SHOULD not list the deleted label as the label is removed.
|
Description: When a Pod is running, update a Label using 'kubectl label' command. The label MUST be created in the Pod. A 'kubectl get pod' with -l option on the container MUST verify that the label can be read back. Use 'kubectl label label-' to remove the label. 'kubectl get pod' with -l option SHOULD not list the deleted label as the label is removed.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should update the label on a resource ", func() {
|
framework.ConformanceIt("should update the label on a resource ", func() {
|
||||||
labelName := "testing-label"
|
labelName := "testing-label"
|
||||||
@ -1428,11 +1428,11 @@ metadata:
|
|||||||
Testname: Kubectl, logs
|
Testname: Kubectl, logs
|
||||||
Description: When a Pod is running then it MUST generate logs.
|
Description: When a Pod is running then it MUST generate logs.
|
||||||
Starting a Pod should have a expected log line. Also log command options MUST work as expected and described below.
|
Starting a Pod should have a expected log line. Also log command options MUST work as expected and described below.
|
||||||
‘kubectl logs -tail=1’ should generate a output of one line, the last line in the log.
|
'kubectl logs -tail=1' should generate a output of one line, the last line in the log.
|
||||||
‘kubectl --limit-bytes=1’ should generate a single byte output.
|
'kubectl --limit-bytes=1' should generate a single byte output.
|
||||||
‘kubectl --tail=1 --timestamp should generate one line with timestamp in RFC3339 format
|
'kubectl --tail=1 --timestamp should generate one line with timestamp in RFC3339 format
|
||||||
‘kubectl --since=1s’ should output logs that are only 1 second older from now
|
'kubectl --since=1s' should output logs that are only 1 second older from now
|
||||||
‘kubectl --since=24h’ should output logs that are only 1 day older from now
|
'kubectl --since=24h' should output logs that are only 1 day older from now
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should be able to retrieve and filter logs ", func() {
|
framework.ConformanceIt("should be able to retrieve and filter logs ", func() {
|
||||||
// Split("something\n", "\n") returns ["something", ""], so
|
// Split("something\n", "\n") returns ["something", ""], so
|
||||||
@ -1492,7 +1492,7 @@ metadata:
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Kubectl, patch to annotate
|
Testname: Kubectl, patch to annotate
|
||||||
Description: Start running agnhost and a replication controller. When the pod is running, using ‘kubectl patch’ command add annotations. The annotation MUST be added to running pods and SHOULD be able to read added annotations from each of the Pods running under the replication controller.
|
Description: Start running agnhost and a replication controller. When the pod is running, using 'kubectl patch' command add annotations. The annotation MUST be added to running pods and SHOULD be able to read added annotations from each of the Pods running under the replication controller.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should add annotations for pods in rc ", func() {
|
framework.ConformanceIt("should add annotations for pods in rc ", func() {
|
||||||
controllerJSON := commonutils.SubstituteImageName(string(readTestFileOrDie(agnhostControllerFilename)))
|
controllerJSON := commonutils.SubstituteImageName(string(readTestFileOrDie(agnhostControllerFilename)))
|
||||||
@ -1526,7 +1526,7 @@ metadata:
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Kubectl, version
|
Testname: Kubectl, version
|
||||||
Description: The command ‘kubectl version’ MUST return the major, minor versions, GitCommit, etc of the Client and the Server that the kubectl is configured to connect to.
|
Description: The command 'kubectl version' MUST return the major, minor versions, GitCommit, etc of the Client and the Server that the kubectl is configured to connect to.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should check is all data is printed ", func() {
|
framework.ConformanceIt("should check is all data is printed ", func() {
|
||||||
version := framework.RunKubectlOrDie(ns, "version")
|
version := framework.RunKubectlOrDie(ns, "version")
|
||||||
@ -1560,7 +1560,7 @@ metadata:
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Kubectl, rolling update
|
Testname: Kubectl, rolling update
|
||||||
Description: Command ‘kubectl rolling-update’ MUST replace the specified replication controller with a new replication controller by updating one pod at a time to use the new Pod spec.
