Result | SUCCESS |
Tests | 4 failed / 867 succeeded |
Started | |
Elapsed | 1h43m |
Work namespace | ci-op-f7jvkn8j |
pod | 4.3.0-0.nightly-2019-11-07-091723-azure-ovn |
go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\sMonitor\scluster\swhile\stests\sexecute$'
1 error level events were detected during this test run: Nov 07 10:30:44.777 E ns/default pod/recycler-for-nfs-wskvw node/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2 pod failed (DeadlineExceeded): Pod was active on the node longer than the specified deadlinefrom junit_e2e_20191107-104211.xml
Timeline: Nov 07 10:04:50.329 I ns/openshift-kube-apiserver-operator deployment/kube-apiserver-operator (combined from similar events): Created Pod/revision-pruner-6-ci-op-f7jvkn8j-bfca5-k72gq-master-0 -n openshift-kube-apiserver because it was missing Nov 07 10:04:50.382 I ns/openshift-kube-apiserver pod/revision-pruner-6-ci-op-f7jvkn8j-bfca5-k72gq-master-0 node/ci-op-f7jvkn8j-bfca5-k72gq-master-0 created Nov 07 10:04:56.721 I ns/openshift-kube-apiserver pod/revision-pruner-6-ci-op-f7jvkn8j-bfca5-k72gq-master-0 Container image "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:19af1c1ce75f5ee43176c23dc17681e33651aa56d1aa0432f5abca9b19afb48d" already present on machine Nov 07 10:04:56.998 I ns/openshift-kube-apiserver pod/revision-pruner-6-ci-op-f7jvkn8j-bfca5-k72gq-master-0 Created container pruner Nov 07 10:04:57.042 I ns/openshift-kube-apiserver pod/revision-pruner-6-ci-op-f7jvkn8j-bfca5-k72gq-master-0 Started container pruner Nov 07 10:05:13.055 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: ensure(openshift-ingress/router-default): backendPoolID(/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Network/loadBalancers/ci-op-f7jvkn8j-bfca5-k72gq/backendAddressPools/ci-op-f7jvkn8j-bfca5-k72gq) - failed to ensure host in pool: "azure - cloud provider rate limited(read) for operation:NicGet" (2 times) Nov 07 10:06:03.998 - 402s I test="[Suite:openshift/oauth] LDAP should start an OpenLDAP test server [Suite:openshift/conformance/parallel]" running Nov 07 10:06:15.057 - 77s I test="[Feature:OAuthServer] [Headers] expected headers returned from the login URL for when there is only one IDP [Suite:openshift/conformance/parallel]" running Nov 07 10:06:52.345 I ns/openshift-must-gather-wrksl pod/must-gather-8ft5f node/ created Nov 07 10:06:52.372 I ns/openshift-must-gather-wrksl pod/must-gather-8ft5f Successfully assigned openshift-must-gather-wrksl/must-gather-8ft5f to ci-op-f7jvkn8j-bfca5-k72gq-master-2 Nov 07 10:06:53.767 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: ensure(openshift-ingress/router-default): backendPoolID(/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Network/loadBalancers/ci-op-f7jvkn8j-bfca5-k72gq/backendAddressPools/ci-op-f7jvkn8j-bfca5-k72gq) - failed to ensure host in pool: "azure - cloud provider rate limited(read) for operation:NicGet" (3 times) Nov 07 10:06:58.889 I ns/openshift-must-gather-wrksl pod/must-gather-8ft5f Pulling image "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5ddd62469a9bd0f38fd58b05e7e51065e4c4ac291eeb4650eb69c47ece5dfc8d" Nov 07 10:07:02.351 I ns/openshift-must-gather-wrksl pod/must-gather-8ft5f Successfully pulled image "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5ddd62469a9bd0f38fd58b05e7e51065e4c4ac291eeb4650eb69c47ece5dfc8d" Nov 07 10:07:02.641 I ns/openshift-must-gather-wrksl pod/must-gather-8ft5f Created container gather Nov 07 10:07:02.672 I ns/openshift-must-gather-wrksl pod/must-gather-8ft5f Started container gather Nov 07 10:07:02.916 I ns/openshift-must-gather-wrksl pod/must-gather-8ft5f Container image "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5ddd62469a9bd0f38fd58b05e7e51065e4c4ac291eeb4650eb69c47ece5dfc8d" already present on machine Nov 07 10:07:03.227 I ns/openshift-must-gather-wrksl pod/must-gather-8ft5f Created container copy Nov 07 10:07:03.262 I ns/openshift-must-gather-wrksl pod/must-gather-8ft5f Started container copy Nov 07 10:07:12.320 W ns/openshift-must-gather-wrksl pod/must-gather-8ft5f node/ci-op-f7jvkn8j-bfca5-k72gq-master-2 graceful deletion within 0s Nov 07 10:07:12.329 W ns/openshift-must-gather-wrksl pod/must-gather-8ft5f node/ci-op-f7jvkn8j-bfca5-k72gq-master-2 deleted Nov 07 10:07:32.853 I test="[Feature:OAuthServer] [Headers] expected headers returned from the login URL for when there is only one IDP [Suite:openshift/conformance/parallel]" failed Nov 07 10:07:42.182 - 133s I test="[Feature:ImageLayers][registry] Image layer subresource should return layers from tagged images [Suite:openshift/conformance/parallel]" running Nov 07 10:08:09.044 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-72gx6/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-72gx6 because it is being terminated Nov 07 10:08:09.063 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-72gx6/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-72gx6 because it is being terminated (2 times) Nov 07 10:08:09.090 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-72gx6/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-72gx6 because it is being terminated (3 times) Nov 07 10:08:09.117 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-72gx6/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-72gx6 because it is being terminated (4 times) Nov 07 10:08:09.141 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-72gx6/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-72gx6 because it is being terminated (5 times) Nov 07 10:08:09.254 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-72gx6/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-72gx6 because it is being terminated (6 times) Nov 07 10:08:09.376 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-72gx6/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-72gx6 because it is being terminated (7 times) Nov 07 10:08:09.705 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-72gx6/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-72gx6 because it is being terminated (8 times) Nov 07 10:08:10.032 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-72gx6/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-72gx6 because it is being terminated (9 times) Nov 07 10:08:34.453 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: ensure(openshift-ingress/router-default): backendPoolID(/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Network/loadBalancers/ci-op-f7jvkn8j-bfca5-k72gq/backendAddressPools/ci-op-f7jvkn8j-bfca5-k72gq) - failed to ensure host in pool: "azure - cloud provider rate limited(read) for operation:NicGet" (4 times) Nov 07 10:09:55.384 I test="[Feature:ImageLayers][registry] Image layer subresource should return layers from tagged images [Suite:openshift/conformance/parallel]" failed Nov 07 10:10:02.992 W endpoints/mongodb Failed to create endpoint for service e2e-test-mongodb-create-p5xkf/mongodb: endpoints "mongodb" is forbidden: unable to create new content in namespace e2e-test-mongodb-create-p5xkf because it is being terminated Nov 07 10:10:03.012 W endpoints/mongodb Failed to create endpoint for service e2e-test-mongodb-create-p5xkf/mongodb: endpoints "mongodb" is forbidden: unable to create new content in namespace e2e-test-mongodb-create-p5xkf because it is being terminated (2 times) Nov 07 10:10:03.061 W endpoints/mongodb Failed to create endpoint for service e2e-test-mongodb-create-p5xkf/mongodb: endpoints "mongodb" is forbidden: unable to create new content in namespace e2e-test-mongodb-create-p5xkf because it is being terminated (3 times) Nov 07 10:10:03.106 W endpoints/mongodb Failed to create endpoint for service e2e-test-mongodb-create-p5xkf/mongodb: endpoints "mongodb" is forbidden: unable to create new content in namespace e2e-test-mongodb-create-p5xkf because it is being terminated (4 times) Nov 07 10:10:03.144 W endpoints/mongodb Failed to create endpoint for service e2e-test-mongodb-create-p5xkf/mongodb: endpoints "mongodb" is forbidden: unable to create new content in namespace e2e-test-mongodb-create-p5xkf because it is being terminated (5 times) Nov 07 10:10:03.172 W endpoints/mongodb Failed to create endpoint for service e2e-test-mongodb-create-p5xkf/mongodb: endpoints "mongodb" is forbidden: unable to create new content in namespace e2e-test-mongodb-create-p5xkf because it is being terminated (6 times) Nov 07 10:10:03.330 W endpoints/mongodb Failed to create endpoint for service e2e-test-mongodb-create-p5xkf/mongodb: endpoints "mongodb" is forbidden: unable to create new content in namespace e2e-test-mongodb-create-p5xkf because it is being terminated (7 times) Nov 07 10:10:03.649 W endpoints/mongodb Failed to create endpoint for service e2e-test-mongodb-create-p5xkf/mongodb: endpoints "mongodb" is forbidden: unable to create new content in namespace e2e-test-mongodb-create-p5xkf because it is being terminated (8 times) Nov 07 10:10:15.101 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: ensure(openshift-ingress/router-default): backendPoolID(/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Network/loadBalancers/ci-op-f7jvkn8j-bfca5-k72gq/backendAddressPools/ci-op-f7jvkn8j-bfca5-k72gq) - failed to ensure host in pool: "azure - cloud provider rate limited(read) for operation:NicGet" (5 times) Nov 07 10:10:37.591 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-1 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert" not found) (3 times) Nov 07 10:10:37.599 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-1 (combined from similar events): Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-000" not found) (6 times) Nov 07 10:10:37.614 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-1 (combined from similar events): Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-001" not found) (7 times) Nov 07 10:10:37.982 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-1 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-002" not found) (2 times) Nov 07 10:10:38.382 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-1 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-003" not found) (3 times) Nov 07 10:11:55.849 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: azure - cloud provider rate limited(read) for operation:NSGGet Nov 07 10:12:26.913 W persistentvolume/pvc-28531871-7b84-42a4-9a47-e9d0fd68d5dc compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-28531871-7b84-42a4-9a47-e9d0fd68d5dc is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd." Nov 07 10:12:33.107 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-2 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert" not found) (2 times) Nov 07 10:12:33.123 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-2 (combined from similar events): Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-000" not found) (7 times) Nov 07 10:12:33.144 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-2 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-001" not found) (3 times) Nov 07 10:12:33.510 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-2 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-002" not found) (2 times) Nov 07 10:12:33.899 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-2 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-003" not found) (3 times) Nov 07 10:12:46.553 I test="[Suite:openshift/oauth] LDAP should start an OpenLDAP test server [Suite:openshift/conformance/parallel]" failed Nov 07 10:12:52.028 W endpoints/openldap-server Failed to create endpoint for service e2e-test-oauth-ldap-ss8vb/openldap-server: endpoints "openldap-server" is forbidden: unable to create new content in namespace e2e-test-oauth-ldap-ss8vb because it is being terminated Nov 07 10:12:52.045 W endpoints/openldap-server Failed to create endpoint for service e2e-test-oauth-ldap-ss8vb/openldap-server: endpoints "openldap-server" is forbidden: unable to create new content in namespace e2e-test-oauth-ldap-ss8vb because it is being terminated (2 times) Nov 07 10:12:52.064 W endpoints/openldap-server Failed to create endpoint for service e2e-test-oauth-ldap-ss8vb/openldap-server: endpoints "openldap-server" is forbidden: unable to create new content in namespace e2e-test-oauth-ldap-ss8vb because it is being terminated (3 times) Nov 07 10:12:52.074 W endpoints/openldap-server Failed to create endpoint for service e2e-test-oauth-ldap-ss8vb/openldap-server: endpoints "openldap-server" is forbidden: unable to create new content in namespace e2e-test-oauth-ldap-ss8vb because it is being terminated (4 times) Nov 07 10:12:52.111 W endpoints/openldap-server Failed to create endpoint for service e2e-test-oauth-ldap-ss8vb/openldap-server: endpoints "openldap-server" is forbidden: unable to create new content in namespace e2e-test-oauth-ldap-ss8vb because it is being terminated (5 times) Nov 07 10:12:52.187 W endpoints/openldap-server Failed to create endpoint for service e2e-test-oauth-ldap-ss8vb/openldap-server: endpoints "openldap-server" is forbidden: unable to create new content in namespace e2e-test-oauth-ldap-ss8vb because it is being terminated (6 times) Nov 07 10:12:52.359 W endpoints/openldap-server Failed to create endpoint for service e2e-test-oauth-ldap-ss8vb/openldap-server: endpoints "openldap-server" is forbidden: unable to create new content in namespace e2e-test-oauth-ldap-ss8vb because it is being terminated (7 times) Nov 07 10:13:33.169 W persistentvolume/pvc-1b131273-d3fc-4ff1-9fce-66af03d7f766 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-1b131273-d3fc-4ff1-9fce-66af03d7f766 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt." Nov 07 10:13:36.444 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: azure - cloud provider rate limited(read) for operation:PublicIPGet Nov 07 10:14:25.933 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-0 (combined from similar events): Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert" not found) (5 times) Nov 07 10:14:25.946 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-0 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-000" not found) (3 times) Nov 07 10:14:25.970 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-0 (combined from similar events): Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-001" not found) (6 times) Nov 07 10:14:26.341 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-0 (combined from similar events): Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-002" not found) (7 times) Nov 07 10:14:26.710 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-0 (combined from similar events): Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-003" not found) (8 times) Nov 07 10:14:29.091 W endpoints/hello-openshift Failed to create endpoint for service e2e-test-build-service-fdpjk/hello-openshift: endpoints "hello-openshift" is forbidden: unable to create new content in namespace e2e-test-build-service-fdpjk because it is being terminated Nov 07 10:14:29.124 W endpoints/hello-openshift Failed to create endpoint for service e2e-test-build-service-fdpjk/hello-openshift: endpoints "hello-openshift" is forbidden: unable to create new content in namespace e2e-test-build-service-fdpjk because it is being terminated (2 times) Nov 07 10:14:29.158 W endpoints/hello-openshift Failed to create endpoint for service e2e-test-build-service-fdpjk/hello-openshift: endpoints "hello-openshift" is forbidden: unable to create new content in namespace e2e-test-build-service-fdpjk because it is being terminated (3 times) Nov 07 10:14:29.184 W endpoints/hello-openshift Failed to create endpoint for service e2e-test-build-service-fdpjk/hello-openshift: endpoints "hello-openshift" is forbidden: unable to create new content in namespace e2e-test-build-service-fdpjk because it is being terminated (4 times) Nov 07 10:14:29.218 W endpoints/hello-openshift Failed to create endpoint for service e2e-test-build-service-fdpjk/hello-openshift: endpoints "hello-openshift" is forbidden: unable to create new content in namespace e2e-test-build-service-fdpjk because it is