diff --git a/.ci/pipeline_definitions b/.ci/pipeline_definitions index 8e3e356220..ff5adc06ce 100644 --- a/.ci/pipeline_definitions +++ b/.ci/pipeline_definitions @@ -1,5 +1,104 @@ test-infra: + base_definition: + traits: + component_descriptor: ~ + scheduling: + suppress_parallel_execution: true + version: + preprocess: + 'inject-commit-hash' + inject_effective_version: true + notifications: + default: + on_error: + triggering_policy: 'only_first' + publish: + oci-builder: 'docker-buildx' jobs: head-update: traits: - version: ~ + publish: + dockerimages: &default_images + tm-base-image: + registry: 'gcr-readwrite' + image: eu.gcr.io/gardener-project/gardener/testmachinery/base-step + dockerfile: 'Dockerfile' + target: base-step + tag_as_latest: true + tm-controller: + registry: 'gcr-readwrite' + image: eu.gcr.io/gardener-project/gardener/testmachinery/testmachinery-controller + dockerfile: 'Dockerfile' + target: tm-controller + tag_as_latest: true + tm-run: + registry: 'gcr-readwrite' + image: eu.gcr.io/gardener-project/gardener/testmachinery/testmachinery-run + dockerfile: 'Dockerfile' + target: tm-run + tag_as_latest: true + tm-bot: + registry: 'gcr-readwrite' + image: eu.gcr.io/gardener-project/gardener/testmachinery/bot + dockerfile: 'Dockerfile' + target: tm-bot + tag_as_latest: true + tm-prepare-image: + registry: 'gcr-readwrite' + image: eu.gcr.io/gardener-project/gardener/testmachinery/prepare-step + dockerfile: 'Dockerfile' + target: tm-prepare + tag_as_latest: true + draft_release: ~ + steps: &default_steps + check: + image: 'golang:1.20.3' + test: + image: 'golang:1.20.3' + test-definitions: + image: 'golang:1.20.3' + pull-request: + traits: + publish: + <<: *default_images + steps: + <<: *default_steps + release: + traits: + version: + preprocess: 'finalize' + release: + nextversion: 'bump_minor' + slack: + default_channel: 'internal_ti_workspace' + channel_cfgs: + internal_ti_workspace: + channel_name: 'gardener-oq' + slack_cfg_name: 'ti_workspace' + scheduling: + suppress_parallel_execution: true + <<: *ti_docker_images + steps: + <<: *default_steps + publish-helm: + execute: + - ./publish-helm + trait_depends: + - release + + ##################### + # Images # + ##################### + tm-golang-image: + repo: + trigger: false + traits: + version: + preprocess: 'finalize' + publish: + dockerimages: + tm-golang-image: + image: eu.gcr.io/gardener-project/gardener/testmachinery/golang + dockerfile: 'Dockerfile' + dir: 'hack/images/golang' + tag_as_latest: true diff --git a/VERSION b/VERSION index 7055d5fb25..b4a431033e 100644 --- a/VERSION +++ b/VERSION @@ -1 +1 @@ -0.250.0-dev \ No newline at end of file +0.251.0-dev \ No newline at end of file diff --git a/integration-tests/e2e/kubetest/description/1.28/false_positives.json b/integration-tests/e2e/kubetest/description/1.28/false_positives.json new file mode 100644 index 0000000000..9e1d085df5 --- /dev/null +++ b/integration-tests/e2e/kubetest/description/1.28/false_positives.json @@ -0,0 +1,62 @@ +[ + { "testcase": "[sig-api-machinery] CustomResourceConversionWebhook [Feature:CustomResourceWebhookConversion] Should be able to convert a non homogeneous list of CRs" }, + { "testcase": "[sig-api-machinery] CustomResourceConversionWebhook [Feature:CustomResourceWebhookConversion] Should be able to convert from CR v1 to CR v2" }, + { "testcase": "[k8s.io] Variable Expansion should allow substituting values in a volume subpath [Feature:VolumeSubpathEnvExpansion][NodeAlphaFeature:VolumeSubpathEnvExpansion]" }, + { "testcase": "[k8s.io] [Feature:NodeLease][NodeAlphaFeature:NodeLease] when the NodeLease feature is enabled the kubelet should create and update a lease in the kube-node-lease namespace" }, + { "testcase": "[k8s.io] [Feature:NodeLease][NodeAlphaFeature:NodeLease] when the NodeLease feature is enabled the kubelet should report node status infrequently" }, + { "testcase": "[sig-cluster-lifecycle] Ports Security Check [Feature:KubeletSecurity] should not have port 10255 open on its all public IP addresses" }, + { "testcase": "[sig-cluster-lifecycle] Ports Security Check [Feature:KubeletSecurity] should not have port 4194 open on its all public IP addresses" }, + { "testcase": "[k8s.io] [sig-node] Pod garbage collector [Feature:PodGarbageCollector] [Slow] should handle the creation of 1000 pods" }, + { "testcase": "[k8s.io] [sig-node] RuntimeClass [Feature:RuntimeClass] should recover when the RuntimeClass CRD is deleted [Slow]" }, + { "testcase": "[k8s.io] [sig-node] RuntimeClass [Feature:RuntimeClass] should reject a Pod requesting a RuntimeClass with an unconfigured handler" }, + { "testcase": "[k8s.io] [sig-node] RuntimeClass [Feature:RuntimeClass] should reject a Pod requesting a deleted RuntimeClass" }, + { "testcase": "[k8s.io] [sig-node] RuntimeClass [Feature:RuntimeClass] should reject a Pod requesting a non-existent RuntimeClass" }, + { "testcase": "[k8s.io] [sig-node] RuntimeClass [Feature:RuntimeClass] should run a Pod requesting a RuntimeClass with an empty handler" }, + { "testcase": "[sig-apps] stateful Upgrade [Feature:StatefulUpgrade] [k8s.io] stateful upgrade should maintain a functioning cluster" }, + { "testcase": "[sig-cluster-lifecycle] [Feature:BootstrapTokens] should delete the signed bootstrap tokens from clusterInfo ConfigMap when bootstrap token is deleted" }, + { "testcase": "[sig-cluster-lifecycle] [Feature:BootstrapTokens] should sign the new added bootstrap tokens" }, + { "testcase": "[sig-cluster-lifecycle] Downgrade [Feature:Downgrade] cluster downgrade should maintain a functioning cluster [Feature:ClusterDowngrade]" }, + { "testcase": "[sig-cluster-lifecycle] Upgrade [Feature:Upgrade] cluster upgrade should maintain a functioning cluster [Feature:ClusterUpgrade] " }, + { "testcase": "[sig-cluster-lifecycle] Upgrade [Feature:Upgrade] master upgrade should maintain a functioning cluster [Feature:MasterUpgrade]" }, + { "testcase": "[sig-cluster-lifecycle] Upgrade [Feature:Upgrade] node upgrade should maintain a functioning cluster [Feature:NodeUpgrade]" }, + { "testcase": "[sig-cluster-lifecycle] ingress Downgrade [Feature:IngressDowngrade] ingress downgrade should maintain a functioning ingress" }, + { "testcase": "[sig-cluster-lifecycle] ingress Upgrade [Feature:IngressUpgrade] ingress upgrade should maintain a functioning ingress" }, + { "testcase": "[sig-cluster-lifecycle] etcd Upgrade [Feature:EtcdUpgrade] etcd upgrade should maintain a functioning cluster" }, + { "testcase": "[sig-instrumentation] Cluster level logging implemented by Stackdriver [Feature:StackdriverLogging] [Soak] should ingest logs from applications running for a prolonged amount of time" }, + { "testcase": "[sig-network] DNS configMap federations [Feature:Federation] should be able to change federation configuration [Slow][Serial]" }, + { "testcase": "[sig-network] DNS configMap nameserver [Feature:Networking-IPv6] Change stubDomain should be able to change stubDomain configuration [Slow][Serial]" }, + { "testcase": "[sig-network] DNS configMap nameserver [Feature:Networking-IPv6] Forward PTR lookup should forward PTR records lookup to upstream nameserver [Slow][Serial]" }, + { "testcase": "[sig-network] DNS configMap nameserver [Feature:Networking-IPv6] Forward external name lookup should forward externalname lookup to upstream nameserver [Slow][Serial]" }, + { "testcase": "[sig-network] DNS configMap nameserver [IPv4] Change stubDomain should be able to change stubDomain configuration [Slow][Serial]" }, + { "testcase": "[sig-network] DNS configMap nameserver [IPv4] Forward PTR lookup should forward PTR records lookup to upstream nameserver [Slow][Serial]" }, + { "testcase": "[sig-scalability] Density [Feature:HighDensityPerformance] should allow starting 95 pods per node using ReplicationController with 0 secrets, 0 configmaps, 0 token projections, and 0 daemons" }, + { "testcase": "[sig-scalability] Density [Feature:ManualPerformance] should allow starting 100 pods per node using ReplicationController with 0 secrets, 0 configmaps, 0 token projections, and 0 daemons" }, + { "testcase": "[sig-scalability] Density [Feature:ManualPerformance] should allow starting 3 pods per node using ReplicationController with 0 secrets, 0 configmaps, 0 token projections, and 0 daemons" }, + { "testcase": "[sig-scalability] Density [Feature:ManualPerformance] should allow starting 30 pods per node using Deployment.extensions with 0 secrets, 0 configmaps, 0 token projections, and 0 daemons" }, + { "testcase": "[sig-scalability] Density [Feature:ManualPerformance] should allow starting 30 pods per node using Deployment.extensions with 0 secrets, 0 configmaps, 2 token projections, and 0 daemons" }, + { "testcase": "[sig-scalability] Density [Feature:ManualPerformance] should allow starting 30 pods per node using Deployment.extensions with 0 secrets, 2 configmaps, 0 token projections, and 0 daemons" }, + { "testcase": "[sig-scalability] Density [Feature:ManualPerformance] should allow starting 30 pods per node using Deployment.extensions with 2 secrets, 0 configmaps, 0 token projections, and 0 daemons" }, + { "testcase": "[sig-scalability] Density [Feature:ManualPerformance] should allow starting 30 pods per node using Job.batch with 0 secrets, 0 configmaps, 0 token projections, and 0 daemons" }, + { "testcase": "[sig-scalability] Density [Feature:ManualPerformance] should allow starting 30 pods per node using ReplicationController with 0 secrets, 0 configmaps, 0 token projections, and 0 daemons with quotas" }, + { "testcase": "[sig-scalability] Density [Feature:ManualPerformance] should allow starting 30 pods per node using ReplicationController with 0 secrets, 0 configmaps, 0 token projections, and 2 daemons" }, + { "testcase": "[sig-scalability] Density [Feature:ManualPerformance] should allow starting 50 pods per node using ReplicationController with 0 secrets, 0 configmaps, 0 token projections, and 0 daemons" }, + { "testcase": "[sig-scalability] Density [Feature:Performance] should allow starting 30 pods per node using ReplicationController with 0 secrets, 0 configmaps, 0 token projections, and 0 daemons" }, + { "testcase": "[sig-scalability] Load capacity [Feature:ManualPerformance] should be able to handle 3 pods per node ReplicationController with 0 secrets, 0 configmaps and 0 daemons" }, + { "testcase": "[sig-scalability] Load capacity [Feature:ManualPerformance] should be able to handle 30 pods per node Deployment.extensions with 0 secrets, 0 configmaps and 0 daemons" }, + { "testcase": "[sig-scalability] Load capacity [Feature:ManualPerformance] should be able to handle 30 pods per node Deployment.extensions with 0 secrets, 2 configmaps and 0 daemons" }, + { "testcase": "[sig-scalability] Load capacity [Feature:ManualPerformance] should be able to handle 30 pods per node Deployment.extensions with 2 secrets, 0 configmaps and 0 daemons" }, + { "testcase": "[sig-scalability] Load capacity [Feature:ManualPerformance] should be able to handle 30 pods per node Job.batch with 0 secrets, 0 configmaps and 0 daemons" }, + { "testcase": "[sig-scalability] Load capacity [Feature:ManualPerformance] should be able to handle 30 pods per node Random with 0 secrets, 0 configmaps and 0 daemons" }, + { "testcase": "[sig-scalability] Load capacity [Feature:ManualPerformance] should be able to handle 30 pods per node Random with 0 secrets, 0 configmaps and 0 daemons with quotas" }, + { "testcase": "[sig-scalability] Load capacity [Feature:ManualPerformance] should be able to handle 30 pods per node ReplicationController with 0 secrets, 0 configmaps and 0 daemons with quotas" }, + { "testcase": "[sig-scalability] Load capacity [Feature:ManualPerformance] should be able to handle 30 pods per node ReplicationController with 0 secrets, 0 configmaps and 2 daemons" }, + { "testcase": "[sig-scalability] Load capacity [Feature:Performance] should be able to handle 30 pods per node ReplicationController with 0 secrets, 0 configmaps and 0 daemons" }, + { "testcase": "[sig-scheduling] SchedulerPredicates [Serial] validates local ephemeral storage resource limits of pods that are allowed to run [Feature:LocalStorageCapacityIsolation]" }, + { "testcase": "[sig-network] NoSNAT [Feature:NoSNAT] [Slow] Should be able to send traffic between Pods without SNAT" }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: iscsi][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted" }, + { "testcase": "[sig-scheduling] ResourceQuota [Feature:Initializers] should create a ResourceQuota and capture the life of an