...under test/e2e_kubeadm/ in the core kubernetes repo.
e2e tests here should for instance make sure that:
node-role.kubernetes.io/master=""cluster-info is exposed in a correct manner, and the right Role and RoleBinding existkubeadm-config ConfigMap exists.@timothysc @pipejakob Ideas?
So this requires segregating into it's own location for future forking.
/assign @fabriziopandini @liztio
This will be a requirement for some of the HA work in order to validate it.
Can we clarify this a little more? What RBAC roles should be expected? What's the "correct manner" for cluster-info to be exposed? What node bootstrap token rules should exist?
@liztio I think that this document can be a good starting point
https://kubernetes.io/docs/reference/setup-tools/kubeadm/implementation-details/#wait-for-the-control-plane-to-come-up.
If I got this right we have to check that kubeadm-- executes properly the steps starting from mark master.
Is there a WIP for this work?
@fabriziopandini my WIP is https://github.com/kubernetes/kubernetes/pull/62665.
I'm feeling a bit weird about this though... most of these things aren't really E2E tests, they're more like integration tests.
@liz I'm totally ok with getting what you have hooked up, and we can create a new tracking issue with a list. You could easily back-hole on this, and we could federate the work items across the SIG for this type of work.
Reopening until we've got these running automatically
Per discussion, I think we should separate out the automation from the enablement so move to close.
Closed in favor of #813