being terminated (5 times) Nov 07 10:14:29.253 W endpoints/hello-openshift Failed to create endpoint for service e2e-test-build-service-fdpjk/hello-openshift: endpoints "hello-openshift" is forbidden: unable to create new content in namespace e2e-test-build-service-fdpjk because it is being terminated (6 times) Nov 07 10:14:29.377 W endpoints/hello-openshift Failed to create endpoint for service e2e-test-build-service-fdpjk/hello-openshift: endpoints "hello-openshift" is forbidden: unable to create new content in namespace e2e-test-build-service-fdpjk because it is being terminated (7 times) Nov 07 10:14:29.713 W endpoints/hello-openshift Failed to create endpoint for service e2e-test-build-service-fdpjk/hello-openshift: endpoints "hello-openshift" is forbidden: unable to create new content in namespace e2e-test-build-service-fdpjk because it is being terminated (8 times) Nov 07 10:15:17.128 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: ensure(openshift-ingress/router-default): backendPoolID(/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Network/loadBalancers/ci-op-f7jvkn8j-bfca5-k72gq/backendAddressPools/ci-op-f7jvkn8j-bfca5-k72gq) - failed to ensure host in pool: "azure - cloud provider rate limited(read) for operation:NicGet" (6 times) Nov 07 10:15:41.604 W persistentvolume/pvc-0264148a-1437-433b-ac54-0d4cb403f6d4 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-0264148a-1437-433b-ac54-0d4cb403f6d4 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd." Nov 07 10:16:49.269 W endpoints/endpoints Failed to create endpoint for service e2e-test-router-scoped-bw5dz/endpoints: endpoints "endpoints" is forbidden: unable to create new content in namespace e2e-test-router-scoped-bw5dz because it is being terminated Nov 07 10:16:49.297 W endpoints/endpoints Failed to create endpoint for service e2e-test-router-scoped-bw5dz/endpoints: endpoints "endpoints" is forbidden: unable to create new content in namespace e2e-test-router-scoped-bw5dz because it is being terminated (2 times) Nov 07 10:16:49.314 W endpoints/endpoints Failed to create endpoint for service e2e-test-router-scoped-bw5dz/endpoints: endpoints "endpoints" is forbidden: unable to create new content in namespace e2e-test-router-scoped-bw5dz because it is being terminated (3 times) Nov 07 10:16:49.330 W endpoints/endpoints Failed to create endpoint for service e2e-test-router-scoped-bw5dz/endpoints: endpoints "endpoints" is forbidden: unable to create new content in namespace e2e-test-router-scoped-bw5dz because it is being terminated (4 times) Nov 07 10:16:49.342 W endpoints/endpoints Failed to create endpoint for service e2e-test-router-scoped-bw5dz/endpoints: endpoints "endpoints" is forbidden: unable to create new content in namespace e2e-test-router-scoped-bw5dz because it is being terminated (5 times) Nov 07 10:16:57.687 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: ensure(openshift-ingress/router-default): backendPoolID(/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Network/loadBalancers/ci-op-f7jvkn8j-bfca5-k72gq/backendAddressPools/ci-op-f7jvkn8j-bfca5-k72gq) - failed to ensure host in pool: "azure - cloud provider rate limited(read) for operation:NicGet" (7 times) Nov 07 10:17:47.383 W persistentvolume/pvc-8a472501-1e1f-4769-a699-52def1abcc8b compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-8a472501-1e1f-4769-a699-52def1abcc8b is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:18:38.320 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: ensure(openshift-ingress/router-default): backendPoolID(/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Network/loadBalancers/ci-op-f7jvkn8j-bfca5-k72gq/backendAddressPools/ci-op-f7jvkn8j-bfca5-k72gq) - failed to ensure host in pool: "azure - cloud provider rate limited(read) for operation:NicGet" (8 times) Nov 07 10:18:39.481 W persistentvolume/pvc-73b21fd4-c94e-406e-a4f7-4321f4796575 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-73b21fd4-c94e-406e-a4f7-4321f4796575 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt." Nov 07 10:18:39.497 W persistentvolume/pvc-ce005fb2-4e91-43a2-b7fd-4dc914628e6b compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-ce005fb2-4e91-43a2-b7fd-4dc914628e6b is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:19:37.111 W persistentvolume/pvc-8c611a78-9ff5-4ced-ad16-6138069b1911 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-8c611a78-9ff5-4ced-ad16-6138069b1911 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:20:19.055 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: ensure(openshift-ingress/router-default): backendPoolID(/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Network/loadBalancers/ci-op-f7jvkn8j-bfca5-k72gq/backendAddressPools/ci-op-f7jvkn8j-bfca5-k72gq) - failed to ensure host in pool: "azure - cloud provider rate limited(read) for operation:NicGet" (9 times) Nov 07 10:20:37.598 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-1 (combined from similar events): Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert" not found) (11 times) Nov 07 10:20:37.807 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-1 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-006" not found) (3 times) Nov 07 10:21:34.324 W persistentvolume/pvc-f4ecce47-6554-4dce-afab-ffac6bca1905 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-f4ecce47-6554-4dce-afab-ffac6bca1905 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:21:59.753 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: ensure(openshift-ingress/router-default): backendPoolID(/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Network/loadBalancers/ci-op-f7jvkn8j-bfca5-k72gq/backendAddressPools/ci-op-f7jvkn8j-bfca5-k72gq) - failed to ensure host in pool: "azure - cloud provider rate limited(read) for operation:NicGet" (10 times) Nov 07 10:22:33.103 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-2 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert" not found) (4 times) Nov 07 10:22:33.688 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-2 (combined from similar events): Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-009" not found) (17 times) Nov 07 10:23:40.456 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: ensure(openshift-ingress/router-default): backendPoolID(/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Network/loadBalancers/ci-op-f7jvkn8j-bfca5-k72gq/backendAddressPools/ci-op-f7jvkn8j-bfca5-k72gq) - failed to ensure host in pool: "azure - cloud provider rate limited(read) for operation:NicGet" (11 times) Nov 07 10:24:25.917 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-0 (combined from similar events): Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert" not found) (14 times) Nov 07 10:24:26.309 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-0 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-007" not found) (5 times) Nov 07 10:24:54.265 I ns/default pod/recycler-for-nfs-wskvw node/ created Nov 07 10:24:54.292 I ns/default pod/recycler-for-nfs-wskvw Successfully assigned default/recycler-for-nfs-wskvw to ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Nov 07 10:24:54.298 I persistentvolume/nfs-wskvw Recycler pod: Successfully assigned default/recycler-for-nfs-wskvw to ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Nov 07 10:25:01.414 I ns/default pod/recycler-for-nfs-wskvw Pulling image "busybox:1.27" Nov 07 10:25:01.424 I persistentvolume/nfs-wskvw Recycler pod: Pulling image "busybox:1.27" Nov 07 10:25:07.032 I ns/default pod/recycler-for-nfs-wskvw Successfully pulled image "busybox:1.27" Nov 07 10:25:07.046 I persistentvolume/nfs-wskvw Recycler pod: Successfully pulled image "busybox:1.27" Nov 07 10:25:08.407 I ns/default pod/recycler-for-nfs-wskvw Created container pv-recycler Nov 07 10:25:08.416 I persistentvolume/nfs-wskvw Recycler pod: Created container pv-recycler Nov 07 10:25:08.479 I ns/default pod/recycler-for-nfs-wskvw Started container pv-recycler Nov 07 10:25:08.491 I persistentvolume/nfs-wskvw Recycler pod: Started container pv-recycler Nov 07 10:25:09.260 W ns/default pod/recycler-for-nfs-wskvw node/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd graceful deletion within 0s Nov 07 10:25:09.267 W ns/default pod/recycler-for-nfs-wskvw node/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd deleted Nov 07 10:25:09.278 I persistentvolume/nfs-wskvw Volume recycled Nov 07 10:25:21.062 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: ensure(openshift-ingress/router-default): backendPoolID(/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Network/loadBalancers/ci-op-f7jvkn8j-bfca5-k72gq/backendAddressPools/ci-op-f7jvkn8j-bfca5-k72gq) - failed to ensure host in pool: "azure - cloud provider rate limited(read) for operation:NicGet" (12 times) Nov 07 10:25:39.129 I ns/default pod/recycler-for-nfs-wskvw node/ created Nov 07 10:25:39.156 I persistentvolume/nfs-wskvw Recycler pod: Started container pv-recycler (2 times) Nov 07 10:25:39.177 I ns/default pod/recycler-for-nfs-wskvw Successfully assigned default/recycler-for-nfs-wskvw to ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2 Nov 07 10:25:39.207 I persistentvolume/nfs-wskvw Recycler pod: Successfully pulled image "busybox:1.27" (2 times) Nov 07 10:25:39.230 I persistentvolume/nfs-wskvw Recycler pod: Successfully assigned default/recycler-for-nfs-wskvw to ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd (2 times) Nov 07 10:25:39.302 I persistentvolume/nfs-wskvw Recycler pod: Pulling image "busybox:1.27" (2 times) Nov 07 10:25:39.318 I persistentvolume/nfs-wskvw Recycler pod: Created container pv-recycler (2 times) Nov 07 10:25:39.327 I persistentvolume/nfs-wskvw Recycler pod: Successfully assigned default/recycler-for-nfs-wskvw to ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2 Nov 07 10:26:10.594 I ns/default pod/recycler-for-nfs-wskvw Pulling image "busybox:1.27" Nov 07 10:26:10.616 I persistentvolume/nfs-wskvw Recycler pod: Pulling image "busybox:1.27" (3 times) Nov 07 10:26:18.012 I ns/default pod/recycler-for-nfs-wskvw Successfully pulled image "busybox:1.27" Nov 07 10:26:18.023 I persistentvolume/nfs-wskvw Recycler pod: Successfully pulled image "busybox:1.27" (3 times) Nov 07 10:26:35.862 W persistentvolume/pvc-75e4a5a5-5ee3-4b37-be2c-8d791b58bdda compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-75e4a5a5-5ee3-4b37-be2c-8d791b58bdda is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:26:49.901 - 225s W ns/default pod/recycler-for-nfs-wskvw node/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2 pod has been pending longer than a minute Nov 07 10:27:01.670 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: azure - cloud provider rate limited(read) for operation:PublicIPGet (2 times) Nov 07 10:27:35.913 W persistentvolume/pvc-d5b0df05-47b1-45b0-abb9-8929e35ae0e3 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-d5b0df05-47b1-45b0-abb9-8929e35ae0e3 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:27:47.550 W persistentvolume/pvc-e8d269ea-8720-4b81-8511-bbdc5d41f8cb compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-e8d269ea-8720-4b81-8511-bbdc5d41f8cb is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:28:10.151 W persistentvolume/pvc-eb3057c9-90cd-4f71-a87a-8866206f83d8 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-eb3057c9-90cd-4f71-a87a-8866206f83d8 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd." Nov 07 10:28:18.014 W ns/default pod/recycler-for-nfs-wskvw Error: context deadline exceeded Nov 07 10:28:18.029 W persistentvolume/nfs-wskvw Recycler pod: Error: context deadline exceeded Nov 07 10:28:18.974 I ns/default pod/recycler-for-nfs-wskvw Container image "busybox:1.27" already present on machine Nov 07 10:28:18.987 I persistentvolume/nfs-wskvw Recycler pod: Container image "busybox:1.27" already present on machine Nov 07 10:28:19.027 W ns/default pod/recycler-for-nfs-wskvw Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id 6fc121dcdd7ae1f7a3bd235248d8f06dba0ae83c6b35ac7302258a8c8bc8392c Nov 07 10:28:19.033 W persistentvolume/nfs-wskvw Recycler pod: Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id 6fc121dcdd7ae1f7a3bd235248d8f06dba0ae83c6b35ac7302258a8c8bc8392c Nov 07 10:28:30.278 I ns/default pod/recycler-for-nfs-wskvw Container image "busybox:1.27" already present on machine (2 times) Nov 07 10:28:30.284 W ns/default pod/recycler-for-nfs-wskvw Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id ed490e72fbc6b023e9db11571d118c207150d7598ccaf5b2c0db61a6d6aee7d3 Nov 07 10:28:30.304 W persistentvolume/nfs-wskvw Recycler pod: Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id ed490e72fbc6b023e9db11571d118c207150d7598ccaf5b2c0db61a6d6aee7d3 Nov 07 10:28:42.320 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: azure - cloud provider rate limited(read) for operation:PublicIPGet (3 times) Nov 07 10:28:43.576 I ns/default pod/recycler-for-nfs-wskvw Container image "busybox:1.27" already present on machine (3 times) Nov 07 10:28:44.226 W ns/default pod/recycler-for-nfs-wskvw Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id 7df767f38f276fde0276a6eebcdf1155cf254de396e3b10f457a34ca526bcbf9 Nov 07 10:28:44.234 W persistentvolume/nfs-wskvw Recycler pod: Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id 7df767f38f276fde0276a6eebcdf1155cf254de396e3b10f457a34ca526bcbf9 Nov 07 10:28:54.694 W persistentvolume/pvc-ea964081-112b-4a8f-9f5a-9915e9298725 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-ea964081-112b-4a8f-9f5a-9915e9298725 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd." Nov 07 10:28:58.485 I ns/default pod/recycler-for-nfs-wskvw Container image "busybox:1.27" already present on machine (4 times) Nov 07 10:28:58.667 W ns/default pod/recycler-for-nfs-wskvw Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id 1a16f867aaaef9d3bef8970a88b00f35c0cb7096cf9d371ec5c5bf5a4397969a Nov 07 10:28:58.679 W persistentvolume/nfs-wskvw Recycler pod: Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id 1a16f867aaaef9d3bef8970a88b00f35c0cb7096cf9d371ec5c5bf5a4397969a Nov 07 10:29:08.450 W persistentvolume/pvc-dfb7b497-dfc7-4b86-9c97-806ea0cc5a56 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-dfb7b497-dfc7-4b86-9c97-806ea0cc5a56 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:29:14.097 I ns/default pod/recycler-for-nfs-wskvw Container image "busybox:1.27" already present on machine (5 times) Nov 07 10:29:14.635 W ns/default pod/recycler-for-nfs-wskvw Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id e0843fa19d375e2c372710590b9640bde18f3e65db1561ba7ef08bfb92780d6d Nov 07 10:29:14.667 W persistentvolume/nfs-wskvw Recycler pod: Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id e0843fa19d375e2c372710590b9640bde18f3e65db1561ba7ef08bfb92780d6d Nov 07 10:29:29.365 I ns/default pod/recycler-for-nfs-wskvw Container image "busybox:1.27" already present on machine (6 times) Nov 07 10:29:29.416 W ns/default pod/recycler-for-nfs-wskvw Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id fe6b3e71f13314c9b8c3f7758fa180a58ca97ed22adaa4555a00d42e8fb6dfa6 Nov 07 10:29:29.432 W persistentvolume/nfs-wskvw Recycler pod: Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id fe6b3e71f13314c9b8c3f7758fa180a58ca97ed22adaa4555a00d42e8fb6dfa6 Nov 07 10:29:41.276 I ns/default pod/recycler-for-nfs-wskvw Container image "busybox:1.27" already present on machine (7 times) Nov 07 10:29:41.286 W ns/default pod/recycler-for-nfs-wskvw Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id c71486f5e40a7182cb70fb426d2c5f9c88132e477b8f077cfa0910e8ae207645 Nov 07 10:29:41.306 W persistentvolume/nfs-wskvw Recycler pod: Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id c71486f5e40a7182cb70fb426d2c5f9c88132e477b8f077cfa0910e8ae207645 Nov 07 10:29:53.270 I ns/default pod/recycler-for-nfs-wskvw Container image "busybox:1.27" already present on machine (8 times) Nov 07 10:29:53.285 W ns/default pod/recycler-for-nfs-wskvw Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id 