Skip to content

Commit

Permalink
WIP - Speculatively run more tests
Browse files Browse the repository at this point in the history
  • Loading branch information
smarterclayton committed Sep 11, 2017
1 parent d0a3438 commit 8bbd5f4
Showing 1 changed file with 24 additions and 26 deletions.
50 changes: 24 additions & 26 deletions test/extended/util/test.go
Original file line number Diff line number Diff line change
Expand Up @@ -240,12 +240,9 @@ var (
`\[Skipped\]`,
`\[Slow\]`,
`\[Flaky\]`,
`\[Compatibility\]`,

`\[Feature:Performance\]`,

// not enabled in Origin yet
`\[Feature:GarbageCollector\]`,
//`\[Feature:GarbageCollector\]`,

// Depends on external components, may not need yet
`Monitoring`, // Not installed, should be
Expand All @@ -261,52 +258,52 @@ var (
`Cinder`, // requires an OpenStack cluster
`should support r/w`, // hostPath: This test expects that host's tmp dir is WRITABLE by a container. That isn't something we need to guarantee for openshift.
`should check that the kubernetes-dashboard instance is alive`, // we don't create this
`\[Feature:ManualPerformance\]`, // requires /resetMetrics which we don't expose
// `\[Feature:ManualPerformance\]`, // requires /resetMetrics which we don't expose

// See the CanSupport implementation in upstream to determine wether these work.
`Ceph RBD`, // Works if ceph-common Binary installed (but we can't guarantee this on all clusters).
`GlusterFS`, // May work if /sbin/mount.glusterfs to be installed for plugin to work (also possibly blocked by serial pulling)
`should support r/w`, // hostPath: This test expects that host's tmp dir is WRITABLE by a container. That isn't something we need to guarantee for openshift.

// Failing because of https://github.com/openshift/origin/issues/12365 against a real cluster
`should allow starting 95 pods per node`,
//`should allow starting 95 pods per node`,

// Need fixing
`Horizontal pod autoscaling`, // needs heapster
`PersistentVolume`, // https://github.com/openshift/origin/pull/6884 for recycler
`Horizontal pod autoscaling`, // needs heapster
//`PersistentVolume`, // https://github.com/openshift/origin/pull/6884 for recycler
`mount an API token into pods`, // We add 6 secrets, not 1
`ServiceAccounts should ensure a single API token exists`, // We create lots of secrets
`Networking should function for intra-pod`, // Needs two nodes, add equiv test for 1 node, then use networking suite
`should test kube-proxy`, // needs 2 nodes
`authentication: OpenLDAP`, // needs separate setup and bucketing for openldap bootstrapping
`NFS`, // no permissions https://github.com/openshift/origin/pull/6884
`\[Feature:Example\]`, // may need to pre-pull images
`NodeProblemDetector`, // requires a non-master node to run on
`unchanging, static URL paths for kubernetes api services`, // the test needs to exclude URLs that are not part of conformance (/logs)
`\[Feature:Example\]`, // has cleanup issues
`NodeProblemDetector`, // requires a non-master node to run on
//`unchanging, static URL paths for kubernetes api services`, // the test needs to exclude URLs that are not part of conformance (/logs)

// Needs triage to determine why it is failing
`Addon update`, // TRIAGE
`SSH`, // TRIAGE
`\[Feature:Upgrade\]`, // TRIAGE
`SELinux relabeling`, // started failing
`openshift mongodb replication creating from a template`, // flaking on deployment
`Update Demo should do a rolling update of a replication controller`, // this is flaky and needs triaging
`\[Feature:Upgrade\]`, // TRIAGE
`SELinux relabeling`, // https://github.com/openshift/origin/issues/7287
`openshift mongodb replication creating from a template`, // flaking on deployment
//`Update Demo should do a rolling update of a replication controller`, // this is flaky and needs triaging

// Test will never work
`should proxy to cadvisor`, // we don't expose cAdvisor port directly for security reasons

// Need to relax security restrictions
`validates that InterPod Affinity and AntiAffinity is respected if matching`, // this *may* now be safe
//`validates that InterPod Affinity and AntiAffinity is respected if matching`, // this *may* now be safe

// Requires too many pods per node for the per core defaults
`should ensure that critical pod is scheduled in case there is no resources available`,
//`should ensure that critical pod is scheduled in case there is no resources available`,

// Need multiple nodes
`validates that InterPodAntiAffinity is respected if matching 2`,

// Inordinately slow tests
`should create and stop a working application`,
`should always delete fast`, // will be uncommented in etcd3
//`should always delete fast`, // will be uncommented in etcd3

// tested by networking.sh and requires the environment that script sets up
`\[networking\] OVS`,
Expand All @@ -321,18 +318,18 @@ var (
`\[Feature:Downgrade\]`,

// upstream flakes
`should provide basic identity`, // Basic StatefulSet functionality
`validates resource limits of pods that are allowed to run`, // SchedulerPredicates
`should idle the service and DeploymentConfig properly`, // idling with a single service and DeploymentConfig [Conformance]
//`should provide basic identity`, // Basic StatefulSet functionality
//`validates resource limits of pods that are allowed to run`, // SchedulerPredicates

// fails without a cloud provider
"should be able to create a functioning NodePort service",
//"should be able to create a functioning NodePort service",

// TODO undisable:
"should be schedule to node that don't match the PodAntiAffinity terms",
"should perfer to scheduled to nodes pod can tolerate",
"should adopt matching orphans and release non-matching pods",
"should not deadlock when a pod's predecessor fails",
//"should be schedule to node that don't match the PodAntiAffinity terms",
//"should perfer to scheduled to nodes pod can tolerate",
"should adopt matching orphans and release non-matching pods", // stateful set, broken?
"should not deadlock when a pod's predecessor fails", // stateful set, broken?
`should idle the service and DeploymentConfig properly`, // idling with a single service and DeploymentConfig [Conformance]

// slow as sin and twice as ugly (11m each)
"Pod should avoid to schedule to node that have avoidPod annotation",
Expand Down Expand Up @@ -380,6 +377,7 @@ var (
`\[Feature:HighDensityPerformance\]`, // requires no other namespaces
`Service endpoints latency`, // requires low latency
`Clean up pods on node`, // schedules up to max pods per node
`should allow starting 95 pods per node`,
}
serialTestsFilter = regexp.MustCompile(strings.Join(serialTests, `|`))
)
Expand Down

0 comments on commit 8bbd5f4

Please sign in to comment.