github.com/munnerz/test-infra@v0.0.0-20190108210205-ce3d181dc989/config/jobs/kubernetes-sigs/sig-windows/sig-windows-config.yaml (about)

     1  presets:
     2  - labels:
     3      preset-azure-acsengine: "true"
     4    env:
     5    - name: AZURE_CREDENTIALS
     6      value: /etc/azure-cred/credentials
     7    - name: AZURE_SSH_PUBLIC_KEY_FILE
     8      value: /etc/azure-ssh/azure-ssh-pub
     9    - name: CLOUD_CONFIG
    10      value: random 
    11    - name: AZ_STORAGE_CONTAINER_NAME
    12      value: mystoragecontainer
    13    - name: REGISTRY
    14      value: gcr.io/win-e2e-test/win-e2e-hyperkube
    15    - name: WIN_BUILD
    16      value: https://raw.githubusercontent.com/Azure/acs-engine/master/scripts/build-windows-k8s.sh
    17    - name: KUBE_TEST_REPO_LIST_DOWNLOAD_LOCATION
    18      value: https://raw.githubusercontent.com/e2e-win/e2e-win-prow-deployment/master/repo-list
    19    volumes:
    20    - name: azure-cred
    21      secret:
    22        secretName: azure-cred
    23    - name: azure-ssh
    24      secret:
    25        secretName: azure-ssh
    26    volumeMounts:
    27    - name: azure-cred
    28      mountPath: /etc/azure-cred
    29      readOnly: true
    30    - name: azure-ssh
    31      mountPath: /etc/azure-ssh
    32      readOnly: true
    33  
    34  
    35  periodics:
    36  - interval: 8h
    37    name: ci-kubernetes-e2e-win-1-13
    38    labels:
    39      preset-service-account: "true"
    40      preset-azure-acsengine: "true"
    41      preset-k8s-ssh: "true"
    42    spec:
    43      containers:
    44      - image: gcr.io/k8s-testimages/kubekins-e2e:v20181218-134e718ec-master
    45        args:
    46        - "--job=$(JOB_NAME)"
    47        - "--root=/go/src"
    48        - "--repo=k8s.io/kubernetes=master"
    49        - "--upload=gs://kubernetes-jenkins/logs/"
    50        - "--timeout=360"
    51        - "--scenario=kubernetes_e2e"
    52        - --
    53        - "--test=true"
    54        - "--up=true"
    55        - "--down=true"
    56        - "--deployment=acsengine"
    57        - "--provider=skeleton"
    58        - "--build=bazel"
    59        - "--acsengine-admin-username=azureuser"
    60        - "--acsengine-admin-password=AdminPassw0rd"
    61        - "--acsengine-creds=$AZURE_CREDENTIALS"
    62        - "--acsengine-download-url=https://k8stestinfrabinaries.blob.core.windows.net/acsengine/acs-engine-dirty.tar.gz"
    63        - "--acsengine-public-key=$AZURE_SSH_PUBLIC_KEY_FILE"
    64        - "--acsengine-winZipBuildScript=$WIN_BUILD"
    65        - "--acsengine-orchestratorRelease=1.13"
    66        - "--acsengine-win-binaries-url=https://k8stestinfrabinaries.blob.core.windows.net/k8swin/v1.13.0-beta.0-1int.zip"
    67        - "--acsengine-hyperkube-url=k8s.gcr.io/hyperkube-amd64:v1.13.0-beta.0"
    68        - "--acsengine-agentpoolcount=3"
    69        - "--test_args=--ginkgo.focus=\\[Conformance\\]|\\[NodeConformance\\] --ginkgo.skip=\\[k8s.io\\].Container.Runtime.blackbox.test.when.running.a.container.with.a.new.image.should.be.able.to.pull.from.private.registry.with.secret.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.running.a.container.with.a.new.image.should.be.able.to.pull.image.from.docker.hub.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.running.a.container.with.a.new.image.should.be.able.to.pull.image.from.gcr.io.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.running.a.container.with.a.new.image.should.not.be.able.to.pull.from.private.registry.without.secret.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.running.a.container.with.a.new.image.should.not.be.able.to.pull.image.from.invalid.registry.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.running.a.container.with.a.new.image.should.not.be.able.to.pull.non-existing.image.from.gcr.io.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.starting.a.container.that.exits.should.report.termination.message.as.empty.when.pod.succeeds.and.TerminationMessagePolicy.FallbackToLogOnError.is.set.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.starting.a.container.that.exits.should.report.termination.message.from.file.when.pod.succeeds.and.TerminationMessagePolicy.FallbackToLogOnError.is.set.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.starting.a.container.that.exits.should.report.termination.message.from.log.output.if.TerminationMessagePolicy.FallbackToLogOnError.is.set.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.starting.a.container.that.exits.should.report.termination.message.if.TerminationMessagePath.is.set.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.starting.a.container.that.exits.should.report.termination.message.if.TerminationMessagePath.is.set.as.non-root.user.and.at.a.non-default.path.\\[NodeConformance\\]|\\[k8s.io\\].Container.Runtime.blackbox.test.when.starting.a.container.that.exits.should.run.with.the.expected.status.\\[NodeConformance\\]|\\[k8s.io\\].Kubelet.when.scheduling.a.busybox.Pod.with.hostAliases.should.write.entries.to./etc/hosts.\\[NodeConformance\\].