Skip to content

Commit

Permalink
Merge pull request #4133 from nicknovitski/parallel-psp-e2e-test
Browse files Browse the repository at this point in the history
Run PodSecurityPolicy E2E test in parallel
  • Loading branch information
k8s-ci-robot authored May 29, 2019
2 parents 8a2d506 + e1958b8 commit 85842ed
Showing 1 changed file with 1 addition and 25 deletions.
26 changes: 1 addition & 25 deletions test/e2e/settings/pod_security_policy.go
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,7 @@ const (
ingressControllerPSP = "ingress-controller-psp"
)

var _ = framework.IngressNginxDescribe("[Serial] Pod Security Policies", func() {
var _ = framework.IngressNginxDescribe("Pod Security Policies", func() {
f := framework.NewDefaultFramework("pod-security-policies")

BeforeEach(func() {
Expand Down Expand Up @@ -78,30 +78,6 @@ var _ = framework.IngressNginxDescribe("[Serial] Pod Security Policies", func()
f.NewEchoDeployment()
})

AfterEach(func() {
role, err := f.KubeClientSet.RbacV1().ClusterRoles().Get(fmt.Sprintf("nginx-ingress-clusterrole-%v", f.Namespace), metav1.GetOptions{})
Expect(err).NotTo(HaveOccurred(), "getting ingress controller cluster role")
Expect(role).NotTo(BeNil())

index := -1
for idx, rule := range role.Rules {
found := false
for _, rn := range rule.ResourceNames {
if rn == ingressControllerPSP {
found = true
break
}
}
if found {
index = idx
}
}

role.Rules = append(role.Rules[:index], role.Rules[index+1:]...)
_, err = f.KubeClientSet.RbacV1().ClusterRoles().Update(role)
Expect(err).NotTo(HaveOccurred(), "updating ingress controller cluster role to not use a pod security policy")
})

It("should be running with a Pod Security Policy", func() {
f.WaitForNginxConfiguration(
func(cfg string) bool {
Expand Down

0 comments on commit 85842ed

Please sign in to comment.