@@ -266,46 +266,6 @@ stages:
266266 # there can't be a command after e2e.test/policy-assistant because the exit code is important
267267 }
268268
269- runConformanceWindows () {
270- # full suite of ~32 test cases is taking too long...
271- # nomatch1="should enforce policy based on PodSelector or NamespaceSelector"
272- # nomatch2="should enforce policy based on NamespaceSelector with MatchExpressions using default ns label"
273- # nomatch3="should enforce policy based on PodSelector and NamespaceSelector"
274- # nomatch4="should enforce policy based on Multiple PodSelectors and NamespaceSelectors"
275- # cidrExcept1="should ensure an IP overlapping both IPBlock.CIDR and IPBlock.Except is allowed"
276- # cidrExcept2="should enforce except clause while egress access to server in CIDR block"
277- # namedPorts="named port"
278- # wrongK8sVersion="Netpol API"
279- # toSkip="\[LinuxOnly\]|$nomatch1|$nomatch2|$nomatch3|$nomatch4|$cidrExcept1|$cidrExcept2|$namedPorts|$wrongK8sVersion|SCTP"
280-
281- # slimmed down to 14 tests like npm-cni-integration-test.yaml
282- # NetworkPolicy between server and...
283- f1="client should enforce policy to allow traffic only from a different namespace, based on NamespaceSelector"
284- f2="client should deny egress from pods based on PodSelector"
285- f3="client should enforce multiple, stacked policies with overlapping podSelectors"
286- f4="client should enforce egress policy allowing traffic to a server in a different namespace based on PodSelector and NamespaceSelector"
287- f5="client should work with Ingress, Egress specified together"
288- f6="client should enforce ingress policy allowing any port traffic to a server on a specific protocol"
289- f7="client should not allow access by TCP when a policy specifies only UDP"
290- f8="client should allow egress access to server in CIDR block"
291- f9="client should enforce policy based on Ports"
292- f10="client should support allow-all policy"
293- f11="client should enforce updated policy"
294- f12="client should support denying of egress traffic on the client side"
295- f13="client should stop enforcing policies after they are deleted"
296- f14="client should support a 'default-deny-ingress' policy"
297- focus="$f1|$f2|$f3|$f4|$f5|$f6|$f7|$f8|$f9|$f10|$f11|$f12|$f13|$f14"
298- KUBERNETES_SERVICE_HOST="$FQDN" KUBERNETES_SERVICE_PORT=443 \
299- ./e2e.test \
300- --provider=local \
301- --ginkgo.focus="$focus" \
302- --ginkgo.skip="\[LinuxOnly\]|NetworkPolicyLegacy|SCTP" \
303- --node-os-distro=windows \
304- --allowed-not-ready-nodes=1 \
305- --kubeconfig=./kubeconfig \
306- --ginkgo.timeout="2h"
307- }
308-
309269 exitCode=0
310270 if [ $(IS_STRESS_TEST) == "true" ]; then
311271 echo "Running $NUM_PARALLEL_JOBS_FOR_STRESS_TEST conformance tests at once and writing outputs to files"
@@ -314,20 +274,11 @@ stages:
314274 # for each iteration, run the conformance test and echos in the background, and write the output of the conformance test to a file
315275
316276 # run the conformance test in the foreground and write the output to stdout and a file
317- if [[ $(AZURE_CLUSTER) == *ws22 ]] # * is used for pattern matching
318- then
319- echo "starting conformance test #$round" && \
320- runConformanceWindows | tee $npmLogsFolder/conformance-results-$round && \
321- echo "finished conformance test #$round" &
322- pidOfConformanceTest=$!
323- conformancePIDs+=($pidOfConformanceTest)
324- else
325- echo "starting windows conformance test #$round" && \
326- runConformance > $npmLogsFolder/conformance-results-$round && \
327- echo "finished conformance test #$round" &
328- pidOfConformanceTest=$!
329- conformancePIDs+=($pidOfConformanceTest)
330- fi
277+ echo "starting windows conformance test #$round" && \
278+ runConformance > $npmLogsFolder/conformance-results-$round && \
279+ echo "finished conformance test #$round" &
280+ pidOfConformanceTest=$!
281+ conformancePIDs+=($pidOfConformanceTest)
331282 done
332283
333284 # wait until all conformance tests finish and take note of any failed tests
@@ -341,15 +292,9 @@ stages:
341292 fi
342293 done
343294 else
344- # run the conformance test in the foreground and write the output to stdout and a file
345- if [[ $(AZURE_CLUSTER) == *ws22 ]] # * is used for pattern matching
346- then
347- runConformanceWindows | tee $npmLogsFolder/conformance-results
348- exitCode=$?
349- else
350- runConformance | tee $npmLogsFolder/conformance-results
351- exitCode=$?
352- fi
295+ # run the conformance test in the foreground and write the output to stdout and a file
296+ runConformance | tee $npmLogsFolder/conformance-results
297+ exitCode=$?
353298 fi
354299
355300 # get all current npm pods
0 commit comments