5
5
"time"
6
6
7
7
g "github.com/onsi/ginkgo/v2"
8
- t "github.com/onsi/ginkgo/v2/extensions/table"
9
8
o "github.com/onsi/gomega"
10
9
11
10
v1 "k8s.io/api/core/v1"
@@ -19,7 +18,7 @@ import (
19
18
20
19
var _ = g .Describe ("[sig-arch] [Conformance] sysctl" , func () {
21
20
oc := exutil .NewCLIWithPodSecurityLevel ("sysctl" , admissionapi .LevelPrivileged )
22
- t .DescribeTable ("whitelists" , func (sysctl , value , path , defaultSysctlValue string ) {
21
+ g .DescribeTable ("whitelists" , func (sysctl , value , path , defaultSysctlValue string ) {
23
22
f := oc .KubeFramework ()
24
23
var preexistingPod * v1.Pod
25
24
var err error
@@ -75,14 +74,14 @@ var _ = g.Describe("[sig-arch] [Conformance] sysctl", func() {
75
74
o .Expect (podOutput ).Should (o .Equal (defaultSysctlValue ))
76
75
})
77
76
},
78
- t .Entry ("kernel.shm_rmid_forced" , "kernel.shm_rmid_forced" , "1" , "/proc/sys/kernel/shm_rmid_forced" , "0" ),
79
- t .Entry ("net.ipv4.ip_local_port_range" , "net.ipv4.ip_local_port_range" , "32769\t 61001" , "/proc/sys/net/ipv4/ip_local_port_range" , "32768\t 60999" ),
80
- t .Entry ("net.ipv4.tcp_syncookies" , "net.ipv4.tcp_syncookies" , "0" , "/proc/sys/net/ipv4/tcp_syncookies" , "1" ),
81
- t .Entry ("net.ipv4.ping_group_range" , "net.ipv4.ping_group_range" , "1\t 0" , "/proc/sys/net/ipv4/ping_group_range" , "0\t 2147483647" ),
82
- t .Entry ("net.ipv4.ip_unprivileged_port_start" , "net.ipv4.ip_unprivileged_port_start" , "1002" , "/proc/sys/net/ipv4/ip_unprivileged_port_start" , "1024" ),
77
+ g .Entry ("kernel.shm_rmid_forced" , "kernel.shm_rmid_forced" , "1" , "/proc/sys/kernel/shm_rmid_forced" , "0" ),
78
+ g .Entry ("net.ipv4.ip_local_port_range" , "net.ipv4.ip_local_port_range" , "32769\t 61001" , "/proc/sys/net/ipv4/ip_local_port_range" , "32768\t 60999" ),
79
+ g .Entry ("net.ipv4.tcp_syncookies" , "net.ipv4.tcp_syncookies" , "0" , "/proc/sys/net/ipv4/tcp_syncookies" , "1" ),
80
+ g .Entry ("net.ipv4.ping_group_range" , "net.ipv4.ping_group_range" , "1\t 0" , "/proc/sys/net/ipv4/ping_group_range" , "0\t 2147483647" ),
81
+ g .Entry ("net.ipv4.ip_unprivileged_port_start" , "net.ipv4.ip_unprivileged_port_start" , "1002" , "/proc/sys/net/ipv4/ip_unprivileged_port_start" , "1024" ),
83
82
)
84
83
85
- t .DescribeTable ("pod should not start for sysctl not on whitelist" , func (sysctl , value string ) {
84
+ g .DescribeTable ("pod should not start for sysctl not on whitelist" , func (sysctl , value string ) {
86
85
f := oc .KubeFramework ()
87
86
podDefinition := frameworkpod .NewAgnhostPod (f .Namespace .Name , "sysctl-pod" , nil , nil , nil )
88
87
podDefinition .Spec .SecurityContext .Sysctls = []v1.Sysctl {{Name : sysctl , Value : value }}
@@ -97,7 +96,7 @@ var _ = g.Describe("[sig-arch] [Conformance] sysctl", func() {
97
96
})
98
97
o .Expect (err ).NotTo (o .HaveOccurred (), "should not be able to create pod" )
99
98
},
100
- t .Entry ("kernel.msgmax" , "kernel.msgmax" , "1000" ),
101
- t .Entry ("net.ipv4.ip_dynaddr" , "net.ipv4.ip_dynaddr" , "1" ),
99
+ g .Entry ("kernel.msgmax" , "kernel.msgmax" , "1000" ),
100
+ g .Entry ("net.ipv4.ip_dynaddr" , "net.ipv4.ip_dynaddr" , "1" ),
102
101
)
103
102
})
0 commit comments