uninitialized pod." }, + { "testcase": "[sig-network] [Feature:PerformanceDNS][Serial] Should answer DNS query for maximum number of services per cluster" }, + { "testcase": "[Driver: iscsi]" }, + { "testcase": "[Driver: rbd]" }, + { "testcase": "[Driver: nfs]" } +] \ No newline at end of file diff --git a/integration-tests/e2e/kubetest/description/1.28/skip.json b/integration-tests/e2e/kubetest/description/1.28/skip.json new file mode 100644 index 0000000000..119ecd391f --- /dev/null +++ b/integration-tests/e2e/kubetest/description/1.28/skip.json @@ -0,0 +1,680 @@ +[{ "testcase": "[Flaky]"}, + { "testcase": "Alpha"}, + { "testcase": "[Experimental]"}, + { "testcase": "[Driver: vSphere]"}, + { "testcase": "[Driver: cinder]"}, + { "testcase": "[Driver: gluster]"}, + { "testcase": "[sig-node] RuntimeClass should run a Pod requesting a RuntimeClass with a configured handler [NodeFeature:RuntimeHandler]"}, + { "testcase": "[k8s.io] Cluster size autoscaler scalability [Slow] CA ignores unschedulable pods while scheduling schedulable pods [Feature:ClusterAutoscalerScalability6]"}, + { "testcase": "[k8s.io] Cluster size autoscaler scalability [Slow] should scale down empty nodes [Feature:ClusterAutoscalerScalability3]"}, + { "testcase": "[k8s.io] Cluster size autoscaler scalability [Slow] should scale down underutilized nodes [Feature:ClusterAutoscalerScalability4]"}, + { "testcase": "[k8s.io] Cluster size autoscaler scalability [Slow] should scale up at all [Feature:ClusterAutoscalerScalability1]"}, + { "testcase": "[k8s.io] Cluster size autoscaler scalability [Slow] should scale up twice [Feature:ClusterAutoscalerScalability2]"}, + { "testcase": "[k8s.io] Cluster size autoscaler scalability [Slow] shouldn't scale down with underutilized nodes due to host port conflicts [Feature:ClusterAutoscalerScalability5]"}, + { "testcase": "[k8s.io] GKE local SSD [Feature:GKELocalSSD] should write and read from node local SSD [Feature:GKELocalSSD]"}, + { "testcase": "[k8s.io] GKE node pools [Feature:GKENodePool] should create a cluster with multiple node pools [Feature:GKENodePool]"}, + { "testcase": "[k8s.io] Probing container should be restarted with a docker exec liveness probe with timeout"}, + { "testcase": "[k8s.io] [sig-node] AppArmor load AppArmor profiles can disable an AppArmor profile, using unconfined"}, + { "testcase": "[k8s.io] [sig-node] AppArmor load AppArmor profiles should enforce an AppArmor profile"}, + { "testcase": "[k8s.io] [sig-node] SSH should SSH to all nodes and run commands"}, + { "testcase": "[k8s.io] [sig-node] crictl should be able to run crictl on the node"}, + { "testcase": "[sig-api-machinery] AdmissionWebhook Should be able to deny attaching pod"}, + { "testcase": "[sig-api-machinery] AdmissionWebhook Should be able to deny custom resource creation"}, + { "testcase": "[sig-api-machinery] AdmissionWebhook Should be able to deny pod and configmap creation"}, + { "testcase": "[sig-api-machinery] AdmissionWebhook Should deny crd creation"}, + { "testcase": "[sig-api-machinery] AdmissionWebhook Should mutate configmap"}, + { "testcase": "[sig-api-machinery] AdmissionWebhook Should mutate custom resource"}, + { "testcase": "[sig-api-machinery] AdmissionWebhook Should mutate pod and apply defaults after mutation"}, + { "testcase": "[sig-api-machinery] AdmissionWebhook Should not be able to mutate or prevent deletion of webhook configuration objects"}, + { "testcase": "[sig-api-machinery] AdmissionWebhook Should unconditionally reject operations on fail closed webhook"}, + { "testcase": "[sig-api-machinery] Aggregator Should be able to support the 1.10 Sample API Server using the current Aggregator"}, + { "testcase": "[sig-apps] ReplicaSet should serve a basic image on each replica with a private image"}, + { "testcase": "[sig-apps] ReplicationController should serve a basic image on each replica with a private image"}, + { "testcase": "[sig-auth] Advanced Audit should audit API calls [DisabledForLargeClusters]"}, + { "testcase": "[sig-auth] Metadata Concealment should run a check-metadata-concealment job to completion"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] Should be able to scale a node group down to 0[Feature:ClusterSizeAutoscalingScaleDown]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] Should be able to scale a node group up from 0[Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] Should not scale GPU pool up if pod does not require GPUs [GpuType:] [Feature:ClusterSizeAutoscalingGpu]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] Should scale down GPU pool from 1 [GpuType:] [Feature:ClusterSizeAutoscalingGpu]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] Should scale up GPU pool from 0 [GpuType:] [Feature:ClusterSizeAutoscalingGpu]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] Should scale up GPU pool from 1 [GpuType:] [Feature:ClusterSizeAutoscalingGpu]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] Shouldn't perform scale up operation and should list unhealthy status if most of the cluster is broken[Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should add node to the particular mig [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should be able to scale down by draining multiple pods one by one as dictated by pdb[Feature:ClusterSizeAutoscalingScaleDown]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should be able to scale down by draining system pods with pdb[Feature:ClusterSizeAutoscalingScaleDown]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should be able to scale down when rescheduling a pod is required and pdb allows for it[Feature:ClusterSizeAutoscalingScaleDown]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should correctly scale down after a node is not needed [Feature:ClusterSizeAutoscalingScaleDown]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should correctly scale down after a node is not needed and one node is broken [Feature:ClusterSizeAutoscalingScaleDown]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should correctly scale down after a node is not needed when there is non autoscaled pool[Feature:ClusterSizeAutoscalingScaleDown]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should disable node pool autoscaling [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pending pods are small [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pending pods are small and one node is broken [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pending pods are small and there is another node pool that is not autoscaled [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pod requesting EmptyDir volume is pending [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pod requesting volume is pending [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pods are pending due to host port conflict [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should increase cluster size if pods are pending due to pod anti-affinity [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should scale down when expendable pod is running [Feature:ClusterSizeAutoscalingScaleDown]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should scale up correct target pool [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] should scale up when non expendable pod is created [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] shouldn't be able to scale down when rescheduling a pod is required, but pdb doesn't allow drain[Feature:ClusterSizeAutoscalingScaleDown]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] shouldn't increase cluster size if pending pod is too large [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] shouldn't scale down when non expendable pod is running [Feature:ClusterSizeAutoscalingScaleDown]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] shouldn't scale up when expendable pod is created [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] shouldn't scale up when expendable pod is preempted [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] Cluster size autoscaling [Slow] shouldn't trigger additional scale-ups during processing scale-up [Feature:ClusterSizeAutoscalingScaleUp]"}, + { "testcase": "[sig-autoscaling] DNS horizontal autoscaling [DisabledForLargeClusters] kube-dns-autoscaler should scale kube-dns pods in both nonfaulty and faulty scenarios"}, + { "testcase": "[sig-autoscaling] DNS horizontal autoscaling [Serial] [Slow] kube-dns-autoscaler should scale kube-dns pods when cluster size changed"}, + { "testcase": "[sig-autoscaling] [Feature:ClusterSizeAutoscalingScaleUp] [Slow] Autoscaling [sig-autoscaling] Autoscaling a service from 1 pod and 3 nodes to 8 pods and >"}, + { "testcase": "[sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Object from Stackdriver [Feature:CustomMetricsAutoscaling]"}, + { "testcase": "[sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Pod from Stackdriver [Feature:CustomMetricsAutoscaling]"}, + { "testcase": "[sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Pod from Stackdriver with Prometheus [Feature:CustomMetricsAutoscaling]"}, + { "testcase": "[sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with External Metric with target average value from Stackdriver [Feature:CustomMetricsAutoscaling]"}, + { "testcase": "[sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with External Metric with target value from Stackdriver [Feature:CustomMetricsAutoscaling]"}, + { "testcase": "[sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale up with two External metrics from Stackdriver [Feature:CustomMetricsAutoscaling]"}, + { "testcase": "[sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale up with two metrics of type Pod from Stackdriver [Feature:CustomMetricsAutoscaling]"}, + { "testcase": "[sig-cli] Kubectl alpha client [k8s.io] Kubectl run CronJob should create a CronJob"}, + { "testcase": "[sig-cli] Kubectl client Simple pod should handle in-cluster config", "groups": ["fast"]}, + { "testcase": "[sig-cluster-lifecycle] Addon update should propagate add-on file changes [Slow]"}, + { "testcase": "[sig-cluster-lifecycle] kube-proxy migration [Feature:KubeProxyDaemonSetMigration] Downgrade kube-proxy from a DaemonSet to static pods should maintain a functioning cluster [Feature:KubeProxyDaemonSetDowngrade]"}, + { "testcase": "[sig-cluster-lifecycle] kube-proxy migration [Feature:KubeProxyDaemonSetMigration] Upgrade kube-proxy from static pods to a DaemonSet should maintain a functioning cluster [Feature:KubeProxyDaemonSetUpgrade]"}, + { "testcase": "[sig-instrumentation] Cluster level logging implemented by Stackdriver should ingest events [Feature:StackdriverLogging]"}, + { "testcase": "[sig-instrumentation] Cluster level logging implemented by Stackdriver should ingest logs [Feature:StackdriverLogging]"}, + { "testcase": "[sig-instrumentation] Cluster level logging implemented by Stackdriver should ingest system logs from all nodes [Feature:StackdriverLogging]"}, + { "testcase": "[sig-instrumentation] Cluster level logging using Elasticsearch [Feature:Elasticsearch] should check that logs from containers are ingested into Elasticsearch"}, + { "testcase": "[sig-instrumentation] Kibana Logging Instances Is Alive [Feature:Elasticsearch] should check that the Kibana logging instance is alive"}, + { "testcase": "[sig-instrumentation] Stackdriver Monitoring should have accelerator metrics [Feature:StackdriverAcceleratorMonitoring]"}, + { "testcase": "[sig-instrumentation] Stackdriver Monitoring should have cluster metrics [Feature:StackdriverMonitoring]"}, + { "testcase": "[sig-instrumentation] Stackdriver Monitoring should run Custom Metrics - Stackdriver Adapter for external metrics [Feature:StackdriverExternalMetrics]"}, + { "testcase": "[sig-instrumentation] Stackdriver Monitoring should run Custom Metrics - Stackdriver Adapter for new resource model [Feature:StackdriverCustomMetrics]"}, + { "testcase": "[sig-instrumentation] Stackdriver Monitoring should run Custom Metrics - Stackdriver Adapter for old resource model [Feature:StackdriverCustomMetrics]"}, + { "testcase": "[sig-instrumentation] Stackdriver Monitoring should run Stackdriver Metadata Agent [Feature:StackdriverMetadataAgent]"}, + { "testcase": "[sig-instrumentation] [Feature:PrometheusMonitoring] Prometheus should contain correct container CPU metric."}, + { "testcase": "[sig-instrumentation] [Feature:PrometheusMonitoring] Prometheus should scrape container metrics from all nodes."}, + { "testcase": "[sig-instrumentation] [Feature:PrometheusMonitoring] Prometheus should scrape metrics from annotated pods."