Commit Graph

429 Commits (k3s-v1.15.3)

Author SHA1 Message Date
jennybuckley 3fcc269733 Cleanup CRD/CR confusion in webhook e2e tests 2018-04-03 15:14:30 -07:00
Mikhail Mazurskiy 1f393cdef9
Stop() for Ticker to enable leak-free code 2018-03-31 19:41:43 +11:00
Christoph Blecker 9690d44fca
Update to use go1.10.1 2018-03-30 15:26:18 -07:00
Kubernetes Submit Queue 37b2edd855
Merge pull request #54300 from jsafrane/fix-test-images
Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

Fix test images

These commits fix volume_io tests for iSCSI and Ceph RBD. Both server images were quite old (Fedora 22), so I updated them to ~~something more stable (CentOS 7) and to newer Ceph (Jewel, 10.2.7).~~ something newer (Fedora 26).

The most important fix is that the test volumes have 120 MB so volume_io test can actually run - the tests put 100MB file to the volume to check its persistence.

When mount containers in #53440 are merged I'll try to run the tests regularly with every PR (or merge) so we catch regressions quickly.

```release-note
NONE
```

/sig testing
/sig storage

/assign @jeffvance 

Fixes: #56725
2018-03-19 20:34:22 -07:00
Jan Safranek 76f1386ba9 Update Gluster image
- rebase to Fedora 26
2018-03-06 10:04:49 +01:00
Jan Safranek 9db147715b Fix Ceph RBD image
- create 120MB volume instead of 1MB for volume_io tests
- rebase to Fedora 26
- added compatibility with ext4 and older ceph clients
- unify CephFS and Ceph RBD images.
2018-03-06 10:04:48 +01:00
jennybuckley 58b43ad27d Prevent webhooks from affecting admission requests for webhooks 2018-03-05 16:35:52 -08:00
Jan Safranek b9ad4cb57b Fix iSCSI image
- create 120MB LUN instead of 1MB for volume_io tests
- increase verbosity
- rebase to Fedora 26
  - targetcli now requires running dbus, so run it
2018-03-02 16:41:39 +01:00
Mike Danese c0b7364563 remove gcloud docker -- since it's deprecated 2018-02-28 00:24:27 -08:00
Ryan Hitchman 8aa3ca3cbb Add a few "+build linux" tags where appropriate. 2018-02-27 13:53:32 -08:00
Kubernetes Submit Queue ecc5eb67d9
Merge pull request #59563 from CaoShuFeng/webhook_readme
Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

fix README for admission webhook test image

This README is copied from somewhere else and it's out of date.

**Release note**:

```release-note
NONE
```
2018-02-21 11:43:06 -08:00
Jeff Grafton ef56a8d6bb Autogenerated: hack/update-bazel.sh 2018-02-16 13:43:01 -08:00
Cao Shufeng f09f866470 fix README for admission webhook test image
This README is copied from somewhere else and it's out of date.
2018-02-14 09:30:34 +08:00
Paul Czarkowski 2ac136bf07
fix markdown formatting for test image
subtitles were not rendering correctly due to lack of spaces after octothorps.
2018-02-13 14:36:15 -06:00
Di Xu 48388fec7e fix all the typos across the project 2018-02-11 11:04:14 +08:00
Tim Hockin 3586986416 Switch to k8s.gcr.io vanity domain
This is the 2nd attempt.  The previous was reverted while we figured out
the regional mirrors (oops).

New plan: k8s.gcr.io is a read-only facade that auto-detects your source
region (us, eu, or asia for now) and pulls from the closest.  To publish
an image, push k8s-staging.gcr.io and it will be synced to the regionals
automatically (similar to today).  For now the staging is an alias to
gcr.io/google_containers (the legacy URL).

When we move off of google-owned projects (working on it), then we just
do a one-time sync, and change the google-internal config, and nobody
outside should notice.

We can, in parallel, change the auto-sync into a manual sync - send a PR
to "promote" something from staging, and a bot activates it.  Nice and
visible, easy to keep track of.
2018-02-07 21:14:19 -08:00
Yang Guo eeecd6e8c0 Update tests to use the hostexec:1.1 image 2018-01-30 17:31:52 -08:00
Yang Guo 5357a31043 e2e test: use sleep to wait in hostexec 2018-01-30 17:30:41 -08:00
Kubernetes Submit Queue 84408378f9
Merge pull request #58174 from filbranden/ipcs1
Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

Fixes for HostIPC tests to work when Docker has SELinux support enabled.

**What this PR does / why we need it**:

Fixes for HostIPC tests to work when Docker has SELinux support enabled.

**Which issue(s) this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close the issue(s) when PR gets merged)*:

N/A

**Special notes for your reviewer**:

The core of the matter is to use `ipcs` from util-linux rather than the one from busybox. The typical SELinux policy has enough to allow Docker containers (running under svirt_lxc_net_t SELinux type) to access IPC information by reading the contents of the files under /proc/sysvipc/, but not by using the shmctl etc. syscalls.

The `ipcs` implementation in busybox will use `shmctl(0, SHM_INFO, ...)` to detect whether it can read IPC info (see source code [here](https://git.busybox.net/busybox/tree/util-linux/ipcs.c?h=1_28_0#n138)), while the one in util-linux will prefer to read from the /proc files directly if they are available (see source code [here](https://github.com/karelzak/util-linux/blob/v2.27.1/sys-utils/ipcutils.c#L108)).

It turns out the SELinux policy doesn't allow the shmctl syscalls in an unprivileged container, while access to it through the /proc interface is fine. (One could argue this is a bug in the SELinux policy, but getting it fixed on stable OSs is hard, and it's not that hard for us to test it with an util-linux `ipcs`, so I propose we do so.)

This PR also contains a refactor of the code setting IpcMode, since setting it in the "common options" function is misleading, as on containers other than the sandbox, it ends up always getting overwritten, so let's only set it to "host" in the Sandbox.

It also has a minor fix for the `ipcmk` call, since support for size suffix was only introduced in recent versions of it.

**Release note**:

```release-note
NONE
```
2018-01-30 17:18:52 -08:00
Jeff Grafton c555a7f3c9 Update to go1.9.3 2018-01-29 18:26:59 -08:00
Cao Shufeng 1df5373d6a fix webhook admission README 2018-01-28 14:25:41 +08:00
Filipe Brandenburger c9e5bfbbbb Add new e2e-test container to export ipcs from util-linux
This container will be used to exercise the HostIPC functionality in
e2e-node tests.

The version of `ipcs` shipped in busybox performs operations that get
blocked by SELinux on hosts where it is enabled. The version of `ipcs`
in util-linux does not perform those operations, rather it checks
whether the /proc files it needs are available and proceeds to reading
from them directly.

