Commit graph

402 commits

Author SHA1 Message Date
Kubernetes Prow Robot
751ab64d57
Merge pull request #135837 from dgrisonnet/increase-resource-limits
test/e2e: fix pod resize test flakes on CRI-O/runc environments
2026-01-17 08:35:15 +05:30
David Lynch
df66e4728b Back out "Remove image volume e2e test because CI has containerd < 2.1"
Original commit changeset: 71ddb98ae4

user: David Lynch <davite3@protonmail.com>
2026-01-14 12:36:03 +00:00
Kubernetes Prow Robot
08ad958d0d
Merge pull request #135774 from pohly/e2e-framework-ginkgo-wrappers
E2E framework: make usage of Ginkgo wrappers optional
2026-01-07 19:01:38 +05:30
Patrick Ohly
47d02070ba E2E: remove unnecessary trailing spaces in test names
The spaces are unnecessary because Ginkgo adds spaces automatically.

This was detected before only for tests using the wrapper functions,
now it also gets detected for ginkgo methods.
2026-01-07 12:05:43 +01:00
Damien Grisonnet
c29d27bc44 test/e2e: increase memory limits in pod resize tests
The pod resize e2e tests use memory limits as low as 20Mi for Guaranteed
QoS pods. On OpenShift/CRI-O, the container runtime (runc) runs inside
the pod's cgroup and requires ~20-22MB of memory during container
creation and restart operations. This causes intermittent OOM kills
when the pod's memory limit is at or below runc's memory footprint.

This issue does not occur on containerd-based clusters because
containerd's shim runs outside the pod's cgroup by default (ShimCgroup=""),
so runc's memory is not charged against the pod's limit.

Increase memory limits to provide sufficient headroom for runc:
- originalMem: 20Mi -> 35Mi
- reducedMem: 15Mi -> 30Mi
- increasedMem: 25Mi -> 40Mi

The test validates resize behavior, not minimal memory limits, so
larger values do not reduce test coverage.

Signed-off-by: Damien Grisonnet <dgrisonn@redhat.com>
2025-12-19 07:41:59 +01:00
Damien Grisonnet
315c38fb8a Revert "test/e2e: increase memory limits in pod resize tests"
This reverts commit a2cf7f770d.
2025-12-18 19:05:47 +01:00
Patrick Ohly
ad79e479c2 build: remove deprecated '// +build' tag
This has been replaced by `//build:...` for a long time now.

Removal of the old build tag was automated with:

    for i in $(git grep -l '^// +build' | grep -v -e '^vendor/'); do if ! grep -q '^// Code generated' "$i"; then sed -i -e '/^\/\/ +build/d' "$i"; fi; done
2025-12-18 12:16:21 +01:00
Damien Grisonnet
a2cf7f770d test/e2e: increase memory limits in pod resize tests
The pod resize e2e tests use memory limits as low as 20Mi for Guaranteed
QoS pods. On OpenShift/CRI-O, the container runtime (runc) runs inside
the pod's cgroup and requires ~20-22MB of memory during container
creation and restart operations. This causes intermittent OOM kills
when the pod's memory limit is at or below runc's memory footprint.

This issue does not occur on containerd-based clusters because
containerd's shim runs outside the pod's cgroup by default (ShimCgroup=""),
so runc's memory is not charged against the pod's limit.

Increase memory limits to provide sufficient headroom for runc:
- originalMem: 20Mi -> 35Mi
- reducedMem: 15Mi -> 30Mi
- increasedMem: 25Mi -> 40Mi

The test validates resize behavior, not minimal memory limits, so
larger values do not reduce test coverage.

Signed-off-by: Damien Grisonnet <dgrisonn@redhat.com>
2025-12-09 12:15:25 +01:00
Kubernetes Prow Robot
c245b40b87
Merge pull request #135254 from saschagrunert/image-volume-containerd-skip
[KEP-4639] Remove image volume e2e test because CI has containerd < 2.1
2025-11-12 07:59:49 -08:00
Kubernetes Prow Robot
9673a7fbf1
Merge pull request #132919 from ndixita/pod-level-in-place-pod-resize
Pod level in place pod resize - alpha
2025-11-12 07:59:41 -08:00
Sascha Grunert
71ddb98ae4
Remove image volume e2e test because CI has containerd < 2.1
Remove the e2e test since we switched to beta (enabled by default)
instead of GA. We re-add the test in 1.36.

