Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions test/e2e/apimachinery/aggregator.go
Original file line number Diff line number Diff line change
Expand Up @@ -46,6 +46,7 @@ import (
e2edeployment "k8s.io/kubernetes/test/e2e/framework/deployment"
e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
imageutils "k8s.io/kubernetes/test/utils/image"
admissionapi "k8s.io/pod-security-admission/api"
samplev1alpha1 "k8s.io/sample-apiserver/pkg/apis/wardle/v1alpha1"
"k8s.io/utils/pointer"

Expand All @@ -70,6 +71,7 @@ var _ = SIGDescribe("Aggregator", func() {
})

f := framework.NewDefaultFramework("aggregator")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

// We want namespace initialization BeforeEach inserted by
// NewDefaultFramework to happen before this, so we put this BeforeEach
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apimachinery/apply.go
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,7 @@ import (
clientset "k8s.io/client-go/kubernetes"
"k8s.io/kubernetes/test/e2e/framework"
e2edeployment "k8s.io/kubernetes/test/e2e/framework/deployment"
admissionapi "k8s.io/pod-security-admission/api"

"github.com/onsi/ginkgo"

Expand All @@ -44,6 +45,7 @@ import (

var _ = SIGDescribe("ServerSideApply", func() {
f := framework.NewDefaultFramework("apply")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

var client clientset.Interface
var ns string
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apimachinery/crd_conversion_webhook.go
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,7 @@ import (
e2edeployment "k8s.io/kubernetes/test/e2e/framework/deployment"
"k8s.io/kubernetes/test/utils/crd"
imageutils "k8s.io/kubernetes/test/utils/image"
admissionapi "k8s.io/pod-security-admission/api"
"k8s.io/utils/pointer"

apiextensionsv1 "k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/v1"
Expand Down Expand Up @@ -117,6 +118,7 @@ var alternativeAPIVersions = []apiextensionsv1.CustomResourceDefinitionVersion{
var _ = SIGDescribe("CustomResourceConversionWebhook [Privileged:ClusterAdmin]", func() {
var certCtx *certContext
f := framework.NewDefaultFramework("crd-webhook")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
servicePort := int32(9443)
containerPort := int32(9444)

Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apimachinery/garbage_collector.go
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@ import (
e2emetrics "k8s.io/kubernetes/test/e2e/framework/metrics"
e2enode "k8s.io/kubernetes/test/e2e/framework/node"
e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
admissionapi "k8s.io/pod-security-admission/api"

"github.com/onsi/ginkgo"
imageutils "k8s.io/kubernetes/test/utils/image"
Expand Down Expand Up @@ -301,6 +302,7 @@ func getUniqLabel(labelkey, labelvalue string) map[string]string {

var _ = SIGDescribe("Garbage collector", func() {
f := framework.NewDefaultFramework("gc")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

/*
Release: v1.9
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apimachinery/generated_clientset.go
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,7 @@ import (
"k8s.io/apimachinery/pkg/watch"
"k8s.io/kubernetes/test/e2e/framework"
e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
admissionapi "k8s.io/pod-security-admission/api"

"github.com/onsi/ginkgo"
imageutils "k8s.io/kubernetes/test/utils/image"
Expand Down Expand Up @@ -100,6 +101,7 @@ func observerUpdate(w watch.Interface, expectedUpdate func(runtime.Object) bool)

var _ = SIGDescribe("Generated clientset", func() {
f := framework.NewDefaultFramework("clientset")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
ginkgo.It("should create pods, set the deletionTimestamp and deletionGracePeriodSeconds of the pod", func() {
podClient := f.ClientSet.CoreV1().Pods(f.Namespace.Name)
ginkgo.By("constructing the pod")
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apimachinery/namespace.go
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,7 @@ import (
"k8s.io/kubernetes/test/e2e/framework"
e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
imageutils "k8s.io/kubernetes/test/utils/image"
admissionapi "k8s.io/pod-security-admission/api"

"github.com/onsi/ginkgo"
"k8s.io/apimachinery/pkg/types"
Expand Down Expand Up @@ -226,6 +227,7 @@ func ensureServicesAreRemovedWhenNamespaceIsDeleted(f *framework.Framework) {
var _ = SIGDescribe("Namespaces [Serial]", func() {

f := framework.NewDefaultFramework("namespaces")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

