@@ -30,13 +30,13 @@ import (
30
30
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
31
31
imageutils "k8s.io/kubernetes/test/utils/image"
32
32
33
- . "github.com/onsi/ginkgo"
34
- . "github.com/onsi/gomega"
33
+ "github.com/onsi/ginkgo"
34
+ "github.com/onsi/gomega"
35
35
)
36
36
37
37
const (
38
- NodesGroup = "system:nodes"
39
- NodeNamePrefix = "system:node:"
38
+ nodesGroup = "system:nodes"
39
+ nodeNamePrefix = "system:node:"
40
40
)
41
41
42
42
var _ = SIGDescribe ("[Feature:NodeAuthorizer]" , func () {
@@ -48,47 +48,47 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
48
48
var asUser string
49
49
var defaultSaSecret string
50
50
var nodeName string
51
- BeforeEach (func () {
51
+ ginkgo . BeforeEach (func () {
52
52
ns = f .Namespace .Name
53
53
54
54
nodeList , err := f .ClientSet .CoreV1 ().Nodes ().List (metav1.ListOptions {})
55
55
framework .ExpectNoError (err , "failed to list nodes in namespace: %s" , ns )
56
- Expect (len (nodeList .Items )).NotTo (Equal (0 ))
56
+ gomega . Expect (len (nodeList .Items )).NotTo (gomega . Equal (0 ))
57
57
nodeName = nodeList .Items [0 ].Name
58
- asUser = NodeNamePrefix + nodeName
58
+ asUser = nodeNamePrefix + nodeName
59
59
saName := "default"
60
60
sa , err := f .ClientSet .CoreV1 ().ServiceAccounts (ns ).Get (saName , metav1.GetOptions {})
61
- Expect (len (sa .Secrets )).NotTo (Equal (0 ))
61
+ gomega . Expect (len (sa .Secrets )).NotTo (gomega . Equal (0 ))
62
62
framework .ExpectNoError (err , "failed to retrieve service account (%s:%s)" , ns , saName )
63
63
defaultSaSecret = sa .Secrets [0 ].Name
64
- By ("Creating a kubernetes client that impersonates a node" )
64
+ ginkgo . By ("Creating a kubernetes client that impersonates a node" )
65
65
config , err := framework .LoadConfig ()
66
66
framework .ExpectNoError (err , "failed to load kubernetes client config" )
67
67
config .Impersonate = restclient.ImpersonationConfig {
68
68
UserName : asUser ,
69
- Groups : []string {NodesGroup },
69
+ Groups : []string {nodesGroup },
70
70
}
71
71
c , err = clientset .NewForConfig (config )
72
72
framework .ExpectNoError (err , "failed to create Clientset for the given config: %+v" , * config )
73
73
74
74
})
75
- It ("Getting a non-existent secret should exit with the Forbidden error, not a NotFound error" , func () {
75
+ ginkgo . It ("Getting a non-existent secret should exit with the Forbidden error, not a NotFound error" , func () {
76
76
_ , err := c .CoreV1 ().Secrets (ns ).Get ("foo" , metav1.GetOptions {})
77
- Expect (apierrors .IsForbidden (err )).Should (Equal (true ))
77
+ gomega . Expect (apierrors .IsForbidden (err )).Should (gomega . Equal (true ))
78
78
})
79
79
80
- It ("Getting an existing secret should exit with the Forbidden error" , func () {
80
+ ginkgo . It ("Getting an existing secret should exit with the Forbidden error" , func () {
81
81
_ , err := c .CoreV1 ().Secrets (ns ).Get (defaultSaSecret , metav1.GetOptions {})
82
- Expect (apierrors .IsForbidden (err )).Should (Equal (true ))
82
+ gomega . Expect (apierrors .IsForbidden (err )).Should (gomega . Equal (true ))
83
83
})
84
84
85
- It ("Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error" , func () {
85
+ ginkgo . It ("Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error" , func () {
86
86
_ , err := c .CoreV1 ().ConfigMaps (ns ).Get ("foo" , metav1.GetOptions {})
87
- Expect (apierrors .IsForbidden (err )).Should (Equal (true ))
87
+ gomega . Expect (apierrors .IsForbidden (err )).Should (gomega . Equal (true ))
88
88
})
89
89
90
- It ("Getting an existing configmap should exit with the Forbidden error" , func () {
91
- By ("Create a configmap for testing" )
90
+ ginkgo . It ("Getting an existing configmap should exit with the Forbidden error" , func () {
91
+ ginkgo . By ("Create a configmap for testing" )
92
92
configmap := & v1.ConfigMap {
93
93
ObjectMeta : metav1.ObjectMeta {
94
94
Namespace : ns ,
@@ -101,11 +101,11 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
101
101
_ , err := f .ClientSet .CoreV1 ().ConfigMaps (ns ).Create (configmap )
102
102
framework .ExpectNoError (err , "failed to create configmap (%s:%s) %+v" , ns , configmap .Name , * configmap )
103
103
_ , err = c .CoreV1 ().ConfigMaps (ns ).Get (configmap .Name , metav1.GetOptions {})
104
- Expect (apierrors .IsForbidden (err )).Should (Equal (true ))
104
+ gomega . Expect (apierrors .IsForbidden (err )).Should (gomega . Equal (true ))
105
105
})
106
106
107
- It ("Getting a secret for a workload the node has access to should succeed" , func () {
108
- By ("Create a secret for testing" )
107
+ ginkgo . It ("Getting a secret for a workload the node has access to should succeed" , func () {
108
+ ginkgo . By ("Create a secret for testing" )
109
109
secret := & v1.Secret {
110
110
ObjectMeta : metav1.ObjectMeta {
111
111
Namespace : ns ,
@@ -118,11 +118,11 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
118
118
_ , err := f .ClientSet .CoreV1 ().Secrets (ns ).Create (secret )
119
119
framework .ExpectNoError (err , "failed to create secret (%s:%s)" , ns , secret .Name )
120
120
121
- By ("Node should not get the secret" )
121
+ ginkgo . By ("Node should not get the secret" )
122
122
_ , err = c .CoreV1 ().Secrets (ns ).Get (secret .Name , metav1.GetOptions {})
123
- Expect (apierrors .IsForbidden (err )).Should (Equal (true ))
123
+ gomega . Expect (apierrors .IsForbidden (err )).Should (gomega . Equal (true ))
124
124
125
- By ("Create a pod that use the secret" )
125
+ ginkgo . By ("Create a pod that use the secret" )
126
126
pod := & v1.Pod {
127
127
ObjectMeta : metav1.ObjectMeta {
128
128
Name : "pause" ,
@@ -151,7 +151,7 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
151
151
_ , err = f .ClientSet .CoreV1 ().Pods (ns ).Create (pod )
152
152
framework .ExpectNoError (err , "failed to create pod (%s:%s)" , ns , pod .Name )
153
153
154
- By ("The node should able to access the secret" )
154
+ ginkgo . By ("The node should able to access the secret" )
155
155
itv := framework .Poll
156
156
dur := 1 * time .Minute
157
157
err = wait .Poll (itv , dur , func () (bool , error ) {
@@ -165,22 +165,22 @@ var _ = SIGDescribe("[Feature:NodeAuthorizer]", func() {
165
165
framework .ExpectNoError (err , "failed to get secret after trying every %v for %v (%s:%s)" , itv , dur , ns , secret .Name )
166
166
})
167
167
168
- It ("A node shouldn't be able to create another node" , func () {
168
+ ginkgo . It ("A node shouldn't be able to create another node" , func () {
169
169
node := & v1.Node {
170
170
ObjectMeta : metav1.ObjectMeta {Name : "foo" },
171
171
TypeMeta : metav1.TypeMeta {
172
172
Kind : "Node" ,
173
173
APIVersion : "v1" ,
174
174
},
175
175
}
176
- By (fmt .Sprintf ("Create node foo by user: %v" , asUser ))
176
+ ginkgo . By (fmt .Sprintf ("Create node foo by user: %v" , asUser ))
177
177
_ , err := c .CoreV1 ().Nodes ().Create (node )
178
- Expect (apierrors .IsForbidden (err )).Should (Equal (true ))
178
+ gomega . Expect (apierrors .IsForbidden (err )).Should (gomega . Equal (true ))
179
179
})
180
180
181
- It ("A node shouldn't be able to delete another node" , func () {
182
- By (fmt .Sprintf ("Create node foo by user: %v" , asUser ))
181
+ ginkgo . It ("A node shouldn't be able to delete another node" , func () {
182
+ ginkgo . By (fmt .Sprintf ("Create node foo by user: %v" , asUser ))
183
183
err := c .CoreV1 ().Nodes ().Delete ("foo" , & metav1.DeleteOptions {})
184
- Expect (apierrors .IsForbidden (err )).Should (Equal (true ))
184
+ gomega . Expect (apierrors .IsForbidden (err )).Should (gomega . Equal (true ))
185
185
})
186
186
})
0 commit comments