You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add in step to buildkite pipeline for critest. Use fcnet configuration
rather than the example CNI plugin configurations in
tools/docker/critest
This step will diff the current known status of failing tests with
output in the pipeline such that we can maintain a state of known
failures while not failing the pipeline on every new build. The version
of ginkgo used by critest does not support output to a format file, so
these changes include some scripting to capture output and compare.
Current passing tests are related to image management.
Current tests failing are due to network namespacing issues. Host and VM
are not sharing the same network namespace. critest (crictl) creates CNI
namespace to be used for pod sandbox. FC-CD will create this namespace
as well as a network namespace for the VM itself, but critest cannot
find the CNI namespace as it is contained within the VM's network
namespace.
Signed-off-by: Gavin Inglis <[email protected]>
[Fail] [k8s.io] Security Context SeccompProfilePath [It] runtime should support an seccomp profile that blocks setting hostname with SYS_ADMIN
2
+
[Fail] [k8s.io] Security Context SeccompProfilePath [It] should support seccomp localhost/profile on the container
3
+
[Fail] [k8s.io] Container runtime should support adding volume and device [BeforeEach] runtime should support starting container with volume [Conformance]
4
+
[Fail] [k8s.io] Security Context bucket [It] runtime should support that ReadOnlyRootfs is false
5
+
[Fail] [k8s.io] PodSandbox runtime should support basic operations on PodSandbox [It] runtime should support running PodSandbox [Conformance]
6
+
[Fail] [k8s.io] Security Context NamespaceOption [It] runtime should support HostIpc is false
7
+
[Fail] [k8s.io] Security Context NamespaceOption [It] runtime should support ContainerPID
8
+
[Fail] [k8s.io] Security Context bucket [It] runtime should return error if RunAsGroup is set without RunAsUser
9
+
[Fail] [k8s.io] Security Context NoNewPrivs [BeforeEach] should allow privilege escalation when false
10
+
[Fail] [k8s.io] Networking runtime should support networking [It] runtime should support set hostname [Conformance]
11
+
[Fail] [k8s.io] Security Context bucket [It] runtime should support dropping ALL capabilities
12
+
[Fail] [k8s.io] Security Context bucket [It] runtime should support dropping capability
13
+
[Fail] [k8s.io] Security Context SeccompProfilePath docker/default [It] runtime should support setting hostname with docker/default seccomp profile and SYS_ADMIN
14
+
[Fail] [k8s.io] Security Context bucket [It] runtime should support ReadonlyPaths
15
+
[Fail] [k8s.io] Security Context bucket [It] runtime should support MaskedPaths
16
+
[Fail] [k8s.io] PodSandbox runtime should support basic operations on PodSandbox [It] runtime should support removing PodSandbox [Conformance]
17
+
[Fail] [k8s.io] Container Mount Propagation runtime should support mount propagation [BeforeEach] mount with 'rshared' should support propagation from host to container and vice versa
18
+
[Fail] [k8s.io] Security Context bucket [It] runtime should support that ReadOnlyRootfs is true
19
+
[Fail] [k8s.io] Security Context NamespaceOption [It] runtime should support HostPID
20
+
[Fail] [k8s.io] Security Context bucket [It] runtime should support RunAsUserName
21
+
[Fail] [k8s.io] Container runtime should support log [BeforeEach] runtime should support starting container with log [Conformance]
22
+
[Fail] [k8s.io] Container Mount Propagation runtime should support mount propagation [BeforeEach] mount with 'rslave' should support propagation from host to container
23
+
[Fail] [k8s.io] Security Context bucket [It] runtime should support SupplementalGroups
24
+
[Fail] [k8s.io] Security Context bucket [It] runtime should support Privileged is true
25
+
[Fail] [k8s.io] Security Context NamespaceOption [It] runtime should support HostNetwork is true
26
+
[Fail] [k8s.io] Security Context SeccompProfilePath [It] runtime should not support a custom seccomp profile without using localhost/ as a prefix
27
+
[Fail] [k8s.io] Security Context SeccompProfilePath [It] runtime should ignore a seccomp profile that blocks setting hostname when privileged
28
+
[Fail] [k8s.io] Streaming runtime should support streaming interfaces [It] runtime should support exec with tty=false and stdin=false [Conformance]
29
+
[Fail] [k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod [BeforeEach] should support network
30
+
[Fail] [k8s.io] Container runtime should support basic operations on container [BeforeEach] runtime should support stopping container [Conformance]
31
+
[Fail] [k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod [BeforeEach] should support container exec