/*
Release: v1.11
Expand Down
3 changes: 3 additions & 0 deletions test/e2e/apimachinery/resource_quota.go
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,7 @@ import (
"k8s.io/kubernetes/test/e2e/framework"
"k8s.io/kubernetes/test/utils/crd"
imageutils "k8s.io/kubernetes/test/utils/image"
admissionapi "k8s.io/pod-security-admission/api"

"github.com/onsi/ginkgo"
)
Expand All @@ -51,6 +52,7 @@ var extendedResourceName = "example.com/dongle"

var _ = SIGDescribe("ResourceQuota", func() {
f := framework.NewDefaultFramework("resourcequota")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

/*
Release: v1.16
Expand Down Expand Up @@ -1420,6 +1422,7 @@ var _ = SIGDescribe("ResourceQuota [Feature:PodPriority]", func() {

var _ = SIGDescribe("ResourceQuota", func() {
f := framework.NewDefaultFramework("cross-namespace-pod-affinity")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
ginkgo.It("should verify ResourceQuota with cross namespace pod affinity scope using scope-selectors.", func() {
ginkgo.By("Creating a ResourceQuota with cross namespace pod affinity scope")
quota, err := createResourceQuota(
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apimachinery/table_conversion.go
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,7 @@ import (
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
metav1beta1 "k8s.io/apimachinery/pkg/apis/meta/v1beta1"
"k8s.io/client-go/util/workqueue"
admissionapi "k8s.io/pod-security-admission/api"

utilversion "k8s.io/apimachinery/pkg/util/version"
"k8s.io/cli-runtime/pkg/printers"
Expand All @@ -43,6 +44,7 @@ var serverPrintVersion = utilversion.MustParseSemantic("v1.10.0")

var _ = SIGDescribe("Servers with support for Table transformation", func() {
f := framework.NewDefaultFramework("tables")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

ginkgo.BeforeEach(func() {
e2eskipper.SkipUnlessServerVersionGTE(serverPrintVersion, f.ClientSet.Discovery())
Expand Down
12 changes: 10 additions & 2 deletions test/e2e/apimachinery/webhook.go
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,7 @@ import (
e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
"k8s.io/kubernetes/test/utils/crd"
imageutils "k8s.io/kubernetes/test/utils/image"
admissionapi "k8s.io/pod-security-admission/api"

"github.com/onsi/ginkgo"

Expand Down Expand Up @@ -78,6 +79,7 @@ const (
var _ = SIGDescribe("AdmissionWebhook [Privileged:ClusterAdmin]", func() {
var certCtx *certContext
f := framework.NewDefaultFramework("webhook")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
servicePort := int32(8443)
containerPort := int32(8444)

Expand Down Expand Up @@ -1155,6 +1157,8 @@ func testWebhook(f *framework.Framework) {
Labels: map[string]string{
skipNamespaceLabelKey: skipNamespaceLabelValue,
f.UniqueName: "true",
// TODO(https://github.com/kubernetes/kubernetes/issues/108298): route namespace creation via framework.Framework.CreateNamespace in 1.24
admissionapi.EnforceLevelLabel: string(admissionapi.LevelRestricted),
},
}})
framework.ExpectNoError(err, "creating namespace %q", skippedNamespaceName)
Expand Down Expand Up @@ -2369,8 +2373,12 @@ func newMutateConfigMapWebhookFixture(f *framework.Framework, certCtx *certConte
func createWebhookConfigurationReadyNamespace(f *framework.Framework) {
ns, err := f.ClientSet.CoreV1().Namespaces().Create(context.TODO(), &v1.Namespace{
ObjectMeta: metav1.ObjectMeta{
Name: f.Namespace.Name + "-markers",
Labels: map[string]string{f.UniqueName + "-markers": "true"},
Name: f.Namespace.Name + "-markers",
Labels: map[string]string{
f.UniqueName + "-markers": "true",
// TODO(https://github.com/kubernetes/kubernetes/issues/108298): route namespace creation via framework.Framework.CreateNamespace in 1.24
admissionapi.EnforceLevelLabel: string(admissionapi.LevelRestricted),
},
},
}, metav1.CreateOptions{})
framework.ExpectNoError(err, "creating namespace for webhook configuration ready markers")
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apps/cronjob.go
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@ import (
e2ejob "k8s.io/kubernetes/test/e2e/framework/job"
e2eresource "k8s.io/kubernetes/test/e2e/framework/resource"
imageutils "k8s.io/kubernetes/test/utils/image"
admissionapi "k8s.io/pod-security-admission/api"
)