53449b41e2e7c3a9febdaa2fad0fc77e70a4b3312862828e22a768c262b27f70 Nov 07 10:29:53.297 W persistentvolume/nfs-wskvw Recycler pod: Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id 53449b41e2e7c3a9febdaa2fad0fc77e70a4b3312862828e22a768c262b27f70 Nov 07 10:30:05.279 I ns/default pod/recycler-for-nfs-wskvw Container image "busybox:1.27" already present on machine (9 times) Nov 07 10:30:05.302 W ns/default pod/recycler-for-nfs-wskvw (combined from similar events): Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id 277a2134fa7d2d447143072a2b57e68005858d2287ed3d19455ac63c72244140 Nov 07 10:30:05.320 W persistentvolume/nfs-wskvw (combined from similar events): Recycler pod: (combined from similar events): Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id 277a2134fa7d2d447143072a2b57e68005858d2287ed3d19455ac63c72244140 Nov 07 10:30:11.747 W persistentvolume/pvc-1f539eb0-223d-4e5b-a1c1-adb3b1508de5 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-1f539eb0-223d-4e5b-a1c1-adb3b1508de5 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt." Nov 07 10:30:12.013 W persistentvolume/pvc-2f08a69c-76ea-4a41-815d-107fcaf53b3b compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-2f08a69c-76ea-4a41-815d-107fcaf53b3b is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:30:17.899 I ns/default pod/recycler-for-nfs-wskvw Container image "busybox:1.27" already present on machine (10 times) Nov 07 10:30:18.383 W ns/default pod/recycler-for-nfs-wskvw (combined from similar events): Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id 00ad535187f9241243d1cbc9c64781d2b8d0f2b95565d7e1da038e75d6320cf9 (2 times) Nov 07 10:30:22.966 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: ensure(openshift-ingress/router-default): backendPoolID(/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Network/loadBalancers/ci-op-f7jvkn8j-bfca5-k72gq/backendAddressPools/ci-op-f7jvkn8j-bfca5-k72gq) - failed to ensure host in pool: "azure - cloud provider rate limited(read) for operation:NicGet" (13 times) Nov 07 10:30:36.587 I ns/default pod/recycler-for-nfs-wskvw Container image "busybox:1.27" already present on machine (11 times) Nov 07 10:30:36.731 W ns/default pod/recycler-for-nfs-wskvw (combined from similar events): Error: error reserving ctr name k8s_pv-recycler_recycler-for-nfs-wskvw_default_741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9_0 for id 75a8fc336dc776e6f4a69d6e9a6e78c0a288b236931fe5c22f2ec34ae380c644 (3 times) Nov 07 10:30:37.611 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-1 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert" not found) (5 times) Nov 07 10:30:37.648 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-1 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-002" not found) (6 times) Nov 07 10:30:44.777 E ns/default pod/recycler-for-nfs-wskvw node/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2 pod failed (DeadlineExceeded): Pod was active on the node longer than the specified deadline Nov 07 10:30:44.794 W ns/default pod/recycler-for-nfs-wskvw node/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2 graceful deletion within 0s Nov 07 10:30:44.807 W ns/default pod/recycler-for-nfs-wskvw node/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2 deleted Nov 07 10:31:17.427 W persistentvolume/pvc-3ff7428e-93f0-4ebf-90f9-fc9deac22124 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-3ff7428e-93f0-4ebf-90f9-fc9deac22124 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:31:49.135 W persistentvolume/pvc-e00d6e34-270e-482a-ac1c-e8cee34463e8 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-e00d6e34-270e-482a-ac1c-e8cee34463e8 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd." Nov 07 10:32:33.200 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-2 (combined from similar events): Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert" not found) (21 times) Nov 07 10:32:33.297 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-2 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-006" not found) (6 times) Nov 07 10:32:44.716 W ns/default pod/recycler-for-nfs-wskvw error killing pod: failed to "KillPodSandbox" for "741f55e8-cb6f-4f68-bef9-7bb04bd6dcf9" with KillPodSandboxError: "rpc error: code = DeadlineExceeded desc = context deadline exceeded" Nov 07 10:32:51.272 W persistentvolume/pvc-14dbd107-44f5-4821-93dd-ecdf5b666545 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-14dbd107-44f5-4821-93dd-ecdf5b666545 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:32:58.277 W persistentvolume/pvc-3127d77a-cb10-433f-b590-8df5765dbda1 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-3127d77a-cb10-433f-b590-8df5765dbda1 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:33:42.150 I ns/openshift-must-gather-ng6b9 pod/must-gather-445kk node/ created Nov 07 10:33:42.167 I ns/openshift-must-gather-ng6b9 pod/must-gather-445kk Successfully assigned openshift-must-gather-ng6b9/must-gather-445kk to ci-op-f7jvkn8j-bfca5-k72gq-master-2 Nov 07 10:33:44.530 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: ensure(openshift-ingress/router-default): backendPoolID(/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Network/loadBalancers/ci-op-f7jvkn8j-bfca5-k72gq/backendAddressPools/ci-op-f7jvkn8j-bfca5-k72gq) - failed to ensure host in pool: "azure - cloud provider rate limited(read) for operation:NicGet" (14 times) Nov 07 10:34:05.768 W persistentvolume/pvc-d45decbf-672c-4856-bdd2-965551f98bdc compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-d45decbf-672c-4856-bdd2-965551f98bdc is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:34:18.674 I ns/openshift-must-gather-ng6b9 pod/must-gather-445kk Container image "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5ddd62469a9bd0f38fd58b05e7e51065e4c4ac291eeb4650eb69c47ece5dfc8d" already present on machine Nov 07 10:34:18.994 I ns/openshift-must-gather-ng6b9 pod/must-gather-445kk Created container gather Nov 07 10:34:19.026 I ns/openshift-must-gather-ng6b9 pod/must-gather-445kk Started container gather Nov 07 10:34:25.920 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-0 (combined from similar events): Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert" not found) (21 times) Nov 07 10:34:26.517 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-0 (combined from similar events): Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-008" not found) (24 times) Nov 07 10:34:49.901 - 390s W ns/openshift-must-gather-ng6b9 pod/must-gather-445kk node/ci-op-f7jvkn8j-bfca5-k72gq-master-2 pod has been pending longer than a minute Nov 07 10:36:22.186 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-gcpgn/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-gcpgn because it is being terminated Nov 07 10:36:22.203 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-gcpgn/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-gcpgn because it is being terminated (2 times) Nov 07 10:36:22.231 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-gcpgn/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-gcpgn because it is being terminated (3 times) Nov 07 10:36:22.271 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-gcpgn/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-gcpgn because it is being terminated (4 times) Nov 07 10:36:22.290 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-gcpgn/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-gcpgn because it is being terminated (5 times) Nov 07 10:36:22.360 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-gcpgn/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-gcpgn because it is being terminated (6 times) Nov 07 10:36:22.381 W endpoints/test-oauth-svc Failed to create endpoint for service e2e-test-oauth-server-headers-gcpgn/test-oauth-svc: endpoints "test-oauth-svc" is forbidden: unable to create new content in namespace e2e-test-oauth-server-headers-gcpgn because it is being terminated (7 times) Nov 07 10:37:06.817 W persistentvolume/pvc-91ac3ecf-6587-4774-9775-8732a9d7b0e7 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-91ac3ecf-6587-4774-9775-8732a9d7b0e7 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:38:40.061 W persistentvolume/pvc-51afc4fe-0ffe-4ff4-8a94-8ccab1c3a5d9 compute.DisksClient#Delete: Failure sending request: StatusCode=0 -- Original Error: autorest/azure: Service returned an error. Status=<nil> Code="OperationNotAllowed" Message="Disk ci-op-f7jvkn8j-bfca5-k72gq-dynamic-pvc-51afc4fe-0ffe-4ff4-8a94-8ccab1c3a5d9 is attached to VM /subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Compute/virtualMachines/ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2." Nov 07 10:38:46.647 W ns/openshift-ingress service/router-default Error updating load balancer with new hosts map[ci-op-f7jvkn8j-bfca5-k72gq-master-0:{} ci-op-f7jvkn8j-bfca5-k72gq-master-1:{} ci-op-f7jvkn8j-bfca5-k72gq-master-2:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd:{} ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-wr9w2:{}]: ensure(openshift-ingress/router-default): backendPoolID(/subscriptions/d38f1e38-4bed-438e-b227-833f997adf6a/resourceGroups/ci-op-f7jvkn8j-bfca5-k72gq-rg/providers/Microsoft.Network/loadBalancers/ci-op-f7jvkn8j-bfca5-k72gq/backendAddressPools/ci-op-f7jvkn8j-bfca5-k72gq) - failed to ensure host in pool: "azure - cloud provider rate limited(read) for operation:NicGet" (17 times) Nov 07 10:40:37.599 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-1 (combined from similar events): Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert" not found) (24 times) Nov 07 10:40:38.189 W ns/openshift-kube-apiserver pod/kube-apiserver-ci-op-f7jvkn8j-bfca5-k72gq-master-1 Removed file for secret: /%!(EXTRA *errors.StatusError=secrets "user-serving-cert-008" not found) (7 times) Nov 07 10:41:27.124 I ns/openshift-must-gather-ng6b9 pod/must-gather-445kk Container image "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5ddd62469a9bd0f38fd58b05e7e51065e4c4ac291eeb4650eb69c47ece5dfc8d" already present on machine Nov 07 10:41:27.459 I ns/openshift-must-gather-ng6b9 pod/must-gather-445kk Created container copy Nov 07 10:41:27.489 I ns/openshift-must-gather-ng6b9 pod/must-gather-445kk Started container copy
Find failed mentions in log files
go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[Feature\:ImageLayers\]\[registry\]\sImage\slayer\ssubresource\sshould\sreturn\slayers\sfrom\stagged\simages\s\[Suite\:openshift\/conformance\/parallel\]$'
fail [github.com/openshift/origin/test/extended/images/layers.go:194]: Unexpected error: <*errors.errorString | 0xc000286100>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurredfrom junit_e2e_20191107-104211.xml
Nov 7 10:07:43.725: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:07:43.728: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:07:44.200: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:07:45.504: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:07:45.505: INFO: Waiting up to 30m0s for all (but 100) nodes to be schedulable Nov 7 10:07:45.727: INFO: Waiting up to 10m0s for all pods (need at least 0) in namespace 'kube-system' to be running and ready Nov 7 10:07:45.979: INFO: 0 / 0 pods in namespace 'kube-system' are running and ready (0 seconds elapsed) Nov 7 10:07:45.979: INFO: expected 0 pod replicas in namespace 'kube-system', 0 are Running and Ready. Nov 7 10:07:45.979: INFO: Waiting up to 5m0s for all daemonsets in namespace 'kube-system' to start Nov 7 10:07:46.061: INFO: e2e test version: v1.16.2 Nov 7 10:07:46.135: INFO: kube-apiserver version: v1.16.2 Nov 7 10:07:46.135: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:07:46.219: INFO: Cluster IP family: ipv4 [BeforeEach] [Top Level] /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/test/extended/util/test.go:60 [BeforeEach] [Feature:ImageLayers][registry] Image layer subresource /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/k8s.io/kubernetes/test/e2e/framework/framework.go:151 STEP: Creating a kubernetes client Nov 7 10:07:46.234: INFO: >>> kubeConfig: /tmp/admin.kubeconfig [BeforeEach] [Feature:ImageLayers][registry] Image layer subresource /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/test/extended/util/client.go:109 Nov 7 10:07:47.006: INFO: configPath is now "/tmp/configfile327578405" Nov 7 10:07:47.006: INFO: The user is now "e2e-test-image-layers-ln99z-user" Nov 7 10:07:47.006: INFO: Creating project "e2e-test-image-layers-ln99z" Nov 7 10:07:47.305: INFO: Waiting on permissions in project "e2e-test-image-layers-ln99z" ... Nov 7 10:07:47.382: INFO: Waiting for ServiceAccount "default" to be provisioned... Nov 7 10:07:48.262: INFO: Waiting for ServiceAccount "deployer" to be provisioned... Nov 7 10:07:48.440: INFO: Waiting for ServiceAccount "builder" to be provisioned... Nov 7 10:07:48.619: INFO: Waiting for RoleBinding "system:image-pullers" to be provisioned... Nov 7 10:07:48.771: INFO: Waiting for RoleBinding "system:image-builders" to be provisioned... Nov 7 10:07:48.923: INFO: Waiting for RoleBinding "system:deployers" to be provisioned... Nov 7 10:07:49.074: INFO: Project "e2e-test-image-layers-ln99z" has been fully provisioned. [It] should return layers from tagged images [Suite:openshift/conformance/parallel] /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/test/extended/images/layers.go:75 STEP: verifying that layers for imported images are correct STEP: running a build based on our tagged layer Nov 7 10:07:51.452: INFO: Creating project "e2e-test-image-layers-5hx8j" Nov 7 10:07:51.824: INFO: Waiting on permissions in project "e2e-test-image-layers-5hx8j" ... STEP: waiting for the build to finish [AfterEach] [Feature:ImageLayers][registry] Image layer subresource /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/test/extended/images/layers.go:28 Nov 7 10:09:52.441: INFO: Running 'oc --namespace=e2e-test-image-layers-ln99z --config=/tmp/admin.kubeconfig describe pod/output-build -n e2e-test-image-layers-ln99z' Nov 7 10:09:53.102: INFO: Describing pod "output-build" Name: output-build Namespace: e2e-test-image-layers-ln99z Priority: 0 Node: ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd/10.0.32.5 Start Time: Thu, 07 Nov 2019 10:07:51 +0000 Labels: openshift.io/build.name=output Annotations: k8s.v1.cni.cncf.io/networks-status: [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.128.2.26" ], "mac": "d2:91:e9:80:02:1b", "dns": {} }] openshift.io/build.name: output openshift.io/scc: privileged ovn: {"ip_address":"10.128.2.26/23","mac_address":"d2:91:e9:80:02:1b","gateway_ip":"10.128.2.1"} Status: Running IP: 10.128.2.26 IPs: IP: 10.128.2.26 Controlled By: Build/output Init Containers: manage-dockerfile: Container ID: cri-o://afde610d68b89cfaab24a22265e19b651eb6167b645ea0629aabd150bfb12ffa Image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b8fe44aeb40fef8eaa0f80e58542ae6e6b328ce98232ab1f126dbbe0e0457b2 Image ID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b8fe44aeb40fef8eaa0f80e58542ae6e6b328ce98232ab1f126dbbe0e0457b2 Port: <none> Host Port: <none> Command: openshift-manage-dockerfile Args: --loglevel=0 State: Terminated Reason: Completed Exit Code: 0 Started: Thu, 07 Nov 2019 10:09:31 +0000 Finished: Thu, 07 Nov 2019 10:09:31 +0000 Ready: True Restart Count: 0 Environment: BUILD: {"kind":"Build","apiVersion":"build.openshift.io/v1","metadata":{"name":"output","namespace":"e2e-test-image-layers-ln99z","selfLink":"/apis/build.openshift.io/v1/namespaces/e2e-test-image-layers-ln99z/builds/output","uid":"dd2e02b4-59a3-4cb2-ab2a-189163b01500","resourceVersion":"25140","creationTimestamp":"2019-11-07T10:07:51Z"},"spec":{"source":{"type":"Dockerfile","dockerfile":"\nFROM a\nRUN mkdir -p /var/lib \u0026\u0026 echo \"a\" \u003e /var/lib/file\n"},"strategy":{"type":"Docker","dockerStrategy":{"from":{"kind":"DockerImage","name":"busybox@sha256:679b1c1058c1f2dc59a3ee70eed986a88811c0205c8ceea57cec5f22d2c3fbb1"},"pullSecret":{"name":"builder-dockercfg-wfkjq"}}},"output":{"to":{"kind":"DockerImage","name":"image-registry.openshift-image-registry.svc:5000/e2e-test-image-layers-ln99z/output:latest"},"pushSecret":{"name":"builder-dockercfg-wfkjq"}},"resources":{},"postCommit":{},"nodeSelector":null,"triggeredBy":null},"status":{"phase":"New","outputDockerImageReference":"image-registry.openshift-image-registry.svc:5000/e2e-test-image-layers-ln99z/output:latest","output":{}}} LANG: en_US.utf8 BUILD_REGISTRIES_CONF_PATH: /var/run/configs/openshift.io/build-system/registries.conf BUILD_REGISTRIES_DIR_PATH: /var/run/configs/openshift.io/build-system/registries.d BUILD_SIGNATURE_POLICY_PATH: /var/run/configs/openshift.io/build-system/policy.json BUILD_STORAGE_CONF_PATH: /var/run/configs/openshift.io/build-system/storage.conf BUILD_BLOBCACHE_DIR: /var/cache/blobs HTTP_PROXY: HTTPS_PROXY: NO_PROXY: Mounts: /tmp/build from buildworkdir (rw) /var/cache/blobs from build-blob-cache (rw) /var/run/configs/openshift.io/build-system from build-system-configs (ro) /var/run/secrets/kubernetes.io/serviceaccount from builder-token-k2mdj (ro) Containers: docker-build: Container ID: cri-o://fb45d1f62056381eb946f4e27cdee6a19e1421c7c65785324b83afb1a5412cbd Image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b8fe44aeb40fef8eaa0f80e58542ae6e6b328ce98232ab1f126dbbe0e0457b2 Image ID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b8fe44aeb40fef8eaa0f80e58542ae6e6b328ce98232ab1f126dbbe0e0457b2 Port: <none> Host Port: <none> Command: openshift-docker-build Args: --loglevel=0 State: Running Started: Thu, 07 Nov 2019 10:09:37 +0000 Ready: True Restart Count: 0 Environment: BUILD: {"kind":"Build","apiVersion":"build.openshift.io/v1","metadata":{"name":"output","namespace":"e2e-test-image-layers-ln99z","selfLink":"/apis/build.openshift.io/v1/namespaces/e2e-test-image-layers-ln99z/builds/output","uid":"dd2e02b4-59a3-4cb2-ab2a-189163b01500","resourceVersion":"25140","creationTimestamp":"2019-11-07T10:07:51Z"},"spec":{"source":{"type":"Dockerfile","dockerfile":"\nFROM a\nRUN mkdir -p /var/lib \u0026\u0026 echo \"a\" \u003e /var/lib/file\n"},"strategy":{"type":"Docker","dockerStrategy":{"from":{"kind":"DockerImage","name":"busybox@sha256:679b1c1058c1f2dc59a3ee70eed986a88811c0205c8ceea57cec5f22d2c3fbb1"},"pullSecret":{"name":"builder-dockercfg-wfkjq"}}},"output":{"to":{"kind":"DockerImage","name":"image-registry.openshift-image-registry.svc:5000/e2e-test-image-layers-ln99z/output:latest"},"pushSecret":{"name":"builder-dockercfg-wfkjq"}},"resources":{},"postCommit":{},"nodeSelector":null,"triggeredBy":null},"status":{"phase":"New","outputDockerImageReference":"image-registry.openshift-image-registry.svc:5000/e2e-test-image-layers-ln99z/output:latest","output":{}}} LANG: en_US.utf8 PUSH_DOCKERCFG_PATH: /var/run/secrets/openshift.io/push PULL_DOCKERCFG_PATH: /var/run/secrets/openshift.io/pull BUILD_REGISTRIES_CONF_PATH: /var/run/configs/openshift.io/build-system/registries.conf BUILD_REGISTRIES_DIR_PATH: /var/run/configs/openshift.io/build-system/registries.d BUILD_SIGNATURE_POLICY_PATH: /var/run/configs/openshift.io/build-system/policy.json BUILD_STORAGE_CONF_PATH: /var/run/configs/openshift.io/build-system/storage.conf BUILD_STORAGE_DRIVER: overlay BUILD_ISOLATION: chroot BUILD_BLOBCACHE_DIR: /var/cache/blobs HTTP_PROXY: HTTPS_PROXY: NO_PROXY: Mounts: /etc/pki/ca-trust/extracted/pem from build-proxy-ca-bundles (rw) /tmp/build from buildworkdir (rw) /var/cache/blobs from build-blob-cache (rw) /var/lib/containers/cache from buildcachedir (rw) /var/lib/containers/storage from container-storage-root (rw) /var/run/configs/openshift.io/build-system from build-system-configs (ro) /var/run/configs/openshift.io/certs from build-ca-bundles (rw) /var/run/secrets/kubernetes.io/serviceaccount from builder-token-k2mdj (ro) /var/run/secrets/openshift.io/pull from builder-dockercfg-wfkjq-pull (ro) /var/run/secrets/openshift.io/push from builder-dockercfg-wfkjq-push (ro) Conditions: Type Status Initialized True Ready True ContainersReady True PodScheduled True Volumes: buildcachedir: Type: HostPath (bare host directory volume) Path: /var/lib/containers/cache HostPathType: buildworkdir: Type: EmptyDir (a temporary directory that shares a pod's lifetime) Medium: SizeLimit: <unset> builder-dockercfg-wfkjq-push: Type: Secret (a volume populated by a Secret) SecretName: builder-dockercfg-wfkjq Optional: false builder-dockercfg-wfkjq-pull: Type: Secret (a volume populated by a Secret) SecretName: builder-dockercfg-wfkjq Optional: false build-system-configs: Type: ConfigMap (a volume populated by a ConfigMap) Name: output-sys-config Optional: false build-ca-bundles: Type: ConfigMap (a volume populated by a ConfigMap) Name: output-ca Optional: false build-proxy-ca-bundles: Type: ConfigMap (a volume populated by a ConfigMap) Name: output-global-ca Optional: false container-storage-root: Type: EmptyDir (a temporary directory that shares a pod's lifetime) Medium: SizeLimit: <unset> build-blob-cache: Type: EmptyDir (a temporary directory that shares a pod's lifetime) Medium: SizeLimit: <unset> builder-token-k2mdj: Type: Secret (a volume populated by a Secret) SecretName: builder-token-k2mdj Optional: false QoS Class: BestEffort Node-Selectors: kubernetes.io/os=linux Tolerations: node.kubernetes.io/not-ready:NoExecute for 300s node.kubernetes.io/unreachable:NoExecute for 300s Events: Type Reason Age From Message ---- ------ ---- ---- ------- Normal Scheduled <unknown> default-scheduler Successfully assigned e2e-test-image-layers-ln99z/output-build to ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Normal Pulling 113s kubelet, ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Pulling image "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b8fe44aeb40fef8eaa0f80e58542ae6e6b328ce98232ab1f126dbbe0e0457b2" Normal Pulled 59s kubelet, ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Successfully pulled image "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b8fe44aeb40fef8eaa0f80e58542ae6e6b328ce98232ab1f126dbbe0e0457b2" Normal Created 22s kubelet, ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Created container manage-dockerfile Normal Started 22s kubelet, ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Started container manage-dockerfile Normal Pulled 21s kubelet, ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Container image "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b8fe44aeb40fef8eaa0f80e58542ae6e6b328ce98232ab1f126dbbe0e0457b2" already present on machine Normal Created 16s kubelet, ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Created container docker-build Normal Started 16s kubelet, ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Started container docker-build Nov 7 10:09:53.102: INFO: Running 'oc --namespace=e2e-test-image-layers-ln99z --config=/tmp/admin.kubeconfig logs pod/output-build -c manage-dockerfile -n e2e-test-image-layers-ln99z' Nov 7 10:09:53.724: INFO: Log for pod "output-build"/"manage-dockerfile" ----> Replaced Dockerfile FROM image a <----end of log for "output-build"/"manage-dockerfile" Nov 7 10:09:53.724: INFO: Running 'oc --namespace=e2e-test-image-layers-ln99z --config=/tmp/admin.kubeconfig logs pod/output-build -c docker-build -n e2e-test-image-layers-ln99z' Nov 7 10:09:54.388: INFO: Log for pod "output-build"/"docker-build" ----> Caching blobs under "/var/cache/blobs". Pulling image busybox@sha256:679b1c1058c1f2dc59a3ee70eed986a88811c0205c8ceea57cec5f22d2c3fbb1 ... Getting image source signatures Copying blob sha256:0f8c40e1270f10d085dda8ce12b7c5b17cd808f055df5a7222f54837ca0feae0 Copying config sha256:020584afccce44678ec82676db80f68d50ea5c766b6e9d9601f7b5fc86dfb96d Writing manifest to image destination Storing signatures STEP 1: FROM busybox@sha256:679b1c1058c1f2dc59a3ee70eed986a88811c0205c8ceea57cec5f22d2c3fbb1 STEP 2: RUN mkdir -p /var/lib && echo "a" > /var/lib/file time="2019-11-07T10:09:54Z" level=warning msg="pkg/chroot: error unmounting \"/tmp/buildah840159216/mnt/rootfs\": error checking if \"/tmp/buildah840159216/mnt/rootfs/sys/fs/cgroup/rdma\" is mounted: no such file or directory" time="2019-11-07T10:09:54Z" level=warning msg="pkg/bind: error unmounting \"/tmp/buildah840159216/mnt/rootfs\": error checking if \"/tmp/buildah840159216/mnt/rootfs/sys/fs/cgroup/rdma\" is mounted: no such file or directory" <----end of log for "output-build"/"docker-build" [AfterEach] [Feature:ImageLayers][registry] Image layer subresource /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/test/extended/util/client.go:101 STEP: Collecting events from namespace "e2e-test-image-layers-ln99z". STEP: Found 9 events. Nov 7 10:09:54.490: INFO: At 0001-01-01 00:00:00 +0000 UTC - event for output-build: {default-scheduler } Scheduled: Successfully assigned e2e-test-image-layers-ln99z/output-build to ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Nov 7 10:09:54.490: INFO: At 2019-11-07 10:08:00 +0000 UTC - event for output-build: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Pulling: Pulling image "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b8fe44aeb40fef8eaa0f80e58542ae6e6b328ce98232ab1f126dbbe0e0457b2" Nov 7 10:09:54.490: INFO: At 2019-11-07 10:08:54 +0000 UTC - event for output-build: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Pulled: Successfully pulled image "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b8fe44aeb40fef8eaa0f80e58542ae6e6b328ce98232ab1f126dbbe0e0457b2" Nov 7 10:09:54.490: INFO: At 2019-11-07 10:09:31 +0000 UTC - event for output-build: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Created: Created container manage-dockerfile Nov 7 10:09:54.490: INFO: At 2019-11-07 10:09:31 +0000 UTC - event for output-build: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Started: Started container manage-dockerfile Nov 7 10:09:54.490: INFO: At 2019-11-07 10:09:32 +0000 UTC - event for output-build: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Pulled: Container image "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b8fe44aeb40fef8eaa0f80e58542ae6e6b328ce98232ab1f126dbbe0e0457b2" already present on machine Nov 7 10:09:54.490: INFO: At 2019-11-07 10:09:37 +0000 UTC - event for output: {build-controller } BuildStarted: Build e2e-test-image-layers-ln99z/output is now running Nov 7 10:09:54.490: INFO: At 2019-11-07 10:09:37 +0000 UTC - event for output-build: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Created: Created container docker-build Nov 7 10:09:54.490: INFO: At 2019-11-07 10:09:37 +0000 UTC - event for output-build: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Started: Started container docker-build Nov 7 10:09:54.574: INFO: POD NODE PHASE GRACE CONDITIONS Nov 7 10:09:54.575: INFO: output-build ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:09:32 +0000 UTC } {Ready True 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:09:37 +0000 UTC } {ContainersReady True 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:09:37 +0000 UTC } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:07:51 +0000 UTC }] Nov 7 10:09:54.575: INFO: Nov 7 10:09:54.672: INFO: output-build[e2e-test-image-layers-ln99z].container[docker-build].log Caching blobs under "/var/cache/blobs". Pulling image busybox@sha256:679b1c1058c1f2dc59a3ee70eed986a88811c0205c8ceea57cec5f22d2c3fbb1 ... Getting image source signatures Copying blob sha256:0f8c40e1270f10d085dda8ce12b7c5b17cd808f055df5a7222f54837ca0feae0 Copying config sha256:020584afccce44678ec82676db80f68d50ea5c766b6e9d9601f7b5fc86dfb96d Writing manifest to image destination Storing signatures STEP 1: FROM busybox@sha256:679b1c1058c1f2dc59a3ee70eed986a88811c0205c8ceea57cec5f22d2c3fbb1 STEP 2: RUN mkdir -p /var/lib && echo "a" > /var/lib/file time="2019-11-07T10:09:54Z" level=warning msg="pkg/chroot: error unmounting \"/tmp/buildah840159216/mnt/rootfs\": error checking if \"/tmp/buildah840159216/mnt/rootfs/sys/fs/cgroup/rdma\" is mounted: no such file or directory" time="2019-11-07T10:09:54Z" level=warning msg="pkg/bind: error unmounting \"/tmp/buildah840159216/mnt/rootfs\": error checking if \"/tmp/buildah840159216/mnt/rootfs/sys/fs/cgroup/rdma\" is mounted: no such file or directory" Nov 7 10:09:54.822: INFO: skipping dumping cluster info - cluster too large Nov 7 10:09:54.910: INFO: Deleted {user.openshift.io/v1, Resource=users e2e-test-image-layers-ln99z-user}, err: <nil> Nov 7 10:09:55.005: INFO: Deleted {oauth.openshift.io/v1, Resource=oauthclients e2e-client-e2e-test-image-layers-ln99z}, err: <nil> Nov 7 10:09:55.096: INFO: Deleted {oauth.openshift.io/v1, Resource=oauthaccesstokens KoMy8pKgSO-PVMlZdMgj3gAAAAAAAAAA}, err: <nil> [AfterEach] [Feature:ImageLayers][registry] Image layer subresource /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/k8s.io/kubernetes/test/e2e/framework/framework.go:152 Nov 7 10:09:55.096: INFO: Waiting up to 3m0s for all (but 100) nodes to be ready STEP: Destroying namespace "e2e-test-image-layers-ln99z" for this suite. STEP: Destroying namespace "e2e-test-image-layers-5hx8j" for this suite. Nov 7 10:09:55.362: INFO: Running AfterSuite actions on all nodes Nov 7 10:09:55.362: INFO: Running AfterSuite actions on node 1 fail [github.com/openshift/origin/test/extended/images/layers.go:194]: Unexpected error: <*errors.errorString | 0xc000286100>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred
Filter through log files
go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[Feature\:OAuthServer\]\s\[Headers\]\sexpected\sheaders\sreturned\sfrom\sthe\slogin\sURL\sfor\swhen\sthere\sis\sonly\sone\sIDP\s\[Suite\:openshift\/conformance\/parallel\]$'
fail [github.com/openshift/origin/test/extended/oauth/server_headers.go:34]: Unexpected error: <*errors.errorString | 0xc000282100>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurredfrom junit_e2e_20191107-104211.xml