Signed-off-by: Sascha Grunert <sgrunert@redhat.com>
2025-11-12 09:31:34 +01:00
ndixita
10b73f8ef9
Test fixes
Signed-off-by: ndixita <ndixita@google.com>
2025-11-12 06:21:06 +00:00
ndixita
21920bb37e
Test fixes
Signed-off-by: ndixita <ndixita@google.com>
2025-11-12 01:18:53 +00:00
ndixita
1733d8fc8c
e2e tests
Signed-off-by: ndixita <ndixita@google.com>
2025-11-11 18:19:09 +00:00
Stanislav Láznička
805eb885e3
node e2e: add tests for Ensure Secret Image Pulls default policy
Signed-off-by: Stanislav Láznička <slznika@microsoft.com>

Co-authored-by: Anish Ramasekar <anish.ramasekar@gmail.com>
2025-11-11 11:15:53 -05:00
carlory
094b1bf018
fix [sig-node] Container Runtime blackbox test when running a container with a new image [Serial] should be able to pull from private registry with secret [NodeConformance] 2025-11-11 10:31:12 +08:00
Heba
aceb89debc
KEP-5471: Extend tolerations operators (#134665)
* Add numeric operations to tolerations

Signed-off-by: Heba Elayoty <heelayot@microsoft.com>

* code review feedback

Signed-off-by: Heba Elayoty <heelayot@microsoft.com>

* add default feature gate

Signed-off-by: Heba Elayoty <heelayot@microsoft.com>

* Add integration tests

Signed-off-by: Heba Elayoty <heelayot@microsoft.com>

* Add toleration value validation

Signed-off-by: Heba Elayoty <heelayot@microsoft.com>

* Add validate options for new operators

Signed-off-by: helayoty <heelayot@microsoft.com>

* Remove log

Signed-off-by: helayoty <heelayot@microsoft.com>

* Update feature gate check

Signed-off-by: helayoty <heelayot@microsoft.com>

* emove IsValidNumericString func

Signed-off-by: helayoty <heelayot@microsoft.com>

* Implement IsDecimalInteger

Signed-off-by: helayoty <heelayot@microsoft.com>

* code review feedback

Signed-off-by: helayoty <heelayot@microsoft.com>

* Add logs to v1/toleration

Signed-off-by: Heba Elayoty <heelayot@microsoft.com>
Signed-off-by: helayoty <heelayot@microsoft.com>