}, + { "testcase": "[sig-instrumentation] [Feature:PrometheusMonitoring] Prometheus should scrape metrics from annotated services."}, + { "testcase": "[sig-instrumentation] [Feature:PrometheusMonitoring] Prometheus should successfully scrape all targets"}, + { "testcase": "[sig-network] ESIPP [Slow] [DisabledForLargeClusters] should handle updates to ExternalTrafficPolicy field"}, + { "testcase": "[sig-network] ESIPP [Slow] [DisabledForLargeClusters] should only target nodes with endpoints"}, + { "testcase": "[sig-network] ESIPP [Slow] [DisabledForLargeClusters] should work for type"}, + { "testcase": "[sig-network] ESIPP [Slow] [DisabledForLargeClusters] should work from pods"}, + { "testcase": "[sig-network] Firewall rule [Slow] [Serial] should create valid firewall rules for LoadBalancer type service"}, + { "testcase": "[sig-network] Firewall rule should have correct firewall rules for e2e cluster"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] multicluster ingress should get instance group annotation"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] should be able to switch between HTTPS and HTTP2 modes"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] should conform to Ingress spec"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] should create ingress with backend HTTPS"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] should create ingress with given static-ip"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] should create ingress with pre-shared certificate"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] should not reconcile manually modified health check for ingress"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] should support multiple TLS certs"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:Ingress] should update ingress while sync failures occur on other ingresses"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] rolling update backend pods should not cause service disruption"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should be able to create a ClusterIP service"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should be able to switch between IG and NEG modes"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should conform to Ingress spec"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should create NEGs for all ports with the Ingress annotation, and NEGs for the standalone annotation otherwise"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should sync endpoints for both Ingress-referenced NEG and standalone NEG"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:NEG] should sync endpoints to NEG"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should conform to Ingress spec"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should create ingress with backend HTTPS"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should create ingress with pre-shared certificate"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should remove clusters as expected"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] should support https-only annotation"}, + { "testcase": "[sig-network] Loadbalancing: L7 GCE [Slow] [Feature:kubemci] single and multi-cluster ingresses should be able to exist together"}, + { "testcase": "[sig-network] Loadbalancing: L7 Scalability GCE [Slow] [Serial] [Feature:IngressScale] Creating and updating ingresses should happen promptly with small/medium/large amount of ingresses"}, + { "testcase": "[sig-network] Loadbalancing: L7 [Slow] Nginx should conform to Ingress spec"}, + { "testcase": "[sig-network] Networking Granular Checks: Services [Slow] should function for client IP based session affinity: http"}, + { "testcase": "[sig-network] Networking Granular Checks: Services [Slow] should function for client IP based session affinity: udp"}, + { "testcase": "[sig-network] Networking Granular Checks: Services [Slow] should function for endpoint-Service: http"}, + { "testcase": "[sig-network] Networking Granular Checks: Services [Slow] should function for endpoint-Service: udp"}, + { "testcase": "[sig-network] Networking Granular Checks: Services [Slow] should function for node-Service: http"}, + { "testcase": "[sig-network] Networking Granular Checks: Services [Slow] should function for node-Service: udp"}, + { "testcase": "[sig-network] Networking Granular Checks: Services [Slow] should function for pod-Service: http"}, + { "testcase": "[sig-network] Networking Granular Checks: Services [Slow] should function for pod-Service: udp"}, + { "testcase": "[sig-network] Networking Granular Checks: Services [Slow] should update endpoints: http"}, + { "testcase": "[sig-network] Networking Granular Checks: Services [Slow] should update endpoints: udp"}, + { "testcase": "[sig-network] Networking Granular Checks: Services [Slow] should update nodePort: http [Slow]"}, + { "testcase": "[sig-network] Networking Granular Checks: Services [Slow] should update nodePort: udp [Slow]"}, + { "testcase": "[sig-network] Networking should check kube-proxy urls"}, + { "testcase": "[sig-network] Services [Feature:GCEAlphaFeature][Slow] should be able to create and tear down a standard-tier load balancer [Slow]"}, + { "testcase": "[sig-network] Services should be able to change the type and ports of a service [Slow] [DisabledForLargeClusters]"}, + { "testcase": "[sig-network] Services should be able to create an internal type load balancer [Slow] [DisabledForLargeClusters]"}, + { "testcase": "[sig-network] Services should be able to up and down services"}, + { "testcase": "[sig-network] Services should only allow access from service loadbalancer source ranges [Slow]"}, + { "testcase": "[sig-network] Services should reconcile LB health check interval [Slow][Serial]"}, + { "testcase": "[sig-scheduling] Multi-AZ Cluster Volumes [sig-storage] should only be allowed to provision PDs in zones where nodes exist"}, + { "testcase": "[sig-scheduling] Multi-AZ Cluster Volumes [sig-storage] should schedule pods in the same zones as statically provisioned PVs"}, + { "testcase": "[sig-scheduling] Multi-AZ Clusters should spread the pods of a replication controller across zones"}, + { "testcase": "[sig-scheduling] Multi-AZ Clusters should spread the pods of a service across zones"}, + { "testcase": "[sig-apps] stateful Upgrade [Feature:StatefulUpgrade] [k8s.io] stateful upgrade should maintain a functioning cluster"}, + { "testcase": "[sig-storage] Dynamic Provisioning DynamicProvisioner Default should create and delete default persistent volumes [Slow]"}, + { "testcase": "[sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] deletion should be idempotent"}, + { "testcase": "[sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] should not provision a volume in an unmanaged GCE zone."}, + { "testcase": "[sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] should provision storage with non-default reclaim policy Retain"}, + { "testcase": "[sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] should test that deleting a claim before the volume is provisioned deletes the volume."}, + { "testcase": "[sig-storage] Dynamic Provisioning Invalid AWS KMS key should report an error and create no PV"}, + { "testcase": "[sig-storage] Flexvolumes should be mountable when attachable"}, + { "testcase": "[sig-storage] Flexvolumes should be mountable when non-attachable"}, + { "testcase": "[sig-storage] GCP Volumes GlusterFS should be mountable"}, + { "testcase": "[sig-storage] GCP Volumes NFSv3 should be mountable for NFSv3"}, + { "testcase": "[sig-storage] GCP Volumes NFSv4 should be mountable for NFSv4"}, + { "testcase": "[sig-storage] Mounted flexvolume expand[Slow] Should verify mounted flex volumes can be resized"}, + { "testcase": "[sig-storage] Mounted flexvolume volume expand [Slow] [Feature:ExpandInUsePersistentVolumes] should be resizable when mounted"}, + { "testcase": "[sig-storage] Mounted volume expand[Slow] Should verify mounted devices can be resized"}, + { "testcase": "[sig-storage] PersistentVolumes Default StorageClass pods that use multiple volumes should be reschedulable [Slow]"}, + { "testcase": "[sig-storage] PersistentVolumes GCEPD should test that deleting a PVC before the pod does not cause pod deletion to fail on PD detach"}, + { "testcase": "[sig-storage] PersistentVolumes GCEPD should test that deleting the Namespace of a PVC and Pod causes the successful detach of Persistent Disk"}, + { "testcase": "[sig-storage] PersistentVolumes GCEPD should test that deleting the PV before the pod does not cause pod deletion to fail on PD detach"}, + { "testcase": "[sig-storage] PersistentVolumes [Feature:LabelSelector] [sig-storage] Selector-Label Volume Binding:vsphere should bind volume with claim for given label"}, + { "testcase": "[sig-storage] PersistentVolumes [Feature:ReclaimPolicy] [sig-storage] persistentvolumereclaim:vsphere should delete persistent volume when reclaimPolicy set to delete and associated claim is deleted"}, + { "testcase": "[sig-storage] PersistentVolumes [Feature:ReclaimPolicy] [sig-storage] persistentvolumereclaim:vsphere should not detach and unmount PV when associated pvc with delete as reclaimPolicy is deleted when it is in use by the pod"}, + { "testcase": "[sig-storage] PersistentVolumes [Feature:ReclaimPolicy] [sig-storage] persistentvolumereclaim:vsphere should retain persistent volume when reclaimPolicy set to retain when associated claim is deleted"}, + { "testcase": "[sig-storage] Volume FStype [Feature:vsphere] verify invalid fstype"}, + { "testcase": "[sig-storage] Volume FStype [Feature:vsphere] verify fstype - default value should be ext4"}, + { "testcase": "[sig-storage] Volume Disk Size [Feature:vsphere] verify dynamically provisioned pv using storageclass with an invalid disk size fails"}, + { "testcase": "[sig-storage] Volume Disk Format [Feature:vsphere] verify disk format type - zeroedthick is honored for dynamically provisioned pv using storageclass"}, + { "testcase": "[sig-storage] Volume Disk Format [Feature:vsphere] verify disk format type - thin is honored for dynamically provisioned pv using storageclass"}, + { "testcase": "[sig-storage] Volume Disk Format [Feature:vsphere] verify disk format type - eagerzeroedthick is honored for dynamically provisioned pv using storageclass"}, + { "testcase": "[sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify if a non-existing SPBM policy is not honored for dynamically provisioned pvc using storageclass"}, + { "testcase": "[sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify if a SPBM policy is not honored on a non-compatible datastore for dynamically provisioned pvc using storageclass"}, + { "testcase": "[sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify clean up of stale dummy VM for dynamically provisioned pvc using SPBM policy"}, + { "testcase": "[sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify an if a SPBM policy and VSAN capabilities cannot be honored for dynamically provisioned pvc using storageclass"}, + { "testcase": "[sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify an existing and compatible SPBM policy is honored for dynamically provisioned pvc using storageclass"}, + { "testcase": "[sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid objectSpaceReservation and iopsLimit values is honored for dynamically provisioned pvc using storageclass"}, + { "testcase": "[sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid hostFailuresToTolerate and cacheReservation values is honored for dynamically provisioned pvc using storageclass"}, + { "testcase": "[sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid diskStripes and objectSpaceReservation values is honored for dynamically provisioned pvc using storageclass"}, + { "testcase": "[sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid diskStripes and objectSpaceReservation values and a VSAN datastore is honored for dynamically provisioned pvc using storageclass"}, + { "testcase": "[sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with non-vsan datastore is not honored for dynamically provisioned pvc using storageclass"}, + { "testcase": "[sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with invalid hostFailuresToTolerate value is not honored for dynamically provisioned pvc using storageclass"}, + { "testcase": "[sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with invalid diskStripes value is not honored for dynamically provisioned pvc using storageclass"}, + { "testcase": "[sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with invalid capability name objectSpaceReserve is not honored for dynamically provisioned pvc using storageclass"}, + { "testcase": "[sig-storage] Regional PD RegionalPD should provision storage with delayed binding [Slow]"}, + { "testcase": "[sig-storage] Regional PD RegionalPD should provision storage in the allowedTopologies with delayed binding [Slow]"}, + { "testcase": "[sig-storage] Regional PD RegionalPD should provision storage in the allowedTopologies [Slow]"}, + { "testcase": "[sig-storage] Regional PD RegionalPD should provision storage [Slow]"}, + { "testcase": "[sig-storage] PersistentVolumes:vsphere should test that deleting the PV before the pod does not cause pod deletion to fail on vspehre volume detach"}, + { "testcase": "[sig-storage] PersistentVolumes:vsphere should test that deleting the Namespace of a PVC and Pod causes the successful detach of vsphere volume"}, + { "testcase": "[sig-storage] PersistentVolumes:vsphere should test that deleting a PVC before the pod does not cause pod deletion to fail on vsphere volume detach"}, + { "testcase": "[sig-storage] vsphere cloud provider stress [Feature:vsphere] vsphere stress tests"}, + { "testcase": "[sig-storage] vcp-performance [Feature:vsphere] vcp performance tests"}, + { "testcase": "[sig-storage] vcp at scale [Feature:vsphere] vsphere scale tests"}, + { "testcase": "[sig-storage] [Serial] Volume metrics should create volume metrics with the correct PVC ref"}, + { "testcase": "[sig-storage] [Serial] Volume metrics should create volume metrics in Volume Manager"}, + { "testcase": "[sig-storage] [Serial] Volume metrics should create prometheus metrics for volume provisioning and attach/detach"}, + { "testcase": "[sig-storage] [Serial] Volume metrics should create metrics for total time taken in volume operations in P/V Controller"}, + { "testcase": "[sig-storage] [Serial] Volume metrics should create metrics for total number of volumes in A/D Controller"}, + { "testcase": "[sig-storage] [Serial] Volume metrics PVController should create unbound pvc count metrics for pvc controller after creating pvc only"}, + { "testcase": "[sig-storage] [Serial] Volume metrics PVController should create unbound pv count metrics for pvc controller after creating pv only"}, + { "testcase": "[sig-storage] [Serial] Volume metrics PVController should create none metrics for pvc controller before creating any PV or PVC"}, + { "testcase": "[sig-storage] [Serial] Volume metrics PVController should create bound pv/pvc count metrics for pvc controller after creating both pv and pvc"}, + { "testcase": "[sig-storage] Volume expand [Slow] Verify if editing PVC allows resize"}, + { "testcase": "[sig-storage] Volume Provisioning on Datastore [Feature:vsphere] verify dynamically provisioned pv using storageclass fails on an invalid datastore"}, + { "testcase": "[sig-storage] Volume Provisioning On Clustered Datastore [Feature:vsphere] verify static provisioning on clustered datastore"}, + { "testcase": "[sig-storage] Volume Provisioning On Clustered Datastore [Feature:vsphere] verify dynamic provision with spbm policy on clustered datastore"}, + { "testcase": "[sig-storage] Volume Provisioning On Clustered Datastore [Feature:vsphere] verify dynamic provision with default parameter on clustered datastore"}, + { "testcase": "[sig-storage] Volume Placement test back to back pod creation and deletion with different volume sources on the same worker node"}, + { "testcase": "[sig-storage] Volume Placement should create and delete pod with the same volume source on the same worker node"}, + { "testcase": "[sig-storage] Volume Placement should create and delete pod with the same volume source attach/detach to different worker nodes"}, + { "testcase": "[sig-storage] Volume Placement should create and delete pod with multiple volumes from same datastore"}, + { "testcase": "[sig-storage] Volume Placement should create and delete pod with multiple volumes from different datastore"}, + { "testcase": "[sig-storage] Volume Operations Storm [Feature:vsphere] should create pod with many volumes and verify no attach call fails"}, + { "testcase": "[sig-storage] vsphere statefulset vsphere statefulset testing"}, + { "testcase": "[sig-service-catalog] [Feature:PodPreset] PodPreset should create a pod preset"}, + { "testcase": "[sig-service-catalog] [Feature:PodPreset] PodPreset should not modify the pod on conflict"}, + { "testcase": "[sig-storage] Detaching volumes should not work when mount is in progress"}, + { "testcase": "[sig-storage] Volume FStype [Feature:vsphere] verify fstype - ext3 formatted volume"}, + { "testcase": "[sig-storage] Volume limits should verify that all nodes have volume limits"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Set fsGroup for local volume should set same fsGroup for two pods simultaneously"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Set fsGroup for local volume should set fsGroup for one pod"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] Set fsGroup for local volume should not set different fsGroups for two pods simultaneously"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and write from pod1"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: gce-localssd-scsi-fs] [Serial] One pod requesting one prebound PVC should be able to mount volume and read from pod1"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] provisioning should create and delete block persistent volumes"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should create and delete block persistent volumes"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should create and delete block persistent volumes"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with defaults"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should create sc, pod, pv, and pvc, read/write to the pv, and delete all created resources"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should create sc, pod, pv, and pvc, read/write to the pv, and delete all created resources"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should create and delete block persistent volumes"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with defaults"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should create sc, pod, pv, and pvc, read/write to the pv, and delete all created resources"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should create sc, pod, pv, and pvc, read/write to the pv, and delete all created resources"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should create and delete block persistent volumes"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with defaults"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should create sc, pod, pv, and pvc, read/write to the pv, and delete all created resources"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should create sc, pod, pv, and pvc, read/write to the pv, and delete all created resources"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should create sc, pod, pv, and pvc, read/write to the pv, and delete all created resources"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] volumes should be mountable"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with defaults"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (default fs)] provisioning should create and delete block persistent volumes"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail in binding dynamic provisioned PV to PVC"}, + { "testcase": "[sig-storage] Pod Disks should be able to delete a non-existent PD without error"}, + { "testcase": "[sig-storage] Pod Disks schedule a pod w/ RW PD(s) mounted to 1 or more containers, write to PD, verify content, delete pod, and repeat in rapid succession [Slow] using 4 containers and 1 PDs"}, + { "testcase": "[sig-storage] Pod Disks schedule a pod w/ RW PD(s) mounted to 1 or more containers, write to PD, verify content, delete pod, and repeat in rapid succession [Slow] using 1 containers and 2 PDs"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: block] Set fsGroup for local volume should set same fsGroup for two pods simultaneously"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: block] Set fsGroup for local volume should set fsGroup for one pod"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: block] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: block] Set fsGroup for local volume should not set different fsGroups for two pods simultaneously"}, + { "testcase": "[sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes spread across nodes when pod management is parallel and pod has anti-affinity"}, + { "testcase": "[sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes spread across nodes when pod has anti-affinity"}, + { "testcase": "[sig-scheduling] TaintBasedEvictions [Serial] Checks that the node becomes unreachable"}, + { "testcase": "[Driver: gcepd]"}, + { "testcase": "[Driver: pd.csi.storage.gke.io]"}, + { "testcase": "[Driver: aws]"}, + { "testcase": "[Driver: azure]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: gce-localssd-scsi-fs]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should access volume from different nodes"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should create sc, pod, pv, and pvc, read/write to the pv, and delete all created resources"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] provisioning should access volume from different nodes"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support existing directory"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Pre-provisioned PV (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath-v0] [Testpattern: Inline-volume (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should create sc, pod, pv, and pvc, read/write to the pv, and delete all created resources"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (xfs)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should access volume from different nodes"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumeMode should create sc, pod, pv, and pvc, read/write to the pv, and delete all created resources"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should create sc, pod, pv, and pvc, read/write to the pv, and delete all created resources"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext3)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext4)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] volumes should be mountable"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support existing directory"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (xfs)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume"}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should access volume from different nodes"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should access volume from different nodes"}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should verify container cannot write to subpath readonly volumes [Slow]"}, + { "testcase": "[sig-windows]"}, + { "testcase": "multiVolume"}, + { "testcase": "[sig-storage] CSI Volumes CSI Topology test using GCE PD driver [Serial] should provision zonal PD with immediate volume binding and AllowedTopologies set and mount the volume to a pod"}, + { "testcase": "[sig-storage] CSI Volumes CSI Topology test using GCE PD driver [Serial] should provision zonal PD with delayed volume binding and mount the volume to a pod"}, + { "testcase": "[sig-storage] [Serial] Volume metrics should create prometheus metrics for volume provisioning errors [Slow]"}, + { "testcase": "[sig-storage] CSI Volumes CSI Topology test using GCE PD driver [Serial] should fail to schedule a pod with a zone missing from AllowedTopologies; PD is provisioned with delayed volume binding"}, + { "testcase": "[sig-storage] CSI Volumes CSI Topology test using GCE PD driver [Serial] should provision zonal PD with delayed volume binding and AllowedTopologies set and mount the volume to a pod"}, + { "testcase": "[sig-storage] CSI Volumes CSI Topology test using GCE PD driver [Serial] should fail to schedule a pod with a zone missing from AllowedTopologies; PD is provisioned with immediate volume binding"}, + { "testcase": "[sig-network] Network should set TCP CLOSE_WAIT timeout"}, + { "testcase": "[sig-storage] Zone Support Verify PVC creation fails if no zones are specified in the storage class (No shared datastores exist among all the nodes)"}, + { "testcase": "[sig-storage] Pod Disks schedule pods each with a PD, delete pod and verify detach [Slow] for RW PD with pod delete grace period of \"default (30s)\","}, + { "testcase": "[sig-storage] Zone Support Verify PVC creation with incompatible storage policy along with compatible zone and datastore combination specified in storage class fails"}, + { "testcase": "[sig-storage] Volume expand should allow expansion of block volumes"}, + { "testcase": "[sig-storage] Volume expand should not allow expansion of pvcs without AllowVolumeExpansion property"}, + { "testcase": "[sig-storage] Zone Support Verify PVC creation with incompatible datastore and zone combination specified in storage class fails"}, + { "testcase": "[sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on the allowed zones and datastore specified in storage class"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted"}, + { "testcase": "[sig-storage] Zone Support Verify PVC creation with invalid zone specified in storage class fails"}, + { "testcase": "[sig-storage] Pod Disks schedule pods each with a PD, delete pod and verify detach [Slow] for RW PD with pod delete grace period of \"immediate (0s)\""}, + { "testcase": "[sig-storage] Volume expand Verify if offline PVC expansion works"}, + { "testcase": "[sig-storage] Mounted volume expand Should verify mounted devices can be resized"}, + { "testcase": "[sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on the allowed zones, datastore and storage policy specified in storage class"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted"}, + { "testcase": "[sig-storage] Zone Support Verify PVC creation fails if only storage policy is specified in the storage class (No shared datastores exist among all the nodes)"}, + { "testcase": "[sig-storage] Zone Support Verify PVC creation fails if only datastore is specified in the storage class (No shared datastores exist among all the nodes)"}, + { "testcase": "[sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on a VSAN capability, datastore and compatible zone specified in storage class"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted"}, + { "testcase": "[sig-storage] Zone Support Verify PVC creation with incompatible zone along with compatible storagePolicy and datastore combination specified in storage class fails"}, + { "testcase": "[sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on the allowed zones and storage policy specified in storage class"}, + { "testcase": "[sig-storage] Zone Support Verify dynamically created pv with multiple zones specified in the storage class, shows both the zones on its labels"}, + { "testcase": "[sig-storage] Zone Support Verify PVC creation with compatible policy and datastore without any zones specified in the storage class fails (No shared datastores exist among all the nodes)"}, + { "testcase": "[k8s.io] [sig-node] NodeProblemDetector [DisabledForLargeClusters] should run without error"}, + { "testcase": "[sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on allowed zones specified in storage class "}, + { "testcase": "[sig-storage] Zone Support Verify dynamically created pv with allowed zones specified in storage class, shows the right zone information on its labels"}, + { "testcase": "[sig-storage] Zone Support Verify PVC creation with an invalid VSAN capability along with a compatible zone combination specified in storage class fails"}, + { "testcase": "[sig-storage] Pod Disks schedule pods each with a PD, delete pod and verify detach [Slow] for read-only PD with pod delete grace period of \"default (30s)\""}, + { "testcase": "[sig-storage] Zone Support Verify PVC creation fails if the availability zone specified in the storage class have no shared datastores under it."}, + { "testcase": "[sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on multiple zones specified in storage class "}, + { "testcase": "[sig-network] Services should implement service.kubernetes.io/service-proxy-name"}, + { "testcase": "[sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on multiple zones specified in the storage class. (No shared datastores exist among both zones)"}, + { "testcase": "[sig-storage] Zone Support Verify PVC creation with incompatible storagePolicy and zone combination specified in storage class fails"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted"}, + { "testcase": "[sig-api-machinery] AdmissionWebhook Should honor timeout"}, + { "testcase": "[sig-storage] Pod Disks schedule pods each with a PD, delete pod and verify detach [Slow] for read-only PD with pod delete grace period of \"immediate (0s)\""}, + { "testcase": "[sig-storage] Zone Support Verify a pod is created on a non-Workspace zone and attached to a dynamically created PV, based on the allowed zones and storage policy specified in storage class"}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-link] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted"}, + { "testcase": "[sig-storage] EmptyDir wrapper volumes should not cause race condition when used for git_repo [Serial] [Slow]", "description": "Fails on GL (not investigated why), but test looks for a race condition in K8S which was fixed in K8S v1.9.x and uses GitRepo type volumes which are deprecated since K8S v1.11.0" }, + { "testcase": "[sig-storage] PersistentVolumes NFS when invoking the Recycle reclaim policy should test that a PV becomes Available and is clean after the PVC is deleted.", "description": "Fails on shoots with allowPrivilegedContainers=false because the recycling pod is not assigned any PSP and thus cannot mount nfs volumes. Recycling reclaim mode is anyway deprecated since K8s v1.10, see https://github.com/kubernetes/kubernetes/commit/24ab5e9ed0cd01e06fb2df2b3f704f45c780410d"}, + { "testcase": "[sig-instrumentation] MetricsGrabber should grab all metrics from API server.", "description": "Depends on control plane (kapi,kcm,...) being present in 'kube-system' ns of the target cluster (shoot), fails since 1.20 if cp pods are not there: https://github.com/kubernetes/kubernetes/commit/20863a8b4390d275925338571e7a46105177a6cf" }, + { "testcase": "[sig-instrumentation] MetricsGrabber should grab all metrics from a ControllerManager.", "description": "Depends on control plane (kapi,kcm,...) being present in 'kube-system' ns of the target cluster (shoot), fails since 1.20 if cp pods are not there: https://github.com/kubernetes/kubernetes/commit/20863a8b4390d275925338571e7a46105177a6cf" }, + { "testcase": "[sig-instrumentation] MetricsGrabber should grab all metrics from a Kubelet.", "description": "Depends on control plane (kapi,kcm,...) being present in 'kube-system' ns of the target cluster (shoot), fails since 1.20 if cp pods are not there: https://github.com/kubernetes/kubernetes/commit/20863a8b4390d275925338571e7a46105177a6cf" }, + { "testcase": "[sig-instrumentation] MetricsGrabber should grab all metrics from a Scheduler.", "description": "Depends on control plane (kapi,kcm,...) being present in 'kube-system' ns of the target cluster (shoot), fails since 1.20 if cp pods are not there: https://github.com/kubernetes/kubernetes/commit/20863a8b4390d275925338571e7a46105177a6cf" } +] \ No newline at end of file diff --git a/integration-tests/e2e/kubetest/description/1.28/test.json b/integration-tests/e2e/kubetest/description/1.28/test.json new file mode 100644 index 0000000000..887462610b --- /dev/null +++ b/integration-tests/e2e/kubetest/description/1.28/test.json @@ -0,0 +1,2 @@ +[ { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (xfs)] volumes should allow exec of files on the volume"} +] \ No newline at end of file diff --git a/integration-tests/e2e/kubetest/description/1.28/working.json b/integration-tests/e2e/kubetest/description/1.28/working.json new file mode 100644 index 0000000000..d783279ae2 --- /dev/null +++ b/integration-tests/e2e/kubetest/description/1.28/working.json @@ -0,0 +1,438 @@ +[ + { "testcase": "[Conformance]", "is-substring": true, "focus": "Serial|Slow|Disruptive", "groups": ["slow", "slow2"]}, + { "testcase": "[Conformance]", "is-substring": true, "skip": "Serial|Slow|Disruptive", "groups": ["fast"]}, + { "testcase": "[k8s.io] [sig-node] kubelet [k8s.io] [sig-node] Clean up pods on node kubelet should be able to delete 10 pods per node in 1m0s.", "groups": ["fast"]}, + { "testcase": "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim with a storage class. [sig-storage]", "groups": ["fast"]}, + { "testcase": "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim. [sig-storage]", "groups": ["fast"]}, + { "testcase": "[sig-storage] ConfigMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]", "groups": ["fast"]}, + { "testcase": "[sig-storage] HostPath should support r/w [NodeConformance]", "groups": ["fast"]}, + { "testcase": "[sig-storage] HostPath should support subPath [NodeConformance]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and read from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and write from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Set fsGroup for local volume should set fsGroup for one pod [Slow]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Set fsGroup for local volume should set fsGroup for one pod [Slow]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Set fsGroup for local volume should set fsGroup for one pod [Slow]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Set fsGroup for local volume should set fsGroup for one pod [Slow]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and read from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and write from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-link] Set fsGroup for local volume should set fsGroup for one pod [Slow]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-link] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and read from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and write from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir] Set fsGroup for local volume should set fsGroup for one pod [Slow]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and read from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and write from pod1", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] Set fsGroup for local volume should set fsGroup for one pod [Slow]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] Set fsGroup for local volume should set same fsGroup for two pods simultaneously [Slow]", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2", "groups": ["fast"]}, + { "testcase": "[sig-storage] Projected secret should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance]", "groups": ["fast"]}, + { "testcase": "[k8s.io] Container Runtime blackbox test when running a container with a new image should not be able to pull from private registry without secret [NodeConformance]", "groups": ["fast"]}, + { "testcase": "[k8s.io] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance]", "groups": ["fast"]}, + { "testcase": "[k8s.io] PrivilegedPod [NodeConformance] should enable privileged commands [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-api-machinery] Garbage collector should delete jobs and pods created by cronjob", "groups": ["fast"]}, + { "testcase": "[sig-api-machinery] Garbage collector should orphan pods created by rc if deleteOptions.OrphanDependents is nil", "groups": ["fast"]}, + { "testcase": "[sig-api-machinery] Garbage collector should support cascading deletion of custom resources", "groups": ["fast"]}, + { "testcase": "[sig-api-machinery] Garbage collector should support orphan deletion of custom resources", "groups": ["fast"]}, + { "testcase": "[sig-api-machinery] Generated clientset should create pods, set the deletionTimestamp and deletionGracePeriodSeconds of the pod", "groups": ["fast"]}, + { "testcase": "[sig-api-machinery] Generated clientset should create v1beta1 cronJobs, delete cronJobs, watch cronJobs", "groups": ["fast"]}, + { "testcase": "[sig-api-machinery] Servers with support for API chunking should return chunks of results for list calls", "groups": ["fast"]}, + { "testcase": "[sig-api-machinery] Servers with support for Table transformation should return chunks of table results for list calls", "groups": ["fast"]}, + { "testcase": "[sig-api-machinery] Servers with support for Table transformation should return generic metadata details across all namespaces for nodes", "groups": ["fast"]}, + { "testcase": "[sig-api-machinery] Servers with support for Table transformation should return pod details", "groups": ["fast"]}, + { "testcase": "[sig-apps] CronJob should remove from active list jobs that have been deleted", "groups": ["fast"]}, + { "testcase": "[sig-apps] Deployment deployment reaping should cascade to its replica sets and pods", "groups": ["fast"]}, + { "testcase": "[sig-apps] Deployment iterative rollouts should eventually progress", "groups": ["fast"]}, + { "testcase": "[sig-apps] Deployment test Deployment ReplicaSet orphaning and adoption regarding controllerRef", "groups": ["fast"]}, + { "testcase": "[sig-apps] DisruptionController evictions: enough pods, absolute => should allow an eviction", "groups": ["fast"]}, + { "testcase": "[sig-apps] DisruptionController evictions: enough pods, replicaSet, percentage => should allow an eviction", "groups": ["fast"]}, + { "testcase": "[sig-apps] DisruptionController evictions: maxUnavailable allow single eviction, percentage => should allow an eviction", "groups": ["fast"]}, + { "testcase": "[sig-apps] DisruptionController evictions: maxUnavailable deny evictions, integer => should not allow an eviction", "groups": ["fast"]}, + { "testcase": "[sig-apps] DisruptionController evictions: no PDB => should allow an eviction", "groups": ["fast"]}, + { "testcase": "[sig-apps] DisruptionController evictions: too few pods, absolute => should not allow an eviction", "groups": ["fast"]}, + { "testcase": "[sig-apps] DisruptionController evictions: too few pods, replicaSet, percentage => should not allow an eviction", "groups": ["fast"]}, + { "testcase": "[sig-apps] DisruptionController should create a PodDisruptionBudget", "groups": ["fast"]}, + { "testcase": "[sig-apps] DisruptionController should update PodDisruptionBudget status", "groups": ["fast"]}, + { "testcase": "[sig-apps] Job should run a job to completion when tasks sometimes fail and are not locally restarted", "groups": ["fast"]}, + { "testcase": "[sig-apps] Job should run a job to completion when tasks succeed", "groups": ["fast"]}, + { "testcase": "[sig-apps] ReplicaSet should surface a failure condition on a common issue like exceeded quota", "groups": ["fast"]}, + { "testcase": "[sig-auth] Certificates API should support building a client with a CSR", "groups": ["fast"]}, + { "testcase": "[sig-auth] PodSecurityPolicy should forbid pod creation when no PSP is available", "groups": ["fast"]}, + { "testcase": "[sig-auth] ServiceAccounts should ensure a single API token exists", "groups": ["fast"]}, + { "testcase": "[sig-instrumentation] Cadvisor should be healthy on every node.", "groups": ["fast"]}, + { "testcase": "[sig-network] DNS should support configurable pod resolv.conf", "groups": ["fast"]}, + { "testcase": "[sig-network] Networking should provide unchanging, static URL paths for kubernetes api services", "groups": ["fast"]}, + { "testcase": "[sig-network] Services should be able to switch session affinity for NodePort service [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-network] Services should be able to switch session affinity for service with type clusterIP [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-network] Services should check NodePort out-of-range", "groups": ["fast"]}, + { "testcase": "[sig-network] Services should create endpoints for unready pods", "groups": ["fast"]}, + { "testcase": "[sig-network] Services should have session affinity work for NodePort service [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-network] Services should have session affinity work for service with type clusterIP [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-network] Services should prevent NodePort collisions", "groups": ["fast"]}, + { "testcase": "[sig-network] Services should release NodePorts on delete", "groups": ["fast"]}, + { "testcase": "[sig-scheduling] LimitRange should create a LimitRange with defaults and ensure pod has those defaults applied.", "groups": ["fast"]}, + { "testcase": "[sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : configmap", "groups": ["fast"]}, + { "testcase": "[sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : projected", "groups": ["fast"]}, + { "testcase": "[sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : secret", "groups": ["fast"]}, + { "testcase": "[sig-storage] PV Protection Verify that PV bound to a PVC is not removed immediately", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV and a pre-bound PVC: test write access", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and a pre-bound PV: test write access", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and non-pre-bound PV: test write access", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes NFS with Single PV - PVC pairs should create a non-pre-bound PV and PVC: test write access ", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 2 PVs and 4 PVCs: test write access", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 3 PVs and 3 PVCs: test write access", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeAffinity", "groups": ["fast"]}, + { "testcase": "[sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeSelector", "groups": ["fast"]}, + { "testcase": "[sig-storage] Volumes ConfigMap should be mountable", "groups": ["fast"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted", "groups": ["fast"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource", "groups": ["fast"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory", "groups": ["fast"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path", "groups": ["fast"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount", "groups": ["fast"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directory", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directory", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly]", "groups": ["fast", "debug1"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should adopt matching orphans and release non-matching pods", "groups": ["fast"], "exclude": ["alicloud"] }, + { "testcase": "[sig-storage] PVC Protection Verify that PVC in active use by a pod is not removed immediately", "groups": ["fast"], "exclude": ["alicloud"] }, + { "testcase": "[sig-storage] PVC Protection Verify that scheduling of a pod that uses PVC that is being deleted fails and the pod becomes Unschedulable", "groups": ["fast"], "exclude": ["alicloud"] }, + { "testcase": "[k8s.io] Pods should support pod readiness gates [NodeFeature:PodReadinessGate]", "groups": ["fast"], "only": ["gcp", "openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support existing directory", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support existing single file", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] volumes should be mountable", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] volumes should be mountable", "groups": ["fast"], "only": ["openstack"] }, + { "testcase": "[sig-api-machinery] Namespaces [Serial] should delete fast enough (90 percent of 100 namespaces in 150 seconds)", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-apps] CronJob should not schedule jobs when suspended [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-apps] CronJob should not schedule new jobs when ForbidConcurrent [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-apps] Daemon set [Serial] should not update pod when spec was updated and update strategy is OnDelete", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-apps] Daemon set [Serial] should run and stop complex daemon with node affinity", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-scheduling] NoExecuteTaintManager Multiple Pods [Serial] evicts pods with minTolerationSeconds [Disruptive] [Conformance]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-scheduling] NoExecuteTaintManager Multiple Pods [Serial] only evicts pods without tolerations from tainted nodes", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-scheduling] NoExecuteTaintManager Single Pod [Serial] doesn't evict pod with tolerations from tainted nodes", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-scheduling] NoExecuteTaintManager Single Pod [Serial] eventually evict pod with finite tolerations from tainted nodes", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-scheduling] NoExecuteTaintManager Single Pod [Serial] evicts pods from tainted nodes", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-scheduling] NoExecuteTaintManager Single Pod [Serial] removing taint cancels eviction [Disruptive] [Conformance]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-scheduling] SchedulerPredicates [Serial] validates MaxPods limit number of pods that are allowed to run [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-scheduling] SchedulerPredicates [Serial] validates that NodeAffinity is respected if not matching", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-scheduling] SchedulerPredicates [Serial] validates that required NodeAffinity setting is respected if matching", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-scheduling] SchedulerPredicates [Serial] validates that taints-tolerations is respected if matching", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-scheduling] SchedulerPredicates [Serial] validates that taints-tolerations is respected if not matching", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-scheduling] SchedulerPreemption [Serial] validates basic preemption works", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-scheduling] SchedulerPreemption [Serial] validates lower priority pod preemption by critical pod", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] ConfigMap Should fail non-optional pod creation due to configMap object does not exist [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] ConfigMap Should fail non-optional pod creation due to the key in the configMap object does not exist [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] Dynamic Provisioning DynamicProvisioner [Slow] should provision storage with different parameters", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] Dynamic Provisioning DynamicProvisioner External should let an external dynamic provisioner create and delete persistent volumes [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 4 PVs and 2 PVCs: test write access [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] PersistentVolumes-local Local volume that cannot be mounted [Slow] should fail due to non-existent path", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] PersistentVolumes-local Local volume that cannot be mounted [Slow] should fail due to wrong node", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes on one node when pod has affinity", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] PersistentVolumes-local StatefulSet with pod affinity [Slow] should use volumes on one node when pod management is parallel and pod has affinity", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] Projected configMap Should fail non-optional pod creation due to configMap object does not exist [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] Projected configMap Should fail non-optional pod creation due to the key in the configMap object does not exist [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] Projected secret Should fail non-optional pod creation due to secret object does not exist [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] Projected secret Should fail non-optional pod creation due to the key in the secret object does not exist [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] Secrets Should fail non-optional pod creation due to secret object does not exist [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] Secrets Should fail non-optional pod creation due to the key in the secret object does not exist [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] PersistentVolumes-local [Volume type: tmpfs] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should implement legacy replacement when the update strategy is OnDelete", "groups": ["slow", "slow2"] }, + { "testcase": "[k8s.io] Pods should have their auto-restart back-off timer reset on image update [Slow][NodeConformance]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-api-machinery] Servers with support for API chunking should support continue listing from the last key if the original version has been compacted away, though the list is inconsistent [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[k8s.io] Pods should cap back-off at MaxContainerBackOff [Slow][NodeConformance]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow][LinuxOnly]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow][LinuxOnly]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow][LinuxOnly]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-network] DNS should provide DNS for ExternalName services [Conformance]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-apps] CronJob should schedule multiple jobs concurrently", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-apps] CronJob should replace jobs when ReplaceConcurrent", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-apps] CronJob should not emit unexpected warnings", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-network] Services should preserve source pod IP for traffic thru service cluster IP [LinuxOnly]", "groups": ["slow", "slow2"] }, + { "testcase": "[k8s.io] Probing container should *not* be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications [Conformance]", "groups": ["slow", "slow2"] }, + { "testcase": "[k8s.io] Probing container should have monotonically increasing restart count [NodeConformance] [Conformance]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-cli] Kubectl client Guestbook application should create and stop a working application [Conformance]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform canary updates and phased rolling updates of template modifications [Conformance]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should not deadlock when a pod's predecessor fails", "groups": ["slow", "slow2"], "exclude": ["alicloud"] }, + { "testcase": "[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications with PVCs", "groups": ["slow", "slow2"], "exclude": ["alicloud"] }, + { "testcase": "[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should provide basic identity", "groups": ["slow", "slow2"], "exclude": ["alicloud"] }, + { "testcase": "[sig-scheduling] SchedulerPriorities [Serial] Pod should avoid nodes that have avoidPod annotation", "groups": ["slow", "slow2"], "exclude": ["alicloud"] }, + { "testcase": "[sig-scheduling] SchedulerPriorities [Serial] Pod should be preferably scheduled to nodes pod can tolerate", "groups": ["slow", "slow2"], "exclude": ["alicloud"] }, + { "testcase": "[sig-scheduling] SchedulerPriorities [Serial] Pod should be scheduled to node that don't match the PodAntiAffinity terms", "groups": ["slow", "slow2"], "exclude": ["alicloud"] }, + { "testcase": "[sig-network] Services should have session affinity work for LoadBalancer service with ESIPP on [Slow] [DisabledForLargeClusters]", "groups": ["slow", "slow2"], "only": ["gcp", "openstack"] }, + { "testcase": "[sig-network] Services should have session affinity work for LoadBalancer service with ESIPP off [Slow] [DisabledForLargeClusters]", "groups": ["slow", "slow2"], "only": ["gcp", "openstack"] }, + { "testcase": "[sig-network] Services should be able to switch session affinity for LoadBalancer service with ESIPP off [Slow] [DisabledForLargeClusters]", "groups": ["slow", "slow2"], "only": ["gcp", "openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support creating multiple subpath from same volumes [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath directory is outside the volume [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath file is outside the volume [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support creating multiple subpath from same volumes [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using directory as subpath [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] subPath should support restarting containers using file as subpath [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Inline-volume (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if non-existent subpath is outside the volume [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath directory is outside the volume [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath file is outside the volume [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should fail if subpath with backstepping is outside the volume [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using directory as subpath [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] subPath should support restarting containers using file as subpath [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (default fs)] volumeIO should write files of various sizes, verify size, validate content [Slow]", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-storage] In-tree Volumes [Driver: ceph][Feature:Volumes] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should fail to create pod by failing to mount volume", "groups": ["slow", "slow2"], "only": ["openstack"] }, + { "testcase": "[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a custom resource.", "groups": ["fast"]}, + { "testcase": "[k8s.io] Probing container should be restarted with a local redirect http liveness probe", "groups": ["fast"]}, + { "testcase": "[k8s.io] Security Context When creating a container with runAsNonRoot should not run with an explicit root user ID [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[k8s.io] Security Context When creating a container with runAsNonRoot should not run without a specified user ID", "groups": ["fast"]}, + { "testcase": "[sig-node] RuntimeClass should reject a Pod requesting a non-existent RuntimeClass", "groups": ["fast"]}, + { "testcase": "[sig-node] RuntimeClass should reject a Pod requesting a deleted RuntimeClass", "groups": ["fast"]}, + { "testcase": "[sig-node] RuntimeClass should reject a Pod requesting a RuntimeClass with an unconfigured handler", "groups": ["fast"]}, + { "testcase": "[sig-network] DNS should resolve DNS of partial qualified names for the cluster [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[k8s.io] Security Context When creating a container with runAsNonRoot should run with an image specified user ID", "groups": ["fast"]}, + { "testcase": "[k8s.io] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance]", "groups": ["fast"]}, + { "testcase": "[k8s.io] [sig-node] Security Context should support container.SecurityContext.RunAsUser [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[k8s.io] Variable Expansion should allow substituting values in a volume subpath [sig-storage]", "groups": ["fast"]}, + { "testcase": "[k8s.io] [sig-node] Security Context should support container.SecurityContext.RunAsUser And container.SecurityContext.RunAsGroup [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[k8s.io] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance]", "groups": ["fast"]}, + { "testcase": "[k8s.io] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[k8s.io] [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[k8s.io] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance]", "groups": ["fast"]}, + { "testcase": "[k8s.io] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance]", "groups": ["fast"]}, + { "testcase": "[k8s.io] [sig-node] Security Context should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[k8s.io] [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser And pod.Spec.SecurityContext.RunAsGroup [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] if TerminationMessagePath is set [NodeConformance]", "groups": ["fast"]}, + { "testcase": "[sig-storage] HostPath should give a volume the correct mode [LinuxOnly] [NodeConformance] [Conformance]", "groups": ["slow"] }, + { "testcase": "[sig-api-machinery] Discovery Custom resource should have storage version hash", "groups": ["fast"]}, + { "testcase": "[sig-storage] PV Protection Verify \"immediate\" deletion of a PV that is not bound to a PVC", "groups": ["fast"]}, + { "testcase": "[k8s.io] NodeLease when the NodeLease feature is enabled the kubelet should create and update a lease in the kube-node-lease namespace", "groups": ["fast"]}, + { "testcase": "[sig-storage] PV Protection Verify \"immediate\" deletion of a PV that is not bound to a PVC", "groups": ["fast"]}, + { "testcase": "[sig-network] Services should be able to switch session affinity for LoadBalancer service with ESIPP on [Slow] [DisabledForLargeClusters]", "groups": ["slow", "slow2"], "only": ["azure","gcp"] }, + { "testcase": "[k8s.io] NodeLease when the NodeLease feature is enabled the kubelet should report node status infrequently", "groups": ["slow", "slow2"] }, + { "testcase": "[k8s.io] Probing container should *not* be restarted with a non-local redirect http liveness probe", "groups": ["slow", "slow2"] }, + { "testcase": "[k8s.io] Variable Expansion should not change the subpath mount on a container restart if the environment variable changes [sig-storage][Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[k8s.io] Variable Expansion should verify that a failing subpath expansion can be modified during the lifecycle of a container [sig-storage][Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[k8s.io] Variable Expansion should fail substituting values in a volume subpath with absolute path [sig-storage][Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[k8s.io] Variable Expansion should fail substituting values in a volume subpath with backticks [sig-storage][Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI mock volume CSI volume limit information using mock driver should report attach limit when limit is bigger than 0 [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-network] Network should resolve connrection reset issue #74839 [Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI mock volume CSI attach test using mock driver should require VolumeAttach for drivers with attachment", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-apps] DisruptionController should block an eviction until the PDB is updated to allow it", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when podInfoOnMount=nil", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when podInfoOnMount=false", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI mock volume CSI workload information using mock driver should be passed when podInfoOnMount=true", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-scheduling] PreemptionExecutionPath runs ReplicaSets to verify preemption running path", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI mock volume CSI attach test using mock driver should preserve attachment policy when no CSIDriver present", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when CSIDriver does not exist", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] PVC Protection Verify \"immediate\" deletion of a PVC that is not in active use by a pod", "exclude": ["alicloud"], "groups": ["slow", "slow2"] }, + { "testcase": "[k8s.io] Variable Expansion should succeed in writing subpaths in container [sig-storage][Slow]", "groups": ["slow", "slow2"] }, + { "testcase": "[sig-storage] CSI mock volume CSI attach test using mock driver should not require VolumeAttach for drivers without attachment", "groups": ["slow", "slow2"] }, + { "testcase": "[k8s.io] Probing container should *not* be restarted with a tcp:8080 liveness probe [NodeConformance]", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] PersistentVolumes-local Pods sharing a single local PV [Serial] all pods should be running", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] PersistentVolumes-local Stress with local volumes [Serial] should be able to process many pods and reuse local volumes", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-node] RuntimeClass should reject a Pod requesting a RuntimeClass with conflicting node selector", "groups": ["fast"]}, + { "testcase": "[k8s.io] Sysctls [LinuxOnly] [NodeFeature:Sysctls] should reject invalid sysctls", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl create quota should create a quota without scopes", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl create quota should reject quota with invalid scopes", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl run CronJob should create a CronJob", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl get componentstatuses should get componentstatuses", "groups": ["fast"]}, + { "testcase": "[k8s.io] Sysctls [LinuxOnly] [NodeFeature:Sysctls] should not launch unsafe, but not explicitly enabled sysctls on the node", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl create quota should create a quota with scopes", "groups": ["fast"]}, + { "testcase": "[sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-storage] Downward API volume should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup]", "groups": ["fast"]}, + { "testcase": "[sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]", "groups": ["fast"]}, + { "testcase": "[sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup]", "groups": ["fast"]}, + { "testcase": "[sig-storage] Projected configMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]", "groups": ["fast"]}, + { "testcase": "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is root", "groups": ["fast"]}, + { "testcase": "[sig-storage] Downward API volume should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup]", "groups": ["fast"]}, + { "testcase": "[k8s.io] Sysctls [LinuxOnly] [NodeFeature:Sysctls] should support unsafe sysctls which are actually whitelisted", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl cluster-info dump should check if cluster-info dump succeeds", "groups": ["fast"]}, + { "testcase": "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is non-root", "groups": ["fast"]}, + { "testcase": "[sig-storage] Projected configMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup]", "groups": ["fast"]}, + { "testcase": "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] files with FSGroup ownership should support (root,0644,tmpfs)", "groups": ["fast"]}, + { "testcase": "[sig-storage] ConfigMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]", "groups": ["fast"]}, + { "testcase": "[sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup]", "groups": ["fast"]}, + { "testcase": "[k8s.io] Sysctls [LinuxOnly] [NodeFeature:Sysctls] should support sysctls", "groups": ["fast"]}, + { "testcase": "[k8s.io] Container Runtime blackbox test when running a container with a new image should be able to pull from private registry with secret [NodeConformance]", "groups": ["fast"]}, + { "testcase": "[sig-storage] ConfigMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup]", "groups": ["fast"]}, + { "testcase": "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on tmpfs should have the correct mode using FSGroup", "groups": ["fast"]}, + { "testcase": "[sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup]", "groups": ["fast"]}, + { "testcase": "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on default medium should have the correct mode using FSGroup", "groups": ["fast"]}, + { "testcase": "[sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] nonexistent volume subPath should have the correct mode and owner using FSGroup", "groups": ["fast"]}, + { "testcase": "[sig-node] RuntimeClass should run a Pod requesting a RuntimeClass with scheduling [NodeFeature:RuntimeHandler] [Disruptive] ", "groups": ["fast"]}, + { "testcase": "[sig-apps] Job should fail when exceeds active deadline", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl copy should copy a file from a running Pod", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl client-side validation should create/apply a CR with unknown fields for CRD with no validation schema", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl client-side validation should create/apply a valid CR with arbitrary-extra properties for CRD with partially-specified validation schema", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl client-side validation should create/apply a valid CR for CRD with validation schema", "groups": ["fast"]}, + { "testcase": "[sig-apps] Job should fail to exceed backoffLimit", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Simple pod should support exec through kubectl proxy", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Simple pod should support exec through an HTTP proxy", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Simple pod should support exec using resource/name", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Simple pod should support port-forward", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl apply should apply a new configuration to an existing RC", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Simple pod should support exec", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should store data", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends NO DATA, and disconnects", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 should support forwarding over websockets", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl apply apply set/view last-applied", "groups": ["fast"]}, + { "testcase": "[sig-network] Services should allow pods to hairpin back to themselves through services", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl Port forwarding With a server listening on localhost should support forwarding over websockets", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends NO DATA, and disconnects", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends DATA, and disconnects", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl Port forwarding With a server listening on localhost that expects NO client request should support a client that connects, sends DATA, and disconnects", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects NO client request should support a client that connects, sends DATA, and disconnects", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends DATA, and disconnects", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Simple pod should contain last line of the log", "groups": ["fast"]}, + { "testcase": "[sig-network] Networking Granular Checks: Services should function for endpoint-Service: udp", "groups": ["fast"]}, + { "testcase": "[sig-network] Networking Granular Checks: Services should function for node-Service: http", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Simple pod should support inline execution and attach", "groups": ["fast"]}, + { "testcase": "[sig-network] Networking Granular Checks: Services should function for pod-Service: udp", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should store data", "groups": ["fast"]}, + { "testcase": "[sig-network] Networking Granular Checks: Services should function for node-Service: udp", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Simple pod should return command exit codes", "groups": ["fast"]}, + { "testcase": "[sig-network] Networking Granular Checks: Services should function for pod-Service: http", "groups": ["fast"]}, + { "testcase": "[sig-apps] Job should remove pods when job is deleted", "groups": ["fast"]}, + { "testcase": "[sig-storage] CSI mock volume CSI Volume expansion should expand volume by restarting pod if attach=off, nodeExpansion=on", "groups": ["fast"]}, + { "testcase": "[sig-network] Networking Granular Checks: Services should function for client IP based session affinity: udp [LinuxOnly]", "groups": ["fast"]}, + { "testcase": "[sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should store data", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl taint [Serial] should update the taint on a node", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl taint [Serial] should remove all the taints with the same key off a node", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI mock volume CSI workload information using mock driver contain ephemeral=true when using inline volume", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI mock volume CSI Volume expansion should expand volume without restarting pod if nodeExpansion=off", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-network] Networking Granular Checks: Services should function for endpoint-Service: http", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-network] Networking Granular Checks: Services should function for client IP based session affinity: http [LinuxOnly]", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI mock volume CSI Volume expansion should expand volume by restarting pod if attach=on, nodeExpansion=on", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI mock volume CSI online volume expansion should expand volume without restarting pod if attach=off, nodeExpansion=on", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI mock volume CSI online volume expansion should expand volume without restarting pod if attach=on, nodeExpansion=on", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-network] Networking Granular Checks: Services should update endpoints: http", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-network] Networking Granular Checks: Services should update endpoints: udp", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-network] Networking Granular Checks: Services should update nodePort: udp [Slow]", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: inline ephemeral CSI volume] ephemeral should create read-only inline ephemeral volume", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] volumes should store data", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI mock volume CSI Volume expansion should not expand volume if resizingOnDriver=off, resizingOnSC=on", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-network] Networking Granular Checks: Services should update nodePort: http [Slow]", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-apps] CronJob should delete successful/failed finished jobs with limit of one job", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: inline ephemeral CSI volume] ephemeral should support two pods which share the same volume", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: inline ephemeral CSI volume] ephemeral should support multiple inline ephemeral volumes", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: inline ephemeral CSI volume] ephemeral should create read/write inline ephemeral volume", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumes should store data", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumeMode should fail to use a volume in a pod with mismatched mode [Slow]", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-network] Services should handle load balancer cleanup finalizer for service [Slow]", "groups": ["slow", "slow2"], "exclude": ["alicloud"] }, + { "testcase": "[sig-instrumentation] Logging soak [Performance] [Slow] [Disruptive] should survive logging 1KB every 1s seconds, for a duration of 2m0s", "groups": ["slow", "slow2"]}, + { "testcase": "[k8s.io] Downward API [Serial] [Disruptive] [NodeFeature:EphemeralStorage] Downward API tests for local ephemeral storage should provide default limits.ephemeral-storage from node allocatable", "groups": ["slow", "slow2"]}, + { "testcase": "[k8s.io] Downward API [Serial] [Disruptive] [NodeFeature:EphemeralStorage] Downward API tests for local ephemeral storage should provide container's limits.ephemeral-storage and requests.ephemeral-storage as env vars", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl apply should reuse port when apply to an existing SVC", "groups": ["fast"]}, + { "testcase": "[k8s.io] Probing container should *not* be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance] [Conformance]", "groups": ["slow", "slow2"]}, + { "testcase": "[k8s.io] Container Runtime blackbox test when running a container with a new image should be able to pull image [NodeConformance]", "groups": ["fast"]}, + { "testcase": "[k8s.io] NodeLease when the NodeLease feature is enabled should have OwnerReferences set", "groups": ["fast"]}, + { "testcase": "[k8s.io] Security Context When creating a pod with privileged should run the container as privileged when true [LinuxOnly] [NodeFeature:HostAccess]", "groups": ["fast"]}, + { "testcase": "[k8s.io] [sig-node] Mount propagation should propagate mounts to the host", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for cronjob", "groups": ["fast"]}, + { "testcase": "[sig-cli] Kubectl client kubectl get output should contain custom columns for each resource ", "groups": ["fast"]}, + { "testcase": "[sig-network] Networking Granular Checks: Services should be able to handle large requests: http", "groups": ["fast"]}, + { "testcase": "[sig-network] Networking Granular Checks: Services should be able to handle large requests: udp", "groups": ["fast"]}, + { "testcase": "[sig-network] Services should be able to update service type to NodePort listening on same port number but different protocols", "groups": ["fast"]}, + { "testcase": "[sig-node] ConfigMap should update ConfigMap successfully", "groups": ["fast"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod", "groups": ["fast"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits [Serial]", "groups": ["slow", "slow2"]}, + { "testcase": "[sig-storage] CSI Volumes [Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod", "groups": ["fast"]} +] \ No newline at end of file