Created
October 5, 2020 00:06
-
-
Save jayunit100/f2e978a2639455f22563027cdb9e838a to your computer and use it in GitHub Desktop.
kube-proxy dependent tests in sig-network (excluding slow/disruptive/ipv6)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ | |
"[sig-network] Networking Granular Checks: Services should function for client IP based session affinity: http [LinuxOnly]", | |
"[sig-network] Services should have session affinity work for NodePort service [LinuxOnly] [Conformance]", | |
"[sig-network] Networking should check kube-proxy urls", | |
"[sig-network] Networking Granular Checks: Services should be able to handle large requests: udp", | |
"[sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a ClusterIP service", | |
"[sig-network] ClusterDns [Feature:Example] should create pod that uses dns", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy]", | |
"[sig-network] SCTP [Feature:SCTP] [LinuxOnly] should allow creating a basic SCTP service with pod and endpoints", | |
"[sig-network] Services should be able to update service type to NodePort listening on same port number but different protocols", | |
"[sig-network] Networking Granular Checks: Services should function for pod-Service: sctp [Feature:SCTPConnectivity]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy]", | |
"[sig-network] Services should have session affinity timeout work for NodePort service [LinuxOnly] [Conformance]", | |
"[sig-network] EndpointSliceMirroring should mirror a custom Endpoints resource through create update and delete", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy]", | |
"[sig-network] Services should be able to switch session affinity for service with type clusterIP [LinuxOnly] [Conformance]", | |
"[sig-network] Networking Granular Checks: Services should function for endpoint-Service: http", | |
"[sig-network] Services should be rejected when no endpoints exist", | |
"[sig-network] Networking should function for pod-pod: sctp [Feature:SCTPConnectivity]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]", | |
"[sig-network] Services should have session affinity timeout work for service with type clusterIP [LinuxOnly] [Conformance]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy]", | |
"[sig-network] Services should create endpoints for unready pods", | |
"[sig-network] Services should allow pods to hairpin back to themselves through services", | |
"[sig-network] Services should have session affinity work for service with type clusterIP [LinuxOnly] [Conformance]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic from pods within server namespace based on PodSelector [Feature:NetworkPolicy]", | |
"[sig-network] Ingress API should support creating Ingress API operations [Conformance]", | |
"[sig-network] Networking Granular Checks: Services should function for client IP based session affinity: udp [LinuxOnly]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should support a 'default-deny-all' policy [Feature:NetworkPolicy]", | |
"[sig-network] Services should be able to change the type from ExternalName to ClusterIP [Conformance]", | |
"[sig-network] IngressClass API should support creating IngressClass API operations [Conformance]", | |
"[sig-network] Networking Granular Checks: Services should function for pod-Service: udp", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should work with Ingress,Egress specified together [Feature:NetworkPolicy]", | |
"[sig-network] Networking Granular Checks: Services should update endpoints: udp", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector with MatchExpressions[Feature:NetworkPolicy]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on NamespaceSelector with MatchExpressions[Feature:NetworkPolicy]", | |
"[sig-network] Services should be able to create a functioning NodePort service [Conformance]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector or NamespaceSelector [Feature:NetworkPolicy]", | |
"[sig-network] Networking Granular Checks: Services should update endpoints: http", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce egress policy allowing traffic to a server in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]", | |
"[sig-network] Services should be able to change the type from ExternalName to NodePort [Conformance]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic only from a different namespace, based on NamespaceSelector [Feature:NetworkPolicy]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple, stacked policies with overlapping podSelectors [Feature:NetworkPolicy]", | |
"[sig-network] Networking Granular Checks: Services should be able to handle large requests: http", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce updated policy [Feature:NetworkPolicy]", | |
"[sig-network] Services should be able to switch session affinity for NodePort service [LinuxOnly] [Conformance]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should not allow access by TCP when a policy specifies only SCTP [Feature:NetworkPolicy] [Feature:SCTP]", | |
"[sig-network] Services should preserve source pod IP for traffic thru service cluster IP [LinuxOnly]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy]", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic only from a pod in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]", | |
"[sig-network] Networking Granular Checks: Services should function for endpoint-Service: udp", | |
"[sig-network] Networking Granular Checks: Services should function for pod-Service: http", | |
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy]", | |
"[sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a NodePort service" | |
] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment