github.com/munnerz/test-infra@v0.0.0-20190108210205-ce3d181dc989/config/jobs/kubernetes-sigs/sig-windows/sig-windows-config.yaml (about) 1 presets: 2 - labels: 3 preset-azure-acsengine: "true" 4 env: 5 - name: AZURE_CREDENTIALS 6 value: /etc/azure-cred/credentials 7 - name: AZURE_SSH_PUBLIC_KEY_FILE 8 value: /etc/azure-ssh/azure-ssh-pub 9 - name: CLOUD_CONFIG 10 value: random 11 - name: AZ_STORAGE_CONTAINER_NAME 12 value: mystoragecontainer 13 - name: REGISTRY 14 value: gcr.io/win-e2e-test/win-e2e-hyperkube 15 - name: WIN_BUILD 16 value: https://raw.githubusercontent.com/Azure/acs-engine/master/scripts/build-windows-k8s.sh 17 - name: KUBE_TEST_REPO_LIST_DOWNLOAD_LOCATION 18 value: https://raw.githubusercontent.com/e2e-win/e2e-win-prow-deployment/master/repo-list 19 volumes: 20 - name: azure-cred 21 secret: 22 secretName: azure-cred 23 - name: azure-ssh 24 secret: 25 secretName: azure-ssh 26 volumeMounts: 27 - name: azure-cred 28 mountPath: /etc/azure-cred 29 readOnly: true 30 - name: azure-ssh 31 mountPath: /etc/azure-ssh 32 readOnly: true 33 34 35 periodics: 36 - interval: 8h 37 name: ci-kubernetes-e2e-win-1-13 38 labels: 39 preset-service-account: "true" 40 preset-azure-acsengine: "true" 41 preset-k8s-ssh: "true" 42 spec: 43 containers: 44 - image: gcr.io/k8s-testimages/kubekins-e2e:v20181218-134e718ec-master 45 args: 46 - "--job=$(JOB_NAME)" 47 - "--root=/go/src" 48 - "--repo=k8s.io/kubernetes=master" 49 - "--upload=gs://kubernetes-jenkins/logs/" 50 - "--timeout=360" 51 - "--scenario=kubernetes_e2e" 52 - -- 53 - "--test=true" 54 - "--up=true" 55 - "--down=true" 56 - "--deployment=acsengine" 57 - "--provider=skeleton" 58 - "--build=bazel" 59 - "--acsengine-admin-username=azureuser" 60 - "--acsengine-admin-password=AdminPassw0rd" 61 - "--acsengine-creds=$AZURE_CREDENTIALS" 62 - "--acsengine-download-url=https://k8stestinfrabinaries.blob.core.windows.net/acsengine/acs-engine-dirty.tar.gz" 63 - "--acsengine-public-key=$AZURE_SSH_PUBLIC_KEY_FILE" 64 - "--acsengine-winZipBuildScript=$WIN_BUILD" 65 - "--acsengine-orchestratorRelease=1.13" 66 - "--acsengine-win-binaries-url=https://k8stestinfrabinaries.blob.core.windows.net/k8swin/v1.13.0-beta.0-1int.zip" 67 - "--acsengine-hyperkube-url=k8s.gcr.io/hyperkube-amd64:v1.13.0-beta.0" 68 - "--acsengine-agentpoolcount=3" 69 - "--test_args=--ginkgo.focus=\\[Conformance\\]|\\[NodeConformance\\] --ginkgo.skip=\\[k8s.io\\].Container.Runtime.blackbox.test.when.running.a.container.with.a.new.image.should.be.able.to.pull.from.private.registry.with.secret.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.running.a.container.with.a.new.image.should.be.able.to.pull.image.from.docker.hub.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.running.a.container.with.a.new.image.should.be.able.to.pull.image.from.gcr.io.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.running.a.container.with.a.new.image.should.not.be.able.to.pull.from.private.registry.without.secret.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.running.a.container.with.a.new.image.should.not.be.able.to.pull.image.from.invalid.registry.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.running.a.container.with.a.new.image.should.not.be.able.to.pull.non-existing.image.from.gcr.io.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.starting.a.container.that.exits.should.report.termination.message.as.empty.when.pod.succeeds.and.TerminationMessagePolicy.FallbackToLogOnError.is.set.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.starting.a.container.that.exits.should.report.termination.message.from.file.when.pod.succeeds.and.TerminationMessagePolicy.FallbackToLogOnError.is.set.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.starting.a.container.that.exits.should.report.termination.message.from.log.output.if.TerminationMessagePolicy.FallbackToLogOnError.is.set.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.starting.a.container.that.exits.should.report.termination.message.if.TerminationMessagePath.is.set.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.starting.a.container.that.exits.should.report.termination.message.if.TerminationMessagePath.is.set.as.non-root.user.and.at.a.non-default.path.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.starting.a.container.that.exits.should.run.with.the.expected.status.\\[NodeConformance\\]|\\[k8s.io\\].Kubelet.when.scheduling.a.busybox.Pod.with.hostAliases.should.write.entries.to./etc/hosts.\\[NodeConformance\\].\\[Conformance\\]|\\[k8s.io\\].Kubelet.when.scheduling.a.read.only.busybox.container.should.not.write.to.root.filesystem.\\[NodeConformance\\].\\[Conformance\\]|\\[k8s.io\\].KubeletManagedEtcHosts.should.test.kubelet.managed./etc/hosts.file.\\[NodeConformance\\].\\[Conformance\\]|\\[k8s.io\\].PrivilegedPod.