Using `ipcs` from util-linux makes these tests pass, even when running
under SELinux enabled, so let's use them here.

Tested: On a host where Docker with SELinux enabled:

- Checked that `ipcs` from busybox does not work:

  $ docker run busybox ipcs -m
  kernel not configured for shared memory

- Checked that the one from this container does work:

  $ docker run gcr.io/kubernetes-e2e-test-images/ipc-utils-amd64:1.0 ipcs -m
  ------ Shared Memory Segments --------
  key        shmid      owner      perms      bytes      nattch     status
2018-01-25 11:09:16 -08:00
Chao Xu 5029bb56c4 Let mutating webhook defaults the object after applying the patch sent back by the webhook 2018-01-09 15:58:18 -08:00
Manjunath A Kumatagi b0aff1ebea Add owners file for test images 2017-12-26 20:44:45 +05:30
Jeff Grafton efee0704c6 Autogenerate BUILD files 2017-12-23 13:12:11 -08:00
Tim Hockin e9dd8a68f6 Revert k8s.gcr.io vanity domain
This reverts commit eba5b6092a.

Fixes https://github.com/kubernetes/kubernetes/issues/57526
2017-12-22 14:36:16 -08:00
Tim Hockin f7be352a67 gcloud docker now auths k8s.gcr.io by default 2017-12-18 09:18:34 -08:00
Tim Hockin eba5b6092a Use k8s.gcr.io vanity domain for container images 2017-12-18 09:18:34 -08:00
Walter Fender e1cf77858e Add e2e test for when a webhook does not return.
Adding code to simulate a webhook not returning.
Ensure that we verify that the returned error is a timeout.
2017-12-11 18:32:31 -08:00
Kubernetes Submit Queue f9f8dc30c5
Merge pull request #52748 from leblancd/v6_e2e_host_port
Automatic merge from submit-queue (batch tested with PRs 52748, 56623). If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

Add brackets around IPv6 addrs in e2e test IP:port endpoints

There are several locations in the e2e tests where endpoints of the
form IPv6:port use IPv6 addresses directly, without surrounding brackets.
Brackets are required around IPv6 addresses in this case, in order to
distinguish the colons in the IPv6 address from the colon immediately
preceding the port.

Also, wherever the curl command might be used with an IPv6 address
surrounded in brackets, the "-g" argument is added to the curl
command line arguments so that the brackets can be interpreted
correctly.

fixes #52746



**What this PR does / why we need it**:
This PR adds brackets around IPv6 addresses when they appear as part of an IPv6-addr:port endpoint
in the e2e tests. This is needed because any connections that attempt to use IPv6-addr:port
endpoint without brackets surrounding the IPv6-addr will fail.

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #52746

**Special notes for your reviewer**:

**Release note**:

```release-note
NONE
```
2017-12-04 14:22:10 -08:00
Chao Xu fcf4f15c89 update-all generated 2017-11-21 13:00:40 -08:00
Chao Xu 7945ae68d0 remove reference to v1alpha1 2017-11-21 13:00:40 -08:00
Chao Xu 6193360eb5 generated bazel 2017-11-17 21:02:47 -08:00
Chao Xu ea123f82aa Adding the mutating webhook 2017-11-17 21:02:47 -08:00
Kubernetes Submit Queue 2aaab817de
Merge pull request #55420 from cblecker/go1.9.2
Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

Upgrade to go1.9.2

**What this PR does / why we need it**:
Use go1.9.2, containing a number of bug fixes: https://github.com/golang/go/issues?q=milestone%3AGo1.9.2

**Release note**:
```release-note
Upgrade to go1.9.2
```
2017-11-17 20:24:42 -08:00
Christoph Blecker 82737e730c
Upgrade to go1.9.2 2017-11-17 16:27:17 -08:00
cheftako dac3c2e168 Admission request/response handling
AdmissionResponse allows mutating webhook to send apiserver a json patch
to mutate the object.
This reflects the imperative nature of AdmissionReview. It adds
AdmissionRequest and AdmissionResponse in place of status/spec.
The AdmissionResponse the allows the mutating webhook
to send back a json path with the mutated version of the requested
object.
Fixed the integration test to clean up properly.
Switched test image to 1.8v5 to reflect API changes.
Make sure to cache test framework client for cleaup test code.
Switched to pointer for patch type.
Factored in @liggitt's feedback.
Factored in @lavalamp's feedback.
2017-11-17 14:22:55 -08:00
Dane LeBlanc 2827b7ffb7 Add brackets around IPv6 addrs in e2e test IP:port endpoints
There are several locations in the e2e tests where endpoints of the
form IP:port use IPv6 addresses directly, without surrounding brackets.
Brackets are required around IPv6 addresses in this case, in order to
distinguish the colons in the IPv6 address from the colon immediately
preceding the port.

Also, wherever the curl command might be used with an IPv6 address
surrounded in brackets, the "-g" argument is added to the curl
command line arguments so that the brackets can be interpreted
correctly.

fixes #52746
2017-11-14 10:55:09 -05:00
Chao Xu ab053a224d let validation webhook convert objects to the external version before sending them 2017-11-13 12:55:33 -08:00
Kubernetes Submit Queue e52e79342c
Merge pull request #54727 from caesarxuchao/namespaceSelector
Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

Add namespace selector to admission webhook

Implementing the [design](https://github.com/kubernetes/community/blob/master/contributors/design-proposals/api-machinery/admission-webhook-bootstrapping.md).

* Added the NamespaceSelector field to the webhook configuration API
* Let the webhook plugin respect the NamespaceSelector
* Added unit test and e2e test

cc @kubernetes/sig-api-machinery-api-reviews 

```release-note
Added namespaceSelector to externalAdmissionWebhook configuration to allow applying webhooks only to objects in the namespaces that have matching labels.
```
2017-11-11 07:50:32 -08:00
Chao Xu 7006d224be add NamespaceSelector to the api
business logic in webhook plugin and unit test

add a e2e test for namespace selector
2017-11-10 13:40:16 -08:00
Ryan Phillips 66965daf56 bump base images to debian stretch 2017-11-10 09:54:10 -06:00
Chao Xu 7430e0a489 remove the wrongly checked in binary 2017-11-05 15:52:16 -08:00
Chao Xu 0f54fdb059 update bazel 2017-10-27 15:58:24 -07:00
Chao Xu 1b420e4f80 webhook source code 2017-10-27 15:58:24 -07:00
Kubernetes Submit Queue 06776c2ab3 Merge pull request #54327 from freehan/hostname
Automatic merge from submit-queue. If you want to cherry-pick this change to another branch, please follow the instructions <a href="https://github.com/kubernetes/community/blob/master/contributors/devel/cherry-picks.md">here</a>.

