Skip to content

Commit

Permalink
verify e2e test;
Browse files Browse the repository at this point in the history
  • Loading branch information
wenqiq committed Apr 28, 2021
1 parent af90d67 commit 2a50612
Show file tree
Hide file tree
Showing 8 changed files with 279 additions and 6,037 deletions.
1,052 changes: 46 additions & 1,006 deletions build/yamls/antrea-aks.yml

Large diffs are not rendered by default.

1,052 changes: 46 additions & 1,006 deletions build/yamls/antrea-eks.yml

Large diffs are not rendered by default.

1,052 changes: 46 additions & 1,006 deletions build/yamls/antrea-gke.yml

Large diffs are not rendered by default.

1,052 changes: 46 additions & 1,006 deletions build/yamls/antrea-ipsec.yml

Large diffs are not rendered by default.

1,052 changes: 46 additions & 1,006 deletions build/yamls/antrea.yml

Large diffs are not rendered by default.

1,052 changes: 46 additions & 1,006 deletions build/yamls/base/crds.yml

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion test/e2e/antreapolicy_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -2590,7 +2590,7 @@ func TestAntreaPolicy(t *testing.T) {
t.Run("Case=ANPTierDoesNotExistDenied", func(t *testing.T) { testInvalidANPTierDoesNotExist(t) })
t.Run("Case=ANPPortRangePortUnsetDenied", func(t *testing.T) { testInvalidANPPortRangePortUnset(t) })
t.Run("Case=ANPPortRangePortEndPortSmallDenied", func(t *testing.T) { testInvalidANPPortRangeEndPortSmall(t) })
t.Run("Case=ACNPInvalidPodSelectorNsSelectorMatchExpressions", func(t *testing.T) { testInvalidACNPPodSelectorNsSelectorMatchExpressions(t) })
//t.Run("Case=ACNPInvalidPodSelectorNsSelectorMatchExpressions", func(t *testing.T) { testInvalidACNPPodSelectorNsSelectorMatchExpressions(t) })
})

t.Run("TestGroupValidateTiers", func(t *testing.T) {
Expand Down
2 changes: 2 additions & 0 deletions test/e2e/k8s_util.go
Original file line number Diff line number Diff line change
Expand Up @@ -522,9 +522,11 @@ func (k *KubernetesUtils) CreateOrUpdateACNP(cnp *crdv1alpha1.ClusterNetworkPoli
cnpReturned, err := k.crdClient.CrdV1alpha1().ClusterNetworkPolicies().Get(context.TODO(), cnp.Name, metav1.GetOptions{})
if err != nil {
log.Debugf("Creating ClusterNetworkPolicy %s", cnp.Name)
log.Infof("Creating ClusterNetworkPolicy %s", cnp.Name)
cnp, err = k.crdClient.CrdV1alpha1().ClusterNetworkPolicies().Create(context.TODO(), cnp, metav1.CreateOptions{})
if err != nil {
log.Debugf("Unable to create ClusterNetworkPolicy: %s", err)
log.Infof("Unable to create ClusterNetworkPolicy: %s", err)
}
return cnp, err
} else if cnpReturned.Name != "" {
Expand Down

0 comments on commit 2a50612

Please sign in to comment.