\\[NodeConformance\\].should.enable.privileged.commands|\\[k8s.io\\].Security.Context.When.creating.a.container.with.runAsUser.should.run.the.container.with.uid.0.\\[NodeConformance\\]|\\[k8s.io\\].Security.Context.When.creating.a.container.with.runAsUser.should.run.the.container.with.uid.65534.\\[NodeConformance\\]|\\[k8s.io\\].Security.Context.When.creating.a.pod.with.privileged.should.run.the.container.as.unprivileged.when.false.\\[NodeConformance\\]|\\[k8s.io\\].Security.Context.When.creating.a.pod.with.readOnlyRootFilesystem.should.run.the.container.with.readonly.rootfs.when.readOnlyRootFilesystem=true.\\[NodeConformance\\]|\\[k8s.io\\].Security.Context.when.creating.containers.with.AllowPrivilegeEscalation.should.allow.privilege.escalation.when.not.explicitly.set.and.uid.!=.0.\\[NodeConformance\\]|\\[k8s.io\\].Security.Context.when.creating.containers.with.AllowPrivilegeEscalation.should.allow.privilege.escalation.when.true.\\[NodeConformance\\]|\\[k8s.io\\].Security.Context.when.creating.containers.with.AllowPrivilegeEscalation.should.not.allow.privilege.escalation.when.false.\\[NodeConformance\\]|\\[sig-network\\].DNS.should.provide.DNS.for.services..\\[Conformance\\]|\\[sig-network\\].DNS.should.provide.DNS.for.the.cluster..\\[Conformance\\]|\\[sig-network\\].Networking.Granular.Checks:.Pods.should.function.for.intra-pod.communication:.http.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-network\\].Networking.Granular.Checks:.Pods.should.function.for.intra-pod.communication:.udp.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-network\\].Networking.Granular.Checks:.Pods.should.function.for.node-pod.communication:.http.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-network\\].Networking.Granular.Checks:.Pods.should.function.for.node-pod.communication:.udp.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].ConfigMap.should.be.consumable.from.pods.in.volume.as.non-root.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].ConfigMap.should.be.consumable.from.pods.in.volume.with.defaultMode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].ConfigMap.should.be.consumable.from.pods.in.volume.with.mappings.and.Item.mode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].ConfigMap.should.be.consumable.from.pods.in.volume.with.mappings.as.non-root.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Downward.API.volume.should.set.DefaultMode.on.files.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Downward.API.volume.should.set.mode.on.item.file.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].EmptyDir.volumes.*\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].HostPath.should.give.a.volume.the.correct.mode.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.configMap.should.be.consumable.from.pods.in.volume.as.non-root.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.configMap.should.be.consumable.from.pods.in.volume.with.defaultMode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.configMap.should.be.consumable.from.pods.in.volume.with.mappings.and.Item.mode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.configMap.should.be.consumable.from.pods.in.volume.with.mappings.as.non-root.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.secret.should.be.consumable.from.pods.in.volume.as.non-root.with.defaultMode.and.fsGroup.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.secret.should.be.consumable.from.pods.in.volume.with.defaultMode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.secret.should.be.consumable.from.pods.in.volume.with.mappings.and.Item.Mode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Secrets.should.be.consumable.from.pods.in.volume.as.non-root.with.defaultMode.and.fsGroup.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Secrets.should.be.consumable.from.pods.in.volume.with.defaultMode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Secrets.should.be.consumable.from.pods.in.volume.with.mappings.and.Item.Mode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Subpath.Atomic.writer.volumes.should.support.subpaths.with.configmap.pod.\\[Conformance\\]|\\[sig-storage\\].Subpath.Atomic.writer.volumes.should.support.subpaths.with.configmap.pod.with.mountPath.of.existing.file.\\[Conformance\\]|\\[sig-storage\\].Subpath.Atomic.writer.volumes.should.support.subpaths.with.downward.pod.\\[Conformance\\]|\\[sig-storage\\].Subpath.Atomic.writer.volumes.should.support.subpaths.with.projected.pod.\\[Conformance\\]|\\[sig-storage\\].Subpath.Atomic.writer.volumes.should.support.subpaths.with.secret.pod.\\[Conformance\\]|\\[sig-storage\\].Projected.downwardAPI.should.set.DefaultMode.on.files.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.downwardAPI.should.set.mode.on.item.file.\\[NodeConformance\\].\\[Conformance\\]" 70 - "--timeout=340m"