Nov 7 10:06:16.816: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:06:16.819: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:06:17.289: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:06:18.612: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:06:18.613: INFO: Waiting up to 30m0s for all (but 100) nodes to be schedulable Nov 7 10:06:18.835: INFO: Waiting up to 10m0s for all pods (need at least 0) in namespace 'kube-system' to be running and ready Nov 7 10:06:19.106: INFO: 0 / 0 pods in namespace 'kube-system' are running and ready (0 seconds elapsed) Nov 7 10:06:19.106: INFO: expected 0 pod replicas in namespace 'kube-system', 0 are Running and Ready. Nov 7 10:06:19.106: INFO: Waiting up to 5m0s for all daemonsets in namespace 'kube-system' to start Nov 7 10:06:19.199: INFO: e2e test version: v1.16.2 Nov 7 10:06:19.273: INFO: kube-apiserver version: v1.16.2 Nov 7 10:06:19.273: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:06:19.372: INFO: Cluster IP family: ipv4 [BeforeEach] [Top Level] /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/test/extended/util/test.go:60 [BeforeEach] [Feature:OAuthServer] [Headers] /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/k8s.io/kubernetes/test/e2e/framework/framework.go:151 STEP: Creating a kubernetes client Nov 7 10:06:19.380: INFO: >>> kubeConfig: /tmp/admin.kubeconfig [BeforeEach] [Feature:OAuthServer] [Headers] /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/test/extended/util/client.go:109 Nov 7 10:06:20.167: INFO: configPath is now "/tmp/configfile173141121" Nov 7 10:06:20.167: INFO: The user is now "e2e-test-oauth-server-headers-v6ms4-user" Nov 7 10:06:20.167: INFO: Creating project "e2e-test-oauth-server-headers-v6ms4" Nov 7 10:06:20.464: INFO: Waiting on permissions in project "e2e-test-oauth-server-headers-v6ms4" ... Nov 7 10:06:20.541: INFO: Waiting for ServiceAccount "default" to be provisioned... Nov 7 10:06:27.119: INFO: Waiting for ServiceAccount "deployer" to be provisioned... Nov 7 10:06:27.315: INFO: Waiting for ServiceAccount "builder" to be provisioned... Nov 7 10:06:27.504: INFO: Waiting for RoleBinding "system:image-pullers" to be provisioned... Nov 7 10:06:27.658: INFO: Waiting for RoleBinding "system:image-builders" to be provisioned... Nov 7 10:06:27.809: INFO: Waiting for RoleBinding "system:deployers" to be provisioned... Nov 7 10:06:27.959: INFO: Project "e2e-test-oauth-server-headers-v6ms4" has been fully provisioned. [BeforeEach] [Feature:OAuthServer] [Headers] /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/test/extended/oauth/server_headers.go:25 Nov 7 10:06:27.961: INFO: Running 'oc --namespace=e2e-test-oauth-server-headers-v6ms4 --config=/tmp/admin.kubeconfig create -f /tmp/fixture-testdata-dir752633655/test/extended/testdata/oauthserver/cabundle-cm.yaml' configmap/service-ca created Nov 7 10:06:28.413: INFO: Created resources defined in cabundle-cm.yaml Nov 7 10:06:28.413: INFO: Running 'oc --namespace=e2e-test-oauth-server-headers-v6ms4 --config=/tmp/admin.kubeconfig create -f /tmp/fixture-testdata-dir752633655/test/extended/testdata/oauthserver/oauth-sa.yaml' serviceaccount/e2e-oauth created Nov 7 10:06:28.892: INFO: Created resources defined in oauth-sa.yaml Nov 7 10:06:28.892: INFO: Running 'oc --namespace=e2e-test-oauth-server-headers-v6ms4 --config=/tmp/admin.kubeconfig create -f /tmp/fixture-testdata-dir752633655/test/extended/testdata/oauthserver/oauth-network.yaml' service/test-oauth-svc created route.route.openshift.io/test-oauth-route created Nov 7 10:06:29.490: INFO: Created resources defined in oauth-network.yaml Nov 7 10:06:29.577: INFO: Created: ClusterRoleBinding e2e-test-oauth-server-headers-v6ms4 Nov 7 10:06:29.657: INFO: Created: /htpasswd Nov 7 10:06:29.743: INFO: Created: Secret e2e-test-oauth-server-headers-v6ms4/session-secret Nov 7 10:06:30.289: INFO: Created: ConfigMap e2e-test-oauth-server-headers-v6ms4/oauth-config Nov 7 10:06:30.492: INFO: Created: Pod e2e-test-oauth-server-headers-v6ms4/test-oauth-server Nov 7 10:06:30.492: INFO: Waiting for user 'system:serviceaccount:e2e-test-oauth-server-headers-v6ms4:e2e-oauth' to be authorized to * the * resource Nov 7 10:06:30.571: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:31.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:32.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:33.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:34.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:35.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:36.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:37.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:38.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:39.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:40.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:41.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:42.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:43.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:44.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:45.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:46.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:47.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:48.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:49.658: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:50.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:51.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:52.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:53.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:54.656: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:55.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:56.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:57.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:58.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:06:59.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:00.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:01.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:02.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:03.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:04.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:05.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:06.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:07.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:08.657: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:09.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:10.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:11.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:12.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:13.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:14.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:15.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:16.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:17.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:18.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:19.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:20.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:21.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:22.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:23.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:24.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:25.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:26.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:27.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:28.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:29.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:30.654: INFO: Waiting for the OAuth server pod to be ready Nov 7 10:07:30.733: INFO: Waiting for the OAuth server pod to be ready [AfterEach] [Feature:OAuthServer] [Headers] /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/test/extended/util/client.go:101 STEP: Collecting events from namespace "e2e-test-oauth-server-headers-v6ms4". STEP: Found 5 events. Nov 7 10:07:30.893: INFO: At 0001-01-01 00:00:00 +0000 UTC - event for test-oauth-server: {default-scheduler } Scheduled: Successfully assigned e2e-test-oauth-server-headers-v6ms4/test-oauth-server to ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Nov 7 10:07:30.893: INFO: At 2019-11-07 10:06:41 +0000 UTC - event for test-oauth-server: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Pulling: Pulling image "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:748d8c1c889ad7aaa90dca2ede7435bfd94c5af44a9dc4cb741032bddf8fd3ed" Nov 7 10:07:30.893: INFO: At 2019-11-07 10:06:58 +0000 UTC - event for test-oauth-server: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Pulled: Successfully pulled image "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:748d8c1c889ad7aaa90dca2ede7435bfd94c5af44a9dc4cb741032bddf8fd3ed" Nov 7 10:07:30.893: INFO: At 2019-11-07 10:07:22 +0000 UTC - event for test-oauth-server: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Created: Created container oauth-server Nov 7 10:07:30.893: INFO: At 2019-11-07 10:07:22 +0000 UTC - event for test-oauth-server: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Started: Started container oauth-server Nov 7 10:07:30.971: INFO: POD NODE PHASE GRACE CONDITIONS Nov 7 10:07:30.971: INFO: test-oauth-server ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:06:31 +0000 UTC } {Ready False 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:06:31 +0000 UTC ContainersNotReady containers with unready status: [oauth-server]} {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:06:31 +0000 UTC ContainersNotReady containers with unready status: [oauth-server]} {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:06:30 +0000 UTC }] Nov 7 10:07:30.971: INFO: Nov 7 10:07:31.113: INFO: test-oauth-server[e2e-test-oauth-server-headers-v6ms4].container[oauth-server].log I1107 10:07:22.781005 1 round_trippers.go:423] curl -k -v -XGET -H "Authorization: Bearer eyJhbGciOiJSUzI1NiIsImtpZCI6IjFpdWd3TU56bzdfZWgxd2I2R09NV3pDcnhuLWpaMVNRaDZscHc4elpUZDAifQ.eyJpc3MiOiJrdWJlcm5ldGVzL3NlcnZpY2VhY2NvdW50Iiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9uYW1lc3BhY2UiOiJlMmUtdGVzdC1vYXV0aC1zZXJ2ZXItaGVhZGVycy12Nm1zNCIsImt1YmVybmV0ZXMuaW8vc2VydmljZWFjY291bnQvc2VjcmV0Lm5hbWUiOiJlMmUtb2F1dGgtdG9rZW4tcTgydGsiLCJrdWJlcm5ldGVzLmlvL3NlcnZpY2VhY2NvdW50L3NlcnZpY2UtYWNjb3VudC5uYW1lIjoiZTJlLW9hdXRoIiwia3ViZXJuZXRlcy5pby9zZXJ2aWNlYWNjb3VudC9zZXJ2aWNlLWFjY291bnQudWlkIjoiNjM0MWFmMmEtMGNkMy00MTRhLWIyZWQtMTJmYzc5MmRjMTcwIiwic3ViIjoic3lzdGVtOnNlcnZpY2VhY2NvdW50OmUyZS10ZXN0LW9hdXRoLXNlcnZlci1oZWFkZXJzLXY2bXM0OmUyZS1vYXV0aCJ9.kvY6miv48me8ZbPq7W9ouji10MZ0Ep2DG89z8QpLiTaZb13knuS1D8dwEASumXaIXgLeMBRsSXP05bMpUWJeH4tUs50ggfiq3lFWi71XpVD05gQ7KGepxxzoVYp2qHm6LXuTYNY_dZejz1Ur--COWQZXypTPEeqrp4g0JimZ_DFoCmQByI52c5KDwJPQbkT7YSvvRX17OpDjzzHYnuiejqjuO-km-Bg8v5AwQYVt3Zd4G60NxvtKIJfOK1BtvhyeFbZoILojNsMKbad6J5af0UYbA41NxR1pKgyXtV_l0pGnZHGmFfSJjb1iEHSlLmbfmoelX-Dws7MHbICx1uHBgw" -H "Accept: application/json, */*" -H "User-Agent: oauth-server/v0.0.0 (linux/amd64) kubernetes/$Format" 'https://172.30.0.1:443/api/v1/namespaces/kube-system/configmaps/extension-apiserver-authentication' I1107 10:07:22.870758 1 round_trippers.go:443] GET https://172.30.0.1:443/api/v1/namespaces/kube-system/configmaps/extension-apiserver-authentication 200 OK in 89 milliseconds I1107 10:07:22.870803 1 round_trippers.go:449] Response Headers: I1107 10:07:22.870827 1 round_trippers.go:452] Content-Type: application/json I1107 10:07:22.870832 1 round_trippers.go:452] Date: Thu, 07 Nov 2019 10:07:22 GMT I1107 10:07:22.870838 1 round_trippers.go:452] Audit-Id: 566f3d02-f43e-4893-89c3-c7f15d371122 I1107 10:07:22.870843 1 round_trippers.go:452] Cache-Control: no-cache, private I1107 10:07:22.871209 1 request.go:968] Response Body: {"kind":"ConfigMap","apiVersion":"v1","metadata":{"name":"extension-apiserver-authentication","namespace":"kube-system","selfLink":"/api/v1/namespaces/kube-system/configmaps/extension-apiserver-authentication","uid":"9a3960fc-177a-4866-b14d-64df104028ed","resourceVersion":"5920","creationTimestamp":"2019-11-07T09:43:27Z"},"data":{"client-ca-file":"-----BEGIN CERTIFICATE-----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\nzrCHnw==\n-----END CERTIFICATE-----\n-----BEGIN CERTIFICATE-----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\nKUenP/goXQVpedfI\n-----END CERTIFICATE-----\n-----BEGIN CERTIFICATE-----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\na1acXuFnfOUPg/6ycIBneJx/eI7kX4AYuoev0P2AIah6SQ==\n-----END CERTIFICATE-----\n-----BEGIN CERTIFICATE-----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\nBL3fX3GKggWau3Szr58LNnVRRxc1ZA==\n-----END CERTIFICATE-----\n-----BEGIN CERTIFICATE-----\nMIIDNDCCAhygAwIBAgIIXVh6P8O+pkIwDQYJKoZIhvcNAQELBQAwODESMBAGA1UE\nCxMJb3BlbnNoaWZ0MSIwIAYDVQQDExlrdWJlLWNvbnRyb2wtcGxhbmUtc2lnbmVy\nMB4XDTE5MTEwNzA5MjQxM1oXDTIwMTEwNjA5MjQxM1owODESMBAGA1UECxMJb3Bl\nbnNoaWZ0MSIwIAYDVQQDExlrdWJlLWNvbnRyb2wtcGxhbmUtc2lnbmVyMIIBIjAN\nBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAt1OHU+CnDSbR8//UyogUMvwoKg5a\n3va96o5MOUbEVAsvWiFA/ayQfMyTgrP4jCPk130puIZ5fbydm+9brbAJVFAdMDn0\n6QEM08Th21v4j5QhRaMJWdBBktVTSmBFDP+oAxcq7oFEgB9JQkz/kSUMjJ3hUwM2\nDTMatG1O4prNpUZghF62cmmuLm+uH/a+R7ZUyMMZwZMWN/EQFwtyCrOo8if2WGez\n+USKwHKb4CSzoZSXrcrTSnmUhzh/3oknXkKOd/dx6DGOsTM64I3CyJN51obDYX2i\nMSpN+oXJ/Q21zOgE2gTqkhd/wWSOv+zOsMovuLPjMzUAJ9cWAdpTT35iQwIDAQAB\no0IwQDAOBgNVHQ8BAf8EBAMCAqQwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU\npB0IlfaDBgnlW7b/a0ECg8d+KVwwDQYJKoZIhvcNAQELBQADggEBABIsFl5fmvl2\n9mq0i8LobBUL9ePJWdr28OBRJaOp7GAFk273mRItgZBq5mbdtcSBxNHnZAqexgy5\nJAP47MqR3W8WlIy86HfEdLy4r3lXSl1LhAfMpZa3USPyL50+8iCsA+KQWrUn3cow\n3lWvz2gbfw4S1/X4aNNxgnHbzPqyPAyku99kXv+6exUA7OwOuady4hKLDc6OJUga\nw33bZI7vrx3lU/U/L0lpeO/BDjk8IQAbdP+RiznDYdWm+yaQm8GDiG6Nk0rhVIup\nNlLb38juQcPrXyPq2AuxlqxokcfmKJyPKS6scb4sMHESgmx2I/IeY8X6hdsqsahr\n0UoS7W8+yZ0=\n-----END CERTIFICATE-----\n","requestheader-allowed-names":"[\"kube-apiserver-proxy\",\"system:kube-apiserver-proxy\",\"system:openshift-aggregator\"]","requestheader-client-ca-file":"-----BEGIN CERTIFICATE-----\nMIIDJDCCAgygAwIBAgIIOd+BKz5SvE8wDQYJKoZIhvcNAQELBQAwMDESMBAGA1UE\nCxMJb3BlbnNoaWZ0MRowGAYDVQQDExFhZ2dyZWdhdG9yLXNpZ25lcjAeFw0xOTEx\nMDcwOTI0MTFaFw0xOTExMDgwOTI0MTFaMDAxEjAQBgNVBAsTCW9wZW5zaGlmdDEa\nMBgGA1UEAxMRYWdncmVnYXRvci1zaWduZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IB\nDwAwggEKAoIBAQDUqSjFX8V1MG1Pz28FdiU84BpGEePg/4pygirDggVcgPRwkdrG\niG+j78PrKIiDZdYAeY5a0q61uMB7/NgKvDuYDD0gksMKQy95/IRGcZhqetKkBFio\ntN3oVfe9TpzWASQExhT5nd/L3NLBHb84SlCt1+uCNfOsbRZ81lJwVqLvgidoC2IM\ngw3dfFzylnPZbYdwPGNN9yXLPb5z9tM9ACbGUjoFAeyVD45RiwgCyw95E3oEIBm0\noek4g10JggyyDq3vkeSSZHg2NJTnvJuktTOFw7JMjmloU24BeUJXlQdknHbTH8ri\nrRRMVv2caus7cE6Lh8J9u/0FGbgPwXfRz/7HAgMBAAGjQjBAMA4GA1UdDwEB/wQE\nAwICpDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRBpje/kgXA1cwWsBwSIpTT\nMJgCRTANBgkqhkiG9w0BAQsFAAOCAQEAqAXmOLyIA61UQjOVKw3u3GyfYRzhjAnn\nsIotMmyf54VECKapx1Avk8YF4B93d5F82V36iNrXKxFm9NlMvstcZz9TJEQOUWuG\nRj4oXStEqi9QGoZ+gLHwow2skTnZbq0MKv5FES+QvfIluyaHDF0/m9ovYOi0Aw/f\nChoKR3sK0naxtGI78E7u25lu4ZVAOUwgunPhAJU7i2B7C6uPNB5NKXGBz1iabtas\nebWEeSEMyOqwtEr5AFA2YUDseyLKJcFnt1oMnczNqMm8ZMta9K1Mp+Uyya1YAvdu\nr3aSW9cg4brX8saR6OJ7ytgHhnpjFFbk37+dW2Vkaari5/y+hEiuPA==\n-----END CERTIFICATE-----\n","requestheader-extra-headers-prefix":"[\"X-Remote-Extra-\"]","requestheader-group-headers":"[\"X-Remote-Group\"]","requestheader-username-headers":"[\"X-Remote-User\"]"}} I1107 10:07:22.963867 1 htpasswd.go:112] Loading htpasswd file /var/oauth/configobjects//htpasswd/htpasswd... I1107 10:07:22.963949 1 htpasswd.go:112] Loading htpasswd file /var/oauth/configobjects//htpasswd/htpasswd... I1107 10:07:22.973765 1 healthz.go:123] Installing health checkers for (/healthz): "ping","log" I1107 10:07:22.974937 1 healthz.go:123] Installing health checkers for (/livez): "ping","log" I1107 10:07:22.977682 1 healthz.go:123] Installing health checkers for (/readyz): "ping","log","shutdown" I1107 10:07:22.978547 1 secure_serving.go:64] Forcing use of http/1.1 only I1107 10:07:22.978569 1 secure_serving.go:123] Serving securely on 0.0.0.0:6443 Nov 7 10:07:31.264: INFO: skipping dumping cluster info - cluster too large Nov 7 10:07:31.355: INFO: Deleted {user.openshift.io/v1, Resource=users e2e-test-oauth-server-headers-v6ms4-user}, err: <nil> Nov 7 10:07:31.444: INFO: Deleted {oauth.openshift.io/v1, Resource=oauthclients e2e-client-e2e-test-oauth-server-headers-v6ms4}, err: <nil> Nov 7 10:07:31.538: INFO: Deleted {oauth.openshift.io/v1, Resource=oauthaccesstokens C64U6580RA6JKD2ZTJnbJwAAAAAAAAAA}, err: <nil> [AfterEach] [Feature:OAuthServer] [Headers] /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/k8s.io/kubernetes/test/e2e/framework/framework.go:152 Nov 7 10:07:31.538: INFO: Waiting up to 3m0s for all (but 100) nodes to be ready STEP: Destroying namespace "e2e-test-oauth-server-headers-v6ms4" for this suite. [AfterEach] [Feature:OAuthServer] [Headers] /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/test/extended/oauth/server_headers.go:38 Nov 7 10:07:31.698: INFO: Running 'oc --namespace= --config=/tmp/admin.kubeconfig delete clusterrolebindings.rbac.authorization.k8s.io e2e-test-oauth-server-headers-v6ms4' clusterrolebinding.rbac.authorization.k8s.io "e2e-test-oauth-server-headers-v6ms4" deleted Nov 7 10:07:32.836: INFO: Running AfterSuite actions on all nodes Nov 7 10:07:32.836: INFO: Running AfterSuite actions on node 1 fail [github.com/openshift/origin/test/extended/oauth/server_headers.go:34]: Unexpected error: <*errors.errorString | 0xc000282100>: { s: "timed out waiting for the condition", } timed out waiting for the condition occurred
Filter through log files
go run hack/e2e.go -v -test --test_args='--ginkgo.focus=openshift\-tests\s\[Suite\:openshift\/oauth\]\sLDAP\sshould\sstart\san\sOpenLDAP\stest\sserver\s\[Suite\:openshift\/conformance\/parallel\]$'
fail [github.com/openshift/origin/test/extended/oauth/ldap.go:18]: Unexpected error: <*errors.errorString | 0xc003c71bd0>: { s: "errours encountered trying to run ldapsearch pod: [error waiting for the pod 'runonce-ldapsearch-pod' to complete: timed out waiting for the condition]", } errours encountered trying to run ldapsearch pod: [error waiting for the pod 'runonce-ldapsearch-pod' to complete: timed out waiting for the condition] occurredfrom junit_e2e_20191107-104211.xml
