@@ -46,6 +46,7 @@ def setup_spark(configure_security, configure_universe):
46
46
47
47
@pytest .mark .xfail (utils .is_strict (), reason = "Currently fails in strict mode" )
48
48
@pytest .mark .sanity
49
+ @pytest .mark .smoke
49
50
def test_jar (app_name = utils .SPARK_APP_NAME ):
50
51
master_url = ("https" if utils .is_strict () else "http" ) + "://leader.mesos:5050"
51
52
spark_job_runner_args = '{} dcos \\ "*\\ " spark:only 2 --auth-token={}' .format (
@@ -60,6 +61,7 @@ def test_jar(app_name=utils.SPARK_APP_NAME):
60
61
61
62
62
63
@pytest .mark .sanity
64
+ @pytest .mark .smoke
63
65
def test_rpc_auth ():
64
66
secret_name = "sparkauth"
65
67
@@ -94,6 +96,7 @@ def test_sparkPi(app_name=utils.SPARK_APP_NAME):
94
96
95
97
96
98
@pytest .mark .sanity
99
+ @pytest .mark .smoke
97
100
def test_python ():
98
101
python_script_path = os .path .join (THIS_DIR , 'jobs' , 'python' , 'pi_with_include.py' )
99
102
python_script_url = utils .upload_file (python_script_path )
@@ -106,6 +109,7 @@ def test_python():
106
109
107
110
108
111
@pytest .mark .sanity
112
+ @pytest .mark .smoke
109
113
def test_r ():
110
114
r_script_path = os .path .join (THIS_DIR , 'jobs' , 'R' , 'dataframe.R' )
111
115
r_script_url = utils .upload_file (r_script_path )
@@ -125,6 +129,7 @@ def test_cni():
125
129
126
130
#@pytest.mark.skip("Enable when SPARK-21694 is merged and released in DC/OS Spark")
127
131
@pytest .mark .sanity
132
+ @pytest .mark .smoke
128
133
def test_cni_labels ():
129
134
driver_task_id = utils .submit_job (app_url = utils .SPARK_EXAMPLES ,
130
135
app_args = "3000" , # Long enough to examine the Driver's & Executor's task infos
@@ -166,6 +171,7 @@ def _check_task_network_info(task):
166
171
167
172
168
173
@pytest .mark .sanity
174
+ @pytest .mark .smoke
169
175
def test_s3 ():
170
176
def make_credential_secret (envvar , secret_path ):
171
177
rc , stdout , stderr = sdk_cmd .run_raw_cli ("security secrets create {p} -v {e}"
@@ -234,6 +240,7 @@ def make_credential_secret(envvar, secret_path):
234
240
# Skip DC/OS < 1.10, because it doesn't have adminrouter support for service groups.
235
241
@pytest .mark .skipif ('shakedown.dcos_version_less_than("1.10")' )
236
242
@pytest .mark .sanity
243
+ @pytest .mark .smoke
237
244
def test_marathon_group ():
238
245
app_id = utils .FOLDERED_SPARK_APP_NAME
239
246
options = {"service" : {"name" : app_id }}
@@ -243,6 +250,7 @@ def test_marathon_group():
243
250
#shakedown.uninstall_package_and_wait(SPARK_PACKAGE_NAME, app_id)
244
251
245
252
253
+
246
254
@pytest .mark .sanity
247
255
def test_cli_multiple_spaces ():
248
256
utils .run_tests (app_url = utils .SPARK_EXAMPLES ,
@@ -256,6 +264,7 @@ def test_cli_multiple_spaces():
256
264
@pytest .mark .skipif ('shakedown.dcos_version_less_than("1.10")' )
257
265
@sdk_utils .dcos_ee_only
258
266
@pytest .mark .sanity
267
+ @pytest .mark .smoke
259
268
def test_driver_executor_tls ():
260
269
'''
261
270
Put keystore and truststore as secrets in DC/OS secret store.
0 commit comments