|
Description: Command 'kubectl rolling-update' MUST replace the specified replication controller with a new replication controller by updating one pod at a time to use the new Pod spec.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should support rolling-update to same image ", func() {
|
framework.ConformanceIt("should support rolling-update to same image ", func() {
|
||||||
ginkgo.By("running the image " + httpdImage)
|
ginkgo.By("running the image " + httpdImage)
|
||||||
@ -1591,7 +1591,7 @@ metadata:
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Kubectl, run pod
|
Testname: Kubectl, run pod
|
||||||
Description: Command ‘kubectl run’ MUST create a pod, when a image name is specified in the run command. After the run command there SHOULD be a pod that should exist with one container running the specified image.
|
Description: Command 'kubectl run' MUST create a pod, when a image name is specified in the run command. After the run command there SHOULD be a pod that should exist with one container running the specified image.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should create a pod from an image when restart is Never ", func() {
|
framework.ConformanceIt("should create a pod from an image when restart is Never ", func() {
|
||||||
ginkgo.By("running the image " + httpdImage)
|
ginkgo.By("running the image " + httpdImage)
|
||||||
@ -1627,7 +1627,7 @@ metadata:
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Kubectl, replace
|
Testname: Kubectl, replace
|
||||||
Description: Command ‘kubectl replace’ on a existing Pod with a new spec MUST update the image of the container running in the Pod. A -f option to ‘kubectl replace’ SHOULD force to re-create the resource. The new Pod SHOULD have the container with new change to the image.
|
Description: Command 'kubectl replace' on a existing Pod with a new spec MUST update the image of the container running in the Pod. A -f option to 'kubectl replace' SHOULD force to re-create the resource. The new Pod SHOULD have the container with new change to the image.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should update a single-container pod's image ", func() {
|
framework.ConformanceIt("should update a single-container pod's image ", func() {
|
||||||
ginkgo.By("running the image " + httpdImage)
|
ginkgo.By("running the image " + httpdImage)
|
||||||
@ -1667,7 +1667,7 @@ metadata:
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Kubectl, proxy port zero
|
Testname: Kubectl, proxy port zero
|
||||||
Description: Start a proxy server on port zero by running ‘kubectl proxy’ with --port=0. Call the proxy server by requesting api versions from unix socket. The proxy server MUST provide at least one version string.
|
Description: Start a proxy server on port zero by running 'kubectl proxy' with --port=0. Call the proxy server by requesting api versions from unix socket. The proxy server MUST provide at least one version string.
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should support proxy with --port 0 ", func() {
|
framework.ConformanceIt("should support proxy with --port 0 ", func() {
|
||||||
ginkgo.By("starting the proxy server")
|
ginkgo.By("starting the proxy server")
|
||||||
@ -1692,7 +1692,7 @@ metadata:
|
|||||||
/*
|
/*
|
||||||
Release : v1.9
|
Release : v1.9
|
||||||
Testname: Kubectl, proxy socket
|
Testname: Kubectl, proxy socket
|
||||||
Description: Start a proxy server on by running ‘kubectl proxy’ with --unix-socket=<some path>. Call the proxy server by requesting api versions from http://locahost:0/api. The proxy server MUST provide at least one version string
|
Description: Start a proxy server on by running 'kubectl proxy' with --unix-socket=<some path>. Call the proxy server by requesting api versions from http://locahost:0/api. The proxy server MUST provide at least one version string
|
||||||
*/
|
*/
|
||||||
framework.ConformanceIt("should support --unix-socket=/path ", func() {
|
framework.ConformanceIt("should support --unix-socket=/path ", func() {
|
||||||
ginkgo.By("Starting the proxy")
|
ginkgo.By("Starting the proxy")
|
||||||
|
Loading…
Reference in New Issue
Block a user