diff --git a/resources/coverage/1.32.0.json b/resources/coverage/1.32.0.json index f755b1fc..b55f2c1c 100644 --- a/resources/coverage/1.32.0.json +++ b/resources/coverage/1.32.0.json @@ -2201,6 +2201,14 @@ "conformance_test": true, "promotion_release": "1.9.0" }, + { + "file": null, + "test": "[sig-auth] ServiceAccounts should create a serviceAccountToken and ensure a successful TokenReview", + "release": "1.32.0", + "testname": null, + "conformance_test": false, + "promotion_release": null + }, { "file": "test/e2e/auth/service_accounts.go", "test": "[sig-auth] ServiceAccounts should guarantee kube-root-ca.crt exist in any namespace [Conformance]", @@ -2257,6 +2265,14 @@ "conformance_test": true, "promotion_release": "1.27.0" }, + { + "file": null, + "test": "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", + "release": "1.32.0", + "testname": null, + "conformance_test": false, + "promotion_release": null + }, { "file": "test/e2e/kubectl/kubectl.go", "test": "[sig-cli] Kubectl client Guestbook application should create and stop a working application [Conformance]", @@ -5553,14 +5569,6 @@ "conformance_test": false, "promotion_release": null }, - { - "file": null, - "test": "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode", - "release": "1.32.0", - "testname": null, - "conformance_test": false, - "promotion_release": null - }, { "file": "test/e2e/storage/csi_node.go", "test": "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]", @@ -8388,9 +8396,9 @@ ], "release": "1.32.0", "sources": [ - "https://prow.k8s.io/view/gcs/kubernetes-jenkins/logs/ci-audit-kind-conformance/1844052039982649344", - "https://prow.k8s.io/view/gcs/kubernetes-jenkins/logs/ci-kubernetes-e2e-gci-gce/1841239762430595072", - "https://prow.k8s.io/view/gcs/kubernetes-jenkins/logs/ci-kubernetes-gce-conformance-latest/1844049775192707072" + "https://prow.k8s.io/view/gcs/kubernetes-jenkins/logs/ci-audit-kind-conformance/1844823362518388736", + "https://prow.k8s.io/view/gcs/kubernetes-jenkins/logs/ci-kubernetes-e2e-gci-gce/1844837455484686336", + "https://prow.k8s.io/view/gcs/kubernetes-jenkins/logs/ci-kubernetes-gce-conformance-latest/1844821097795555328" ], "endpoints": [ { @@ -9008,6 +9016,7 @@ "group": "", "level": "stable", "tests": [ + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", "[sig-cli] Kubectl exec should be able to execute 1000 times in a container", "[sig-network] DNS should support configurable pod DNS nameservers [Conformance]", "[sig-network] DNS should support configurable pod resolv.conf", @@ -9499,7 +9508,8 @@ "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should support ValidatingAdmissionPolicy API operations [Conformance]", "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should type check a CRD", "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should type check validation expressions", - "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should validate against a Deployment [Conformance]" + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should validate against a Deployment [Conformance]", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node" ], "action": "post", "tested": true, @@ -9518,7 +9528,8 @@ "tests": [ "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should allow expressions to refer variables. [Conformance]", "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should support ValidatingAdmissionPolicyBinding API operations [Conformance]", - "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should validate against a Deployment [Conformance]" + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should validate against a Deployment [Conformance]", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node" ], "action": "post", "tested": true, @@ -9916,10 +9927,10 @@ "group": "authentication.k8s.io", "level": "stable", "tests": [ - null + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node" ], "action": "post", - "tested": false, + "tested": true, "release": "1.32.0", "version": "v1", "category": "authentication", @@ -9933,6 +9944,7 @@ "group": "authentication.k8s.io", "level": "stable", "tests": [ + "[sig-auth] ServiceAccounts should create a serviceAccountToken and ensure a successful TokenReview", "[sig-auth] ServiceAccounts should mount an API token into pods [Conformance]", null ], @@ -10466,6 +10478,7 @@ "[sig-auth] ServiceAccounts no secret-based service account token should be auto-generated", "[sig-auth] ServiceAccounts ServiceAccountIssuerDiscovery should support OIDC discovery of service account issuer [Conformance]", "[sig-auth] ServiceAccounts should allow opting out of API token automount [Conformance]", + "[sig-auth] ServiceAccounts should create a serviceAccountToken and ensure a successful TokenReview", "[sig-auth] ServiceAccounts should guarantee kube-root-ca.crt exist in any namespace [Conformance]", "[sig-auth] ServiceAccounts should mount an API token into pods [Conformance]", "[sig-auth] ServiceAccounts should mount projected service account token [Conformance]", @@ -10473,6 +10486,7 @@ "[sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup]", "[sig-auth] ServiceAccounts should update a ServiceAccount [Conformance]", "[sig-auth] SubjectReview should support SubjectReview API operations [Conformance]", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", "[sig-cli] Kubectl client Guestbook application should create and stop a working application [Conformance]", "[sig-cli] Kubectl client Kubectl api-versions should check if v1 is in available api versions [Conformance]", "[sig-cli] Kubectl client Kubectl apply apply set/view last-applied", @@ -10885,7 +10899,6 @@ "[sig-storage] CSI Mock workload info CSI workload information using mock driver should be passed when podInfoOnMount=true", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when CSIDriver does not exist", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when podInfoOnMount=false", - "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode", "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]", "[sig-storage] CSIStorageCapacity should support CSIStorageCapacities API operations [Conformance]", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume", @@ -11300,6 +11313,7 @@ "[sig-api-machinery] Watchers should observe add, update, and delete watch notifications on configmaps [Conformance]", "[sig-api-machinery] Watchers should observe an object deletion if it stops meeting the requirements of the selector [Conformance]", "[sig-api-machinery] Watchers should receive events on concurrent watches in same order [Conformance]", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", "[sig-network] DNS should support configurable pod resolv.conf", "[sig-node] AppArmor load AppArmor profiles can disable an AppArmor profile, using unconfined", "[sig-node] AppArmor load AppArmor profiles should enforce an AppArmor profile specified in annotations", @@ -11673,6 +11687,7 @@ "[sig-auth] ServiceAccounts should mount an API token into pods [Conformance]", "[sig-auth] ServiceAccounts should mount projected service account token [Conformance]", "[sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup]", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", "[sig-cli] Kubectl exec should be able to execute 1000 times in a container", "[sig-cli] Kubectl logs default container logs the second container is the default-container by annotation should log default container if not specified", "[sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 should support forwarding over websockets", @@ -12707,6 +12722,7 @@ "tests": [ "[sig-api-machinery] Aggregator Should be able to support the 1.17 Sample API Server using the current Aggregator [Conformance]", "[sig-auth] ServiceAccounts should allow opting out of API token automount [Conformance]", + "[sig-auth] ServiceAccounts should create a serviceAccountToken and ensure a successful TokenReview", "[sig-auth] ServiceAccounts should mount an API token into pods [Conformance]", "[sig-auth] ServiceAccounts should run through the lifecycle of a ServiceAccount [Conformance]", "[sig-auth] ServiceAccounts should update a ServiceAccount [Conformance]", @@ -12810,10 +12826,12 @@ "group": "authentication.k8s.io", "level": "stable", "tests": [ + "[sig-auth] ServiceAccounts should create a serviceAccountToken and ensure a successful TokenReview", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", null ], "action": "post", - "tested": false, + "tested": true, "release": "1.32.0", "version": "v1", "category": "core", @@ -13538,6 +13556,7 @@ "[sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert a non homogeneous list of CRs [Conformance]", "[sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert from CR v1 to CR v2 [Conformance]", "[sig-api-machinery] CustomResourceFieldSelectors [Privileged:ClusterAdmin] CustomResourceFieldSelectors MUST list and watch custom resources matching the field selector", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", "[sig-storage] CSI Mock fsgroup as mount option Delegate FSGroup to CSI driver [LinuxOnly] should not pass FSGroup to CSI driver if it is set in pod and driver supports VOLUME_MOUNT_GROUP", "[sig-storage] CSI Mock fsgroup as mount option Delegate FSGroup to CSI driver [LinuxOnly] should pass FSGroup to CSI driver if it is set in pod and driver supports VOLUME_MOUNT_GROUP", "[sig-storage] CSI Mock volume attach CSI attach test using mock driver should not require VolumeAttach for drivers without attachment", @@ -13750,7 +13769,6 @@ "group": "storage.k8s.io", "level": "stable", "tests": [ - "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode", "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]", null ], @@ -14056,7 +14074,8 @@ "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should support ValidatingAdmissionPolicy API operations [Conformance]", "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should type check a CRD", "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should type check validation expressions", - "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should validate against a Deployment [Conformance]" + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should validate against a Deployment [Conformance]", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node" ], "action": "delete", "tested": true, @@ -14075,7 +14094,8 @@ "tests": [ "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should allow expressions to refer variables. [Conformance]", "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should support ValidatingAdmissionPolicyBinding API operations [Conformance]", - "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should validate against a Deployment [Conformance]" + "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should validate against a Deployment [Conformance]", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node" ], "action": "delete", "tested": true, @@ -14786,6 +14806,7 @@ "group": "", "level": "stable", "tests": [ + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", "[sig-node] ConfigMap should run through a ConfigMap lifecycle [Conformance]", null ], @@ -15311,6 +15332,7 @@ "[sig-auth] ServiceAccounts no secret-based service account token should be auto-generated", "[sig-auth] ServiceAccounts ServiceAccountIssuerDiscovery should support OIDC discovery of service account issuer [Conformance]", "[sig-auth] ServiceAccounts should allow opting out of API token automount [Conformance]", + "[sig-auth] ServiceAccounts should create a serviceAccountToken and ensure a successful TokenReview", "[sig-auth] ServiceAccounts should guarantee