Nov 7 10:06:07.205: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:06:07.210: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:06:07.678: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:06:09.163: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:06:09.165: INFO: Waiting up to 30m0s for all (but 100) nodes to be schedulable Nov 7 10:06:09.391: INFO: Waiting up to 10m0s for all pods (need at least 0) in namespace 'kube-system' to be running and ready Nov 7 10:06:09.681: INFO: 0 / 0 pods in namespace 'kube-system' are running and ready (0 seconds elapsed) Nov 7 10:06:09.681: INFO: expected 0 pod replicas in namespace 'kube-system', 0 are Running and Ready. Nov 7 10:06:09.681: INFO: Waiting up to 5m0s for all daemonsets in namespace 'kube-system' to start Nov 7 10:06:09.771: INFO: e2e test version: v1.16.2 Nov 7 10:06:09.844: INFO: kube-apiserver version: v1.16.2 Nov 7 10:06:09.844: INFO: >>> kubeConfig: /tmp/admin.kubeconfig Nov 7 10:06:09.971: INFO: Cluster IP family: ipv4 [BeforeEach] [Top Level] /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/test/extended/util/test.go:60 [BeforeEach] [Suite:openshift/oauth] LDAP /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/k8s.io/kubernetes/test/e2e/framework/framework.go:151 STEP: Creating a kubernetes client Nov 7 10:06:09.982: INFO: >>> kubeConfig: /tmp/admin.kubeconfig [BeforeEach] [Suite:openshift/oauth] LDAP /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/test/extended/util/client.go:109 Nov 7 10:06:10.864: INFO: configPath is now "/tmp/configfile404886576" Nov 7 10:06:10.864: INFO: The user is now "e2e-test-oauth-ldap-ss8vb-user" Nov 7 10:06:10.864: INFO: Creating project "e2e-test-oauth-ldap-ss8vb" Nov 7 10:06:11.211: INFO: Waiting on permissions in project "e2e-test-oauth-ldap-ss8vb" ... Nov 7 10:06:11.292: INFO: Waiting for ServiceAccount "default" to be provisioned... Nov 7 10:06:22.270: INFO: Waiting for ServiceAccount "deployer" to be provisioned... Nov 7 10:06:22.448: INFO: Waiting for ServiceAccount "builder" to be provisioned... Nov 7 10:06:22.626: INFO: Waiting for RoleBinding "system:image-pullers" to be provisioned... Nov 7 10:06:22.777: INFO: Waiting for RoleBinding "system:image-builders" to be provisioned... Nov 7 10:06:22.928: INFO: Waiting for RoleBinding "system:deployers" to be provisioned... Nov 7 10:06:23.077: INFO: Project "e2e-test-oauth-ldap-ss8vb" has been fully provisioned. [It] should start an OpenLDAP test server [Suite:openshift/conformance/parallel] /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/test/extended/oauth/ldap.go:16 Nov 7 10:06:24.308: INFO: Running 'oc --namespace=e2e-test-oauth-ldap-ss8vb --config=/tmp/admin.kubeconfig create role scc-anyuid --verb=use --resource=scc --resource-name=anyuid' role.rbac.authorization.k8s.io/scc-anyuid created Nov 7 10:06:24.764: INFO: Running 'oc --namespace=e2e-test-oauth-ldap-ss8vb --config=/tmp/admin.kubeconfig adm policy add-role-to-user scc-anyuid -z ldap --role-namespace e2e-test-oauth-ldap-ss8vb' role.rbac.authorization.k8s.io/scc-anyuid added: "ldap" Nov 7 10:06:25.529: INFO: Running 'oc --namespace=e2e-test-oauth-ldap-ss8vb --config=/tmp/admin.kubeconfig create role scc-priv --verb=use --resource=scc --resource-name=privileged' role.rbac.authorization.k8s.io/scc-priv created Nov 7 10:06:25.975: INFO: Running 'oc --namespace=e2e-test-oauth-ldap-ss8vb --config=/tmp/admin.kubeconfig adm policy add-role-to-user scc-priv -z ldap --role-namespace e2e-test-oauth-ldap-ss8vb' role.rbac.authorization.k8s.io/scc-priv added: "ldap" [AfterEach] [Suite:openshift/oauth] LDAP /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/test/extended/util/client.go:101 STEP: Collecting events from namespace "e2e-test-oauth-ldap-ss8vb". STEP: Found 12 events. Nov 7 10:12:45.550: INFO: At 0001-01-01 00:00:00 +0000 UTC - event for openldap-server-7984d49665-4l4sl: {default-scheduler } Scheduled: Successfully assigned e2e-test-oauth-ldap-ss8vb/openldap-server-7984d49665-4l4sl to ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Nov 7 10:12:45.550: INFO: At 0001-01-01 00:00:00 +0000 UTC - event for runonce-ldapsearch-pod: {default-scheduler } Scheduled: Successfully assigned e2e-test-oauth-ldap-ss8vb/runonce-ldapsearch-pod to ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt Nov 7 10:12:45.550: INFO: At 2019-11-07 10:06:26 +0000 UTC - event for openldap-server: {deployment-controller } ScalingReplicaSet: Scaled up replica set openldap-server-7984d49665 to 1 Nov 7 10:12:45.550: INFO: At 2019-11-07 10:06:26 +0000 UTC - event for openldap-server-7984d49665: {replicaset-controller } SuccessfulCreate: Created pod: openldap-server-7984d49665-4l4sl Nov 7 10:12:45.550: INFO: At 2019-11-07 10:06:41 +0000 UTC - event for openldap-server-7984d49665-4l4sl: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Pulling: Pulling image "docker.io/mrogers950/origin-openldap-test:fedora29" Nov 7 10:12:45.550: INFO: At 2019-11-07 10:07:32 +0000 UTC - event for openldap-server-7984d49665-4l4sl: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Pulled: Successfully pulled image "docker.io/mrogers950/origin-openldap-test:fedora29" Nov 7 10:12:45.550: INFO: At 2019-11-07 10:07:43 +0000 UTC - event for openldap-server-7984d49665-4l4sl: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Created: Created container openldap-server Nov 7 10:12:45.550: INFO: At 2019-11-07 10:07:43 +0000 UTC - event for openldap-server-7984d49665-4l4sl: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd} Started: Started container openldap-server Nov 7 10:12:45.550: INFO: At 2019-11-07 10:08:00 +0000 UTC - event for runonce-ldapsearch-pod: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt} Pulling: Pulling image "docker.io/mrogers950/origin-openldap-test:fedora29" Nov 7 10:12:45.550: INFO: At 2019-11-07 10:09:33 +0000 UTC - event for runonce-ldapsearch-pod: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt} Pulled: Successfully pulled image "docker.io/mrogers950/origin-openldap-test:fedora29" Nov 7 10:12:45.550: INFO: At 2019-11-07 10:09:34 +0000 UTC - event for runonce-ldapsearch-pod: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt} Created: Created container runonce-ldapsearch-pod Nov 7 10:12:45.550: INFO: At 2019-11-07 10:09:35 +0000 UTC - event for runonce-ldapsearch-pod: {kubelet ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt} Started: Started container runonce-ldapsearch-pod Nov 7 10:12:45.626: INFO: POD NODE PHASE GRACE CONDITIONS Nov 7 10:12:45.626: INFO: openldap-server-7984d49665-4l4sl ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-jftxd Running [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:06:26 +0000 UTC } {Ready True 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:07:43 +0000 UTC } {ContainersReady True 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:07:43 +0000 UTC } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:06:26 +0000 UTC }] Nov 7 10:12:45.626: INFO: runonce-ldapsearch-pod ci-op-f7jvkn8j-bfca5-k72gq-worker-westus-7bnvt Succeeded [{Initialized True 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:07:45 +0000 UTC PodCompleted } {Ready False 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:07:45 +0000 UTC PodCompleted } {ContainersReady False 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:07:45 +0000 UTC PodCompleted } {PodScheduled True 0001-01-01 00:00:00 +0000 UTC 2019-11-07 10:07:45 +0000 UTC }] Nov 7 10:12:45.626: INFO: Nov 7 10:12:45.823: INFO: openldap-server-7984d49665-4l4sl[e2e-test-oauth-ldap-ss8vb].container[openldap-server].log + ulimit -n 1024 + OPENLDAP_ROOT_PASSWORD=admin + OPENLDAP_ROOT_DN_PREFIX=cn=Manager + OPENLDAP_ROOT_DN_SUFFIX=dc=example,dc=com + OPENLDAP_DEBUG_LEVEL=256 + '[' '!' -f /etc/openldap/CONFIGURED ']' ++ id ++ grep -Po '(?<=uid=)\d+' + user=0 + (( user == 0 )) + cp /usr/share/openldap-servers/DB_CONFIG.example /var/lib/ldap/DB_CONFIG + (( i=30 )) + (( i>0 )) + slapd -h 'ldap:/// ldaps:/// ldapi:///' -d 256 ++ ldapsearch ++ grep 'Can.t contact LDAP server' + ping_result='ldap_sasl_interactive_bind_s: Can'\''t contact LDAP server (-1)' + '[' -z 'ldap_sasl_interactive_bind_s: Can'\''t contact LDAP server (-1)' ']' + sleep 1 5dc3ecef @(#) $OpenLDAP: slapd 2.4.46 (Dec 17 2018 16:36:45) $ mockbuild@buildvm-31.phx2.fedoraproject.org:/builddir/build/BUILD/openldap-2.4.46/openldap-2.4.46/servers/slapd 5dc3ecef slapd starting + (( i-- )) + (( i>0 )) ++ ldapsearch ++ grep 'Can.t contact LDAP server' 5dc3ecf0 conn=1000 fd=14 ACCEPT from IP=[::1]:46212 (IP=[::]:389) 5dc3ecf0 conn=1000 op=0 SRCH base="" scope=0 deref=0 filter="(objectClass=*)" 5dc3ecf0 conn=1000 op=0 SRCH attr=supportedSASLMechanisms 5dc3ecf0 conn=1000 op=0 SEARCH RESULT tag=101 err=0 nentries=1 text= 5dc3ecf0 conn=1000 op=1 UNBIND 5dc3ecf0 conn=1000 fd=14 closed + ping_result= + '[' -z '' ']' + break + '[' 29 -eq 0 ']' + ldapadd -Y EXTERNAL -H ldapi:/// -f /etc/openldap/schema/cosine.ldif -d 256 SASL/EXTERNAL authentication started adding new entry "cn=cosine,cn=schema,cn=config" 5dc3ecf0 conn=1001 fd=14 ACCEPT from PATH=/var/run/ldapi (PATH=/var/run/ldapi) 5dc3ecf0 conn=1001 op=0 BIND dn="" method=163 5dc3ecf0 conn=1001 op=0 BIND authcid="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" authzid="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" 5dc3ecf0 conn=1001 op=0 BIND dn="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" mech=EXTERNAL sasl_ssf=0 ssf=71 5dc3ecf0 conn=1001 op=0 RESULT tag=97 err=0 text= SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth SASL SSF: 0 5dc3ecf0 conn=1001 op=1 ADD dn="cn=cosine,cn=schema,cn=config" + ldapadd -Y EXTERNAL -H ldapi:/// -f /etc/openldap/schema/nis.ldif -d 256 5dc3ecf0 conn=1001 op=1 RESULT tag=105 err=0 text= 5dc3ecf0 conn=1001 op=2 UNBIND 5dc3ecf0 conn=1001 fd=14 closed SASL/EXTERNAL authentication started adding new entry "cn=nis,cn=schema,cn=config" adding new entry "cn=inetorgperson,cn=schema,cn=config" 5dc3ecf0 conn=1002 fd=14 ACCEPT from PATH=/var/run/ldapi (PATH=/var/run/ldapi) 5dc3ecf0 conn=1002 op=0 BIND dn="" method=163 5dc3ecf0 conn=1002 op=0 BIND authcid="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" authzid="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" 5dc3ecf0 conn=1002 op=0 BIND dn="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" mech=EXTERNAL sasl_ssf=0 ssf=71 5dc3ecf0 conn=1002 op=0 RESULT tag=97 err=0 text= SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth SASL SSF: 0 5dc3ecf0 conn=1002 op=1 ADD dn="cn=nis,cn=schema,cn=config" 5dc3ecf0 conn=1002 op=1 RESULT tag=105 err=0 text= 5dc3ecf0 conn=1002 op=2 UNBIND 5dc3ecf0 conn=1002 fd=14 closed + ldapadd -Y EXTERNAL -H ldapi:/// -f /etc/openldap/schema/inetorgperson.ldif -d 256 SASL/EXTERNAL authentication started 5dc3ecf0 conn=1003 fd=14 ACCEPT from PATH=/var/run/ldapi (PATH=/var/run/ldapi) 5dc3ecf0 conn=1003 op=0 BIND dn="" method=163 5dc3ecf0 conn=1003 op=0 BIND authcid="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" authzid="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" 5dc3ecf0 conn=1003 op=0 BIND dn="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" mech=EXTERNAL sasl_ssf=0 ssf=71 5dc3ecf0 conn=1003 op=0 RESULT tag=97 err=0 text= SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth SASL SSF: 0 5dc3ecf0 conn=1003 op=1 ADD dn="cn=inetorgperson,cn=schema,cn=config" 5dc3ecf0 conn=1003 op=1 RESULT tag=105 err=0 text= 5dc3ecf0 conn=1003 op=2 UNBIND 5dc3ecf0 conn=1003 fd=14 closed + ldapadd -Y EXTERNAL -H ldapi:/// -f /usr/local/etc/openldap/testPerson.ldif -d 256 adding new entry "cn=testPerson,cn=schema,cn=config" SASL/EXTERNAL authentication started 5dc3ecf0 conn=1004 fd=14 ACCEPT from PATH=/var/run/ldapi (PATH=/var/run/ldapi) 5dc3ecf0 conn=1004 op=0 BIND dn="" method=163 5dc3ecf0 conn=1004 op=0 BIND authcid="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" authzid="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" 5dc3ecf0 conn=1004 op=0 BIND dn="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" mech=EXTERNAL sasl_ssf=0 ssf=71 5dc3ecf0 conn=1004 op=0 RESULT tag=97 err=0 text= SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth SASL SSF: 0 5dc3ecf0 conn=1004 op=1 ADD dn="cn=testPerson,cn=schema,cn=config" 5dc3ecf0 conn=1004 op=1 RESULT tag=105 err=0 text= 5dc3ecf0 conn=1004 op=2 UNBIND 5dc3ecf0 conn=1004 fd=14 closed + ldapmodify -Y EXTERNAL -H ldapi:/// -f /usr/local/etc/ldapconf/domain_conf.ldif -d 256 SASL/EXTERNAL authentication started 5dc3ecf0 conn=1005 fd=14 ACCEPT from PATH=/var/run/ldapi (PATH=/var/run/ldapi) 5dc3ecf0 conn=1005 op=0 BIND dn="" method=163 5dc3ecf0 conn=1005 op=0 BIND authcid="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" authzid="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" 5dc3ecf0 conn=1005 op=0 BIND dn="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" mech=EXTERNAL sasl_ssf=0 ssf=71 5dc3ecf0 conn=1005 op=0 RESULT tag=97 err=0 text= SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth SASL SSF: 0 5dc3ecf0 conn=1005 op=1 MOD dn="olcDatabase={1}monitor,cn=config" 5dc3ecf0 conn=1005 op=1 MOD attr=olcAccess 5dc3ecf0 conn=1005 op=1 RESULT tag=103 err=0 text= 5dc3ecf0 conn=1005 op=2 MOD dn="olcDatabase={2}mdb,cn=config" 5dc3ecf0 conn=1005 op=2 MOD attr=olcSuffix 5dc3ecf0 conn=1005 op=2 RESULT tag=103 err=0 text= 5dc3ecf0 conn=1005 op=3 MOD dn="olcDatabase={2}mdb,cn=config" 5dc3ecf0 conn=1005 op=3 MOD attr=olcRootDN 5dc3ecf0 conn=1005 op=3 RESULT tag=103 err=0 text= 5dc3ecf0 conn=1005 op=4 MOD dn="olcDatabase={2}mdb,cn=config" 5dc3ecf0 conn=1005 op=4 MOD attr=olcRootPW 5dc3ecf0 conn=1005 op=4 RESULT tag=103 err=0 text= 5dc3ecf0 conn=1005 op=5 MOD dn="olcDatabase={2}mdb,cn=config" 5dc3ecf0 conn=1005 op=5 MOD attr=olcAccess 5dc3ecf0 slapd: line 0: rootdn is always granted unlimited privileges. 5dc3ecf0 slapd: line 0: rootdn is always granted unlimited privileges. 