\\[Conformance\\]|\\[k8s.io\\].Kubelet.when.scheduling.a.read.only.busybox.container.should.not.write.to.root.filesystem.\\[NodeConformance\\].\\[Conformance\\]|\\[k8s.io\\].KubeletManagedEtcHosts.should.test.kubelet.managed./etc/hosts.file.\\[NodeConformance\\].\\[Conformance\\]|\\[k8s.io\\].PrivilegedPod.\\[NodeConformance\\].should.enable.privileged.commands|\\[k8s.io\\].Security.Context.When.creating.a.container.with.runAsUser.should.run.the.container.with.uid.0.\\[NodeConformance\\]|\\[k8s.io\\].Security.Context.When.creating.a.container.with.runAsUser.should.run.the.container.with.uid.65534.\\[NodeConformance\\]|\\[k8s.io\\].Security.Context.When.creating.a.pod.with.privileged.should.run.the.container.as.unprivileged.when.false.\\[NodeConformance\\]|\\[k8s.io\\].Security.Context.When.creating.a.pod.with.readOnlyRootFilesystem.should.run.the.container.with.readonly.rootfs.when.readOnlyRootFilesystem=true.\\[NodeConformance\\]|\\[k8s.io\\].Security.Context.when.creating.containers.with.AllowPrivilegeEscalation.should.allow.privilege.escalation.when.not.explicitly.set.and.uid.!=.0.\\[NodeConformance\\]|\\[k8s.io\\].Security.Context.when.creating.containers.with.AllowPrivilegeEscalation.should.allow.privilege.escalation.when.true.\\[NodeConformance\\]|\\[k8s.io\\].Security.Context.when.creating.containers.with.AllowPrivilegeEscalation.should.not.allow.privilege.escalation.when.false.\\[NodeConformance\\]|\\[sig-network\\].DNS.should.provide.DNS.for.services..\\[Conformance\\]|\\[sig-network\\].DNS.should.provide.DNS.for.the.cluster..\\[Conformance\\]|\\[sig-network\\].Networking.Granular.Checks:.Pods.should.function.for.intra-pod.communication:.http.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-network\\].Networking.Granular.Checks:.Pods.should.function.for.intra-pod.communication:.udp.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-network\\].Networking.Granular.Checks:.Pods.should.function.for.node-pod.communication:.http.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-network\\].Networking.Granular.Checks:.Pods.should.function.for.node-pod.communication:.udp.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].ConfigMap.should.be.consumable.from.pods.in.volume.as.non-root.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].ConfigMap.should.be.consumable.from.pods.in.volume.with.defaultMode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].ConfigMap.should.be.consumable.from.pods.in.volume.with.mappings.and.Item.mode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].ConfigMap.should.be.consumable.from.pods.in.volume.with.mappings.as.non-root.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Downward.API.volume.should.set.DefaultMode.on.files.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Downward.API.volume.should.set.mode.on.item.file.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].EmptyDir.volumes.*\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].HostPath.should.give.a.volume.the.correct.mode.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.configMap.should.be.consumable.from.pods.in.volume.as.non-root.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.configMap.should.be.consumable.from.pods.in.volume.with.defaultMode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.configMap.should.be.consumable.from.pods.in.volume.with.mappings.and.Item.mode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.configMap.should.be.consumable.from.pods.in.volume.with.mappings.as.non-root.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.secret.should.be.consumable.from.pods.in.volume.as.non-root.with.defaultMode.and.fsGroup.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.secret.should.be.consumable.from.pods.in.volume.with.defaultMode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.secret.should.be.consumable.from.pods.in.volume.with.mappings.and.Item.Mode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Secrets.should.be.consumable.from.pods.in.volume.as.non-root.with.defaultMode.and.fsGroup.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Secrets.should.be.consumable.from.pods.in.volume.with.defaultMode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Secrets.should.be.consumable.from.pods.in.volume.with.mappings.and.Item.Mode.set.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Subpath.Atomic.writer.volumes.should.support.subpaths.with.configmap.pod.\\[Conformance\\]|\\[sig-storage\\].Subpath.Atomic.writer.volumes.should.support.subpaths.with.configmap.pod.with.mountPath.of.existing.file.\\[Conformance\\]|\\[sig-storage\\].Subpath.Atomic.writer.volumes.should.support.subpaths.with.downward.pod.\\[Conformance\\]|\\[sig-storage\\].Subpath.Atomic.writer.volumes.should.support.subpaths.with.projected.pod.\\[Conformance\\]|\\[sig-storage\\].Subpath.Atomic.writer.volumes.should.support.subpaths.with.secret.pod.\\[Conformance\\]|\\[sig-storage\\].Projected.downwardAPI.should.set.DefaultMode.on.files.\\[NodeConformance\\].\\[Conformance\\]|\\[sig-storage\\].Projected.downwardAPI.should.set.mode.on.item.file.\\[NodeConformance\\].\\[Conformance\\]"
    70        - "--timeout=340m"