Modify serve-hostname image to handle graceful termination

```release-note
NONE
```
2017-10-24 22:24:53 -07:00
Minhan Xia dd7ad4b738 Modify serve-hostname image to handle graceful termination 2017-10-23 14:09:32 -07:00
Jack Danger fb46207670 Directly using std{in,out} for test helper subproc
This addresses a TODO in a test helper. This is a very minor
improvement.
2017-10-19 13:25:28 -07:00
Christoph Blecker 5c026f6317
Upgrade to go1.9 2017-10-16 10:39:31 -07:00
Jeff Grafton aee5f457db update BUILD files 2017-10-15 18:18:13 -07:00
Jeff Grafton f1953c4f53 bazel: use autogenerated all-srcs rules instead of manually-curated sources rules 2017-09-21 15:53:23 -07:00
Jeff Grafton 02fb4200dc Use buildozer to delete licenses() rules 2017-09-21 15:53:22 -07:00
Jeff Grafton 532bd482df Use buildozer to remove deprecated automanaged tags 2017-09-21 15:53:22 -07:00
Kubernetes Submit Queue 0103ed33d3 Merge pull request #48552 from mkumatag/pets
Automatic merge from submit-queue

Multiarch support for pets images

**What this PR does / why we need it**:
This PR is for multiarch support for pets image

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #52133

**Special notes for your reviewer**:
Copied over the `contrib/pets/peer-finder` as this one is heavily used in many docker images under `test/images`. After this PR I'll submit the PR in contrib project to remove it.

**Release note**:

```NONE
```
2017-09-07 22:27:20 -07:00
Manjunath A Kumatagi 33b0702edc Multiarch support for pets images 2017-09-07 22:30:41 +05:30
Kubernetes Submit Queue 6b9ce5ba11 Merge pull request #50597 from dixudx/qemu_upgrade_2.9.1
Automatic merge from submit-queue

bump QEMU version to v2.9.1

**What this PR does / why we need it**:

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #
xref #38067

**Special notes for your reviewer**:
/assign @luxas 

**Release note**:

```release-note
update QEMU version to v2.9.1
```
2017-09-03 03:24:53 -07:00
Di Xu ec2fbbc85d bump new version due to base image changed 2017-08-21 14:51:44 +08:00
Di Xu 22bdaecbc6 bump QEMU to new version 2.9.1 2017-08-19 14:16:21 +08:00
Kubernetes Submit Queue bbc74a3478 Merge pull request #49951 from mkumatag/multiarch_nonewprivs
Automatic merge from submit-queue (batch tested with PRs 50485, 49951, 50508, 50511, 50506)

Multiarch nonewprivs test image

**What this PR does / why we need it**:
This PR is for converting nonewprivs image which pushed very recently part of https://github.com/kubernetes/kubernetes/pull/47019.
**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #
Fixes #50498 
**Special notes for your reviewer**:

**Release note**:

```NONE```
2017-08-11 20:37:54 -07:00
Jeff Grafton a7f49c906d Use buildozer to delete licenses() rules except under third_party/ 2017-08-11 09:32:39 -07:00
Jeff Grafton 33276f06be Use buildozer to remove deprecated automanaged tags 2017-08-11 09:31:50 -07:00
Jeff Grafton 5187d6db53 Fix typo in test/images/port-forward-tester/Makefile 2017-08-02 14:56:23 -07:00
Manjunath A Kumatagi fdefa96ecf Multiarch nonewprivs test image 2017-08-01 10:13:53 -04:00
Kubernetes Submit Queue 72c6251508 Merge pull request #47019 from jessfraz/allowPrivilegeEscalation
Automatic merge from submit-queue (batch tested with PRs 49651, 49707, 49662, 47019, 49747)

Add support for `no_new_privs` via AllowPrivilegeEscalation

**What this PR does / why we need it**:
Implements kubernetes/community#639
Fixes #38417

Adds `AllowPrivilegeEscalation` and `DefaultAllowPrivilegeEscalation` to `PodSecurityPolicy`.
Adds `AllowPrivilegeEscalation` to container `SecurityContext`.

Adds the proposed behavior to `kuberuntime`, `dockershim`, and `rkt`. Adds a bunch of unit tests to ensure the desired default behavior and that when `DefaultAllowPrivilegeEscalation` is explicitly set.

Tests pass locally with docker and rkt runtimes. There are also a few integration tests with a `setuid` binary for sanity.

**Release note**:

```release-note
Adds AllowPrivilegeEscalation to control whether a process can gain more privileges than it's parent process
```
2017-07-31 16:56:58 -07:00
Jess Frazelle e81daf48b5
test/images: add no_new_privs test container
Using the image:

```
$ docker run --rm -it --user 1000 gcr.io/google_containers/nonewprivs:1.0
Effective uid: 0

$ docker run --rm -it --user 1000 --security-opt no-new-privileges gcr.io/google_containers/nonewprivs:1.0
Effective uid: 1000
```

Signed-off-by: Jess Frazelle <acidburn@google.com>
2017-07-24 12:52:44 -04:00
Manjunath A Kumatagi cba065567f Move e2e dependent images from kubernetes/kubernetes.github.io repo 2017-07-20 09:48:18 +05:30
Kubernetes Submit Queue 94c3c571fc Merge pull request #48535 from mkumatag/debian_base
Automatic merge from submit-queue (batch tested with PRs 48914, 48535, 49099, 48935, 48871)

Adopt debian-base as baseimage

**What this PR does / why we need it**:
Based on discussion from - https://github.com/kubernetes/kubernetes/pull/44910/files#r125150263
**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #49169

**Special notes for your reviewer**:

**Release note**:

```NONE
```
2017-07-18 21:04:22 -07:00
Kubernetes Submit Queue 1fe2bb30b7 Merge pull request #49020 from mkumatag/update_yamls
Automatic merge from submit-queue (batch tested with PRs 48231, 47377, 48797, 49020, 49033)

Update yaml and json with multi arch test images

**What this PR does / why we need it**:
This PR is for updating the yaml and json files under test/images folder with multi arch images
**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #

**Special notes for your reviewer**:

**Release note**:

```NONE
```
2017-07-17 19:37:47 -07:00
Manjunath A Kumatagi 9ebd6f06b6 Update yaml and json with multi arch test images 2017-07-17 17:53:36 +05:30
Manjunath A Kumatagi 6f464259b6 Adopt debian-base as baseimage 2017-07-14 15:08:54 +05:30
Manjunath A Kumatagi 5447ec97f0 Move test-webserver from contrib/for-demos to kubernetes/test/images 2017-07-05 18:55:40 +05:30
Manjunath A Kumatagi 19ca6ca9f2 Fix review comments - luxas, ixdy 2017-06-30 18:51:23 +05:30
Manjunath A Kumatagi 60778cdaa4 Move go build to image-utils 2017-06-28 19:19:25 +05:30
Manjunath A Kumatagi c8a08afc8c Port some more images 2017-06-26 15:25:32 +05:30
Manjunath A Kumatagi 9b70ab1379 Multi Arch test images 2017-06-26 12:49:45 +05:30
Michael Taufen a653603e13 no-snat test
Test checks that Pods can communicate with each other in the same
cluster without SNAT.
2017-05-26 13:45:10 -07:00
Wojciech Tyczynski 3e8c27af34 Bump Go version to 1.8.3 2017-05-25 20:05:34 +02:00
Kubernetes Submit Queue 1e2105808b Merge pull request #45136 from vishh/cos-nvidia-driver-install
Automatic merge from submit-queue

Enable "kick the tires" support for Nvidia GPUs in COS

This PR provides an installation daemonset that will install Nvidia CUDA drivers on Google Container Optimized OS (COS).
User space libraries and debug utilities from the Nvidia driver installation are made available on the host in a special directory on the host -
* `/home/kubernetes/bin/nvidia/lib` for libraries
*  `/home/kubernetes/bin/nvidia/bin` for debug utilities

Containers that run CUDA applications on COS are expected to consume the libraries and debug utilities (if necessary) from the host directories using `HostPath` volumes.

Note: This solution requires updating Pod Spec across distros. This is a known issue and will be addressed in the future. Until then CUDA workloads will not be portable.

This PR updates the COS base image version to m59. This is coupled with this PR for the following reasons:
1. Driver installation requires disabling a kernel feature in COS. 
2. The kernel API for disabling this interface changed across COS versions
3. If the COS image update is not handled in this PR, then a subsequent COS image update will break GPU integration and will require an update to the installation scripts in this PR.
4. Instead of having to post `3` PRs, one each for adding the basic installer, updating COS to m59, and then updating the installer again, this PR combines all the changes to reduce review overhead and latency, and additional noise that will be created when GPU tests break.

**Try out this PR**
1. Get Quota for GPUs in any region
2. `export `KUBE_GCE_ZONE=<zone-with-gpus>` KUBE_NODE_OS_DISTRIBUTION=gci`
3. `NODE_ACCELERATORS="type=nvidia-tesla-k80,count=1" cluster/kube-up.sh`
4. `kubectl create -f cluster/gce/gci/nvidia-gpus/cos-installer-daemonset.yaml`
5. Run your CUDA app in a pod.

**Another option is to run a e2e manually to try out this PR**
1. Get Quota for GPUs in any region
2. export `KUBE_GCE_ZONE=<zone-with-gpus>` KUBE_NODE_OS_DISTRIBUTION=gci
3. `NODE_ACCELERATORS="type=nvidia-tesla-k80,count=1"`
4. `go run hack/e2e.go -- --up` 
5. `hack/ginkgo-e2e.sh --ginkgo.focus="\[Feature:GPU\]"`
The e2e will install the drivers automatically using the daemonset and then run test workloads to validate driver integration.

TODO:
- [x] Update COS image version to m59 release.
- [x] Remove sleep from the install script and add it to the daemonset
- [x] Add an e2e that will run the daemonset and run a sample CUDA app on COS clusters.
- [x] Setup a test project with necessary quota to run GPU tests against HEAD to start with https://github.com/kubernetes/test-infra/pull/2759
- [x] Update node e2e serial configs to install nvidia drivers on COS by default
2017-05-23 10:46:10 -07:00
billy2180 952ad3f4a7 test/images/network-tester:bump rc/pod image verison to 1.9 2017-05-22 17:11:23 +08:00
Vishnu kannan 1e77594958 Adding an installer script that installs Nvidia drivers in Container Optimized OS
Packaged the script as a docker container stored in gcr.io/google-containers
A daemonset deployment is included to make it easy to consume the installer
A cluster e2e has been added to test the installation daemonset along with verifying installation
by using a sample CUDA application.
Node e2e for GPUs updated to avoid running on nodes without GPU devices.

Signed-off-by: Vishnu kannan <vishnuk@google.com>
2017-05-20 21:17:19 -07:00
billy2180 4cd92e8f37 Bump e2e netexec pod.xml image version to 1.7 2017-05-18 17:54:13 +08:00
xiangpengzhao 709ca2e4cc
Clean up petset 2017-05-06 11:24:34 +08:00
Lucas Käldström 6b5d5371d9
Bump to go1.8.1 and remove the edge GOROOT 2017-04-25 23:45:47 +03:00
Jeff Grafton df4e205460 Update gcr.io/google_containers/porter image to 4524579c0e 2017-04-19 11:50:41 -07:00
Jeff Grafton cfda002ea7 Update dummy certificate used in porter image 2017-04-18 14:42:06 -07:00
Mike Danese a05c3c0efd autogenerated 2017-04-14 10:40:57 -07:00
Kubernetes Submit Queue 7ff948ce32 Merge pull request #43643 from rmmh/redis
Automatic merge from submit-queue (batch tested with PRs 43726, 43643)

Make a smaller redis image for testing, based on Alpine.

**What this PR does / why we need it**:
This shrinks gcr.io/google_containers/redis from 400MB to 5MB, which should reduce flakes.

**Which issue this PR fixes**:
fixes #43631

**Release note**:
```release-note
NONE
```
2017-03-29 17:23:19 -07:00
Simen Bekkhus 2ac23cd46a
chore (samples): Don't cache apks at all in Dockerfiles 2017-03-29 17:02:04 +02:00
Ryan Hitchman 4816ba9898 Make a smaller redis image for testing, based on Alpine.
This shrinks redis from 400MB to 5MB, which should reduce flakes.
2017-03-28 16:18:00 -07:00
Christoph Blecker c3de31c8d0
Bump golang versions to 1.7.5 2017-02-21 13:02:16 -08:00
Luca Bruno 239c8a3a3e
test/images/mount-tester-user: bump base image to 0.8 2017-02-01 20:42:02 +00:00
Kubernetes Submit Queue f5e9350d21 Merge pull request #40613 from lucab/to-k8s/test-images-chmod-x
Automatic merge from submit-queue

test/images/mount-tester: ensure exec binary is o+rx

The `mount-tester` image is currently used as a base layer for other
test images (like `mounttest-user`) which perform uid/gid changes.
However, the binary built in here just follows local umask, and currently is
```
-rwxr-x--- 1 root root 2052704 May 19  2016 mt
```

This commit adds an explicit chmod on the binary to make sure uid/gid
tests can still run it as "others".
2017-01-31 12:54:03 -08:00
Lucas Käldström 84006601a0
Upgrade go version in Makefiles to 1.7, use qemu 2.7, armel => armhf and goarm=6 => goarm=7 and use go 1.7.4 2017-01-27 20:04:24 +02:00
Luca Bruno f024329eec
test/images/mount-tester: ensure exec binary is o+rx
The `mount-tester` image is currently used as a base layer for other
test images (like `mounttest-user`) which perform uid/gid changes.
However, the binary built in here just follows local umask, and currently is
```
-rwxr-x--- 1 root root 2052704 May 19  2016 mt
```

This commit adds an explicit chmod on the binary to make sure uid/gid
tests can still run it as "others".
2017-01-27 16:49:59 +00:00
Kubernetes Submit Queue 2e4939a688 Merge pull request #40335 from zmerlynn/b.gcr.io
Automatic merge from submit-queue

Move b.gcr.io/k8s_authenticated_test to gcr.io/k8s-authenticated-test

**What this PR does / why we need it**:

Per https://cloud.google.com/container-registry/docs/support/deprecation-notices, b.gcr.io access will be deprecated soon.

I've already mirrored the repo to the location specified in this PR.
2017-01-24 17:18:11 -08:00
Zach Loafman 3b90066dd6 Move b.gcr.io/k8s_authenticated_test to gcr.io/k8s-authenticated-test
Per
https://cloud.google.com/container-registry/docs/support/deprecation-notices,
b.gcr.io access will be deprecated soon.
2017-01-23 16:58:41 -08:00
Clayton Coleman 9009c1ac14
generated: informer,client 2017-01-23 17:52:47 -05:00
Clayton Coleman 469df12038
refactor: move ListOptions references to metav1 2017-01-23 17:52:46 -05:00
deads2k ee6752ef20 find and replace 2017-01-20 08:04:53 -05:00
deads2k c587b8a21e re-run client-gen 2017-01-20 08:02:36 -05:00
deads2k 11e8068d3f move pkg/fields to apimachinery 2017-01-19 09:50:16 -05:00
deads2k 8686d67c80 move pkg/util/rand 2017-01-16 16:04:03 -05:00
Jeff Grafton 1c2ea28080 Update images that use ubuntu-slim base image to :0.6 2017-01-11 15:07:04 -08:00
deads2k 6a4d5cd7cc start the apimachinery repo 2017-01-11 09:09:48 -05:00
Jeff Grafton 19aafd291c Always --pull in docker build to ensure recent base images 2017-01-10 16:21:05 -08:00
Jeff Grafton 20d221f75c Enable auto-generating sources rules 2017-01-05 14:14:13 -08:00
Kubernetes Submit Queue 274a9f0f70 Merge pull request #38927 from luxas/remove_maintainer
Automatic merge from submit-queue

Remove all MAINTAINER statements in the codebase as they are deprecated

**What this PR does / why we need it**:
ref: https://github.com/docker/docker/pull/25466

**Release note**:

```release-note
Remove all MAINTAINER statements in Dockerfiles in the codebase as they are deprecated by docker
```
@ixdy @thockin (who else should be notified?)
2016-12-29 16:41:24 -08:00
Mike Danese 161c391f44 autogenerated 2016-12-29 13:04:10 -08:00
Lucas Käldström 3c5b5f5963 Remove all MAINTAINER statements in the codebase as they aren't very useful and now deprecated 2016-12-17 20:34:10 +02:00
Mike Danese 82d9ed770c fix examples/ compilation so that test/ also compiles
fix network-tester cauldron serve_hostnames
2016-12-12 15:14:49 -08:00
Mike Danese c87de85347 autoupdate BUILD files 2016-12-12 13:30:07 -08:00
gajju26 70b92aab45 PR-2 Making docker images availabe for s390x on gcr.io repository and enables s390x support to kube-dns , pause, addon-manager, etcd, hyperkube, kube-discovery modules 2016-12-09 14:38:02 +05:30
Kubernetes Submit Queue ee55ea8e68 Merge pull request #37294 from jsafrane/gluster-on-tmpfs
Automatic merge from submit-queue (batch tested with PRs 36626, 37294, 37463, 37943, 36541)

Use tmpfs for gluster-server container volumes.

Gluster server needs a filesystem that supports extended attributes for its data. Some distros (Debian, Ubuntu) ship Docker that runs containers on aufs, which does not support extended attributes and therefore Gluster server fails there.

We can use tmpfs for Gluster server data volumes. ~~This expects that host's /tmp is tmpfs, which is true for  Debian, Ubuntu, RHEL, CentOS and Fedora.~~

I reworked it to mount tmpfs inside the container, the server pod is privileged.

And *after* this PR is merged and new Gluster server container image is pushed we need to bump the image version in https://github.com/kubernetes/kubernetes/blob/master/test/e2e/volumes.go#L407

Edit: I also fixed Gluster server Dockerfile, it was not working at all.
2016-12-08 00:23:10 -08:00
Jess Frazelle 4d27212149
fix golint errors on master for 1.6
Signed-off-by: Jess Frazelle <acidburn@google.com>
2016-12-05 15:01:33 -08:00
Dr. Stefan Schimanski 2bb7903a39 portfordwardtester: avoid data loss during send+close+exit 2016-11-29 09:42:14 +01:00
Jan Safranek 82d66c7d75 Use tmpfs for gluster-server container volumes.
Gluster server needs a filesystem that supports extended attributes for its
data. Some distros (Debian, Ubuntu) ship Docker that runs containers on aufs,
which does not support extended attributes and therefore Gluster server fails
there.

We can use tmpfs for Gluster server data volumes instead of a directory inside
the container.
2016-11-22 16:11:30 +01:00
Bowei Du d99accad41 Change dnsutils image to use alpine
This reduces the size of the image considerably
2016-11-14 13:50:51 -08:00
Bowei Du 938430b1eb Should not defer conn.Close when leaking the connection 2016-11-03 22:07:07 -07:00
Jing Xu ceb2de2939 Enable NFS volume test
This PR fixes the dockerfile for NFS server image and enable NFSv4.
After using containeried mounts approach on GCI, this test should pass.
2016-11-03 12:48:09 -07:00
Christian Koep cc1d8951a9
Fix typos and linted_packages sorting 2016-10-31 18:31:08 +01:00
Kubernetes Submit Queue 6343db835a Merge pull request #35454 from bowei/image-for-issue-32551
Automatic merge from submit-queue

Add test image for networking related tests

This test image is to support the e2e test for #32551
2016-10-30 01:56:10 -07:00
Kubernetes Submit Queue 6e767c71ed Merge pull request #35175 from rothgar/issue-33765
Automatic merge from submit-queue

Fixed gcloud command in logs-generator makefile

I grepped through the code looking for `gcloud` and `push` commands and only found one Makefile missing the `--`. I added it.

fixes #33765 🐛
2016-10-27 01:28:04 -07:00
Bowei Du efa3db9f78 Add test image for networking related tests 2016-10-25 13:34:03 -07:00
Kubernetes Submit Queue b5d604bcb0 Merge pull request #35302 from intelsdi-x/portforwarding_image_changes
Automatic merge from submit-queue

test-images: server address is now configurable

This commit perform changes discussed in #32128
Should be merged before #35301

cc: @pskrzyns
2016-10-25 13:24:07 -07:00
Mike Danese 56200d16a3 add genrule for test bindata 2016-10-24 18:00:08 -07:00
Mike Danese 763c4987f2 autogenerated 2016-10-24 14:47:27 -07:00
Jan Chaloupka 4fde09d308 Replace client with clientset in code 2016-10-23 22:00:35 +02:00
Michał Żyłowski 69a1b1dbbf test-images: server address is now configurable 2016-10-23 20:37:57 +02:00
Mike Danese 3b6a067afc autogenerated 2016-10-21 17:32:32 -07:00
Justin Garrison 746e66958d fixed gcloud command in logs-generator makefile 2016-10-19 23:05:47 -07:00
Kubernetes Submit Queue 40e1aa6b25 Merge pull request #34542 from Crassirostris/logs-generator
Automatic merge from submit-queue

Add logs generator

@piosz 

Tool to test logging mechanisms, mentioned in #34310
2016-10-17 03:32:31 -07:00
Mik Vyatskov 7ab1fc4600 Add logs generator 2016-10-16 16:38:36 +02:00
Jess Frazelle cde5559d09
Update `gcloud docker` commands to use `gcloud docker -- ARGS`
We can then avoid the following warning:
```