5dc3ecf0 conn=1005 op=5 RESULT tag=103 err=0 text= modifying entry "olcDatabase={1}monitor,cn=config" modifying entry "olcDatabase={2}mdb,cn=config" modifying entry "olcDatabase={2}mdb,cn=config" modifying entry "olcDatabase={2}mdb,cn=config" modifying entry "olcDatabase={2}mdb,cn=config" 5dc3ecf0 conn=1005 op=6 UNBIND 5dc3ecf0 conn=1005 fd=14 closed + ldapmodify -Y EXTERNAL -H ldapi:/// -f /usr/local/etc/ldapconf/tls_conf.ldif -d 256 modifying entry "cn=config" SASL/EXTERNAL authentication started 5dc3ecf0 conn=1006 fd=14 ACCEPT from PATH=/var/run/ldapi (PATH=/var/run/ldapi) 5dc3ecf0 conn=1006 op=0 BIND dn="" method=163 5dc3ecf0 conn=1006 op=0 BIND authcid="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" authzid="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" 5dc3ecf0 conn=1006 op=0 BIND dn="gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth" mech=EXTERNAL sasl_ssf=0 ssf=71 5dc3ecf0 conn=1006 op=0 RESULT tag=97 err=0 text= SASL username: gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth SASL SSF: 0 5dc3ecf0 conn=1006 op=1 MOD dn="cn=config" 5dc3ecf0 conn=1006 op=1 MOD attr=olcTLSCACertificateFile olcTLSCertificateFile olcTLSCertificateKeyFile 5dc3ecf0 conn=1006 op=1 RESULT tag=103 err=0 text= 5dc3ecf0 conn=1006 op=2 UNBIND 5dc3ecf0 conn=1006 fd=14 closed + ldapadd -x -D cn=Manager,dc=example,dc=com -w admin -f /usr/local/etc/ldapconf/base_conf.ldif -d 256 5dc3ecf0 conn=1007 fd=14 ACCEPT from IP=[::1]:46216 (IP=[::]:389) 5dc3ecf0 conn=1007 op=0 BIND dn="cn=Manager,dc=example,dc=com" method=128 5dc3ecf0 conn=1007 op=0 BIND dn="cn=Manager,dc=example,dc=com" mech=SIMPLE ssf=0 5dc3ecf0 conn=1007 op=0 RESULT tag=97 err=0 text= 5dc3ecf0 conn=1007 op=1 ADD dn="dc=example,dc=com" 5dc3ecf0 conn=1007 op=1 RESULT tag=105 err=0 text= 5dc3ecf0 conn=1007 op=2 ADD dn="cn=Manager,dc=example,dc=com" 5dc3ecf0 conn=1007 op=2 RESULT tag=105 err=0 text= 5dc3ecf0 conn=1007 op=3 ADD dn="ou=People,dc=example,dc=com" 5dc3ecf0 conn=1007 op=3 RESULT tag=105 err=0 text= 5dc3ecf0 conn=1007 op=4 ADD dn="ou=Group,dc=example,dc=com" adding new entry "dc=example,dc=com" adding new entry "cn=Manager,dc=example,dc=com" adding new entry "ou=People,dc=example,dc=com" adding new entry "ou=Group,dc=example,dc=com" 5dc3ecf0 conn=1007 op=4 RESULT tag=105 err=0 text= 5dc3ecf0 conn=1007 op=5 UNBIND 5dc3ecf0 conn=1007 fd=14 closed + ldapadd -x -D cn=Manager,dc=example,dc=com -w admin -f /usr/local/etc/ldapconf/groupsync.ldif -d 256 5dc3ecf0 conn=1008 fd=14 ACCEPT from IP=[::1]:46220 (IP=[::]:389) 5dc3ecf0 conn=1008 op=0 BIND dn="cn=Manager,dc=example,dc=com" method=128 5dc3ecf0 conn=1008 op=0 BIND dn="cn=Manager,dc=example,dc=com" mech=SIMPLE ssf=0 5dc3ecf0 conn=1008 op=0 RESULT tag=97 err=0 text= 5dc3ecf0 conn=1008 op=1 ADD dn="ou=rfc2307,dc=example,dc=com" 5dc3ecf0 conn=1008 op=1 RESULT tag=105 err=0 text= 5dc3ecf0 conn=1008 op=2 ADD dn="ou=groups,ou=rfc2307,dc=example,dc=com" 5dc3ecf0 conn=1008 op=2 RESULT tag=105 err=0 text= 5dc3ecf0 conn=1008 op=3 ADD dn="ou=people,ou=rfc2307,dc=example,dc=com" 5dc3ecf0 conn=1008 op=3 RESULT tag=105 err=0 text= 5dc3ecf0 conn=1008 op=4 ADD dn="cn=Person1,ou=people,ou=rfc2307,dc=example,dc=com" 5dc3ecf0 conn=1008 op=4 RESULT tag=105 err=0 text= 5dc3ecf0 conn=1008 op=5 ADD dn="cn=Person2,ou=people,ou=rfc2307,dc=example,dc=com" 5dc3ecf0 conn=1008 op=5 RESULT tag=105 err=0 text= 5dc3ecf0 conn=1008 op=6 ADD dn="cn=Person3,ou=people,ou=rfc2307,dc=example,dc=com" 5dc3ecf0 conn=1008 op=6 RESULT tag=105 err=0 text= 5dc3ecf0 conn=1008 op=7 ADD dn="cn=Person4,ou=people,ou=rfc2307,dc=example,dc=com" 5dc3ecf1 conn=1008 op=7 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=8 ADD dn="cn=Person5,ou=people,ou=rfc2307,dc=example,dc=com" 5dc3ecf1 conn=1008 op=8 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=9 ADD dn="cn=group1,ou=groups,ou=rfc2307,dc=example,dc=com" 5dc3ecf1 conn=1008 op=9 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=10 ADD dn="cn=group2,ou=groups,ou=rfc2307,dc=example,dc=com" 5dc3ecf1 conn=1008 op=10 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=11 ADD dn="cn=group3,ou=groups,ou=rfc2307,dc=example,dc=com" 5dc3ecf1 conn=1008 op=11 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=12 ADD dn="ou=ad,dc=example,dc=com" 5dc3ecf1 conn=1008 op=12 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=13 ADD dn="ou=people,ou=ad,dc=example,dc=com" 5dc3ecf1 conn=1008 op=13 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=14 ADD dn="cn=Person1,ou=people,ou=ad,dc=example,dc=com" 5dc3ecf1 conn=1008 op=14 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=15 ADD dn="cn=Person2,ou=people,ou=ad,dc=example,dc=com" 5dc3ecf1 conn=1008 op=15 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=16 ADD dn="cn=Person3,ou=people,ou=ad,dc=example,dc=com" 5dc3ecf1 conn=1008 op=16 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=17 ADD dn="cn=Person4,ou=people,ou=ad,dc=example,dc=com" 5dc3ecf1 conn=1008 op=17 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=18 ADD dn="cn=Person5,ou=people,ou=ad,dc=example,dc=com" 5dc3ecf1 conn=1008 op=18 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=19 ADD dn="ou=adextended,dc=example,dc=com" 5dc3ecf1 conn=1008 op=19 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=20 ADD dn="ou=people,ou=adextended,dc=example,dc=com" 5dc3ecf1 conn=1008 op=20 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=21 ADD dn="cn=Person1,ou=people,ou=adextended,dc=example,dc=com" 5dc3ecf1 conn=1008 op=21 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=22 ADD dn="cn=Person2,ou=people,ou=adextended,dc=example,dc=com" 5dc3ecf1 conn=1008 op=22 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=23 ADD dn="cn=Person3,ou=people,ou=adextended,dc=example,dc=com" 5dc3ecf1 conn=1008 op=23 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=24 ADD dn="cn=Person4,ou=people,ou=adextended,dc=example,dc=com" 5dc3ecf1 conn=1008 op=24 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=25 ADD dn="cn=Person5,ou=people,ou=adextended,dc=example,dc=com" 5dc3ecf1 conn=1008 op=25 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=26 ADD dn="ou=groups,ou=adextended,dc=example,dc=com" 5dc3ecf1 conn=1008 op=26 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=27 ADD dn="cn=group1,ou=groups,ou=adextended,dc=example,dc=com" 5dc3ecf1 conn=1008 op=27 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=28 ADD dn="cn=group2,ou=groups,ou=adextended,dc=example,dc=com" 5dc3ecf1 conn=1008 op=28 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=29 ADD dn="cn=group3,ou=groups,ou=adextended,dc=example,dc=com" 5dc3ecf1 conn=1008 op=29 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=30 ADD dn="ou=incomplete-rfc2307,dc=example,dc=com" 5dc3ecf1 conn=1008 op=30 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=31 ADD dn="ou=groups,ou=incomplete-rfc2307,dc=example,dc=com" 5dc3ecf1 conn=1008 op=31 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=32 ADD dn="cn=group1,ou=groups,ou=incomplete-rfc2307,dc=example,dc=com" 5dc3ecf1 conn=1008 op=32 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=33 ADD dn="cn=group2,ou=groups,ou=incomplete-rfc2307,dc=example,dc=com" 5dc3ecf1 conn=1008 op=33 RESULT tag=105 err=0 text= 5dc3ecf1 conn=1008 op=34 ADD dn="cn=group3,ou=groups,ou=incomplete-rfc2307,dc=example,dc=com" 5dc3ecf1 conn=1008 op=34 RESULT tag=105 err=0 text= adding new entry "ou=rfc2307,dc=example,dc=com" adding new entry "ou=groups,ou=rfc2307,dc=example,dc=com" adding new entry "ou=people,ou=rfc2307,dc=example,dc=com" adding new entry "cn=Person1,ou=people,ou=rfc2307,dc=example,dc=com" adding new entry "cn=Person2,ou=people,ou=rfc2307,dc=example,dc=com" adding new entry "cn=Person3,ou=people,ou=rfc2307,dc=example,dc=com" adding new entry "cn=Person4,ou=people,ou=rfc2307,dc=example,dc=com" adding new entry "cn=Person5,ou=people,ou=rfc2307,dc=example,dc=com" adding new entry "cn=group1,ou=groups,ou=rfc2307,dc=example,dc=com" adding new entry "cn=group2,ou=groups,ou=rfc2307,dc=example,dc=com" adding new entry "cn=group3,ou=groups,ou=rfc2307,dc=example,dc=com" adding new entry "ou=ad,dc=example,dc=com" adding new entry "ou=people,ou=ad,dc=example,dc=com" adding new entry "cn=Person1,ou=people,ou=ad,dc=example,dc=com" adding new entry "cn=Person2,ou=people,ou=ad,dc=example,dc=com" adding new entry "cn=Person3,ou=people,ou=ad,dc=example,dc=com" adding new entry "cn=Person4,ou=people,ou=ad,dc=example,dc=com" adding new entry "cn=Person5,ou=people,ou=ad,dc=example,dc=com" adding new entry "ou=adextended,dc=example,dc=com" adding new entry "ou=people,ou=adextended,dc=example,dc=com" adding new entry "cn=Person1,ou=people,ou=adextended,dc=example,dc=com" adding new entry "cn=Person2,ou=people,ou=adextended,dc=example,dc=com" adding new entry "cn=Person3,ou=people,ou=adextended,dc=example,dc=com" adding new entry "cn=Person4,ou=people,ou=adextended,dc=example,dc=com" adding new entry "cn=Person5,ou=people,ou=adextended,dc=example,dc=com" adding new entry "ou=groups,ou=adextended,dc=example,dc=com" adding new entry "cn=group1,ou=groups,ou=adextended,dc=example,dc=com" adding new entry "cn=group2,ou=groups,ou=adextended,dc=example,dc=com" adding new entry "cn=group3,ou=groups,ou=adextended,dc=example,dc=com" adding new entry "ou=incomplete-rfc2307,dc=example,dc=com" adding new entry "ou=groups,ou=incomplete-rfc2307,dc=example,dc=com" adding new entry "cn=group1,ou=groups,ou=incomplete-rfc2307,dc=example,dc=com" adding new entry "cn=group2,ou=groups,ou=incomplete-rfc2307,dc=example,dc=com" adding new entry "cn=group3,ou=groups,ou=incomplete-rfc2307,dc=example,dc=com" 5dc3ecf1 conn=1008 op=35 UNBIND 5dc3ecf1 conn=1008 fd=14 closed ++ ps -A ++ grep slapd ++ awk '{print $1}' + pid=10 + kill -2 10 + (( i=30 )) + (( i>0 )) 5dc3ecf1 daemon: shutdown requested and initiated. 5dc3ecf1 slapd shutdown: waiting for 0 operations/tasks to finish 5dc3ecf1 slapd stopped. ++ ps -A ++ grep 10 + exists= + '[' -z '' ']' + break + '[' 30 -eq 0 ']' + cp /usr/local/etc/ldapconf/ldap.conf /etc/openldap/ ++ slaptest + LOG='config file testing succeeded' ++ echo 'config file testing succeeded' ++ grep -Po '(?<=ldif_read_file: checksum error on ").+(?=")' + CHECKSUM_ERR= + touch /etc/openldap/CONFIGURED + exec slapd -h 'ldap:///openldap-server-7984d49665-4l4sl ldapi:/// ldaps:///openldap-server-7984d49665-4l4sl' -d 256 5dc3ecf1 @(#) $OpenLDAP: slapd 2.4.46 (Dec 17 2018 16:36:45) $ mockbuild@buildvm-31.phx2.fedoraproject.org:/builddir/build/BUILD/openldap-2.4.46/openldap-2.4.46/servers/slapd 5dc3ecf1 slapd starting 5dc3ed5f conn=1000 fd=14 ACCEPT from IP=10.131.0.23:53764 (IP=0.0.0.0:389) 5dc3ed5f conn=1000 op=0 EXT oid=1.3.6.1.4.1.1466.20037 5dc3ed5f conn=1000 op=0 STARTTLS 5dc3ed5f conn=1000 op=0 RESULT oid= err=0 text= 5dc3ed5f conn=1000 fd=14 TLS established tls_ssf=256 ssf=256 5dc3ed5f conn=1000 op=1 BIND dn="" method=128 5dc3ed5f conn=1000 op=1 RESULT tag=97 err=0 text= 5dc3ed5f conn=1000 op=2 SRCH base="dc=example,dc=com" scope=2 deref=0 filter="(objectClass=*)" 5dc3ed5f conn=1000 op=2 SRCH attr=cn 5dc3ed5f conn=1000 op=2 SEARCH RESULT tag=101 err=0 nentries=38 text= 5dc3ed5f conn=1000 op=3 UNBIND 5dc3ed5f conn=1000 fd=14 closed Nov 7 10:12:45.906: INFO: runonce-ldapsearch-pod[e2e-test-oauth-ldap-ss8vb].container[runonce-ldapsearch-pod].log dn: dc=example,dc=com dn: cn=Manager,dc=example,dc=com cn: Manager dn: ou=People,dc=example,dc=com dn: ou=Group,dc=example,dc=com dn: ou=rfc2307,dc=example,dc=com dn: ou=groups,ou=rfc2307,dc=example,dc=com dn: ou=people,ou=rfc2307,dc=example,dc=com dn: cn=Person1,ou=people,ou=rfc2307,dc=example,dc=com cn: Person1 dn: cn=Person2,ou=people,ou=rfc2307,dc=example,dc=com cn: Person2 dn: cn=Person3,ou=people,ou=rfc2307,dc=example,dc=com cn: Person3 dn: cn=Person4,ou=people,ou=rfc2307,dc=example,dc=com cn: Person4 dn: cn=Person5,ou=people,ou=rfc2307,dc=example,dc=com cn: Person5 dn: cn=group1,ou=groups,ou=rfc2307,dc=example,dc=com cn: group1 dn: cn=group2,ou=groups,ou=rfc2307,dc=example,dc=com cn: group2 dn: cn=group3,ou=groups,ou=rfc2307,dc=example,dc=com cn: group3 dn: ou=ad,dc=example,dc=com dn: ou=people,ou=ad,dc=example,dc=com dn: cn=Person1,ou=people,ou=ad,dc=example,dc=com cn: Person1 dn: cn=Person2,ou=people,ou=ad,dc=example,dc=com cn: Person2 dn: cn=Person3,ou=people,ou=ad,dc=example,dc=com cn: Person3 dn: cn=Person4,ou=people,ou=ad,dc=example,dc=com cn: Person4 dn: cn=Person5,ou=people,ou=ad,dc=example,dc=com cn: Person5 dn: ou=adextended,dc=example,dc=com dn: ou=people,ou=adextended,dc=example,dc=com dn: cn=Person1,ou=people,ou=adextended,dc=example,dc=com cn: Person1 dn: cn=Person2,ou=people,ou=adextended,dc=example,dc=com cn: Person2 dn: cn=Person3,ou=people,ou=adextended,dc=example,dc=com cn: Person3 dn: cn=Person4,ou=people,ou=adextended,dc=example,dc=com cn: Person4 dn: cn=Person5,ou=people,ou=adextended,dc=example,dc=com cn: person5smith cn: Person5 dn: ou=groups,ou=adextended,dc=example,dc=com dn: cn=group1,ou=groups,ou=adextended,dc=example,dc=com cn: extended-group1 cn: group1 dn: cn=group2,ou=groups,ou=adextended,dc=example,dc=com cn: extended-group2 cn: group2 dn: cn=group3,ou=groups,ou=adextended,dc=example,dc=com cn: extended-group3 cn: group3 dn: ou=incomplete-rfc2307,dc=example,dc=com dn: ou=groups,ou=incomplete-rfc2307,dc=example,dc=com dn: cn=group1,ou=groups,ou=incomplete-rfc2307,dc=example,dc=com cn: group1 dn: cn=group2,ou=groups,ou=incomplete-rfc2307,dc=example,dc=com cn: group2 dn: cn=group3,ou=groups,ou=incomplete-rfc2307,dc=example,dc=com cn: group3 Nov 7 10:12:46.057: INFO: skipping dumping cluster info - cluster too large Nov 7 10:12:46.148: INFO: Deleted {user.openshift.io/v1, Resource=users e2e-test-oauth-ldap-ss8vb-user}, err: <nil> Nov 7 10:12:46.248: INFO: Deleted {oauth.openshift.io/v1, Resource=oauthclients e2e-client-e2e-test-oauth-ldap-ss8vb}, err: <nil> Nov 7 10:12:46.342: INFO: Deleted {oauth.openshift.io/v1, Resource=oauthaccesstokens hMqQ7is4Rj6P-i_Hj8YM5AAAAAAAAAAA}, err: <nil> [AfterEach] [Suite:openshift/oauth] LDAP /go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/k8s.io/kubernetes/test/e2e/framework/framework.go:152 Nov 7 10:12:46.342: INFO: Waiting up to 3m0s for all (but 100) nodes to be ready STEP: Destroying namespace "e2e-test-oauth-ldap-ss8vb" for this suite. Nov 7 10:12:46.534: INFO: Running AfterSuite actions on all nodes Nov 7 10:12:46.534: INFO: Running AfterSuite actions on node 1 fail [github.com/openshift/origin/test/extended/oauth/ldap.go:18]: Unexpected error: <*errors.errorString | 0xc003c71bd0>: { s: "errours encountered trying to run ldapsearch pod: [error waiting for the pod 'runonce-ldapsearch-pod' to complete: timed out waiting for the condition]", } errours encountered trying to run ldapsearch pod: [error waiting for the pod 'runonce-ldapsearch-pod' to complete: timed out waiting for the condition] occurred
Find runonce-ldapsearch-pod mentions in log files
openshift-tests The bootstrap user should successfully login with password decoded from kubeadmin secret [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] network isolation when using a plugin that does not isolate namespaces by default should allow communication between pods in different namespaces on different nodes [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] network isolation when using a plugin that does not isolate namespaces by default should allow communication between pods in different namespaces on the same node [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] services basic functionality should allow connections to another pod on a different node via a service IP [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] services basic functionality should allow connections to another pod on the same node via a service IP [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] services when using a plugin that does not isolate namespaces by default should allow connections to pods in different namespaces on different nodes via service IPs [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] services when using a plugin that does not isolate namespaces by default should allow connections to pods in different namespaces on the same node via service IPs [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking][endpoints] admission TestEndpointAdmission [Suite:openshift/conformance/parallel]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router converges when multiple routers are writing conflicting status [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router converges when multiple routers are writing status [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router should enable openshift-monitoring to pull metrics [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router should expose a health check on the metrics port [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router should expose prometheus metrics for a route [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router should expose the profiling endpoints [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router should override the route host for overridden domains with a custom value [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router should override the route host with a custom value [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router should respond with 503 to unrecognized hosts [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router should run even if it has no access to update status [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router should serve a route that points to two services and respect weights [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router should serve routes that were created from an ingress [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router should serve the correct routes when scoped to a single namespace and label set [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router should support reencrypt to services backed by a serving certificate automatically [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature: RoleBinding Restrictions] RoleBindingRestrictions should be functional Create a RBAC rolebinding when subject is not already bound and is not permitted by any RBR should fail [Suite:openshift/conformance/parallel]