* Update integration tests and address code review feedback

Signed-off-by: helayoty <heelayot@microsoft.com>

* Add feature gate to the scheduler framework

Signed-off-by: helayoty <heelayot@microsoft.com>

* Remove extra test

Signed-off-by: helayoty <heelayot@microsoft.com>

* Fix integration test

Signed-off-by: helayoty <heelayot@microsoft.com>

* pass feature gate via TolerationsTolerateTaint

Signed-off-by: helayoty <heelayot@microsoft.com>

---------

Signed-off-by: Heba Elayoty <heelayot@microsoft.com>
Signed-off-by: helayoty <heelayot@microsoft.com>
2025-11-10 12:42:54 -08:00
Kubernetes Prow Robot
d777de7741
Merge pull request #135195 from haircommander/image-volume
KEP 4639: Move ImageVolume to on by default beta
2025-11-09 18:34:53 -08:00
Sascha Grunert
c7b277a32e KEP 4639: Move ImageVolume to on by default beta
Coauthored-by: Sascha Grunert <sgrunert@redhat.com>
Signed-off-by: Peter Hunt <pehunt@redhat.com>
2025-11-06 16:26:27 -05:00
Kubernetes Prow Robot
171d2dacd2
Merge pull request #134893 from HirazawaUi/kep-5607
KEP-5607: Allow hostNetwork pods to use user namespace
2025-11-06 12:43:15 -08:00
HirazawaUi
e986000e6a KEP-5607: Allow hostNetwork pods to use user namespaces 2025-11-06 22:45:36 +08:00
Kubernetes Prow Robot
84d0e616da
Merge pull request #135157 from BenTheElder/cleanup-min
Cleanup MinimumKubeletVersion test tag for unsupported kubelet versions
2025-11-05 21:57:26 -08:00
Kubernetes Prow Robot
0decbf4405
Merge pull request #134414 from HirazawaUi/promote-3721-to-beta
KEP-3721: Promote EnvFiles feature gate to Beta
2025-11-05 21:56:50 -08:00
Kubernetes Prow Robot
c35cd16295
Merge pull request #135088 from everpeace/KEP-3619-GA
KEP-3619: Promote SupplementalGroupspolicy feature To GA
2025-11-05 18:53:05 -08:00
HirazawaUi
0976b6ada3 Improve env file syntax 2025-11-06 09:17:42 +08:00
Benjamin Elder
30965ea3ce drop MinimumKubeletVersion for unsupported kubelet versions
Versions 1.20, 1.21, 1.22, 1.23, 1.27 are all well out of support
2025-11-05 14:25:20 -08:00
Natasha Sarkar
8d823b6523 add minimum kubelet version for ippr tests 2025-11-05 18:59:10 +00:00
Kubernetes Prow Robot
dec78c833d
Merge pull request #135094 from stlaz/fix-node-conformance-failures
Fix failures in node-e2e image pull tests
2025-11-04 14:32:11 -08:00
Kubernetes Prow Robot
08a9e4fca7
Merge pull request #135067 from natasha41575/ippr-conformance
[InPlacePodVerticalScaling] Promote IPPR e2e tests to conformance
2025-11-04 11:42:20 -08:00
Stanislav Láznička
ed62db7acf
e2e registry: run as pods even in seemingly in-cluster pull tests
Signed-off-by: Stanislav Láznička <slznika@microsoft.com>
2025-11-04 17:27:17 +01:00
Kubernetes Prow Robot
af70ebcbf5
Merge pull request #132157 from haircommander/drop-userns-psa
drop UserNamespacesPodSecurityStandards feature gate
2025-11-04 08:20:08 -08:00
Shingo Omura
cdbe340143
KEP-3619: remove e2etestskipper in e2e tests for SupplementalGroupsPolicy GA 2025-11-04 16:44:58 +09:00
Shingo Omura
b3aeead3e2
KEP-3617: Graduate SupplementalGroupsPolicy feature gate to GA and lock to default 2025-11-04 16:44:57 +09:00
Natasha Sarkar
de9138f4fa Promote IPPR e2e tests to conformance 2025-11-03 16:37:07 +00:00
Peter Hunt
e8bd3f629d drop UserNamespacesPodSecurityStandards feature gate
this feature gate was meant to be ephemeral, and only was used for guaranteeing a
cluster admin didn't accidentally relax PSA policies before the kubelet would deny a pod
was created if it didn't support user namespaces. As of kube 1.33, the supported apiserver version
skew of n-3 guarantees that all supported kubelets are of 1.30 or later, meaning they do this.

Now, we can unconditionally relax PSA policy if a pod is in a user namespace.

This PR reserves older policies default behavior by never relaxing

Signed-off-by: Peter Hunt <pehunt@redhat.com>
2025-10-31 14:08:21 -04:00
Natasha Sarkar
d99d3c0b69 refactor ippr tests 2025-10-30 17:52:57 +00:00
Kubernetes Prow Robot
34988e758d
Merge pull request #134453 from stlaz/node-conformance-e2e
Fix node conformance tests with fake registry
2025-10-30 07:48:06 -07:00
Stanislav Láznička
428be46ba2
node conformance e2e: move registry cleanup to ginkgo.DeferCleanup
Signed-off-by: Stanislav Láznička <slznika@microsoft.com>
2025-10-30 15:00:57 +01:00
Stanislav Láznička
135b46974a
e2e registry: have SetupRegistry() return registry address 2025-10-29 13:18:06 +01:00
Stanislav Láznička
fc81e22735
fix Node Conformance Container Runtime test with fake registry
Signed-off-by: Stanislav Láznička <slznika@microsoft.com>
2025-10-29 13:17:03 +01:00
Stanislav Láznička
a0e64c21f2
Use fake registry in Node's container runtime image pulling tests
Signed-off-by: Stanislav Láznička <slznika@microsoft.com>
2025-10-29 13:06:34 +01:00
Stanislav Láznička
a3f242676c
Revert "remove failing test that depends on expired credential, remove credential, add TODOs"
This reverts commit 8ace0fb89f.
2025-10-28 14:23:54 +01:00
Maria Romano Silva
86bfcd5eec oopsie missed two, should fix failing tests 2025-10-28 01:26:32 +00:00
Maria Romano Silva
a277269159 updating sidecar feature to node conformance 2025-10-27 23:43:43 +00:00
Lubomir I. Ivanov
804708df53 /test: use a different image for hostname override e2e tests
As discovered in ticket 134737 `hostname` is buggy on busybox
due to the musl backend that it uses. something in the /etc/hosts
that k8s generates trips its parser and it doesn't work properly
in the ipv6 tests.