WARNING: The '--' argument must be specified between gcloud specific args on the left and DOCKER_ARGS on the right. IMPORTANT: previously, commands allowed the omission of the --, and unparsed arguments were treated as implementation args. This usage is being deprecated and will be removed in March 2017.
This will be strictly enforced in March 2017. Use 'gcloud beta docker' to see new behavior.
```

Signed-off-by: Jess Frazelle <acidburn@google.com>
2016-10-10 13:42:34 -07:00
bprashanth 1d7cdffebc Cleanup netexec image and usage. 2016-10-04 14:22:41 -07:00
Kubernetes Submit Queue 520cd7e6f3 Merge pull request #31241 from m1093782566/m109-cross-build-serve-hostname
Automatic merge from submit-queue

Cross-build test/images/serve_hostname

<!--  Thanks for sending a pull request!  Here are some tips for you:
1. If this is your first time, read our contributor guidelines https://github.com/kubernetes/kubernetes/blob/master/CONTRIBUTING.md and developer guide https://github.com/kubernetes/kubernetes/blob/master/docs/devel/development.md
2. If you want *faster* PR reviews, read how: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/faster_reviews.md
3. Follow the instructions for writing a release note: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/pull-requests.md#release-notes
-->

**What this PR does / why we need it**:

**cross build** `test/images/serve_hostname`

https://github.com/kubernetes/kubernetes/tree/master/test/images/serve_hostname

This PR is an effort to achieve multiarch Kubernetes(#26863)

**Which issue this PR fixes** : 

fixes #31238 

@luxas @spxtr
2016-09-12 05:57:46 -07:00
m1093782566 be889f892a address comments 2016-09-10 07:30:48 -04:00
m1093782566 ffc77eff71 cross build test/images/serve_hostname and update README 2016-09-02 17:25:03 -04:00
Avesh Agarwal 4ba39b4722 Update mounttest container image version to 0.7 everywhere. 2016-09-02 09:03:11 -04:00
Girish Kalele b82c028f77 GCE Cloud provider changes for ESIPP
Add feature gate (ExternalTrafficLocalOnly) for alpha feature
2016-08-23 16:16:39 -07:00
Matthew Wong a7145c013e Add test for supplemental gid annotation to pv e2e test 2016-08-09 18:23:06 -04:00
codejuan b038355c81 fixed regex error, which replace 2 line in template file 2016-08-04 22:13:45 +08:00
David McMahon ef0c9f0c5b Remove "All rights reserved" from all the headers. 2016-06-29 17:47:36 -07:00
k8s-merge-robot abc06c9d73 Merge pull request #26913 from bprashanth/petset_e2e
Automatic merge from submit-queue

Improve petset e2es

Mainly
* scale petset to 0 and wait for volume provisioner to delete pvs so we don't leak them
* bake binaries into init[0] and cp into destination, instead of wgetting at runtime
* dump verbose debug output on failure

https://github.com/kubernetes/test-infra/pull/115, https://github.com/kubernetes/kubernetes/issues/26824
2016-06-09 23:31:36 -07:00
Prashanth Balasubramanian ff23a0e4fc Clarity and reliability fixes for petset e2es 2016-06-09 12:58:28 -07:00
Wojciech Tyczynski 12d1cc454c Change webserver binary to be usable in large clusters. 2016-06-09 16:01:01 +02:00
Jerzy Szczepkowski 967a7c95d2 Rework of resource consumer.
Major rework of resource consumer: added controller running as a pod that spreads requests around consumers. This should fix #21664 and #23536.
2016-06-01 15:50:03 +02:00
k8s-merge-robot 91977842ac Merge pull request #26330 from aledbf/test-iperf
Automatic merge from submit-queue

Use ubuntu-slim to reduce size of the iperf:e2e image

from
```
gcr.io/google_containers/iperf     e2e      8b3cc7064090        5 weeks ago     737.9 MB
```
to
```
gcr.io/google_containers/iperf     e2e      204325491636        33 seconds ago  61.09 MB
```

related to https://github.com/kubernetes/kubernetes/pull/25784#issuecomment-221706886
ping @bprashanth
2016-05-29 16:36:44 -07:00
Manuel de Brito Fontes fcea6e0e9e Use ubuntu-slim to reduce size of the iperf:e2e image 2016-05-25 22:50:57 -03:00
Colin Hom a092fd2dd4 Federation build and e2e test integration
Federation components are now buildable and e2e-testable via e2e.go.
2016-05-25 15:07:27 -07:00
Jan Chaloupka 0e0be8421f gcr.io/google_containers/mounttest: use Stat instead of Lstat to retrieve fileinfo of symlinks as well 2016-05-17 15:57:33 +02:00
Tim Hockin cbf886c7f4 Convert everything to use vendor/ 2016-05-08 20:30:37 -07:00
Robert Bailey 18a829e7a4 Merge pull request #24512 from freehan/goproxyflake
reuse goproxy pod and avoid race between kubectl exec and goproxy readiness
2016-05-06 14:46:30 -07:00
Humble Devassy Chirammal fbc22b39b9 Update Dockerfile
Exposing 24008 is not required as glusterd listens on 24007 port.
2016-04-29 19:46:30 +05:30
Minhan Xia 1993bf901a reuse goproxy pod and avoid race between kubectl exec and goproxy readiness 2016-04-26 16:45:10 -07:00
Erick Fejta 4e4edb4edc Add Makefile for iperf 2016-04-13 14:28:33 -07:00
k8s-merge-robot 8905e61522 Merge pull request #23872 from jayunit100/iperf-container
Automatic merge from submit-queue

IPerf container to support network perfomance testing

Simple iperf container.

Issue:
We want to run iperf from the e2e tests for a network baseline, but there are no gcr images for this.

Solution:
Curate our own iperf container from source in kubernetes and copy it as a top level microservice.  So long as these are injected into GCR, we can then run this container from the e2e tests.

 cc @sig-testing this can be used along side #22869
2016-04-13 02:18:40 -07:00
Huamin Chen 3a914c2583 fix #22529: disable nfsv4 and use nfsv3 2016-04-12 16:23:28 +00:00
jay vyas 0e35d9194c IPerf container to support network perfomance testing 2016-04-08 22:53:57 -04:00
goltermann 696423e044 Vet fixes, mostly pass lock by value errors. 2016-04-06 11:27:40 -07:00
Dawn Chen c47f74a470 Merge pull request #23348 from pwittrock/docs
Update docs to reflect `kubectl run` creates deployments by default i…
2016-03-28 17:03:47 -07:00
Phillip Wittrock 4d2f3c1c17 Update docs to reflect `kubectl run` creates deployments by default instead of replicatino controllers. 2016-03-28 16:25:02 -07:00
k8s-merge-robot 25d94e80e0 Merge pull request #23289 from pwittrock/move-serve-hostname
Auto commit by PR queue bot
2016-03-26 11:20:12 -07:00
goltermann 34d4eaea08 Fixing several (but not all) go vet errors. Most are around string formatting, or unreachable code. 2016-03-22 17:26:50 -07:00
Phillip Wittrock d1d6650efd Remove test tag from serve_hostname Makefile 2016-03-21 13:53:35 -07:00
deads2k ab03317d96 support CIDRs in NO_PROXY 2016-03-16 16:22:54 -04:00
k8s-merge-robot 49092c0b99 Merge pull request #22443 from pwittrock/move-serve-hostname
Auto commit by PR queue bot
2016-03-15 21:57:16 -07:00
k8s-merge-robot 3081c10a40 Merge pull request #22632 from jsafrane/devel/fix-nfs-image
Auto commit by PR queue bot
2016-03-09 12:51:44 -08:00
k8s-merge-robot 999e6311b5 Merge pull request #18672 from bprashanth/netexec
Auto commit by PR queue bot
2016-03-08 06:10:02 -08:00
Jan Safranek 44f995699e Fix NFS and gluster test containers taking 100% of CPU 2016-03-08 10:32:34 +01:00
k8s-merge-robot 61c9a004a5 Merge pull request #22397 from bprashanth/dns_debug
Auto commit by PR queue bot
2016-03-07 00:20:03 -08:00
Prashanth Balasubramanian 92ff05f2e6 Wait till netexec is Ready in kubeproxy e2e 2016-03-03 11:27:32 -08:00
Prashanth Balasubramanian 33bb8e863c Add a simple clusterapi-tester, improve e2e logging. 2016-03-03 10:01:01 -08:00
Phillip Wittrock b5bfc6c281 Move serve_hostname testing image to k8s test/images from contrib/for-demos 2016-03-03 09:22:43 -08:00
Minhan Xia 57fc5e1380 bump wait timeout for nettest container 2016-03-01 11:17:15 -08:00
Minhan Xia 66940c2d44 wait for all webserver endpoints to come up before contacting peers 2016-02-24 18:35:59 -08:00
Jeff Grafton 87b0783808 Update tests to use nettest:1.7 2016-02-11 15:50:53 -08:00
Jeff Grafton 214d018911 Fix deadlock in nettest webserver 2016-02-11 15:50:45 -08:00
k8s-merge-robot dbd7b83d93 Merge pull request #20545 from pmorie/boilerplate
Auto commit by PR queue bot
2016-02-03 19:46:26 -08:00
Paul Morie b672785d72 Add boilerplate checks for Dockerfiles 2016-02-03 18:35:26 -05:00
Paul Morie 05bd107301 Add boilerplate checks for Makefiles 2016-02-03 18:35:26 -05:00
Tim Hockin bb460c04dd netexec: Add / and /echo handlers, bump to 1.4
Add some logs, allow simple "cmd" arg for shell.
2016-02-02 21:46:30 -08:00
harry 845a3145cd Add a fake git server image for e2e test 2016-01-21 14:19:18 +08:00
Chao Xu 144b5acd08 move ServerVersion to DiscoveryClient 2016-01-13 10:11:52 -08:00
Piotr Szczesniak fe04005959 Merge pull request #18658 from jszczepkowski/rc-bump
Autoscaling e2e tests: bumped resource consumer to version beta2.
2015-12-15 09:05:11 +01:00
Jerzy Szczepkowski dd62c8e831 Autoscaling e2e tests: bumped resource consumer to version beta2.
Autoscaling e2e tests: bumped resource consumer to version beta2.
2015-12-14 16:55:26 +01:00
Jerzy Szczepkowski aade6e78b2 Added handling custom metrics to resource consumer.
Added handling custom metrics in Prometheus format to resource consumer.
2015-12-10 16:20:03 +01:00
k8s-merge-robot 1a57cc8033 Merge pull request #15777 from mesosphere/sttts-replace-ssh-by-net-host-container
Auto commit by PR queue bot
2015-11-20 02:19:25 -08:00
Dr. Stefan Schimanski 2d6c2eb897 e2e: replace ssh with net=host hostexec pod and kubectl exec
- document needed packages in hostexec image
- add RunHostCmdOrDie
- kube-proxy e2e: port from ssh to hostexec
  - use preset NodeName to schedule test pods to different nodes
  - parallel launch of pods
  - port from ssh to hostexec
  - add timeout because nc might block on udp
  - delete test container without grace period
- PrivilegedPod e2e: port from ssh to hostexec
- NodePort e2e: port from ssh to hostexec
- cluster/mesos/docker: Enable privileged pods
2015-11-17 20:48:34 +01:00
Salvatore Dario Minonne e2c315ee99 modifying readFileContentInLoop to display iteratively file content and eventually check initial content 2015-11-14 22:52:34 +01:00
Dr. Stefan Schimanski 862143fc62 Add hostexec test image 2015-11-11 22:48:56 +01:00
vollschwitz ac9484b869 prevent consumecpu/mem from becoming zombies by calling run instead of start 2015-11-10 08:04:26 +01:00
Prashanth Balasubramanian 84e9277bcc Test image 2015-11-02 12:35:27 -08:00
Steve Milner 70e4693428 Standardized test image Makefile targets 2015-10-29 10:12:05 -04:00