kube-root-ca.crt exist in any namespace [Conformance]", "[sig-auth] ServiceAccounts should mount an API token into pods [Conformance]", "[sig-auth] ServiceAccounts should mount projected service account token [Conformance]", @@ -15318,6 +15340,7 @@ "[sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup]", "[sig-auth] ServiceAccounts should update a ServiceAccount [Conformance]", "[sig-auth] SubjectReview should support SubjectReview API operations [Conformance]", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", "[sig-cli] Kubectl client Guestbook application should create and stop a working application [Conformance]", "[sig-cli] Kubectl client Kubectl api-versions should check if v1 is in available api versions [Conformance]", "[sig-cli] Kubectl client Kubectl apply apply set/view last-applied", @@ -15730,7 +15753,6 @@ "[sig-storage] CSI Mock workload info CSI workload information using mock driver should be passed when podInfoOnMount=true", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when CSIDriver does not exist", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when podInfoOnMount=false", - "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode", "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]", "[sig-storage] CSIStorageCapacity should support CSIStorageCapacities API operations [Conformance]", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume", @@ -16105,7 +16127,6 @@ "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a mutating webhook should work [Conformance]", "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a validating webhook should work [Conformance]", "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should honor timeout [Conformance]", - "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should not be able to mutate or prevent deletion of webhook configuration objects [Conformance]", "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a configMap. [Conformance]", "[sig-api-machinery] Watchers should be able to restart watching from the last resource version observed by the previous watch [Conformance]", "[sig-api-machinery] Watchers should be able to start watching from a specific resource version [Conformance]", @@ -16113,6 +16134,7 @@ "[sig-api-machinery] Watchers should observe an object deletion if it stops meeting the requirements of the selector [Conformance]", "[sig-api-machinery] Watchers should receive events on concurrent watches in same order [Conformance]", "[sig-auth] ServiceAccounts should guarantee kube-root-ca.crt exist in any namespace [Conformance]", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", "[sig-network] DNS should support configurable pod resolv.conf", "[sig-storage] ConfigMap optional updates should be reflected in volume [NodeConformance] [Conformance]", "[sig-storage] ConfigMap should be immutable if `immutable` field is set [Conformance]", @@ -18309,7 +18331,6 @@ "group": "storage.k8s.io", "level": "stable", "tests": [ - "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode", "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]" ], "action": "deletecollection", @@ -18469,7 +18490,6 @@ "group": "storage.k8s.io", "level": "stable", "tests": [ - "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode", "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]" ], "action": "delete", @@ -20625,6 +20645,7 @@ "[sig-auth] ServiceAccounts no secret-based service account token should be auto-generated", "[sig-auth] ServiceAccounts ServiceAccountIssuerDiscovery should support OIDC discovery of service account issuer [Conformance]", "[sig-auth] ServiceAccounts should allow opting out of API token automount [Conformance]", + "[sig-auth] ServiceAccounts should create a serviceAccountToken and ensure a successful TokenReview", "[sig-auth] ServiceAccounts should guarantee kube-root-ca.crt exist in any namespace [Conformance]", "[sig-auth] ServiceAccounts should mount an API token into pods [Conformance]", "[sig-auth] ServiceAccounts should mount projected service account token [Conformance]", @@ -20632,6 +20653,7 @@ "[sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup]", "[sig-auth] ServiceAccounts should update a ServiceAccount [Conformance]", "[sig-auth] SubjectReview should support SubjectReview API operations [Conformance]", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", "[sig-cli] Kubectl client Guestbook application should create and stop a working application [Conformance]", "[sig-cli] Kubectl client Kubectl api-versions should check if v1 is in available api versions [Conformance]", "[sig-cli] Kubectl client Kubectl apply apply set/view last-applied", @@ -21044,7 +21066,6 @@ "[sig-storage] CSI Mock workload info CSI workload information using mock driver should be passed when podInfoOnMount=true", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when CSIDriver does not exist", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when podInfoOnMount=false", - "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode", "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]", "[sig-storage] CSIStorageCapacity should support CSIStorageCapacities API operations [Conformance]", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume", @@ -22206,6 +22227,7 @@ "[sig-auth] ServiceAccounts no secret-based service account token should be auto-generated", "[sig-auth] ServiceAccounts ServiceAccountIssuerDiscovery should support OIDC discovery of service account issuer [Conformance]", "[sig-auth] ServiceAccounts should allow opting out of API token automount [Conformance]", + "[sig-auth] ServiceAccounts should create a serviceAccountToken and ensure a successful TokenReview", "[sig-auth] ServiceAccounts should guarantee kube-root-ca.crt exist in any namespace [Conformance]", "[sig-auth] ServiceAccounts should mount an API token into pods [Conformance]", "[sig-auth] ServiceAccounts should mount projected service account token [Conformance]", @@ -22213,6 +22235,7 @@ "[sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup]", "[sig-auth] ServiceAccounts should update a ServiceAccount [Conformance]", "[sig-auth] SubjectReview should support SubjectReview API operations [Conformance]", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", "[sig-cli] Kubectl client Guestbook application should create and stop a working application [Conformance]", "[sig-cli] Kubectl client Kubectl api-versions should check if v1 is in available api versions [Conformance]", "[sig-cli] Kubectl client Kubectl apply apply set/view last-applied", @@ -22625,7 +22648,6 @@ "[sig-storage] CSI Mock workload info CSI workload information using mock driver should be passed when podInfoOnMount=true", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when CSIDriver does not exist", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when podInfoOnMount=false", - "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode", "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]", "[sig-storage] CSIStorageCapacity should support CSIStorageCapacities API operations [Conformance]", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume", @@ -23271,6 +23293,7 @@ "[sig-auth] ServiceAccounts no secret-based service account token should be auto-generated", "[sig-auth] ServiceAccounts ServiceAccountIssuerDiscovery should support OIDC discovery of service account issuer [Conformance]", "[sig-auth] ServiceAccounts should allow opting out of API token automount [Conformance]", + "[sig-auth] ServiceAccounts should create a serviceAccountToken and ensure a successful TokenReview", "[sig-auth] ServiceAccounts should guarantee kube-root-ca.crt exist in any namespace [Conformance]", "[sig-auth] ServiceAccounts should mount an API token into pods [Conformance]", "[sig-auth] ServiceAccounts should mount projected service account token [Conformance]", @@ -23278,6 +23301,7 @@ "[sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup]", "[sig-auth] ServiceAccounts should update a ServiceAccount [Conformance]", "[sig-auth] SubjectReview should support SubjectReview API operations [Conformance]", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", "[sig-cli] Kubectl client Guestbook application should create and stop a working application [Conformance]", "[sig-cli] Kubectl client Kubectl api-versions should check if v1 is in available api versions [Conformance]", "[sig-cli] Kubectl client Kubectl apply apply set/view last-applied", @@ -23690,7 +23714,6 @@ "[sig-storage] CSI Mock workload info CSI workload information using mock driver should be passed when podInfoOnMount=true", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when CSIDriver does not exist", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when podInfoOnMount=false", - "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode", "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]", "[sig-storage] CSIStorageCapacity should support CSIStorageCapacities API operations [Conformance]", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: CSI Ephemeral-volume (default fs)] ephemeral should create read-only inline ephemeral volume", @@ -24633,6 +24656,7 @@ "[sig-api-machinery] Aggregator Should be able to support the 1.17 Sample API Server using the current Aggregator [Conformance]", "[sig-cli] Kubectl client Simple pod should return command exit codes should handle in-cluster config", "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options", + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [LinuxOnly]", "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource", "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory", "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]", @@ -24640,15 +24664,15 @@ "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path", "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount", "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]", - "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume", - "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read-only inline ephemeral volume", "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should create read/write inline ephemeral volume", + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (immediate-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs", "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read-only inline ephemeral volume", + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should create read/write inline ephemeral volume", + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs", "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support multiple inline ephemeral volumes", + "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Generic Ephemeral-volume (default fs) (late-binding)] ephemeral should support two pods which have the same volume definition", "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume", - "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should store data", "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume", - "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data", "[sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]", null ], @@ -24788,7 +24812,6 @@ "group": "storage.k8s.io", "level": "stable", "tests": [ - "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode", "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]", null ], @@ -25718,6 +25741,23 @@ "conf_tested": true, "description": "partially update ephemeralcontainers of the specified Pod" }, + { + "kind": "Pod", + "path": "/api/v1/namespaces/{namespace}/pods/{name}/resize", + "group": "", + "level": "stable", + "tests": [ + null + ], + "action": "patch", + "tested": false, + "release": "1.32.0", + "version": "v1", + "category": "core", + "endpoint": "patchCoreV1NamespacedPodResize", + "conf_tested": false, + "description": "partially update resize of the specified Pod" + }, { "kind": "Pod", "path": "/api/v1/namespaces/{namespace}/pods/{name}/status", @@ -26347,7 +26387,6 @@ "group": "storage.k8s.io", "level": "stable", "tests": [ - "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode", "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]" ], "action": "patch", @@ -27360,7 +27399,6 @@ "[sig-storage] CSI Mock volume storage capacity storage capacity unlimited", "[sig-storage] CSI Mock workload info CSI PodInfoOnMount Update should be passed when update from false to true", "[sig-storage] CSI Mock workload info CSI PodInfoOnMount Update should not be passed when update from true to false", - "[sig-storage] CSI Mock workload info CSI workload information using mock driver contain ephemeral=true when using inline volume", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should be passed when podInfoOnMount=true", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when CSIDriver does not exist", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when podInfoOnMount=false", @@ -27602,9 +27640,12 @@ "[sig-api-machinery] Servers with support for Table transformation should return pod details", "[sig-apps] Daemon set [Serial] should retry creating failed daemon pods [Conformance]", "[sig-apps] Deployment deployment should delete old replica sets [Conformance]", + "[sig-apps] Deployment deployment should support proportional scaling [Conformance]", "[sig-apps] Deployment deployment should support rollover [Conformance]", "[sig-apps] Deployment RollingUpdateDeployment should delete old pods and create new ones [Conformance]", + "[sig-apps] DisruptionController should evict unready pods with AlwaysAllow UnhealthyPodEvictionPolicy", "[sig-apps] DisruptionController should not evict unready pods with Default UnhealthyPodEvictionPolicy", + "[sig-apps] DisruptionController should not evict unready pods with IfHealthyBudget UnhealthyPodEvictionPolicy", "[sig-apps] Job should adopt matching orphans and release non-matching pods [Conformance]", "[sig-apps] Job should allow to use a pod failure policy to ignore failure matching on DisruptionTarget condition", "[sig-apps] Job should allow to use a pod failure policy to ignore failure matching on exit code", @@ -27626,6 +27667,7 @@ "[sig-auth] ServiceAccounts should mount an API token into pods [Conformance]", "[sig-auth] ServiceAccounts should mount projected service account token [Conformance]", "[sig-auth] ServiceAccounts should set ownership and permission when RunAsUser or FsGroup is present [LinuxOnly] [NodeFeature:FSGroup]", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", "[sig-cli] Kubectl client Kubectl copy should copy a file from a running Pod", "[sig-cli] Kubectl client Kubectl label should update the label on a resource [Conformance]", "[sig-cli] Kubectl client Kubectl replace should update a single-container pod's image [Conformance]", @@ -28432,6 +28474,7 @@ "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumes should store data", + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should mount multiple PV pointing to the same storage on the same node", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source", @@ -28445,6 +28488,7 @@ "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumes should store data", + "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [LinuxOnly]", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should create read/write inline ephemeral volume", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Generic Ephemeral-volume (block volmode) (late-binding)] ephemeral should support expansion of pvcs created for ephemeral pvcs", @@ -28664,6 +28708,23 @@ "conf_tested": true, "description": "read log of the specified Pod" }, + { + "kind": "Pod", + "path": "/api/v1/namespaces/{namespace}/pods/{name}/resize", + "group": "", + "level": "stable", + "tests": [ + null + ], + "action": "get", + "tested": false, + "release": "1.32.0", + "version": "v1", + "category": "core", + "endpoint": "readCoreV1NamespacedPodResize", + "conf_tested": false, + "description": "read resize of the specified Pod" + }, { "kind": "Pod", "path": "/api/v1/namespaces/{namespace}/pods/{name}/status", @@ -29712,7 +29773,6 @@ "[sig-storage] CSI Mock workload info CSI workload information using mock driver should be passed when podInfoOnMount=true", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when CSIDriver does not exist", "[sig-storage] CSI Mock workload info CSI workload information using mock driver should not be passed when podInfoOnMount=false", - "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode", "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]", "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should verify that all csinodes have volume limits", null @@ -30456,6 +30516,7 @@ "[sig-api-machinery] Watchers should observe an object deletion if it stops meeting the requirements of the selector [Conformance]", "[sig-api-machinery] Watchers should receive events on concurrent watches in same order [Conformance]", "[sig-auth] ServiceAccounts should guarantee kube-root-ca.crt exist in any namespace [Conformance]", + "[sig-auth] ValidatingAdmissionPolicy [FeatureGate:ServiceAccountTokenNodeBindingValidation] [Beta] can restrict access by-node", "[sig-node] ConfigMap should update ConfigMap successfully", "[sig-storage] ConfigMap optional updates should be reflected in volume [NodeConformance] [Conformance]", "[sig-storage] ConfigMap should be immutable if `immutable` field is set [Conformance]", @@ -30631,6 +30692,23 @@ "conf_tested": true, "description": "replace ephemeralcontainers of the specified Pod" }, + { + "kind": "Pod", + "path": "/api/v1/namespaces/{namespace}/pods/{name}/resize", + "group": "", + "level": "stable", + "tests": [ + null + ], + "action": "put", + "tested": false, + "release": "1.32.0", + "version": "v1", + "category": "core", + "endpoint": "replaceCoreV1NamespacedPodResize", + "conf_tested": false, + "description": "replace resize of the specified Pod" + }, { "kind": "Pod", "path": "/api/v1/namespaces/{namespace}/pods/{name}/status", @@ -31294,7 +31372,6 @@ "group": "storage.k8s.io", "level": "stable", "tests": [ - "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode", "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]", null ], @@ -31427,9 +31504,9 @@ "description": "create a SelfSubjectReview" }, { - "kind": "FlowSchema", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/flowschemas", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "IPAddress", + "path": "/apis/networking.k8s.io/v1beta1/ipaddresses", + "group": "networking.k8s.io", "level": "beta", "tests": [ null @@ -31437,16 +31514,16 @@ "action": "post", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "createFlowcontrolApiserverV1beta3FlowSchema", + "version": "v1beta1", + "category": "networking", + "endpoint": "createNetworkingV1beta1IPAddress", "conf_tested": false, - "description": "create a FlowSchema" + "description": "create an IPAddress" }, { - "kind": "PriorityLevelConfiguration", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/prioritylevelconfigurations", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "ServiceCIDR", + "path": "/apis/networking.k8s.io/v1beta1/servicecidrs", + "group": "networking.k8s.io", "level": "beta", "tests": [ null @@ -31454,16 +31531,16 @@ "action": "post", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "createFlowcontrolApiserverV1beta3PriorityLevelConfiguration", + "version": "v1beta1", + "category": "networking", + "endpoint": "createNetworkingV1beta1ServiceCIDR", "conf_tested": false, - "description": "create a PriorityLevelConfiguration" + "description": "create a ServiceCIDR" }, { - "kind": "IPAddress", - "path": "/apis/networking.k8s.io/v1beta1/ipaddresses", - "group": "networking.k8s.io", + "kind": "DeviceClass", + "path": "/apis/resource.k8s.io/v1beta1/deviceclasses", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -31472,15 +31549,15 @@ "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "networking", - "endpoint": "createNetworkingV1beta1IPAddress", + "category": "resource", + "endpoint": "createResourceV1beta1DeviceClass", "conf_tested": false, - "description": "create an IPAddress" + "description": "create a DeviceClass" }, { - "kind": "ServiceCIDR", - "path": "/apis/networking.k8s.io/v1beta1/servicecidrs", - "group": "networking.k8s.io", + "kind": "ResourceClaim", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaims", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -31489,10 +31566,44 @@ "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "networking", - "endpoint": "createNetworkingV1beta1ServiceCIDR", + "category": "resource", + "endpoint": "createResourceV1beta1NamespacedResourceClaim", "conf_tested": false, - "description": "create a ServiceCIDR" + "description": "create a ResourceClaim" + }, + { + "kind": "ResourceClaimTemplate", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaimtemplates", + "group": "resource.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "post", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "resource", + "endpoint": "createResourceV1beta1NamespacedResourceClaimTemplate", + "conf_tested": false, + "description": "create a ResourceClaimTemplate" + }, + { + "kind": "ResourceSlice", + "path": "/apis/resource.k8s.io/v1beta1/resourceslices", + "group": "resource.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "post", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "resource", + "endpoint": "createResourceV1beta1ResourceSlice", + "conf_tested": false, + "description": "create a ResourceSlice" }, { "kind": "VolumeAttributesClass", @@ -31579,74 +31690,6 @@ "conf_tested": false, "description": "delete a ValidatingAdmissionPolicyBinding" }, - { - "kind": "FlowSchema", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/flowschemas", - "group": "flowcontrol.apiserver.k8s.io", - "level": "beta", - "tests": [ - null - ], - "action": "deletecollection", - "tested": false, - "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "deleteFlowcontrolApiserverV1beta3CollectionFlowSchema", - "conf_tested": false, - "description": "delete collection of FlowSchema" - }, - { - "kind": "PriorityLevelConfiguration", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/prioritylevelconfigurations", - "group": "flowcontrol.apiserver.k8s.io", - "level": "beta", - "tests": [ - null - ], - "action": "deletecollection", - "tested": false, - "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "deleteFlowcontrolApiserverV1beta3CollectionPriorityLevelConfiguration", - "conf_tested": false, - "description": "delete collection of PriorityLevelConfiguration" - }, - { - "kind": "FlowSchema", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/flowschemas/{name}", - "group": "flowcontrol.apiserver.k8s.io", - "level": "beta", - "tests": [ - null - ], - "action": "delete", - "tested": false, - "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "deleteFlowcontrolApiserverV1beta3FlowSchema", - "conf_tested": false, - "description": "delete a FlowSchema" - }, - { - "kind": "PriorityLevelConfiguration", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/prioritylevelconfigurations/{name}", - "group": "flowcontrol.apiserver.k8s.io", - "level": "beta", - "tests": [ - null - ], - "action": "delete", - "tested": false, - "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "deleteFlowcontrolApiserverV1beta3PriorityLevelConfiguration", - "conf_tested": false, - "description": "delete