Skip to content

Instantly share code, notes, and snippets.

@jayunit100
Created October 5, 2020 00:06
Show Gist options
  • Save jayunit100/f2e978a2639455f22563027cdb9e838a to your computer and use it in GitHub Desktop.
Save jayunit100/f2e978a2639455f22563027cdb9e838a to your computer and use it in GitHub Desktop.
kube-proxy dependent tests in sig-network (excluding slow/disruptive/ipv6)
[
"[sig-network] Networking Granular Checks: Services should function for client IP based session affinity: http [LinuxOnly]",
"[sig-network] Services should have session affinity work for NodePort service [LinuxOnly] [Conformance]",
"[sig-network] Networking should check kube-proxy urls",
"[sig-network] Networking Granular Checks: Services should be able to handle large requests: udp",
"[sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a ClusterIP service",
"[sig-network] ClusterDns [Feature:Example] should create pod that uses dns",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy]",
"[sig-network] SCTP [Feature:SCTP] [LinuxOnly] should allow creating a basic SCTP service with pod and endpoints",
"[sig-network] Services should be able to update service type to NodePort listening on same port number but different protocols",
"[sig-network] Networking Granular Checks: Services should function for pod-Service: sctp [Feature:SCTPConnectivity]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from namespace on one named port [Feature:NetworkPolicy]",
"[sig-network] Services should have session affinity timeout work for NodePort service [LinuxOnly] [Conformance]",
"[sig-network] EndpointSliceMirroring should mirror a custom Endpoints resource through create update and delete",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow egress access to server in CIDR block [Feature:NetworkPolicy]",
"[sig-network] Services should be able to switch session affinity for service with type clusterIP [LinuxOnly] [Conformance]",
"[sig-network] Networking Granular Checks: Services should function for endpoint-Service: http",
"[sig-network] Services should be rejected when no endpoints exist",
"[sig-network] Networking should function for pod-pod: sctp [Feature:SCTPConnectivity]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]",
"[sig-network] Services should have session affinity timeout work for service with type clusterIP [LinuxOnly] [Conformance]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access on one named port [Feature:NetworkPolicy]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple egress policies with egress allow-all policy taking precedence [Feature:NetworkPolicy]",
"[sig-network] Services should create endpoints for unready pods",
"[sig-network] Services should allow pods to hairpin back to themselves through services",
"[sig-network] Services should have session affinity work for service with type clusterIP [LinuxOnly] [Conformance]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic from pods within server namespace based on PodSelector [Feature:NetworkPolicy]",
"[sig-network] Ingress API should support creating Ingress API operations [Conformance]",
"[sig-network] Networking Granular Checks: Services should function for client IP based session affinity: udp [LinuxOnly]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should support a 'default-deny-all' policy [Feature:NetworkPolicy]",
"[sig-network] Services should be able to change the type from ExternalName to ClusterIP [Conformance]",
"[sig-network] IngressClass API should support creating IngressClass API operations [Conformance]",
"[sig-network] Networking Granular Checks: Services should function for pod-Service: udp",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should work with Ingress,Egress specified together [Feature:NetworkPolicy]",
"[sig-network] Networking Granular Checks: Services should update endpoints: udp",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should support a 'default-deny-ingress' policy [Feature:NetworkPolicy]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should deny ingress access to updated pod [Feature:NetworkPolicy]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce except clause while egress access to server in CIDR block [Feature:NetworkPolicy]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector with MatchExpressions[Feature:NetworkPolicy]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on NamespaceSelector with MatchExpressions[Feature:NetworkPolicy]",
"[sig-network] Services should be able to create a functioning NodePort service [Conformance]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector or NamespaceSelector [Feature:NetworkPolicy]",
"[sig-network] Networking Granular Checks: Services should update endpoints: http",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce egress policy allowing traffic to a server in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]",
"[sig-network] Services should be able to change the type from ExternalName to NodePort [Conformance]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic only from a different namespace, based on NamespaceSelector [Feature:NetworkPolicy]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple, stacked policies with overlapping podSelectors [Feature:NetworkPolicy]",
"[sig-network] Networking Granular Checks: Services should be able to handle large requests: http",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed [Feature:NetworkPolicy]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce updated policy [Feature:NetworkPolicy]",
"[sig-network] Services should be able to switch session affinity for NodePort service [LinuxOnly] [Conformance]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should not allow access by TCP when a policy specifies only SCTP [Feature:NetworkPolicy] [Feature:SCTP]",
"[sig-network] Services should preserve source pod IP for traffic thru service cluster IP [LinuxOnly]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policies to check ingress and egress policies can be controlled independently based on PodSelector [Feature:NetworkPolicy]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from updated pod [Feature:NetworkPolicy]",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic only from a pod in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy]",
"[sig-network] Networking Granular Checks: Services should function for endpoint-Service: udp",
"[sig-network] Networking Granular Checks: Services should function for pod-Service: http",
"[sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow egress access on one named port [Feature:NetworkPolicy]",
"[sig-network] Conntrack should be able to preserve UDP traffic when server pod cycles for a NodePort service"
]
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment