Skip to content

Commit e96b037

Browse files
committed
test/ : fix non-ascii characters
1 parent b3ba969 commit e96b037

File tree

9 files changed

+37
-37
lines changed

9 files changed

+37
-37
lines changed

test/e2e/common/configmap_volume.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ var _ = ginkgo.Describe("[sig-storage] ConfigMap", func() {
4747
/*
4848
Release : v1.9
4949
Testname: ConfigMap Volume, without mapping, volume mode set
50-
Description: Create a ConfigMap, create a Pod that mounts a volume and populates the volume with data stored in the ConfigMap. File mode is changed to a custom value of '0x400'. The ConfigMap that is created MUST be accessible to read from the newly created Pod using the volume mount. The data content of the file MUST be readable and verified and file modes MUST be set to the custom value of 0x400
50+
Description: Create a ConfigMap, create a Pod that mounts a volume and populates the volume with data stored in the ConfigMap. File mode is changed to a custom value of '0x400'. The ConfigMap that is created MUST be accessible to read from the newly created Pod using the volume mount. The data content of the file MUST be readable and verified and file modes MUST be set to the custom value of '0x400'
5151
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
5252
*/
5353
framework.ConformanceIt("should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance]", func() {
@@ -89,7 +89,7 @@ var _ = ginkgo.Describe("[sig-storage] ConfigMap", func() {
8989
/*
9090
Release : v1.9
9191
Testname: ConfigMap Volume, with mapping, volume mode set
92-
Description: Create a ConfigMap, create a Pod that mounts a volume and populates the volume with data stored in the ConfigMap. Files are mapped to a path in the volume. File mode is changed to a custom value of '0x400'. The ConfigMap that is created MUST be accessible to read from the newly created Pod using the volume mount. The data content of the file MUST be readable and verified and file modes MUST be set to the custom value of 0x400
92+
Description: Create a ConfigMap, create a Pod that mounts a volume and populates the volume with data stored in the ConfigMap. Files are mapped to a path in the volume. File mode is changed to a custom value of '0x400'. The ConfigMap that is created MUST be accessible to read from the newly created Pod using the volume mount. The data content of the file MUST be readable and verified and file modes MUST be set to the custom value of '0x400'
9393
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
9494
*/
9595
framework.ConformanceIt("should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance]", func() {

test/e2e/common/container_probe.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ var _ = framework.KubeDescribe("Probing container", func() {
132132
/*
133133
Release : v1.9
134134
Testname: Pod liveness probe, using local file, no restart
135-
Description: Pod is created with liveness probe that uses exec command to cat /temp/health file. Liveness probe MUST not fail to check health and the restart count should remain 0.
135+
Description: Pod is created with liveness probe that uses 'exec' command to cat /temp/health file. Liveness probe MUST not fail to check health and the restart count should remain 0.
136136
*/
137137
framework.ConformanceIt("should *not* be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance]", func() {
138138
cmd := []string{"/bin/sh", "-c", "echo ok >/tmp/health; sleep 600"}
@@ -193,7 +193,7 @@ var _ = framework.KubeDescribe("Probing container", func() {
193193
/*
194194
Release : v1.9
195195
Testname: Pod liveness probe, using http endpoint, failure
196-
Description: A Pod is created with liveness probe on http endpoint ‘/’. Liveness probe on this endpoint will not fail. When liveness probe does not fail then the restart count MUST remain zero.
196+
Description: A Pod is created with liveness probe on http endpoint '/'. Liveness probe on this endpoint will not fail. When liveness probe does not fail then the restart count MUST remain zero.
197197
*/
198198
framework.ConformanceIt("should *not* be restarted with a /healthz http liveness probe [NodeConformance]", func() {
199199
livenessProbe := &v1.Probe{

test/e2e/common/lifecycle_hook.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ var _ = framework.KubeDescribe("Container Lifecycle Hook", func() {
9494
/*
9595
Release : v1.9
9696
Testname: Pod Lifecycle, post start exec hook
97-
Description: When a post start handler is specified in the container lifecycle using a Exec action, then the handler MUST be invoked after the start of the container. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a post start that invokes the server pod using ExecAction to validate that the post start is executed.
97+
Description: When a post start handler is specified in the container lifecycle using a 'Exec' action, then the handler MUST be invoked after the start of the container. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a post start that invokes the server pod using ExecAction to validate that the post start is executed.
9898
*/
9999
framework.ConformanceIt("should execute poststart exec hook properly [NodeConformance]", func() {
100100
lifecycle := &v1.Lifecycle{
@@ -110,7 +110,7 @@ var _ = framework.KubeDescribe("Container Lifecycle Hook", func() {
110110
/*
111111
Release : v1.9
112112
Testname: Pod Lifecycle, prestop exec hook
113-
Description: When a pre-stop handler is specified in the container lifecycle using a Exec action, then the handler MUST be invoked before the container is terminated. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a pre-stop that invokes the server pod using ExecAction to validate that the pre-stop is executed.
113+
Description: When a pre-stop handler is specified in the container lifecycle using a 'Exec' action, then the handler MUST be invoked before the container is terminated. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a pre-stop that invokes the server pod using ExecAction to validate that the pre-stop is executed.
114114
*/
115115
framework.ConformanceIt("should execute prestop exec hook properly [NodeConformance]", func() {
116116
lifecycle := &v1.Lifecycle{
@@ -144,7 +144,7 @@ var _ = framework.KubeDescribe("Container Lifecycle Hook", func() {
144144
/*
145145
Release : v1.9
146146
Testname: Pod Lifecycle, prestop http hook
147-
Description: When a pre-stop handler is specified in the container lifecycle using a HttpGet action, then the handler MUST be invoked before the container is terminated. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a pre-stop that invokes the server pod to validate that the pre-stop is executed.
147+
Description: When a pre-stop handler is specified in the container lifecycle using a 'HttpGet' action, then the handler MUST be invoked before the container is terminated. A server pod is created that will serve http requests, create a second pod with a container lifecycle specifying a pre-stop that invokes the server pod to validate that the pre-stop is executed.
148148
*/
149149
framework.ConformanceIt("should execute prestop http hook properly [NodeConformance]", func() {
150150
lifecycle := &v1.Lifecycle{

test/e2e/common/projected_downwardapi.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected downwardAPI", func() {
5959
/*
6060
Release : v1.9
6161
Testname: Projected Volume, DownwardAPI, volume mode 0400
62-
Description: A Pod is created with a projected volume source for downwardAPI with pod name, cpu and memory limits and cpu and memory requests. The default mode for the volume mount is set to 0400. Pod MUST be able to read the pod name from the mounted DownwardAPIVolumeFiles and the volume mode must be -r—-—————.
62+
Description: A Pod is created with a projected volume source for downwardAPI with pod name, cpu and memory limits and cpu and memory requests. The default mode for the volume mount is set to 0400. Pod MUST be able to read the pod name from the mounted DownwardAPIVolumeFiles and the volume mode must be -r--------.
6363
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
6464
*/
6565
framework.ConformanceIt("should set DefaultMode on files [LinuxOnly] [NodeConformance]", func() {
@@ -75,7 +75,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected downwardAPI", func() {
7575
/*
7676
Release : v1.9
7777
Testname: Projected Volume, DownwardAPI, volume mode 0400
78-
Description: A Pod is created with a projected volume source for downwardAPI with pod name, cpu and memory limits and cpu and memory requests. The default mode for the volume mount is set to 0400. Pod MUST be able to read the pod name from the mounted DownwardAPIVolumeFiles and the volume mode must be -r—-—————.
78+
Description: A Pod is created with a projected volume source for downwardAPI with pod name, cpu and memory limits and cpu and memory requests. The default mode for the volume mount is set to 0400. Pod MUST be able to read the pod name from the mounted DownwardAPIVolumeFiles and the volume mode must be -r--------.
7979
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
8080
*/
8181
framework.ConformanceIt("should set mode on item file [LinuxOnly] [NodeConformance]", func() {

test/e2e/common/projected_secret.go

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected secret", func() {
3737
/*
3838
Release : v1.9
3939
Testname: Projected Volume, Secrets, volume mode default
40-
Description: A Pod is created with a projected volume source secret to store a secret with a specified key with default permission mode. Pod MUST be able to read the content of the key successfully and the mode MUST be -rw-r--r-- by default.
40+
Description: A Pod is created with a projected volume source 'secret' to store a secret with a specified key with default permission mode. Pod MUST be able to read the content of the key successfully and the mode MUST be -rw-r--r-- by default.
4141
*/
4242
framework.ConformanceIt("should be consumable from pods in volume [NodeConformance]", func() {
4343
doProjectedSecretE2EWithoutMapping(f, nil /* default mode */, "projected-secret-test-"+string(uuid.NewUUID()), nil, nil)
@@ -46,7 +46,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected secret", func() {
4646
/*
4747
Release : v1.9
4848
Testname: Projected Volume, Secrets, volume mode 0400
49-
Description: A Pod is created with a projected volume source secret to store a secret with a specified key with permission mode set to 0x400 on the Pod. Pod MUST be able to read the content of the key successfully and the mode MUST be -r—-—————.
49+
Description: A Pod is created with a projected volume source 'secret' to store a secret with a specified key with permission mode set to 0x400 on the Pod. Pod MUST be able to read the content of the key successfully and the mode MUST be -r--------.
5050
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
5151
*/
5252
framework.ConformanceIt("should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance]", func() {
@@ -57,7 +57,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected secret", func() {
5757
/*
5858
Release : v1.9
5959
Testname: Project Volume, Secrets, non-root, custom fsGroup
60-
Description: A Pod is created with a projected volume source secret to store a secret with a specified key. The volume has permission mode set to 0440, fsgroup set to 1001 and user set to non-root uid of 1000. Pod MUST be able to read the content of the key successfully and the mode MUST be -r—-r————-.
60+
Description: A Pod is created with a projected volume source 'secret' to store a secret with a specified key. The volume has permission mode set to 0440, fsgroup set to 1001 and user set to non-root uid of 1000. Pod MUST be able to read the content of the key successfully and the mode MUST be -r--r-----.
6161
This test is marked LinuxOnly since Windows does not support setting specific file permissions, or running as UID / GID.
6262
*/
6363
framework.ConformanceIt("should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance]", func() {
@@ -69,7 +69,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected secret", func() {
6969
/*
7070
Release : v1.9
7171
Testname: Projected Volume, Secrets, mapped
72-
Description: A Pod is created with a projected volume source secret to store a secret with a specified key with default permission mode. The secret is also mapped to a custom path. Pod MUST be able to read the content of the key successfully and the mode MUST be -r—-—————— on the mapped volume.
72+
Description: A Pod is created with a projected volume source 'secret' to store a secret with a specified key with default permission mode. The secret is also mapped to a custom path. Pod MUST be able to read the content of the key successfully and the mode MUST be -r--------on the mapped volume.
7373
*/
7474
framework.ConformanceIt("should be consumable from pods in volume with mappings [NodeConformance]", func() {
7575
doProjectedSecretE2EWithMapping(f, nil)
@@ -78,7 +78,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected secret", func() {
7878
/*
7979
Release : v1.9
8080
Testname: Projected Volume, Secrets, mapped, volume mode 0400
81-
Description: A Pod is created with a projected volume source secret to store a secret with a specified key with permission mode set to 0400. The secret is also mapped to a specific name. Pod MUST be able to read the content of the key successfully and the mode MUST be -r—-—————— on the mapped volume.
81+
Description: A Pod is created with a projected volume source 'secret' to store a secret with a specified key with permission mode set to 0400. The secret is also mapped to a specific name. Pod MUST be able to read the content of the key successfully and the mode MUST be -r-------- on the mapped volume.
8282
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
8383
*/
8484
framework.ConformanceIt("should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance]", func() {
@@ -110,7 +110,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected secret", func() {
110110
/*
111111
Release : v1.9
112112
Testname: Projected Volume, Secrets, mapped, multiple paths
113-
Description: A Pod is created with a projected volume source secret to store a secret with a specified key. The secret is mapped to two different volume mounts. Pod MUST be able to read the content of the key successfully from the two volume mounts and the mode MUST be -r—-—————— on the mapped volumes.
113+
Description: A Pod is created with a projected volume source 'secret' to store a secret with a specified key. The secret is mapped to two different volume mounts. Pod MUST be able to read the content of the key successfully from the two volume mounts and the mode MUST be -r-------- on the mapped volumes.
114114
*/
115115
framework.ConformanceIt("should be consumable in multiple volumes in a pod [NodeConformance]", func() {
116116
// This test ensures that the same secret can be mounted in multiple

test/e2e/common/secrets.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ var _ = ginkgo.Describe("[sig-api-machinery] Secrets", func() {
8686
/*
8787
Release : v1.9
8888
Testname: Secrets, pod environment from source
89-
Description: Create a secret. Create a Pod with Container that declares a environment variable using EnvFrom which references the secret created to extract a key value from the secret. Pod MUST have the environment variable that contains proper value for the key to the secret.
89+
Description: Create a secret. Create a Pod with Container that declares a environment variable using 'EnvFrom' which references the secret created to extract a key value from the secret. Pod MUST have the environment variable that contains proper value for the key to the secret.
9090
*/
9191
framework.ConformanceIt("should be consumable via the environment [NodeConformance]", func() {
9292
name := "secret-test-" + string(uuid.NewUUID())

test/e2e/common/secrets_volume.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ var _ = ginkgo.Describe("[sig-storage] Secrets", func() {
4747
/*
4848
Release : v1.9
4949
Testname: Secrets Volume, volume mode 0400
50-
Description: Create a secret. Create a Pod with secret volume source configured into the container with file mode set to 0x400. Pod MUST be able to read the secret from the mounted volume from the container runtime and the file mode of the secret MUST be -r——--—-—- by default.
50+
Description: Create a secret. Create a Pod with secret volume source configured into the container with file mode set to 0x400. Pod MUST be able to read the secret from the mounted volume from the container runtime and the file mode of the secret MUST be -r-------- by default.
5151
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
5252
*/
5353
framework.ConformanceIt("should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance]", func() {
@@ -58,7 +58,7 @@ var _ = ginkgo.Describe("[sig-storage] Secrets", func() {
5858
/*
5959
Release : v1.9
6060
Testname: Secrets Volume, volume mode 0440, fsGroup 1001 and uid 1000
61-
Description: Create a secret. Create a Pod with secret volume source configured into the container with file mode set to 0x440 as a non-root user with uid 1000 and fsGroup id 1001. Pod MUST be able to read the secret from the mounted volume from the container runtime and the file mode of the secret MUST be -r——r-—-—- by default.
61+
Description: Create a secret. Create a Pod with secret volume source configured into the container with file mode set to 0x440 as a non-root user with uid 1000 and fsGroup id 1001. Pod MUST be able to read the secret from the mounted volume from the container runtime and the file mode of the secret MUST be -r--r-----by default.
6262
This test is marked LinuxOnly since Windows does not support setting specific file permissions, or running as UID / GID.
6363
*/
6464
framework.ConformanceIt("should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance]", func() {
@@ -70,7 +70,7 @@ var _ = ginkgo.Describe("[sig-storage] Secrets", func() {
7070
/*
7171
Release : v1.9
7272
Testname: Secrets Volume, mapping
73-
Description: Create a secret. Create a Pod with secret volume source configured into the container with a custom path. Pod MUST be able to read the secret from the mounted volume from the specified custom path. The file mode of the secret MUST be -rw—r-—r—- by default.
73+
Description: Create a secret. Create a Pod with secret volume source configured into the container with a custom path. Pod MUST be able to read the secret from the mounted volume from the specified custom path. The file mode of the secret MUST be -rw-r--r-- by default.
7474
*/
7575
framework.ConformanceIt("should be consumable from pods in volume with mappings [NodeConformance]", func() {
7676
doSecretE2EWithMapping(f, nil)
@@ -79,7 +79,7 @@ var _ = ginkgo.Describe("[sig-storage] Secrets", func() {
7979
/*
8080
Release : v1.9
8181
Testname: Secrets Volume, mapping, volume mode 0400
82-
Description: Create a secret. Create a Pod with secret volume source configured into the container with a custom path and file mode set to 0x400. Pod MUST be able to read the secret from the mounted volume from the specified custom path. The file mode of the secret MUST be -r-—r-—r—-.
82+
Description: Create a secret. Create a Pod with secret volume source configured into the container with a custom path and file mode set to 0x400. Pod MUST be able to read the secret from the mounted volume from the specified custom path. The file mode of the secret MUST be -r--r--r--.
8383
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
8484
*/
8585
framework.ConformanceIt("should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance]", func() {

test/e2e/framework/config/config_test.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,18 +47,18 @@ func TestInt(t *testing.T) {
4747
func TestLower(t *testing.T) {
4848
flags := flag.NewFlagSet("test", 0)
4949
var context struct {
50-
Ähem string
50+
Ahem string
5151
MixedCase string
5252
}
5353
require.NotPanics(t, func() {
5454
AddOptionsToSet(flags, &context, "")
5555
})
5656
require.Equal(t, []simpleFlag{
5757
{
58-
name: "mixedCase",
58+
name: "ahem",
5959
},
6060
{
61-
name: "ähem",
61+
name: "mixedCase",
6262
},
6363
},
6464
allFlags(flags))

0 commit comments

Comments
 (0)