To workaround that use an image that has a glibc backend,
so that the hostname command works.
2025-10-22 15:07:01 +02:00
Kubernetes Prow Robot
cba95d3e42
Merge pull request #132601 from toVersus/test/more-pod-level-resources
[PodLevelResources] Add more comprehensive test cases to kubelet
2025-10-20 14:26:36 -07:00
Kubernetes Prow Robot
e34f01402f
Merge pull request #134703 from pohly/e2e-fix-test-name-uniqueness
e2e: find and fix reuse of test names
2025-10-18 15:38:07 -07:00
Kubernetes Prow Robot
76f5a1c8c2
Merge pull request #134635 from vivzbansal/execprobe1
Locked the (generally available) feature gate `ExecProbeTimeout` to true.
2025-10-17 18:06:40 -07:00
Vivek Bansal
af17392630 Setting the default feature-gate ExecProbeTimeout value to TRUE 2025-10-17 18:38:05 +00:00
Patrick Ohly
d0a2a0d22e e2e: find and fix reuse of test names
This reports and fixes for test/e2e:

    ERROR: E2E suite initialization was faulty, these errors must be fixed:
    ERROR: apimachinery/mutatingadmissionpolicy.go:184: full test name is not unique: "[sig-api-machinery] MutatingAdmissionPolicy [Privileged:ClusterAdmin] [Feature:MutatingAdmissionPolicy] [FeatureGate:MutatingAdmissionPolicy] [Beta] [Feature:OffByDefault] should support MutatingAdmissionPolicy API operations" (/nvme/gopath/src/k8s.io/kubernetes/test/e2e/apimachinery/mutatingadmissionpolicy.go:184, /nvme/gopath/src/k8s.io/kubernetes/test/e2e/apimachinery/mutatingadmissionpolicy.go:606)
    ERROR: apimachinery/mutatingadmissionpolicy.go:412: full test name is not unique: "[sig-api-machinery] MutatingAdmissionPolicy [Privileged:ClusterAdmin] [Feature:MutatingAdmissionPolicy] [FeatureGate:MutatingAdmissionPolicy] [Beta] [Feature:OffByDefault] should support MutatingAdmissionPolicyBinding API operations" (/nvme/gopath/src/k8s.io/kubernetes/test/e2e/apimachinery/mutatingadmissionpolicy.go:412, /nvme/gopath/src/k8s.io/kubernetes/test/e2e/apimachinery/mutatingadmissionpolicy.go:834)
    ERROR: common/node/pod_level_resources.go:250: full test name is not unique: "[sig-node] Pod Level Resources [Serial] [Feature:PodLevelResources] [FeatureGate:PodLevelResources] [Beta] Guaranteed QoS pod with container resources" (/nvme/gopath/src/k8s.io/kubernetes/test/e2e/common/node/pod_level_resources.go:250 (2x))
    ERROR: dra/dra.go:1899: full test name is not unique: "[sig-node] [DRA] kubelet [Feature:DynamicResourceAllocation] [FeatureGate:DRAConsumableCapacity] [Alpha] [Feature:OffByDefault] [FeatureGate:DynamicResourceAllocation] must allow multiple allocations and consume capacity [KubeletMinVersion:1.34]" (/nvme/gopath/src/k8s.io/kubernetes/test/e2e/dra/dra.go:1899 (2x))
    ERROR: storage/testsuites/volume_group_snapshottable.go:173: full test name is not unique: "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern:  (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable  should create snapshots for multiple volumes in a pod" (/nvme/gopath/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_group_snapshottable.go:173 (2x))
    ERROR: storage/testsuites/volume_group_snapshottable.go:173: full test name is not unique: "[sig-storage] CSI Volumes [Driver: pd.csi.storage.gke.io] [Serial] [Testpattern:  (delete policy)] volumegroupsnapshottable [Feature:volumegroupsnapshot] VolumeGroupSnapshottable  should create snapshots for multiple volumes in a pod" (/nvme/gopath/src/k8s.io/kubernetes/test/e2e/storage/testsuites/volume_group_snapshottable.go:173 (2x))

And for test/e2e_node:

    ERROR: cpu_manager_test.go:1622: full test name is not unique: "[sig-node] CPU Manager [Serial] [Feature:CPUManager] when checking the CFS quota management should disable for guaranteed pod with exclusive CPUs assigned" (/nvme/gopath/src/k8s.io/kubernetes/test/e2e_node/cpu_manager_test.go:1622, /nvme/gopath/src/k8s.io/kubernetes/test/e2e_node/cpu_manager_test.go:1642)
    ERROR: eviction_test.go:800: full test name is not unique: "[sig-node] LocalStorageCapacityIsolationFSQuotaMonitoring [Slow] [Serial] [Disruptive] [Feature:LocalStorageCapacityIsolationQuota] [Feature:LSCIQuotaMonitoring] [Feature:UserNamespacesSupport] when we run containers that should cause use quotas for LSCI monitoring (quotas enabled: true)  should eventually evict all of the correct pods" (/nvme/gopath/src/k8s.io/kubernetes/test/e2e_node/eviction_test.go:800 (2x))
2025-10-17 20:19:52 +02:00