Skip to content

Commit 67e0c51

Browse files
committed
Fix references to "ESIPP" and "OnlyLocal" in network e2e tests
1 parent 2d5f148 commit 67e0c51

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

test/e2e/network/loadbalancer.go

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -501,7 +501,7 @@ var _ = common.SIGDescribe("LoadBalancers", feature.LoadBalancer, func() {
501501
})
502502

503503
// [LinuxOnly]: Windows does not support session affinity.
504-
f.It("should have session affinity work for LoadBalancer service with ESIPP on", f.WithSlow(), "[LinuxOnly]", func(ctx context.Context) {
504+
f.It("should have session affinity work for LoadBalancer service with Local traffic policy", f.WithSlow(), "[LinuxOnly]", func(ctx context.Context) {
505505
// FIXME: some cloud providers do not support k8s-compatible affinity
506506

507507
svc := getServeHostnameService("affinity-lb-esipp")
@@ -511,7 +511,7 @@ var _ = common.SIGDescribe("LoadBalancers", feature.LoadBalancer, func() {
511511
})
512512

513513
// [LinuxOnly]: Windows does not support session affinity.
514-
f.It("should be able to switch session affinity for LoadBalancer service with ESIPP on", f.WithSlow(), "[LinuxOnly]", func(ctx context.Context) {
514+
f.It("should be able to switch session affinity for LoadBalancer service with Local traffic policy", f.WithSlow(), "[LinuxOnly]", func(ctx context.Context) {
515515
// FIXME: some cloud providers do not support k8s-compatible affinity
516516

517517
svc := getServeHostnameService("affinity-lb-esipp-transition")
@@ -521,7 +521,7 @@ var _ = common.SIGDescribe("LoadBalancers", feature.LoadBalancer, func() {
521521
})
522522

523523
// [LinuxOnly]: Windows does not support session affinity.
524-
f.It("should have session affinity work for LoadBalancer service with ESIPP off", f.WithSlow(), "[LinuxOnly]", func(ctx context.Context) {
524+
f.It("should have session affinity work for LoadBalancer service with Cluster traffic policy", f.WithSlow(), "[LinuxOnly]", func(ctx context.Context) {
525525
// FIXME: some cloud providers do not support k8s-compatible affinity
526526

527527
svc := getServeHostnameService("affinity-lb")
@@ -531,7 +531,7 @@ var _ = common.SIGDescribe("LoadBalancers", feature.LoadBalancer, func() {
531531
})
532532

533533
// [LinuxOnly]: Windows does not support session affinity.
534-
f.It("should be able to switch session affinity for LoadBalancer service with ESIPP off", f.WithSlow(), "[LinuxOnly]", func(ctx context.Context) {
534+
f.It("should be able to switch session affinity for LoadBalancer service with Cluster traffic policy", f.WithSlow(), "[LinuxOnly]", func(ctx context.Context) {
535535
// FIXME: some cloud providers do not support k8s-compatible affinity
536536

537537
svc := getServeHostnameService("affinity-lb-transition")
@@ -926,7 +926,7 @@ var _ = common.SIGDescribe("LoadBalancers", feature.LoadBalancer, func() {
926926
})
927927
})
928928

929-
var _ = common.SIGDescribe("LoadBalancers ESIPP", feature.LoadBalancer, framework.WithSlow(), func() {
929+
var _ = common.SIGDescribe("LoadBalancers ExternalTrafficPolicy: Local", feature.LoadBalancer, framework.WithSlow(), func() {
930930
// FIXME: What are the expected semantics of requesting an
931931
// "ExternalTrafficPolicy: Local" service from a cloud provider that does not
932932
// support that? What are the expected semantics of "ExternalTrafficPolicy: Local"
@@ -1196,10 +1196,10 @@ var _ = common.SIGDescribe("LoadBalancers ESIPP", feature.LoadBalancer, framewor
11961196
framework.ExpectNoError(err)
11971197
})
11981198

1199-
// save the health check node port because it disappears when ESIPP is turned off.
1199+
// save the health check node port because it disappears when Local traffic policy is turned off.
12001200
healthCheckNodePort := int(svc.Spec.HealthCheckNodePort)
12011201

1202-
ginkgo.By("turning ESIPP off")
1202+
ginkgo.By("changing ExternalTrafficPolicy to Cluster")
12031203
svc, err = jig.UpdateService(ctx, func(svc *v1.Service) {
12041204
svc.Spec.ExternalTrafficPolicy = v1.ServiceExternalTrafficPolicyCluster
12051205
})
@@ -1271,7 +1271,7 @@ var _ = common.SIGDescribe("LoadBalancers ESIPP", feature.LoadBalancer, framewor
12711271
return false, nil
12721272
}
12731273
if pollErr := wait.PollUntilContextTimeout(ctx, framework.Poll, e2eservice.TestTimeout, true, pollFn); pollErr != nil {
1274-
framework.Failf("Kube-proxy still exposing health check on node %v:%v, after ESIPP was turned off. body %s",
1274+
framework.Failf("Kube-proxy still exposing health check on node %v:%v, after traffic policy set to Cluster. body %s",
12751275
nodeName, healthCheckNodePort, body)
12761276
}
12771277
}
@@ -1301,7 +1301,7 @@ var _ = common.SIGDescribe("LoadBalancers ESIPP", feature.LoadBalancer, framewor
13011301
return false, nil
13021302
})
13031303
if pollErr != nil {
1304-
framework.Failf("Source IP WAS preserved even after ESIPP turned off. Got %v, expected a ten-dot cluster ip.", clientIP)
1304+
framework.Failf("Source IP WAS preserved with Cluster traffic policy. Got %v, expected a cluster ip.", clientIP)
13051305
}
13061306

13071307
// TODO: We need to attempt to create another service with the previously
@@ -1310,7 +1310,7 @@ var _ = common.SIGDescribe("LoadBalancers ESIPP", feature.LoadBalancer, framewor
13101310
// If the health check nodePort has NOT been freed, the new service
13111311
// creation will fail.
13121312

1313-
ginkgo.By("setting ExternalTraffic field back to OnlyLocal")
1313+
ginkgo.By("setting ExternalTrafficPolicy back to Local")
13141314
svc, err = jig.UpdateService(ctx, func(svc *v1.Service) {
13151315
svc.Spec.ExternalTrafficPolicy = v1.ServiceExternalTrafficPolicyLocal
13161316
// Request the same healthCheckNodePort as before, to test the user-requested allocation path
@@ -1341,7 +1341,7 @@ var _ = common.SIGDescribe("LoadBalancers ESIPP", feature.LoadBalancer, framewor
13411341
return false, nil
13421342
})
13431343
if pollErr != nil {
1344-
framework.Failf("Source IP (%v) is not the client IP even after ESIPP turned on, expected a public IP.", clientIP)
1344+
framework.Failf("Source IP (%v) is not the client IP after ExternalTrafficPolicy set back to Local, expected a public IP.", clientIP)
13451345
}
13461346
})
13471347
})

0 commit comments

Comments
 (0)