const (
Expand All @@ -52,6 +53,7 @@ const (

var _ = SIGDescribe("CronJob", func() {
f := framework.NewDefaultFramework("cronjob")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

sleepCommand := []string{"sleep", "300"}

Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apps/daemon_set.go
Original file line number Diff line number Diff line change
Expand Up @@ -55,6 +55,7 @@ import (
e2edaemonset "k8s.io/kubernetes/test/e2e/framework/daemonset"
e2enode "k8s.io/kubernetes/test/e2e/framework/node"
e2eresource "k8s.io/kubernetes/test/e2e/framework/resource"
admissionapi "k8s.io/pod-security-admission/api"
)

const (
Expand Down Expand Up @@ -133,6 +134,7 @@ var _ = SIGDescribe("Daemon set [Serial]", func() {
})

f = framework.NewDefaultFramework("daemonsets")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

image := WebserverImage
dsName := "daemon-set"
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apps/deployment.go
Original file line number Diff line number Diff line change
Expand Up @@ -61,6 +61,7 @@ import (
e2eskipper "k8s.io/kubernetes/test/e2e/framework/skipper"
testutil "k8s.io/kubernetes/test/utils"
imageutils "k8s.io/kubernetes/test/utils/image"
admissionapi "k8s.io/pod-security-admission/api"
utilpointer "k8s.io/utils/pointer"
)

Expand All @@ -85,6 +86,7 @@ var _ = SIGDescribe("Deployment", func() {
})

f := framework.NewDefaultFramework("deployment")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

ginkgo.BeforeEach(func() {
c = f.ClientSet
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apps/disruption.go
Original file line number Diff line number Diff line change
Expand Up @@ -46,6 +46,7 @@ import (
"k8s.io/kubernetes/test/e2e/framework"
e2eskipper "k8s.io/kubernetes/test/e2e/framework/skipper"
imageutils "k8s.io/kubernetes/test/utils/image"
admissionapi "k8s.io/pod-security-admission/api"
)

// schedulingTimeout is longer specifically because sometimes we need to wait
Expand All @@ -62,6 +63,7 @@ var defaultLabels = map[string]string{"foo": "bar"}

var _ = SIGDescribe("DisruptionController", func() {
f := framework.NewDefaultFramework("disruption")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
var ns string
var cs kubernetes.Interface
var dc dynamic.Interface
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apps/job.go
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,7 @@ import (
e2enode "k8s.io/kubernetes/test/e2e/framework/node"
e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
e2eresource "k8s.io/kubernetes/test/e2e/framework/resource"
admissionapi "k8s.io/pod-security-admission/api"
"k8s.io/utils/pointer"

"github.com/onsi/ginkgo"
Expand All @@ -43,6 +44,7 @@ import (

var _ = SIGDescribe("Job", func() {
f := framework.NewDefaultFramework("job")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
parallelism := int32(2)
completions := int32(4)
backoffLimit := int32(6) // default value
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apps/rc.go
Original file line number Diff line number Diff line change
Expand Up @@ -41,12 +41,14 @@ import (
e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
e2eskipper "k8s.io/kubernetes/test/e2e/framework/skipper"
imageutils "k8s.io/kubernetes/test/utils/image"
admissionapi "k8s.io/pod-security-admission/api"

"github.com/onsi/ginkgo"
)

var _ = SIGDescribe("ReplicationController", func() {
f := framework.NewDefaultFramework("replication-controller")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

var ns string
var dc dynamic.Interface
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apps/replica_set.go
Original file line number Diff line number Diff line change
Expand Up @@ -45,6 +45,7 @@ import (
e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
e2ereplicaset "k8s.io/kubernetes/test/e2e/framework/replicaset"
e2eskipper "k8s.io/kubernetes/test/e2e/framework/skipper"
admissionapi "k8s.io/pod-security-admission/api"

"github.com/onsi/ginkgo"
imageutils "k8s.io/kubernetes/test/utils/image"
Expand Down Expand Up @@ -100,6 +101,7 @@ func newPodQuota(name, number string) *v1.ResourceQuota {

var _ = SIGDescribe("ReplicaSet", func() {
f := framework.NewDefaultFramework("replicaset")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

