Skip to content

Commit d4958c0

Browse files
committed
Remove all skips from admission and CRD e2e tests that will be promoted to conformance
1 parent c008cf9 commit d4958c0

File tree

5 files changed

+1
-30
lines changed

5 files changed

+1
-30
lines changed

test/e2e/apimachinery/crd_conversion_webhook.go

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,6 @@ import (
3030
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
3131
"k8s.io/apimachinery/pkg/apis/meta/v1/unstructured"
3232
"k8s.io/apimachinery/pkg/util/intstr"
33-
utilversion "k8s.io/apimachinery/pkg/util/version"
3433
"k8s.io/client-go/dynamic"
3534
clientset "k8s.io/client-go/kubernetes"
3635
"k8s.io/kubernetes/test/e2e/framework"
@@ -54,8 +53,6 @@ const (
5453
roleBindingCRDName = "crd-conversion-webhook-auth-reader"
5554
)
5655

57-
var serverCRDConversionWebhookVersion = utilversion.MustParseSemantic("v1.13.0-alpha")
58-
5956
var apiVersions = []apiextensionsv1.CustomResourceDefinitionVersion{
6057
{
6158
Name: "v1",
@@ -129,9 +126,6 @@ var _ = SIGDescribe("CustomResourceConversionWebhook", func() {
129126
client = f.ClientSet
130127
namespaceName = f.Namespace.Name
131128

132-
// Make sure the relevant provider supports conversion webhook
133-
framework.SkipUnlessServerVersionGTE(serverCRDConversionWebhookVersion, f.ClientSet.Discovery())
134-
135129
ginkgo.By("Setting up server cert")
136130
context = setupServerCert(f.Namespace.Name, serviceCRDName)
137131
createAuthReaderRoleBindingForCRDConversion(f, f.Namespace.Name)

test/e2e/apimachinery/crd_publish_openapi.go

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,6 @@ import (
3535
apiequality "k8s.io/apimachinery/pkg/api/equality"
3636
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
3737
"k8s.io/apimachinery/pkg/types"
38-
utilversion "k8s.io/apimachinery/pkg/util/version"
3938
"k8s.io/apimachinery/pkg/util/wait"
4039
k8sclientset "k8s.io/client-go/kubernetes"
4140
"k8s.io/client-go/rest"
@@ -47,17 +46,12 @@ import (
4746
)
4847

4948
var (
50-
crdPublishOpenAPIVersion = utilversion.MustParseSemantic("v1.14.0")
51-
metaPattern = `"kind":"%s","apiVersion":"%s/%s","metadata":{"name":"%s"}`
49+
metaPattern = `"kind":"%s","apiVersion":"%s/%s","metadata":{"name":"%s"}`
5250
)
5351

5452
var _ = SIGDescribe("CustomResourcePublishOpenAPI", func() {
5553
f := framework.NewDefaultFramework("crd-publish-openapi")
5654

57-
ginkgo.BeforeEach(func() {
58-
framework.SkipUnlessServerVersionGTE(crdPublishOpenAPIVersion, f.ClientSet.Discovery())
59-
})
60-
6155
ginkgo.It("works for CRD with validation schema", func() {
6256
crd, err := setupCRD(f, schemaFoo, "foo", "v1")
6357
if err != nil {

test/e2e/apimachinery/crd_watch.go

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,6 @@ var _ = SIGDescribe("CustomResourceDefinition Watch", func() {
4646
*/
4747
ginkgo.It("watch on custom resource definition objects", func() {
4848

49-
framework.SkipUnlessServerVersionGTE(crdVersion, f.ClientSet.Discovery())
50-
5149
const (
5250
watchCRNameA = "name1"
5351
watchCRNameB = "name2"

test/e2e/apimachinery/custom_resource_definition.go

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,15 +29,12 @@ import (
2929
"k8s.io/apimachinery/pkg/types"
3030
"k8s.io/apimachinery/pkg/util/diff"
3131
"k8s.io/apimachinery/pkg/util/uuid"
32-
utilversion "k8s.io/apimachinery/pkg/util/version"
3332
"k8s.io/client-go/dynamic"
3433
"k8s.io/client-go/util/retry"
3534
"k8s.io/kubernetes/test/e2e/framework"
3635
e2elog "k8s.io/kubernetes/test/e2e/framework/log"
3736
)
3837

39-
var crdVersion = utilversion.MustParseSemantic("v1.7.0")
40-
4138
var _ = SIGDescribe("CustomResourceDefinition resources", func() {
4239

4340
f := framework.NewDefaultFramework("custom-resource-definition")

test/e2e/apimachinery/webhook.go

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,6 @@ import (
3636
"k8s.io/apimachinery/pkg/types"
3737
"k8s.io/apimachinery/pkg/util/intstr"
3838
"k8s.io/apimachinery/pkg/util/uuid"
39-
utilversion "k8s.io/apimachinery/pkg/util/version"
4039
"k8s.io/apimachinery/pkg/util/wait"
4140
"k8s.io/client-go/dynamic"
4241
clientset "k8s.io/client-go/kubernetes"
@@ -77,8 +76,6 @@ const (
7776
addedLabelValue = "yes"
7877
)
7978

80-
var serverWebhookVersion = utilversion.MustParseSemantic("v1.8.0")
81-
8279
var _ = SIGDescribe("AdmissionWebhook", func() {
8380
var context *certContext
8481
f := framework.NewDefaultFramework("webhook")
@@ -92,15 +89,6 @@ var _ = SIGDescribe("AdmissionWebhook", func() {
9289
client = f.ClientSet
9390
namespaceName = f.Namespace.Name
9491

95-
// Make sure the relevant provider supports admission webhook
96-
framework.SkipUnlessServerVersionGTE(serverWebhookVersion, f.ClientSet.Discovery())
97-
framework.SkipUnlessProviderIs("gce", "gke", "local")
98-
99-
_, err := f.ClientSet.AdmissionregistrationV1().ValidatingWebhookConfigurations().List(metav1.ListOptions{})
100-
if errors.IsNotFound(err) {
101-
framework.Skipf("dynamic configuration of webhooks requires the admissionregistration.k8s.io group to be enabled")
102-
}
103-
10492
// Make sure the namespace created for the test is labeled to be selected by the webhooks
10593
labelNamespace(f, f.Namespace.Name)
10694

0 commit comments

Comments
 (0)