32
+
[Fail] [k8s.io] Security Context NoNewPrivs [BeforeEach] should not allow privilege escalation when true
33
+
[Fail] [k8s.io] Container runtime should support basic operations on container [BeforeEach] runtime should support execSync [Conformance]
34
+
[Fail] [k8s.io] Container runtime should support basic operations on container [BeforeEach] runtime should support execSync with timeout [Conformance]
35
+
[Fail] [k8s.io] Streaming runtime should support streaming interfaces [It] runtime should support attach [Conformance]
36
+
[Fail] [k8s.io] Container runtime should support basic operations on container [BeforeEach] runtime should support starting container [Conformance]
37
+
[Fail] [k8s.io] Security Context SeccompProfilePath [It] runtime should not block setting host name with unconfined seccomp and SYS_ADMIN
38
+
[Fail] [k8s.io] PodSandbox runtime should support sysctls [It] should support unsafe sysctls
39
+
[Fail] [k8s.io] PodSandbox runtime should support basic operations on PodSandbox [It] runtime should support stopping PodSandbox [Conformance]
40
+
[Fail] [k8s.io] Streaming runtime should support streaming interfaces [It] runtime should support exec with tty=true and stdin=true [Conformance]
41
+
[Fail] [k8s.io] Security Context SeccompProfilePath docker/default [It] runtime should block sethostname with docker/default seccomp profile and no extra caps
42
+
[Fail] [k8s.io] Security Context SeccompProfilePath docker/default [It] should support seccomp docker/default on the container
43
+
[Fail] [k8s.io] Networking runtime should support networking [It] runtime should support DNS config [Conformance]
44
+
[Fail] [k8s.io] Security Context bucket [It] runtime should support RunAsUser
45
+
[Fail] [k8s.io] Container runtime should support log [BeforeEach] runtime should support reopening container log [Conformance]
46
+
[Fail] [k8s.io] Container runtime should support adding volume and device [BeforeEach] runtime should support starting container with volume when host path is a symlink [Conformance]
47
+
[Fail] [k8s.io] Security Context bucket [It] runtime should support adding capability
48
+
[Fail] [k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod [BeforeEach] should support container log
49
+
[Fail] [k8s.io] Streaming runtime should support streaming interfaces [It] runtime should support portforward [Conformance]
50
+
[Fail] [k8s.io] Container Mount Propagation runtime should support mount propagation [BeforeEach] mount with 'rprivate' should not support propagation
51
+
[Fail] [k8s.io] Container runtime should support basic operations on container [BeforeEach] runtime should support creating container [Conformance]
52
+
[Fail] [k8s.io] Container runtime should support basic operations on container [BeforeEach] runtime should support removing running container [Conformance]
53
+
[Fail] [k8s.io] Security Context NamespaceOption [It] runtime should support PodPID
54
+
[Fail] [k8s.io] Container runtime should support basic operations on container [BeforeEach] runtime should support listing container stats [Conformance]
55
+
[Fail] [k8s.io] Networking runtime should support networking [It] runtime should support port mapping with host port and container port [Conformance]
56
+
[Fail] [k8s.io] Security Context bucket [It] runtime should support RunAsGroup
57
+
[Fail] [k8s.io] Security Context SeccompProfilePath [It] should support seccomp unconfined on the container
58
+
[Fail] [k8s.io] PodSandbox runtime should support sysctls [It] should support safe sysctls
59
+
[Fail] [k8s.io] Security Context bucket [It] runtime should support adding ALL capabilities
60
+
[Fail] [k8s.io] Security Context SeccompProfilePath [It] should support seccomp default which is unconfined on the container
61
+
[Fail] [k8s.io] Container runtime should support basic operations on container [BeforeEach] runtime should support removing stopped container [Conformance]
62
+
[Fail] [k8s.io] Security Context bucket [It] runtime should support Privileged is false
63
+
[Fail] [k8s.io] Security Context NamespaceOption [It] runtime should support HostIpc is true
64
+
[Fail] [k8s.io] Security Context NamespaceOption [It] runtime should support HostNetwork is false
65
+
[Fail] [k8s.io] Streaming runtime should support streaming interfaces [It] runtime should support portforward in host network
66
+
[Fail] [k8s.io] Networking runtime should support networking [It] runtime should support port mapping with only container port [Conformance]
67
+
[Fail] [k8s.io] Container runtime should support basic operations on container [BeforeEach] runtime should support removing created container [Conformance]
0 commit comments