Zach Loafman b71bc4e480 Fix volumes/test/nfs: Needs to run insecure to allow container connections
Since this is a container service port anyways, "insecure" is a bit of
a red herring. There's no real security relevance to the incoming port
numbers for the NFS server pod.

This lets us get rid of the examples/nfs/exporter Docker build
(@jsafrane's personal image).
2015-10-27 16:58:04 -07:00
Jan Safranek e0e482e4c8 Move CephFS test container to test/images. 2015-10-22 15:20:20 +02:00
Paul Morie 2ff043e75f Add ownership inspection to mount tester image 2015-10-19 18:42:07 -04:00
k8s-merge-robot a3f2ba2e34 Merge pull request #11694 from ncdc/add-spdy-proxy-support
Auto commit by PR queue bot
2015-10-15 06:56:15 -07:00
Jordan Liggitt 826459e51e Allow specifying scheme when proxying 2015-10-12 11:16:53 -04:00
Filip Grzadkowski c0532a432a Revert "Allow specifying scheme when proxying" 2015-10-07 13:02:35 +02:00
Jordan Liggitt b9ba3bd7c2 Allow specifying scheme when proxying 2015-10-05 22:12:10 -04:00
Steve Milner e5d64ea19b e2e: kubectl verification for HTTP proxying using netexec and goproxy. 2015-10-05 16:05:36 -04:00
Steve Milner e5b85194aa netexec: Multiple fixes and enhancements to netexec
* Added upload functionality
* More logging
* Moved to test/images
* Image file fixes
2015-10-05 16:05:36 -04:00
Andy Goldstein 9f1bd07322 Add goproxy test image 2015-10-05 16:05:34 -04:00
k8s-merge-robot ffacd3bcf2 Merge pull request #14645 from socaa/readme
Auto commit by PR queue bot
2015-10-02 18:48:22 -07:00
k8s-merge-robot cd5cb5791e Merge pull request #14837 from liggitt/nettest_tls
Auto commit by PR queue bot
2015-10-02 14:29:59 -07:00
Jordan Liggitt 1d1d7bb145 Add https to porter test image 2015-10-01 22:55:58 -04:00
Ewa Socala ce5d7d43db added README file to Resource Consumer 2015-10-01 10:28:48 +02:00
Andy Goldstein 7f900daa3e Add port-forward-tester image 2015-09-30 20:03:49 -04:00
Tamer Tas cb5f921df1 Add newline to the end of bash scripts 2015-09-18 19:35:05 +03:00
Piotr Szczesniak 66759a4e24 Bumped image tag for Resource Consumer 2015-09-15 16:10:58 +02:00
k8s-merge-robot db128ac0f7 Merge pull request #13736 from socaa/dockerfile-memory
Auto commit by PR queue bot
2015-09-14 16:35:52 -07:00
tummychow 78ce5da988 Move util.StringSet into its own package
A lot of packages use StringSet, but they don't use anything else from
the util package. Moving StringSet into another package will shrink
their dependency trees significantly.
2015-09-10 12:04:15 -07:00
k8s-merge-robot 08fbe2bc10 Merge pull request #13789 from socaa/resource-consumer-memory
Auto commit by PR queue bot
2015-09-10 08:49:42 -07:00
Ewa Socala 9e640b356c Memory consumption added to Resource Consumer 2015-09-10 13:50:49 +02:00
Ewa Socala 569ebf7a9b Resource Consumer Handler milicore changed to millicore 2015-09-10 12:17:02 +02:00
Ewa Socala 44e1d55029 added possibility of memory consumption to Dockerfile 2015-09-09 16:09:17 +02:00
derekwaynecarr b05c11edac Fix typo for milicores to millicores 2015-09-08 14:12:08 -04:00
Jan Safranek bcdf89a909 Rebase the gluster image to CentOS.
Using the same base for NFS and Gluster images should reduce the download size.
Also, CentOS image is ~30MB smaller than Ubuntu 14.04.
2015-08-28 12:26:01 +02:00
Jan Safranek 49921ada74 Configure lower NFS grace period.
From RFC 3530:
  During the grace period, the server must reject READ and WRITE operations
  and non-reclaim locking requests (i.e., other LOCK and OPEN operations)
  with an error of NFS4ERR_GRACE.

That basically means that all open() calls from clients are blocked until the
grace period is over (90 seconds by default).

We want the grace period as low as possible to speed up the tests. '10'
seconds were tested on Fedora 21 and Ubuntu 15.04 as the hosts.

The test image is rebased to Fedora in order to get 'rpc.nfsd -G <n>' option,
Ubuntu does not support it.
2015-08-27 17:50:05 +02:00
Ewa Socala c68508f8cf Changed Resource Consumer for correct parsing POST requests 2015-08-25 16:29:29 +02:00
Zach Loafman 0a8291505a Merge pull request #9234 from ZJU-SEL/fix-e2e-test-hostdir
fix e2e hostdir test
2015-08-21 15:51:42 -07:00
Clayton Coleman 9ee7b76bba Allow testing graceful shutdown via network-tester 2015-08-19 22:06:37 -04:00
He Simei faeb45d69f fix host dir, to test volume r/w with different containers within a pod
Signed-off-by: He Simei <hesimei@zju.edu.cn>
2015-08-20 08:55:19 +08:00
Paul Morie cffacbb5bd Fix FROM clause in mount-test-user image 2015-08-19 13:49:30 -04:00
Robert Bailey 08e6a43c1d Revert "Merge pull request #9165 from smarterclayton/graceful"
This reverts commit 4f856b595d, reversing
changes made to d78525a83b.

Conflicts:
	pkg/kubelet/status_manager.go
2015-08-18 17:34:49 -07:00
Kris Rousey ae6c64d9bb Moving everyone to unversioned client 2015-08-18 10:23:03 -07:00
Clayton Coleman 266e6226e5 Move slow-* items to test/images/network-tester 2015-08-18 09:08:46 -04:00
Clayton Coleman b842a7dd15 Revert "Revert "Gracefully delete pods from the Kubelet""
This reverts commit 98115facfd.
2015-08-18 08:57:02 -04:00
Mike Danese fa40ced8f8 move contrib/for-tests to test/images 2015-08-14 20:42:46 -07:00