/*
Release: v1.9
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apps/statefulset.go
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,7 @@ import (
e2eservice "k8s.io/kubernetes/test/e2e/framework/service"
e2estatefulset "k8s.io/kubernetes/test/e2e/framework/statefulset"
imageutils "k8s.io/kubernetes/test/utils/image"
admissionapi "k8s.io/pod-security-admission/api"
)

const (
Expand Down Expand Up @@ -88,6 +89,7 @@ var httpProbe = &v1.Probe{
// GCE Api requirements: nodes and master need storage r/w permissions.
var _ = SIGDescribe("StatefulSet", func() {
f := framework.NewDefaultFramework("statefulset")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged
var ns string
var c clientset.Interface

Expand Down
2 changes: 2 additions & 0 deletions test/e2e/apps/ttl_after_finished.go
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ import (
"k8s.io/kubernetes/pkg/util/slice"
"k8s.io/kubernetes/test/e2e/framework"
e2ejob "k8s.io/kubernetes/test/e2e/framework/job"
admissionapi "k8s.io/pod-security-admission/api"

"github.com/onsi/ginkgo"
)
Expand All @@ -42,6 +43,7 @@ const (

var _ = SIGDescribe("TTLAfterFinished", func() {
f := framework.NewDefaultFramework("ttlafterfinished")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

ginkgo.It("job should be deleted once it finishes after TTL seconds", func() {
testFinishedJob(f)
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/auth/metadata_concealment.go
Original file line number Diff line number Diff line change
Expand Up @@ -23,13 +23,15 @@ import (
"k8s.io/kubernetes/test/e2e/framework"
e2ejob "k8s.io/kubernetes/test/e2e/framework/job"
e2eskipper "k8s.io/kubernetes/test/e2e/framework/skipper"
admissionapi "k8s.io/pod-security-admission/api"

"github.com/onsi/ginkgo"
imageutil "k8s.io/kubernetes/test/utils/image"
)

var _ = SIGDescribe("Metadata Concealment", func() {
f := framework.NewDefaultFramework("metadata-concealment")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

ginkgo.It("should run a check-metadata-concealment job to completion", func() {
e2eskipper.SkipUnlessProviderIs("gce")
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/auth/service_accounts.go
Original file line number Diff line number Diff line change
Expand Up @@ -41,13 +41,15 @@ import (
e2epod "k8s.io/kubernetes/test/e2e/framework/pod"
e2eskipper "k8s.io/kubernetes/test/e2e/framework/skipper"
imageutils "k8s.io/kubernetes/test/utils/image"
admissionapi "k8s.io/pod-security-admission/api"
utilptr "k8s.io/utils/pointer"

"github.com/onsi/ginkgo"
)

var _ = SIGDescribe("ServiceAccounts", func() {
f := framework.NewDefaultFramework("svcaccounts")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

ginkgo.It("should ensure a single API token exists", func() {
// wait for the service account to reference a single secret
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/common/network/networking.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,10 +22,12 @@ import (
"k8s.io/apimachinery/pkg/util/sets"
"k8s.io/kubernetes/test/e2e/framework"
e2enetwork "k8s.io/kubernetes/test/e2e/framework/network"
admissionapi "k8s.io/pod-security-admission/api"
)

var _ = SIGDescribe("Networking", func() {
f := framework.NewDefaultFramework("pod-network-test")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelPrivileged

ginkgo.Describe("Granular Checks: Pods", func() {

Expand Down
2 changes: 2 additions & 0 deletions test/e2e/common/node/configmap.go
Original file line number Diff line number Diff line change
Expand Up @@ -27,12 +27,14 @@ import (
"k8s.io/apimachinery/pkg/util/uuid"
"k8s.io/kubernetes/test/e2e/framework"
imageutils "k8s.io/kubernetes/test/utils/image"
admissionapi "k8s.io/pod-security-admission/api"

"github.com/onsi/ginkgo"
)

var _ = SIGDescribe("ConfigMap", func() {
f := framework.NewDefaultFramework("configmap")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline

/*
Release: v1.9
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/common/node/container_probe.go
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,7 @@ import (
e2eskipper "k8s.io/kubernetes/test/e2e/framework/skipper"
testutils "k8s.io/kubernetes/test/utils"
imageutils "k8s.io/kubernetes/test/utils/image"
admissionapi "k8s.io/pod-security-admission/api"

"github.com/onsi/ginkgo"
"github.com/onsi/gomega"
Expand All @@ -50,6 +51,7 @@ const (

var _ = SIGDescribe("Probing container", func() {
f := framework.NewDefaultFramework("container-probe")
f.NamespacePodSecurityEnforceLevel = admissionapi.LevelBaseline
var podClient *framework.PodClient
probe := webserverProbeBuilder{}

Expand Down
Loading