a PriorityLevelConfiguration" - }, { "kind": "IPAddress", "path": "/apis/networking.k8s.io/v1beta1/ipaddresses", @@ -31716,9 +31759,9 @@ "description": "delete a ServiceCIDR" }, { - "kind": "VolumeAttributesClass", - "path": "/apis/storage.k8s.io/v1beta1/volumeattributesclasses", - "group": "storage.k8s.io", + "kind": "DeviceClass", + "path": "/apis/resource.k8s.io/v1beta1/deviceclasses", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -31727,50 +31770,169 @@ "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "storage", - "endpoint": "deleteStorageV1beta1CollectionVolumeAttributesClass", + "category": "resource", + "endpoint": "deleteResourceV1beta1CollectionDeviceClass", "conf_tested": false, - "description": "delete collection of VolumeAttributesClass" + "description": "delete collection of DeviceClass" }, { - "kind": "VolumeAttributesClass", - "path": "/apis/storage.k8s.io/v1beta1/volumeattributesclasses/{name}", - "group": "storage.k8s.io", + "kind": "ResourceClaim", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaims", + "group": "resource.k8s.io", "level": "beta", "tests": [ null ], - "action": "delete", + "action": "deletecollection", "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "storage", - "endpoint": "deleteStorageV1beta1VolumeAttributesClass", + "category": "resource", + "endpoint": "deleteResourceV1beta1CollectionNamespacedResourceClaim", "conf_tested": false, - "description": "delete a VolumeAttributesClass" + "description": "delete collection of ResourceClaim" }, { - "kind": null, - "path": "/apis/admissionregistration.k8s.io/v1beta1/", - "group": null, + "kind": "ResourceClaimTemplate", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaimtemplates", + "group": "resource.k8s.io", "level": "beta", "tests": [ null ], - "action": null, + "action": "deletecollection", "tested": false, "release": "1.32.0", - "version": null, - "category": "admissionregistration", - "endpoint": "getAdmissionregistrationV1beta1APIResources", + "version": "v1beta1", + "category": "resource", + "endpoint": "deleteResourceV1beta1CollectionNamespacedResourceClaimTemplate", "conf_tested": false, - "description": "get available resources" + "description": "delete collection of ResourceClaimTemplate" }, { - "kind": null, - "path": "/apis/authentication.k8s.io/v1beta1/", - "group": null, - "level": "beta", + "kind": "ResourceSlice", + "path": "/apis/resource.k8s.io/v1beta1/resourceslices", + "group": "resource.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "deletecollection", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "resource", + "endpoint": "deleteResourceV1beta1CollectionResourceSlice", + "conf_tested": false, + "description": "delete collection of ResourceSlice" + }, + { + "kind": "DeviceClass", + "path": "/apis/resource.k8s.io/v1beta1/deviceclasses/{name}", + "group": "resource.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "delete", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "resource", + "endpoint": "deleteResourceV1beta1DeviceClass", + "conf_tested": false, + "description": "delete a DeviceClass" + }, + { + "kind": "ResourceClaim", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaims/{name}", + "group": "resource.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "delete", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "resource", + "endpoint": "deleteResourceV1beta1NamespacedResourceClaim", + "conf_tested": false, + "description": "delete a ResourceClaim" + }, + { + "kind": "ResourceClaimTemplate", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaimtemplates/{name}", + "group": "resource.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "delete", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "resource", + "endpoint": "deleteResourceV1beta1NamespacedResourceClaimTemplate", + "conf_tested": false, + "description": "delete a ResourceClaimTemplate" + }, + { + "kind": "ResourceSlice", + "path": "/apis/resource.k8s.io/v1beta1/resourceslices/{name}", + "group": "resource.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "delete", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "resource", + "endpoint": "deleteResourceV1beta1ResourceSlice", + "conf_tested": false, + "description": "delete a ResourceSlice" + }, + { + "kind": "VolumeAttributesClass", + "path": "/apis/storage.k8s.io/v1beta1/volumeattributesclasses", + "group": "storage.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "deletecollection", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "storage", + "endpoint": "deleteStorageV1beta1CollectionVolumeAttributesClass", + "conf_tested": false, + "description": "delete collection of VolumeAttributesClass" + }, + { + "kind": "VolumeAttributesClass", + "path": "/apis/storage.k8s.io/v1beta1/volumeattributesclasses/{name}", + "group": "storage.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "delete", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "storage", + "endpoint": "deleteStorageV1beta1VolumeAttributesClass", + "conf_tested": false, + "description": "delete a VolumeAttributesClass" + }, + { + "kind": null, + "path": "/apis/admissionregistration.k8s.io/v1beta1/", + "group": null, + "level": "beta", "tests": [ null ], @@ -31778,14 +31940,14 @@ "tested": false, "release": "1.32.0", "version": null, - "category": "authentication", - "endpoint": "getAuthenticationV1beta1APIResources", + "category": "admissionregistration", + "endpoint": "getAdmissionregistrationV1beta1APIResources", "conf_tested": false, "description": "get available resources" }, { "kind": null, - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/", + "path": "/apis/authentication.k8s.io/v1beta1/", "group": null, "level": "beta", "tests": [ @@ -31795,8 +31957,8 @@ "tested": false, "release": "1.32.0", "version": null, - "category": "flowcontrolApiserver", - "endpoint": "getFlowcontrolApiserverV1beta3APIResources", + "category": "authentication", + "endpoint": "getAuthenticationV1beta1APIResources", "conf_tested": false, "description": "get available resources" }, @@ -31817,6 +31979,23 @@ "conf_tested": false, "description": "get available resources" }, + { + "kind": null, + "path": "/apis/resource.k8s.io/v1beta1/", + "group": null, + "level": "beta", + "tests": [ + null + ], + "action": null, + "tested": false, + "release": "1.32.0", + "version": null, + "category": "resource", + "endpoint": "getResourceV1beta1APIResources", + "conf_tested": false, + "description": "get available resources" + }, { "kind": null, "path": "/.well-known/openid-configuration/", @@ -31903,9 +32082,9 @@ "description": "list or watch objects of kind ValidatingAdmissionPolicyBinding" }, { - "kind": "FlowSchema", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/flowschemas", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "IPAddress", + "path": "/apis/networking.k8s.io/v1beta1/ipaddresses", + "group": "networking.k8s.io", "level": "beta", "tests": [ null @@ -31913,16 +32092,16 @@ "action": "list", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "listFlowcontrolApiserverV1beta3FlowSchema", + "version": "v1beta1", + "category": "networking", + "endpoint": "listNetworkingV1beta1IPAddress", "conf_tested": false, - "description": "list or watch objects of kind FlowSchema" + "description": "list or watch objects of kind IPAddress" }, { - "kind": "PriorityLevelConfiguration", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/prioritylevelconfigurations", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "ServiceCIDR", + "path": "/apis/networking.k8s.io/v1beta1/servicecidrs", + "group": "networking.k8s.io", "level": "beta", "tests": [ null @@ -31930,16 +32109,16 @@ "action": "list", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "listFlowcontrolApiserverV1beta3PriorityLevelConfiguration", + "version": "v1beta1", + "category": "networking", + "endpoint": "listNetworkingV1beta1ServiceCIDR", "conf_tested": false, - "description": "list or watch objects of kind PriorityLevelConfiguration" + "description": "list or watch objects of kind ServiceCIDR" }, { - "kind": "IPAddress", - "path": "/apis/networking.k8s.io/v1beta1/ipaddresses", - "group": "networking.k8s.io", + "kind": "DeviceClass", + "path": "/apis/resource.k8s.io/v1beta1/deviceclasses", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -31948,15 +32127,15 @@ "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "networking", - "endpoint": "listNetworkingV1beta1IPAddress", + "category": "resource", + "endpoint": "listResourceV1beta1DeviceClass", "conf_tested": false, - "description": "list or watch objects of kind IPAddress" + "description": "list or watch objects of kind DeviceClass" }, { - "kind": "ServiceCIDR", - "path": "/apis/networking.k8s.io/v1beta1/servicecidrs", - "group": "networking.k8s.io", + "kind": "ResourceClaim", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaims", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -31965,10 +32144,78 @@ "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "networking", - "endpoint": "listNetworkingV1beta1ServiceCIDR", + "category": "resource", + "endpoint": "listResourceV1beta1NamespacedResourceClaim", "conf_tested": false, - "description": "list or watch objects of kind ServiceCIDR" + "description": "list or watch objects of kind ResourceClaim" + }, + { + "kind": "ResourceClaimTemplate", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaimtemplates", + "group": "resource.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "list", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "resource", + "endpoint": "listResourceV1beta1NamespacedResourceClaimTemplate", + "conf_tested": false, + "description": "list or watch objects of kind ResourceClaimTemplate" + }, + { + "kind": "ResourceClaim", + "path": "/apis/resource.k8s.io/v1beta1/resourceclaims", + "group": "resource.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "list", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "resource", + "endpoint": "listResourceV1beta1ResourceClaimForAllNamespaces", + "conf_tested": false, + "description": "list or watch objects of kind ResourceClaim" + }, + { + "kind": "ResourceClaimTemplate", + "path": "/apis/resource.k8s.io/v1beta1/resourceclaimtemplates", + "group": "resource.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "list", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "resource", + "endpoint": "listResourceV1beta1ResourceClaimTemplateForAllNamespaces", + "conf_tested": false, + "description": "list or watch objects of kind ResourceClaimTemplate" + }, + { + "kind": "ResourceSlice", + "path": "/apis/resource.k8s.io/v1beta1/resourceslices", + "group": "resource.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "list", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "resource", + "endpoint": "listResourceV1beta1ResourceSlice", + "conf_tested": false, + "description": "list or watch objects of kind ResourceSlice" }, { "kind": "VolumeAttributesClass", @@ -32039,9 +32286,9 @@ "description": "partially update status of the specified ValidatingAdmissionPolicy" }, { - "kind": "FlowSchema", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/flowschemas/{name}", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "IPAddress", + "path": "/apis/networking.k8s.io/v1beta1/ipaddresses/{name}", + "group": "networking.k8s.io", "level": "beta", "tests": [ null @@ -32049,16 +32296,16 @@ "action": "patch", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "patchFlowcontrolApiserverV1beta3FlowSchema", + "version": "v1beta1", + "category": "networking", + "endpoint": "patchNetworkingV1beta1IPAddress", "conf_tested": false, - "description": "partially update the specified FlowSchema" + "description": "partially update the specified IPAddress" }, { - "kind": "FlowSchema", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/flowschemas/{name}/status", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "ServiceCIDR", + "path": "/apis/networking.k8s.io/v1beta1/servicecidrs/{name}", + "group": "networking.k8s.io", "level": "beta", "tests": [ null @@ -32066,16 +32313,16 @@ "action": "patch", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "patchFlowcontrolApiserverV1beta3FlowSchemaStatus", + "version": "v1beta1", + "category": "networking", + "endpoint": "patchNetworkingV1beta1ServiceCIDR", "conf_tested": false, - "description": "partially update status of the specified FlowSchema" + "description": "partially update the specified ServiceCIDR" }, { - "kind": "PriorityLevelConfiguration", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/prioritylevelconfigurations/{name}", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "ServiceCIDR", + "path": "/apis/networking.k8s.io/v1beta1/servicecidrs/{name}/status", + "group": "networking.k8s.io", "level": "beta", "tests": [ null @@ -32083,16 +32330,16 @@ "action": "patch", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "patchFlowcontrolApiserverV1beta3PriorityLevelConfiguration", + "version": "v1beta1", + "category": "networking", + "endpoint": "patchNetworkingV1beta1ServiceCIDRStatus", "conf_tested": false, - "description": "partially update the specified PriorityLevelConfiguration" + "description": "partially update status of the specified ServiceCIDR" }, { - "kind": "PriorityLevelConfiguration", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/prioritylevelconfigurations/{name}/status", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "DeviceClass", + "path": "/apis/resource.k8s.io/v1beta1/deviceclasses/{name}", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -32100,16 +32347,16 @@ "action": "patch", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "patchFlowcontrolApiserverV1beta3PriorityLevelConfigurationStatus", + "version": "v1beta1", + "category": "resource", + "endpoint": "patchResourceV1beta1DeviceClass", "conf_tested": false, - "description": "partially update status of the specified PriorityLevelConfiguration" + "description": "partially update the specified DeviceClass" }, { - "kind": "IPAddress", - "path": "/apis/networking.k8s.io/v1beta1/ipaddresses/{name}", - "group": "networking.k8s.io", + "kind": "ResourceClaim", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaims/{name}", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -32118,15 +32365,15 @@ "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "networking", - "endpoint": "patchNetworkingV1beta1IPAddress", + "category": "resource", + "endpoint": "patchResourceV1beta1NamespacedResourceClaim", "conf_tested": false, - "description": "partially update the specified IPAddress" + "description": "partially update the specified ResourceClaim" }, { - "kind": "ServiceCIDR", - "path": "/apis/networking.k8s.io/v1beta1/servicecidrs/{name}", - "group": "networking.k8s.io", + "kind": "ResourceClaim", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaims/{name}/status", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -32135,15 +32382,15 @@ "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "networking", - "endpoint": "patchNetworkingV1beta1ServiceCIDR", + "category": "resource", + "endpoint": "patchResourceV1beta1NamespacedResourceClaimStatus", "conf_tested": false, - "description": "partially update the specified ServiceCIDR" + "description": "partially update status of the specified ResourceClaim" }, { - "kind": "ServiceCIDR", - "path": "/apis/networking.k8s.io/v1beta1/servicecidrs/{name}/status", - "group": "networking.k8s.io", + "kind": "ResourceClaimTemplate", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaimtemplates/{name}", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -32152,10 +32399,27 @@ "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "networking", - "endpoint": "patchNetworkingV1beta1ServiceCIDRStatus", + "category": "resource", + "endpoint": "patchResourceV1beta1NamespacedResourceClaimTemplate", "conf_tested": false, - "description": "partially update status of the specified ServiceCIDR" + "description": "partially update the specified ResourceClaimTemplate" + }, + { + "kind": "ResourceSlice", + "path": "/apis/resource.k8s.io/v1beta1/resourceslices/{name}", + "group": "resource.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "patch", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "resource", + "endpoint": "patchResourceV1beta1ResourceSlice", + "conf_tested": false, + "description": "partially update the specified ResourceSlice" }, { "kind": "VolumeAttributesClass", @@ -32226,9 +32490,9 @@ "description": "read status of the specified ValidatingAdmissionPolicy" }, { - "kind": "FlowSchema", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/flowschemas/{name}", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "IPAddress", + "path": "/apis/networking.k8s.io/v1beta1/ipaddresses/{name}", + "group": "networking.k8s.io", "level": "beta", "tests": [ null @@ -32236,16 +32500,16 @@ "action": "get", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "readFlowcontrolApiserverV1beta3FlowSchema", + "version": "v1beta1", + "category": "networking", + "endpoint": "readNetworkingV1beta1IPAddress", "conf_tested": false, - "description": "read the specified FlowSchema" + "description": "read the specified IPAddress" }, { - "kind": "FlowSchema", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/flowschemas/{name}/status", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "ServiceCIDR", + "path": "/apis/networking.k8s.io/v1beta1/servicecidrs/{name}", + "group": "networking.k8s.io", "level": "beta", "tests": [ null @@ -32253,16 +32517,16 @@ "action": "get", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "readFlowcontrolApiserverV1beta3FlowSchemaStatus", + "version": "v1beta1", + "category": "networking", + "endpoint": "readNetworkingV1beta1ServiceCIDR", "conf_tested": false, - "description": "read status of the specified FlowSchema" + "description": "read the specified ServiceCIDR" }, { - "kind": "PriorityLevelConfiguration", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/prioritylevelconfigurations/{name}", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "ServiceCIDR", + "path": "/apis/networking.k8s.io/v1beta1/servicecidrs/{name}/status", + "group": "networking.k8s.io", "level": "beta", "tests": [ null @@ -32270,16 +32534,16 @@ "action": "get", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "readFlowcontrolApiserverV1beta3PriorityLevelConfiguration", + "version": "v1beta1", + "category": "networking", + "endpoint": "readNetworkingV1beta1ServiceCIDRStatus", "conf_tested": false, - "description": "read the specified PriorityLevelConfiguration" + "description": "read status of the specified ServiceCIDR" }, { - "kind": "PriorityLevelConfiguration", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/prioritylevelconfigurations/{name}/status", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "DeviceClass", + "path": "/apis/resource.k8s.io/v1beta1/deviceclasses/{name}", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -32287,16 +32551,16 @@ "action": "get", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "readFlowcontrolApiserverV1beta3PriorityLevelConfigurationStatus", + "version": "v1beta1", + "category": "resource", + "endpoint": "readResourceV1beta1DeviceClass", "conf_tested": false, - "description": "read status of the specified PriorityLevelConfiguration" + "description": "read the specified DeviceClass" }, { - "kind": "IPAddress", - "path": "/apis/networking.k8s.io/v1beta1/ipaddresses/{name}", - "group": "networking.k8s.io", + "kind": "ResourceClaim", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaims/{name}", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -32305,15 +32569,15 @@ "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "networking", - "endpoint": "readNetworkingV1beta1IPAddress", + "category": "resource", + "endpoint": "readResourceV1beta1NamespacedResourceClaim", "conf_tested": false, - "description": "read the specified IPAddress" + "description": "read the specified ResourceClaim" }, { - "kind": "ServiceCIDR", - "path": "/apis/networking.k8s.io/v1beta1/servicecidrs/{name}", - "group": "networking.k8s.io", + "kind": "ResourceClaim", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaims/{name}/status", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -32322,15 +32586,15 @@ "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "networking", - "endpoint": "readNetworkingV1beta1ServiceCIDR", + "category": "resource", + "endpoint": "readResourceV1beta1NamespacedResourceClaimStatus", "conf_tested": false, - "description": "read the specified ServiceCIDR" + "description": "read status of the specified ResourceClaim" }, { - "kind": "ServiceCIDR", - "path": "/apis/networking.k8s.io/v1beta1/servicecidrs/{name}/status", - "group": "networking.k8s.io", + "kind": "ResourceClaimTemplate", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaimtemplates/{name}", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -32339,10 +32603,27 @@ "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "networking", - "endpoint": "readNetworkingV1beta1ServiceCIDRStatus", + "category": "resource", + "endpoint": "readResourceV1beta1NamespacedResourceClaimTemplate", "conf_tested": false, - "description": "read status of the specified ServiceCIDR" + "description": "read the specified ResourceClaimTemplate" + }, + { + "kind": "ResourceSlice", + "path": "/apis/resource.k8s.io/v1beta1/resourceslices/{name}", + "group": "resource.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "get", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "resource", + "endpoint": "readResourceV1beta1ResourceSlice", + "conf_tested": false, + "description": "read the specified ResourceSlice" }, { "kind": "VolumeAttributesClass", @@ -32413,9 +32694,9 @@ "description": "replace status of the specified ValidatingAdmissionPolicy" }, { - "kind": "FlowSchema", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/flowschemas/{name}", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "IPAddress", + "path": "/apis/networking.k8s.io/v1beta1/ipaddresses/{name}", + "group": "networking.k8s.io", "level": "beta", "tests": [ null @@ -32423,16 +32704,16 @@ "action": "put", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "replaceFlowcontrolApiserverV1beta3FlowSchema", + "version": "v1beta1", + "category": "networking", + "endpoint": "replaceNetworkingV1beta1IPAddress", "conf_tested": false, - "description": "replace the specified FlowSchema" + "description": "replace the specified IPAddress" }, { - "kind": "FlowSchema", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/flowschemas/{name}/status", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "ServiceCIDR", + "path": "/apis/networking.k8s.io/v1beta1/servicecidrs/{name}", + "group": "networking.k8s.io", "level": "beta", "tests": [ null @@ -32440,16 +32721,16 @@ "action": "put", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "replaceFlowcontrolApiserverV1beta3FlowSchemaStatus", + "version": "v1beta1", + "category": "networking", + "endpoint": "replaceNetworkingV1beta1ServiceCIDR", "conf_tested": false, - "description": "replace status of the specified FlowSchema" + "description": "replace the specified ServiceCIDR" }, { - "kind": "PriorityLevelConfiguration", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/prioritylevelconfigurations/{name}", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "ServiceCIDR", + "path": "/apis/networking.k8s.io/v1beta1/servicecidrs/{name}/status", + "group": "networking.k8s.io", "level": "beta", "tests": [ null @@ -32457,16 +32738,16 @@ "action": "put", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "replaceFlowcontrolApiserverV1beta3PriorityLevelConfiguration", + "version": "v1beta1", + "category": "networking", + "endpoint": "replaceNetworkingV1beta1ServiceCIDRStatus", "conf_tested": false, - "description": "replace the specified PriorityLevelConfiguration" + "description": "replace status of the specified ServiceCIDR" }, { - "kind": "PriorityLevelConfiguration", - "path": "/apis/flowcontrol.apiserver.k8s.io/v1beta3/prioritylevelconfigurations/{name}/status", - "group": "flowcontrol.apiserver.k8s.io", + "kind": "DeviceClass", + "path": "/apis/resource.k8s.io/v1beta1/deviceclasses/{name}", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -32474,16 +32755,16 @@ "action": "put", "tested": false, "release": "1.32.0", - "version": "v1beta3", - "category": "flowcontrolApiserver", - "endpoint": "replaceFlowcontrolApiserverV1beta3PriorityLevelConfigurationStatus", + "version": "v1beta1", + "category": "resource", + "endpoint": "replaceResourceV1beta1DeviceClass", "conf_tested": false, - "description": "replace status of the specified PriorityLevelConfiguration" + "description": "replace the specified DeviceClass" }, { - "kind": "IPAddress", - "path": "/apis/networking.k8s.io/v1beta1/ipaddresses/{name}", - "group": "networking.k8s.io", + "kind": "ResourceClaim", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaims/{name}", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -32492,15 +32773,15 @@ "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "networking", - "endpoint": "replaceNetworkingV1beta1IPAddress", + "category": "resource", + "endpoint": "replaceResourceV1beta1NamespacedResourceClaim", "conf_tested": false, - "description": "replace the specified IPAddress" + "description": "replace the specified ResourceClaim" }, { - "kind": "ServiceCIDR", - "path": "/apis/networking.k8s.io/v1beta1/servicecidrs/{name}", - "group": "networking.k8s.io", + "kind": "ResourceClaim", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaims/{name}/status", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -32509,15 +32790,15 @@ "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "networking", - "endpoint": "replaceNetworkingV1beta1ServiceCIDR", + "category": "resource", + "endpoint": "replaceResourceV1beta1NamespacedResourceClaimStatus", "conf_tested": false, - "description": "replace the specified ServiceCIDR" + "description": "replace status of the specified ResourceClaim" }, { - "kind": "ServiceCIDR", - "path": "/apis/networking.k8s.io/v1beta1/servicecidrs/{name}/status", - "group": "networking.k8s.io", + "kind": "ResourceClaimTemplate", + "path": "/apis/resource.k8s.io/v1beta1/namespaces/{namespace}/resourceclaimtemplates/{name}", + "group": "resource.k8s.io", "level": "beta", "tests": [ null @@ -32526,10 +32807,27 @@ "tested": false, "release": "1.32.0", "version": "v1beta1", - "category": "networking", - "endpoint": "replaceNetworkingV1beta1ServiceCIDRStatus", + "category": "resource", + "endpoint": "replaceResourceV1beta1NamespacedResourceClaimTemplate", + "conf_tested": false, + "description": "replace the specified ResourceClaimTemplate" + }, + { + "kind": "ResourceSlice", + "path": "/apis/resource.k8s.io/v1beta1/resourceslices/{name}", + "group": "resource.k8s.io", + "level": "beta", + "tests": [ + null + ], + "action": "put", + "tested": false, + "release": "1.32.0", + "version": "v1beta1", + "category": "resource", + "endpoint": "replaceResourceV1beta1ResourceSlice", "conf_tested": false, - "description": "replace status of the specified ServiceCIDR" + "description": "replace the specified ResourceSlice" }, { "kind": "VolumeAttributesClass", @@ -32549,8 +32847,8 @@ "description": "replace the specified VolumeAttributesClass" }, { - "kind": "ValidatingAdmissionPolicy", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicies", + "kind": "MutatingAdmissionPolicy", + "path": "/apis/admissionregistration.k8s.io/v1alpha1/mutatingadmissionpolicies", "group": "admissionregistration.k8s.io", "level": "alpha", "tests": [ @@ -32561,13 +32859,13 @@ "release": "1.32.0", "version": "v1alpha1", "category": "admissionregistration", - "endpoint": "createAdmissionregistrationV1alpha1ValidatingAdmissionPolicy", + "endpoint": "createAdmissionregistrationV1alpha1MutatingAdmissionPolicy", "conf_tested": false, - "description": "create a ValidatingAdmissionPolicy" + "description": "create a MutatingAdmissionPolicy" }, { - "kind": "ValidatingAdmissionPolicyBinding", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicybindings", + "kind": "MutatingAdmissionPolicyBinding", + "path": "/apis/admissionregistration.k8s.io/v1alpha1/mutatingadmissionpolicybindings", "group": "admissionregistration.k8s.io", "level": "alpha", "tests": [ @@ -32578,26 +32876,9 @@ "release": "1.32.0", "version": "v1alpha1", "category": "admissionregistration", - "endpoint": "createAdmissionregistrationV1alpha1ValidatingAdmissionPolicyBinding", - "conf_tested": false, - "description": "create a ValidatingAdmissionPolicyBinding" - }, - { - "kind": "SelfSubjectReview", - "path": "/apis/authentication.k8s.io/v1alpha1/selfsubjectreviews", - "group": "authentication.k8s.io", - "level": "alpha", - "tests": [ - "[sig-auth] SelfSubjectReview should support SelfSubjectReview API operations" - ], - "action": "post", - "tested": true, - "release": "1.32.0", - "version": "v1alpha1", - "category": "authentication", - "endpoint": "createAuthenticationV1alpha1SelfSubjectReview", + "endpoint": "createAdmissionregistrationV1alpha1MutatingAdmissionPolicyBinding", "conf_tested": false, - "description": "create a SelfSubjectReview" + "description": "create a MutatingAdmissionPolicyBinding" }, { "kind": "ClusterTrustBundle", @@ -32618,7 +32899,7 @@ }, { "kind": "LeaseCandidate", - "path": "/apis/coordination.k8s.io/v1alpha1/namespaces/{namespace}/leasecandidates", + "path": "/apis/coordination.k8s.io/v1alpha2/namespaces/{namespace}/leasecandidates", "group": "coordination.k8s.io", "level": "alpha", "tests": [ @@ -32627,9 +32908,9 @@ "action": "post", "tested": false, "release": "1.32.0", - "version": "v1alpha1", + "version": "v1alpha2", "category": "coordination", - "endpoint": "createCoordinationV1alpha1NamespacedLeaseCandidate", + "endpoint": "createCoordinationV1alpha2NamespacedLeaseCandidate", "conf_tested": false, "description": "create a LeaseCandidate" }, @@ -32667,23 +32948,6 @@ "conf_tested": false, "description": "create a DeviceClass" }, - { - "kind": "PodSchedulingContext", - "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/podschedulingcontexts", - "group": "resource.k8s.io", - "level": "alpha", - "tests": [ - null - ], - "action": "post", - "tested": false, - "release": "1.32.0", - "version": "v1alpha3", - "category": "resource", - "endpoint": "createResourceV1alpha3NamespacedPodSchedulingContext", - "conf_tested": false, - "description": "create a PodSchedulingContext" - }, { "kind": "ResourceClaim", "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/resourceclaims", @@ -32770,8 +33034,8 @@ "description": "create a VolumeAttributesClass" }, { - "kind": "ValidatingAdmissionPolicy", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicies", + "kind": "MutatingAdmissionPolicy", + "path": "/apis/admissionregistration.k8s.io/v1alpha1/mutatingadmissionpolicies", "group": "admissionregistration.k8s.io", "level": "alpha", "tests": [ @@ -32782,13 +33046,13 @@ "release": "1.32.0", "version": "v1alpha1", "category": "admissionregistration", - "endpoint": "deleteAdmissionregistrationV1alpha1CollectionValidatingAdmissionPolicy", + "endpoint": "deleteAdmissionregistrationV1alpha1CollectionMutatingAdmissionPolicy", "conf_tested": false, - "description": "delete collection of ValidatingAdmissionPolicy" + "description": "delete collection of MutatingAdmissionPolicy" }, { - "kind": "ValidatingAdmissionPolicyBinding", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicybindings", + "kind": "MutatingAdmissionPolicyBinding", + "path": "/apis/admissionregistration.k8s.io/v1alpha1/mutatingadmissionpolicybindings", "group": "admissionregistration.k8s.io", "level": "alpha", "tests": [ @@ -32799,13 +33063,13 @@ "release": "1.32.0", "version": "v1alpha1", "category": "admissionregistration", - "endpoint": "deleteAdmissionregistrationV1alpha1CollectionValidatingAdmissionPolicyBinding", + "endpoint": "deleteAdmissionregistrationV1alpha1CollectionMutatingAdmissionPolicyBinding", "conf_tested": false, - "description": "delete collection of ValidatingAdmissionPolicyBinding" + "description": "delete collection of MutatingAdmissionPolicyBinding" }, { - "kind": "ValidatingAdmissionPolicy", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicies/{name}", + "kind": "MutatingAdmissionPolicy", + "path": "/apis/admissionregistration.k8s.io/v1alpha1/mutatingadmissionpolicies/{name}", "group": "admissionregistration.k8s.io", "level": "alpha", "tests": [ @@ -32816,13 +33080,13 @@ "release": "1.32.0", "version": "v1alpha1", "category": "admissionregistration", - "endpoint": "deleteAdmissionregistrationV1alpha1ValidatingAdmissionPolicy", + "endpoint": "deleteAdmissionregistrationV1alpha1MutatingAdmissionPolicy", "conf_tested": false, - "description": "delete a ValidatingAdmissionPolicy" + "description": "delete a MutatingAdmissionPolicy" }, { - "kind": "ValidatingAdmissionPolicyBinding", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicybindings/{name}", + "kind": "MutatingAdmissionPolicyBinding", + "path": "/apis/admissionregistration.k8s.io/v1alpha1/mutatingadmissionpolicybindings/{name}", "group": "admissionregistration.k8s.io", "level": "alpha", "tests": [ @@ -32833,9 +33097,9 @@ "release": "1.32.0", "version": "v1alpha1", "category": "admissionregistration", - "endpoint": "deleteAdmissionregistrationV1alpha1ValidatingAdmissionPolicyBinding", + "endpoint": "deleteAdmissionregistrationV1alpha1MutatingAdmissionPolicyBinding", "conf_tested": false, - "description": "delete a ValidatingAdmissionPolicyBinding" + "description": "delete a MutatingAdmissionPolicyBinding" }, { "kind": "ClusterTrustBundle", @@ -32873,7 +33137,7 @@ }, { "kind": "LeaseCandidate", - "path": "/apis/coordination.k8s.io/v1alpha1/namespaces/{namespace}/leasecandidates", + "path": "/apis/coordination.k8s.io/v1alpha2/namespaces/{namespace}/leasecandidates", "group": "coordination.k8s.io", "level": "alpha", "tests": [ @@ -32882,15 +33146,15 @@ "action": "deletecollection", "tested": false, "release": "1.32.0", - "version": "v1alpha1", + "version": "v1alpha2", "category": "coordination", - "endpoint": "deleteCoordinationV1alpha1CollectionNamespacedLeaseCandidate", + "endpoint": "deleteCoordinationV1alpha2CollectionNamespacedLeaseCandidate", "conf_tested": false, "description": "delete collection of LeaseCandidate" }, { "kind": "LeaseCandidate", - "path": "/apis/coordination.k8s.io/v1alpha1/namespaces/{namespace}/leasecandidates/{name}", + "path": "/apis/coordination.k8s.io/v1alpha2/namespaces/{namespace}/leasecandidates/{name}", "group": "coordination.k8s.io", "level": "alpha", "tests": [ @@ -32899,9 +33163,9 @@ "action": "delete", "tested": false, "release": "1.32.0", - "version": "v1alpha1", + "version": "v1alpha2", "category": "coordination", - "endpoint": "deleteCoordinationV1alpha1NamespacedLeaseCandidate", + "endpoint": "deleteCoordinationV1alpha2NamespacedLeaseCandidate", "conf_tested": false, "description": "delete a LeaseCandidate" }, @@ -32956,23 +33220,6 @@ "conf_tested": false, "description": "delete collection of DeviceClass" }, - { - "kind": "PodSchedulingContext", - "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/podschedulingcontexts", - "group": "resource.k8s.io", - "level": "alpha", - "tests": [ - null - ], - "action": "deletecollection", - "tested": false, - "release": "1.32.0", - "version": "v1alpha3", - "category": "resource", - "endpoint": "deleteResourceV1alpha3CollectionNamespacedPodSchedulingContext", - "conf_tested": false, - "description": "delete collection of PodSchedulingContext" - }, { "kind": "ResourceClaim", "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/resourceclaims", @@ -33041,23 +33288,6 @@ "conf_tested": false, "description": "delete a DeviceClass" }, - { - "kind": "PodSchedulingContext", - "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/podschedulingcontexts/{name}", - "group": "resource.k8s.io", - "level": "alpha", - "tests": [ - null - ], - "action": "delete", - "tested": false, - "release": "1.32.0", - "version": "v1alpha3", - "category": "resource", - "endpoint": "deleteResourceV1alpha3NamespacedPodSchedulingContext", - "conf_tested": false, - "description": "delete a PodSchedulingContext" - }, { "kind": "ResourceClaim", "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/resourceclaims/{name}", @@ -33194,23 +33424,6 @@ "conf_tested": false, "description": "get available resources" }, - { - "kind": null, - "path": "/apis/authentication.k8s.io/v1alpha1/", - "group": null, - "level": "alpha", - "tests": [ - null - ], - "action": null, - "tested": false, - "release": "1.32.0", - "version": null, - "category": "authentication", - "endpoint": "getAuthenticationV1alpha1APIResources", - "conf_tested": false, - "description": "get available resources" - }, { "kind": null, "path": "/apis/certificates.k8s.io/v1alpha1/", @@ -33230,7 +33443,7 @@ }, { "kind": null, - "path": "/apis/coordination.k8s.io/v1alpha1/", + "path": "/apis/coordination.k8s.io/v1alpha2/", "group": null, "level": "alpha", "tests": [ @@ -33241,7 +33454,7 @@ "release": "1.32.0", "version": null, "category": "coordination", - "endpoint": "getCoordinationV1alpha1APIResources", + "endpoint": "getCoordinationV1alpha2APIResources", "conf_tested": false, "description": "get available resources" }, @@ -33314,8 +33527,8 @@ "description": "get available resources" }, { - "kind": "ValidatingAdmissionPolicy", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicies", + "kind": "MutatingAdmissionPolicy", + "path": "/apis/admissionregistration.k8s.io/v1alpha1/mutatingadmissionpolicies", "group": "admissionregistration.k8s.io", "level": "alpha", "tests": [ @@ -33326,13 +33539,13 @@ "release": "1.32.0", "version": "v1alpha1", "category": "admissionregistration", - "endpoint": "listAdmissionregistrationV1alpha1ValidatingAdmissionPolicy", + "endpoint": "listAdmissionregistrationV1alpha1MutatingAdmissionPolicy", "conf_tested": false, - "description": "list or watch objects of kind ValidatingAdmissionPolicy" + "description": "list or watch objects of kind MutatingAdmissionPolicy" }, { - "kind": "ValidatingAdmissionPolicyBinding", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicybindings", + "kind": "MutatingAdmissionPolicyBinding", + "path": "/apis/admissionregistration.k8s.io/v1alpha1/mutatingadmissionpolicybindings", "group": "admissionregistration.k8s.io", "level": "alpha", "tests": [ @@ -33343,9 +33556,9 @@ "release": "1.32.0", "version": "v1alpha1", "category": "admissionregistration", - "endpoint": "listAdmissionregistrationV1alpha1ValidatingAdmissionPolicyBinding", + "endpoint": "listAdmissionregistrationV1alpha1MutatingAdmissionPolicyBinding", "conf_tested": false, - "description": "list or watch objects of kind ValidatingAdmissionPolicyBinding" + "description": "list or watch objects of kind MutatingAdmissionPolicyBinding" }, { "kind": "ClusterTrustBundle", @@ -33366,7 +33579,7 @@ }, { "kind": "LeaseCandidate", - "path": "/apis/coordination.k8s.io/v1alpha1/leasecandidates", + "path": "/apis/coordination.k8s.io/v1alpha2/leasecandidates", "group": "coordination.k8s.io", "level": "alpha", "tests": [ @@ -33375,15 +33588,15 @@ "action": "list", "tested": false, "release": "1.32.0", - "version": "v1alpha1", + "version": "v1alpha2", "category": "coordination", - "endpoint": "listCoordinationV1alpha1LeaseCandidateForAllNamespaces", + "endpoint": "listCoordinationV1alpha2LeaseCandidateForAllNamespaces", "conf_tested": false, "description": "list or watch objects of kind LeaseCandidate" }, { "kind": "LeaseCandidate", - "path": "/apis/coordination.k8s.io/v1alpha1/namespaces/{namespace}/leasecandidates", + "path": "/apis/coordination.k8s.io/v1alpha2/namespaces/{namespace}/leasecandidates", "group": "coordination.k8s.io", "level": "alpha", "tests": [ @@ -33392,9 +33605,9 @@ "action": "list", "tested": false, "release": "1.32.0", - "version": "v1alpha1", + "version": "v1alpha2", "category": "coordination", - "endpoint": "listCoordinationV1alpha1NamespacedLeaseCandidate", + "endpoint": "listCoordinationV1alpha2NamespacedLeaseCandidate", "conf_tested": false, "description": "list or watch objects of kind LeaseCandidate" }, @@ -33432,23 +33645,6 @@ "conf_tested": false, "description": "list or watch objects of kind DeviceClass" }, - { - "kind": "PodSchedulingContext", - "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/podschedulingcontexts", - "group": "resource.k8s.io", - "level": "alpha", - "tests": [ - null - ], - "action": "list", - "tested": false, - "release": "1.32.0", - "version": "v1alpha3", - "category": "resource", - "endpoint": "listResourceV1alpha3NamespacedPodSchedulingContext", - "conf_tested": false, - "description": "list or watch objects of kind PodSchedulingContext" - }, { "kind": "ResourceClaim", "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/resourceclaims", @@ -33483,23 +33679,6 @@ "conf_tested": false, "description": "list or watch objects of kind ResourceClaimTemplate" }, - { - "kind": "PodSchedulingContext", - "path": "/apis/resource.k8s.io/v1alpha3/podschedulingcontexts", - "group": "resource.k8s.io", - "level": "alpha", - "tests": [ - null - ], - "action": "list", - "tested": false, - "release": "1.32.0", - "version": "v1alpha3", - "category": "resource", - "endpoint": "listResourceV1alpha3PodSchedulingContextForAllNamespaces", - "conf_tested": false, - "description": "list or watch objects of kind PodSchedulingContext" - }, { "kind": "ResourceClaim", "path": "/apis/resource.k8s.io/v1alpha3/resourceclaims", @@ -33586,25 +33765,8 @@ "description": "list or watch objects of kind VolumeAttributesClass" }, { - "kind": "ValidatingAdmissionPolicy", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicies/{name}", - "group": "admissionregistration.k8s.io", - "level": "alpha", - "tests": [ - null - ], - "action": "patch", - "tested": false, - "release": "1.32.0", - "version": "v1alpha1", - "category": "admissionregistration", - "endpoint": "patchAdmissionregistrationV1alpha1ValidatingAdmissionPolicy", - "conf_tested": false, - "description": "partially update the specified ValidatingAdmissionPolicy" - }, - { - "kind": "ValidatingAdmissionPolicyBinding", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicybindings/{name}", + "kind": "MutatingAdmissionPolicy", + "path": "/apis/admissionregistration.k8s.io/v1alpha1/mutatingadmissionpolicies/{name}", "group": "admissionregistration.k8s.io", "level": "alpha", "tests": [ @@ -33615,13 +33777,13 @@ "release": "1.32.0", "version": "v1alpha1", "category": "admissionregistration", - "endpoint": "patchAdmissionregistrationV1alpha1ValidatingAdmissionPolicyBinding", + "endpoint": "patchAdmissionregistrationV1alpha1MutatingAdmissionPolicy", "conf_tested": false, - "description": "partially update the specified ValidatingAdmissionPolicyBinding" + "description": "partially update the specified MutatingAdmissionPolicy" }, { - "kind": "ValidatingAdmissionPolicy", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicies/{name}/status", + "kind": "MutatingAdmissionPolicyBinding", + "path": "/apis/admissionregistration.k8s.io/v1alpha1/mutatingadmissionpolicybindings/{name}", "group": "admissionregistration.k8s.io", "level": "alpha", "tests": [ @@ -33632,9 +33794,9 @@ "release": "1.32.0", "version": "v1alpha1", "category": "admissionregistration", - "endpoint": "patchAdmissionregistrationV1alpha1ValidatingAdmissionPolicyStatus", + "endpoint": "patchAdmissionregistrationV1alpha1MutatingAdmissionPolicyBinding", "conf_tested": false, - "description": "partially update status of the specified ValidatingAdmissionPolicy" + "description": "partially update the specified MutatingAdmissionPolicyBinding" }, { "kind": "ClusterTrustBundle", @@ -33655,7 +33817,7 @@ }, { "kind": "LeaseCandidate", - "path": "/apis/coordination.k8s.io/v1alpha1/namespaces/{namespace}/leasecandidates/{name}", + "path": "/apis/coordination.k8s.io/v1alpha2/namespaces/{namespace}/leasecandidates/{name}", "group": "coordination.k8s.io", "level": "alpha", "tests": [ @@ -33664,9 +33826,9 @@ "action": "patch", "tested": false, "release": "1.32.0", - "version": "v1alpha1", + "version": "v1alpha2", "category": "coordination", - "endpoint": "patchCoordinationV1alpha1NamespacedLeaseCandidate", + "endpoint": "patchCoordinationV1alpha2NamespacedLeaseCandidate", "conf_tested": false, "description": "partially update the specified LeaseCandidate" }, @@ -33721,40 +33883,6 @@ "conf_tested": false, "description": "partially update the specified DeviceClass" }, - { - "kind": "PodSchedulingContext", - "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/podschedulingcontexts/{name}", - "group": "resource.k8s.io", - "level": "alpha", - "tests": [ - null - ], - "action": "patch", - "tested": false, - "release": "1.32.0", - "version": "v1alpha3", - "category": "resource", - "endpoint": "patchResourceV1alpha3NamespacedPodSchedulingContext", - "conf_tested": false, - "description": "partially update the specified PodSchedulingContext" - }, - { - "kind": "PodSchedulingContext", - "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/podschedulingcontexts/{name}/status", - "group": "resource.k8s.io", - "level": "alpha", - "tests": [ - null - ], - "action": "patch", - "tested": false, - "release": "1.32.0", - "version": "v1alpha3", - "category": "resource", - "endpoint": "patchResourceV1alpha3NamespacedPodSchedulingContextStatus", - "conf_tested": false, - "description": "partially update status of the specified PodSchedulingContext" - }, { "kind": "ResourceClaim", "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/resourceclaims/{name}", @@ -33875,25 +34003,8 @@ "description": "partially update the specified VolumeAttributesClass" }, { - "kind": "ValidatingAdmissionPolicy", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicies/{name}", - "group": "admissionregistration.k8s.io", - "level": "alpha", - "tests": [ - null - ], - "action": "get", - "tested": false, - "release": "1.32.0", - "version": "v1alpha1", - "category": "admissionregistration", - "endpoint": "readAdmissionregistrationV1alpha1ValidatingAdmissionPolicy", - "conf_tested": false, - "description": "read the specified ValidatingAdmissionPolicy" - }, - { - "kind": "ValidatingAdmissionPolicyBinding", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicybindings/{name}", + "kind": "MutatingAdmissionPolicy", + "path": "/apis/admissionregistration.k8s.io/v1alpha1/mutatingadmissionpolicies/{name}", "group": "admissionregistration.k8s.io", "level": "alpha", "tests": [ @@ -33904,13 +34015,13 @@ "release": "1.32.0", "version": "v1alpha1", "category": "admissionregistration", - "endpoint": "readAdmissionregistrationV1alpha1ValidatingAdmissionPolicyBinding", + "endpoint": "readAdmissionregistrationV1alpha1MutatingAdmissionPolicy", "conf_tested": false, - "description": "read the specified ValidatingAdmissionPolicyBinding" + "description": "read the specified MutatingAdmissionPolicy" }, { - "kind": "ValidatingAdmissionPolicy", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicies/{name}/status", + "kind": "MutatingAdmissionPolicyBinding", + "path": "/apis/admissionregistration.k8s.io/v1alpha1/mutatingadmissionpolicybindings/{name}", "group": "admissionregistration.k8s.io", "level": "alpha", "tests": [ @@ -33921,9 +34032,9 @@ "release": "1.32.0", "version": "v1alpha1", "category": "admissionregistration", - "endpoint": "readAdmissionregistrationV1alpha1ValidatingAdmissionPolicyStatus", + "endpoint": "readAdmissionregistrationV1alpha1MutatingAdmissionPolicyBinding", "conf_tested": false, - "description": "read status of the specified ValidatingAdmissionPolicy" + "description": "read the specified MutatingAdmissionPolicyBinding" }, { "kind": "ClusterTrustBundle", @@ -33944,7 +34055,7 @@ }, { "kind": "LeaseCandidate", - "path": "/apis/coordination.k8s.io/v1alpha1/namespaces/{namespace}/leasecandidates/{name}", + "path": "/apis/coordination.k8s.io/v1alpha2/namespaces/{namespace}/leasecandidates/{name}", "group": "coordination.k8s.io", "level": "alpha", "tests": [ @@ -33953,9 +34064,9 @@ "action": "get", "tested": false, "release": "1.32.0", - "version": "v1alpha1", + "version": "v1alpha2", "category": "coordination", - "endpoint": "readCoordinationV1alpha1NamespacedLeaseCandidate", + "endpoint": "readCoordinationV1alpha2NamespacedLeaseCandidate", "conf_tested": false, "description": "read the specified LeaseCandidate" }, @@ -34010,40 +34121,6 @@ "conf_tested": false, "description": "read the specified DeviceClass" }, - { - "kind": "PodSchedulingContext", - "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/podschedulingcontexts/{name}", - "group": "resource.k8s.io", - "level": "alpha", - "tests": [ - null - ], - "action": "get", - "tested": false, - "release": "1.32.0", - "version": "v1alpha3", - "category": "resource", - "endpoint": "readResourceV1alpha3NamespacedPodSchedulingContext", - "conf_tested": false, - "description": "read the specified PodSchedulingContext" - }, - { - "kind": "PodSchedulingContext", - "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/podschedulingcontexts/{name}/status", - "group": "resource.k8s.io", - "level": "alpha", - "tests": [ - null - ], - "action": "get", - "tested": false, - "release": "1.32.0", - "version": "v1alpha3", - "category": "resource", - "endpoint": "readResourceV1alpha3NamespacedPodSchedulingContextStatus", - "conf_tested": false, - "description": "read status of the specified PodSchedulingContext" - }, { "kind": "ResourceClaim", "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/resourceclaims/{name}", @@ -34164,25 +34241,8 @@ "description": "read the specified VolumeAttributesClass" }, { - "kind": "ValidatingAdmissionPolicy", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicies/{name}", - "group": "admissionregistration.k8s.io", - "level": "alpha", - "tests": [ - null - ], - "action": "put", - "tested": false, - "release": "1.32.0", - "version": "v1alpha1", - "category": "admissionregistration", - "endpoint": "replaceAdmissionregistrationV1alpha1ValidatingAdmissionPolicy", - "conf_tested": false, - "description": "replace the specified ValidatingAdmissionPolicy" - }, - { - "kind": "ValidatingAdmissionPolicyBinding", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicybindings/{name}", + "kind": "MutatingAdmissionPolicy", + "path": "/apis/admissionregistration.k8s.io/v1alpha1/mutatingadmissionpolicies/{name}", "group": "admissionregistration.k8s.io", "level": "alpha", "tests": [ @@ -34193,13 +34253,13 @@ "release": "1.32.0", "version": "v1alpha1", "category": "admissionregistration", - "endpoint": "replaceAdmissionregistrationV1alpha1ValidatingAdmissionPolicyBinding", + "endpoint": "replaceAdmissionregistrationV1alpha1MutatingAdmissionPolicy", "conf_tested": false, - "description": "replace the specified ValidatingAdmissionPolicyBinding" + "description": "replace the specified MutatingAdmissionPolicy" }, { - "kind": "ValidatingAdmissionPolicy", - "path": "/apis/admissionregistration.k8s.io/v1alpha1/validatingadmissionpolicies/{name}/status", + "kind": "MutatingAdmissionPolicyBinding", + "path": "/apis/admissionregistration.k8s.io/v1alpha1/mutatingadmissionpolicybindings/{name}", "group": "admissionregistration.k8s.io", "level": "alpha", "tests": [ @@ -34210,9 +34270,9 @@ "release": "1.32.0", "version": "v1alpha1", "category": "admissionregistration", - "endpoint": "replaceAdmissionregistrationV1alpha1ValidatingAdmissionPolicyStatus", + "endpoint": "replaceAdmissionregistrationV1alpha1MutatingAdmissionPolicyBinding", "conf_tested": false, - "description": "replace status of the specified ValidatingAdmissionPolicy" + "description": "replace the specified MutatingAdmissionPolicyBinding" }, { "kind": "ClusterTrustBundle", @@ -34233,7 +34293,7 @@ }, { "kind": "LeaseCandidate", - "path": "/apis/coordination.k8s.io/v1alpha1/namespaces/{namespace}/leasecandidates/{name}", + "path": "/apis/coordination.k8s.io/v1alpha2/namespaces/{namespace}/leasecandidates/{name}", "group": "coordination.k8s.io", "level": "alpha", "tests": [ @@ -34242,9 +34302,9 @@ "action": "put", "tested": false, "release": "1.32.0", - "version": "v1alpha1", + "version": "v1alpha2", "category": "coordination", - "endpoint": "replaceCoordinationV1alpha1NamespacedLeaseCandidate", + "endpoint": "replaceCoordinationV1alpha2NamespacedLeaseCandidate", "conf_tested": false, "description": "replace the specified LeaseCandidate" }, @@ -34299,40 +34359,6 @@ "conf_tested": false, "description": "replace the specified DeviceClass" }, - { - "kind": "PodSchedulingContext", - "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/podschedulingcontexts/{name}", - "group": "resource.k8s.io", - "level": "alpha", - "tests": [ - null - ], - "action": "put", - "tested": false, - "release": "1.32.0", - "version": "v1alpha3", - "category": "resource", - "endpoint": "replaceResourceV1alpha3NamespacedPodSchedulingContext", - "conf_tested": false, - "description": "replace the specified PodSchedulingContext" - }, - { - "kind": "PodSchedulingContext", - "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/podschedulingcontexts/{name}/status", - "group": "resource.k8s.io", - "level": "alpha", - "tests": [ - null - ], - "action": "put", - "tested": false, - "release": "1.32.0", - "version": "v1alpha3", - "category": "resource", - "endpoint": "replaceResourceV1alpha3NamespacedPodSchedulingContextStatus", - "conf_tested": false, - "description": "replace status of the specified PodSchedulingContext" - }, { "kind": "ResourceClaim", "path": "/apis/resource.k8s.io/v1alpha3/namespaces/{namespace}/resourceclaims/{name}", @@ -34453,11 +34479,11 @@ "description": "replace the specified VolumeAttributesClass" } ], - "release_date": "2024-10-09T19:32:43", + "release_date": "2024-11-11T18:22:36", "total endpoints": 770, - "tested endpoints": 517, - "new conformance eligible endpoints": 0, - "total conformance eligible endpoints": 497, + "tested endpoints": 518, + "new conformance eligible endpoints": 3, + "total conformance eligible endpoints": 500, "tested conformance eligible endpoints": 496, "new tested conformance eligible endpoints": 0 } diff --git a/resources/coverage/conformance-coverage-per-release.json b/resources/coverage/conformance-coverage-per-release.json index 9db0f5ef..2ee05f1b 100644 --- a/resources/coverage/conformance-coverage-per-release.json +++ b/resources/coverage/conformance-coverage-per-release.json @@ -245,10 +245,10 @@ { "tested": 0, "release": "1.32.0", - "untested": 0, + "untested": 3, "total tested": 496, - "new endpoints": 0, - "total untested": 1, - "total endpoints": 497 + "new endpoints": 3, + "total untested": 4, + "total endpoints": 500 } ] diff --git a/resources/coverage/conformance-endpoints.json b/resources/coverage/conformance-endpoints.json index 1d5b94aa..60d50f2e 100644 --- a/resources/coverage/conformance-endpoints.json +++ b/resources/coverage/conformance-endpoints.json @@ -1,4 +1,28 @@ [ + { + "tests": [ + null + ], + "endpoint": "patchCoreV1NamespacedPodResize", + "tested_release": null, + "promotion_release": "1.32.0" + }, + { + "tests": [ + null + ], + "endpoint": "readCoreV1NamespacedPodResize", + "tested_release": null, + "promotion_release": "1.32.0" + }, + { + "tests": [ + null + ], + "endpoint": "replaceCoreV1NamespacedPodResize", + "tested_release": null, + "promotion_release": "1.32.0" + }, { "tests": [ { @@ -44,7 +68,8 @@ "release": "1.30.0", "codename": "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should validate against a Deployment [Conformance]", "testname": "ValidatingAdmissionPolicy" - } + }, + null ], "endpoint": "createAdmissionregistrationV1ValidatingAdmissionPolicyBinding", "tested_release": "1.30.0", @@ -121,7 +146,8 @@ "release": "1.30.0", "codename": "[sig-api-machinery] ValidatingAdmissionPolicy [Privileged:ClusterAdmin] should validate against a Deployment [Conformance]", "testname": "ValidatingAdmissionPolicy" - } + }, + null ], "endpoint": "deleteAdmissionregistrationV1ValidatingAdmissionPolicyBinding", "tested_release": "1.30.0", @@ -2427,8 +2453,7 @@ "release": "1.32.0", "codename": "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]", "testname": "CSINode, lifecycle" - }, - null + } ], "endpoint": "deleteStorageV1CollectionCSINode", "tested_release": "1.32.0", @@ -2441,8 +2466,7 @@ "release": "1.32.0", "codename": "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]", "testname": "CSINode, lifecycle" - }, - null + } ], "endpoint": "deleteStorageV1CSINode", "tested_release": "1.32.0", @@ -2494,8 +2518,7 @@ "release": "1.32.0", "codename": "[sig-storage] CSINodes CSI Conformance should run through the lifecycle of a csinode [Conformance]", "testname": "CSINode, lifecycle" - }, - null + } ], "endpoint": "patchStorageV1CSINode", "tested_release": "1.32.0", @@ -15404,12 +15427,6 @@ "codename": "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should honor timeout [Conformance]", "testname": "Admission webhook, honor timeout" }, - { - "file": "test/e2e/apimachinery/webhook.go", - "release": "1.16.0", - "codename": "[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should not be able to mutate or prevent deletion of webhook configuration objects [Conformance]", - "testname": "Admission webhook, admission control not allowed on webhook configuration objects" - }, { "file": "test/e2e/auth/service_accounts.go", "release": "1.21.0", @@ -27108,6 +27125,12 @@ "codename": "[sig-apps] Deployment deployment should delete old replica sets [Conformance]", "testname": "Deployment RevisionHistoryLimit" }, + { + "file": "test/e2e/apps/deployment.go", + "release": "1.12.0", + "codename": "[sig-apps] Deployment deployment should support proportional scaling [Conformance]", + "testname": "Deployment Proportional Scaling" + }, { "file": "test/e2e/apps/deployment.go", "release": "1.12.0", diff --git a/resources/coverage/conformance-progress.json b/resources/coverage/conformance-progress.json index 7feb6645..ae1bddba 100644 --- a/resources/coverage/conformance-progress.json +++ b/resources/coverage/conformance-progress.json @@ -289,13 +289,13 @@ }, { "total": { - "new": 0, + "new": 3, "tested": 496, - "endpoints": 497, + "endpoints": 500, "new_tested": 0, "old_tested": 12, "new_with_tests": 0, - "still_untested": 0 + "still_untested": 3 }, "release": "1.32.0" }