openshift-tests [Feature: RoleBinding Restrictions] RoleBindingRestrictions should be functional Create a rolebinding that also contains system:non-existing users should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature: RoleBinding Restrictions] RoleBindingRestrictions should be functional Create a rolebinding when subject is already bound should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature: RoleBinding Restrictions] RoleBindingRestrictions should be functional Create a rolebinding when subject is not already bound and is not permitted by any RBR should fail [Suite:openshift/conformance/parallel]
openshift-tests [Feature: RoleBinding Restrictions] RoleBindingRestrictions should be functional Create a rolebinding when subject is permitted by RBR should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature: RoleBinding Restrictions] RoleBindingRestrictions should be functional Create a rolebinding when there are no restrictions should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature: RoleBinding Restrictions] RoleBindingRestrictions should be functional Rolebinding restrictions tests single project should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:APIServer] anonymous browsers should get a 403 from / [Suite:openshift/conformance/parallel]
openshift-tests [Feature:APIServer] authenticated browser should get a 200 from / [Suite:openshift/conformance/parallel]
openshift-tests [Feature:AnnotationTrigger] Annotation trigger reconciles after the image is overwritten [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Authentication] TestFrontProxy should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds] Multi-stage image builds should succeed [Conformance] [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds] Optimized image builds should succeed [Conformance] [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds] build have source revision metadata started build should contain source revision information [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds] build with empty source started build should build even with an empty source in build config [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds] buildconfig secret injector should inject secrets to the appropriate buildconfigs [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds] result image should have proper labels set Docker build from a template should create a image from "test-docker-build.json" template with proper Docker labels [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds] result image should have proper labels set S2I build from a template should create a image from "test-s2i-build.json" template with proper Docker labels [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds][Conformance] build can reference a cluster service with a build being created from new-build should be able to run a build that references a cluster service [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][Conformance] build without output image building from templates should create an image from a S2i template without an output image reference defined [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][Conformance] build without output image building from templates should create an image from a docker template without an output image reference defined [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][Conformance] custom build with buildah being created from new-build should complete build with custom builder image [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][Conformance] imagechangetriggers imagechangetriggers should trigger builds of all types [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][Conformance] oc new-app should fail with a --name longer than 58 characters [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][Conformance] oc new-app should succeed with a --name of 58 characters [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][Conformance] remove all builds when build configuration is removed oc delete buildconfig should start builds and delete the buildconfig [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][Conformance] s2i build with a quota Building from a template should create an s2i build with a quota and run it [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][Conformance] s2i build with a root user image should create a root build and pass with a privileged SCC [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][Conformance][valueFrom] process valueFrom in build strategy environment variables should fail resolving unresolvable valueFrom in docker build environment variable references [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][Conformance][valueFrom] process valueFrom in build strategy environment variables should fail resolving unresolvable valueFrom in sti build environment variable references [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][Conformance][valueFrom] process valueFrom in build strategy environment variables should successfully resolve valueFrom in docker build environment variables [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][Conformance][valueFrom] process valueFrom in build strategy environment variables should successfully resolve valueFrom in s2i build environment variables [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][pruning] prune builds based on settings in the buildconfig [Conformance] buildconfigs should have a default history limit set when created via the group api [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][pruning] prune builds based on settings in the buildconfig should prune builds after a buildConfig change [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds][pruning] prune builds based on settings in the buildconfig should prune canceled builds based on the failedBuildsHistoryLimit setting [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds][pruning] prune builds based on settings in the buildconfig should prune completed builds based on the successfulBuildsHistoryLimit setting [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds][pruning] prune builds based on settings in the buildconfig should prune errored builds based on the failedBuildsHistoryLimit setting [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds][pruning] prune builds based on settings in the buildconfig should prune failed builds based on the failedBuildsHistoryLimit setting [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds][pullsecret][Conformance] docker build using a pull secret Building from a template should create a docker build that pulls using a secret run it [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Builds][timing] capture build stages and durations should record build stages and durations for docker [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds][timing] capture build stages and durations should record build stages and durations for s2i [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds][webhook] TestWebhook [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds][webhook] TestWebhookGitHubPing [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds][webhook] TestWebhookGitHubPushWithImage [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds][webhook] TestWebhookGitHubPushWithImageStream [Suite:openshift/conformance/parallel]
openshift-tests [Feature:CLI] CLI can run inside of a busybox container [Suite:openshift/conformance/parallel]
openshift-tests [Feature:ClusterResourceQuota] TestClusterQuota should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs should adhere to Three Laws of Controllers [Conformance] [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs adoption [Conformance] will orphan all RCs and adopt them back when recreated [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs generation [Conformance] should deploy based on a status version bump [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs ignores deployer and lets the config with a NewReplicationControllerCreated reason [Conformance] should let the deployment config with a NewReplicationControllerCreated reason [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs initially [Conformance] should not deploy if pods never transition to ready [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs keep the deployer pod invariant valid [Conformance] should deal with cancellation after deployer pod succeeded [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs keep the deployer pod invariant valid [Conformance] should deal with cancellation of running deployment [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs keep the deployer pod invariant valid [Conformance] should deal with config change in case the deployment is still running [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs paused [Conformance] should disable actions on deployments [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs rolled back [Conformance] should rollback to an older deployment [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs should respect image stream tag reference policy [Conformance] resolve the image pull spec [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs viewing rollout history [Conformance] should print the rollout history [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs when changing image change trigger [Conformance] should successfully trigger from an updated image [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs when run iteratively [Conformance] should immediately start a new deployment [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs when run iteratively [Conformance] should only deploy the last deployment [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs when tagging images [Conformance] should successfully tag the deployed image [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs with custom deployments [Conformance] should run the custom deployment steps [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs with enhanced status [Conformance] should include various info in status [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs with env in params referencing the configmap [Conformance] should expand the config map key to a value [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs with failing hook [Conformance] should get all logs from retried hooks [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs with minimum ready seconds set [Conformance] should not transition the deployment to Complete before satisfied [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs with multiple image change triggers [Conformance] should run a successful deployment with a trigger used by different containers [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs with multiple image change triggers [Conformance] should run a successful deployment with multiple triggers [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs with revision history limits [Conformance] should never persist more old deployments than acceptable after being observed by the controller [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs with test deployments [Conformance] should run a deployment to completion and then scale to zero [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:DeploymentConfig] deploymentconfigs won't deploy RC with unresolved images [Conformance] when patched with empty image [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:ImageAppend] Image append should create images by appending them [Suite:openshift/conformance/parallel]
openshift-tests [Feature:ImageExtract] Image extract should extract content from an image [Suite:openshift/conformance/parallel]
openshift-tests [Feature:ImageInfo] Image info should display information about images [Suite:openshift/conformance/parallel]
openshift-tests [Feature:ImageLayers][registry] Image layer subresource should identify a deleted image as missing [Suite:openshift/conformance/parallel]
openshift-tests [Feature:ImageLookup][registry][Conformance] Image policy should perform lookup when the pod has the resolve-names annotation [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:ImageLookup][registry][Conformance] Image policy should update standard Kube object image fields when local names are on [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Image] signature TestImageAddSignature [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Image] signature TestImageRemoveSignature [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Image][triggers] Image change build triggers TestMultipleImageChangeBuildTriggers [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Image][triggers] Image change build triggers TestSimpleImageChangeBuildTriggerFromImageStreamTagCustom [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Image][triggers] Image change build triggers TestSimpleImageChangeBuildTriggerFromImageStreamTagCustomWithConfigChange [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Image][triggers] Image change build triggers TestSimpleImageChangeBuildTriggerFromImageStreamTagDocker [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Image][triggers] Image change build triggers TestSimpleImageChangeBuildTriggerFromImageStreamTagDockerWithConfigChange [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Image][triggers] Image change build triggers TestSimpleImageChangeBuildTriggerFromImageStreamTagSTI [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Image][triggers] Image change build triggers TestSimpleImageChangeBuildTriggerFromImageStreamTagSTIWithConfigChange [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Machines] Managed cluster should have machine resources [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] OAuth server has the correct token and certificate fallback semantics [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] OAuth server should use http1.1 only to prevent http2 connection reuse [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] [Headers] expected headers returned from the authorize URL [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] [Headers] expected headers returned from the grant URL [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] [Headers] expected headers returned from the login URL for the allow all IDP [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] [Headers] expected headers returned from the login URL for the bootstrap IDP [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] [Headers] expected headers returned from the logout URL [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] [Headers] expected headers returned from the root URL [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] [Headers] expected headers returned from the token URL [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] [Headers] expected headers returned from the token request URL [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] [Token Expiration] Using a OAuth client with a non-default token max age to generate tokens that do not expire works as expected when using a code authorization flow [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] [Token Expiration] Using a OAuth client with a non-default token max age to generate tokens that do not expire works as expected when using a token authorization flow [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] [Token Expiration] Using a OAuth client with a non-default token max age to generate tokens that expire shortly works as expected when using a code authorization flow [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] [Token Expiration] Using a OAuth client with a non-default token max age to generate tokens that expire shortly works as expected when using a token authorization flow [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OAuthServer] well-known endpoint should be reachable [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] RBAC proxy for openshift authz RunLegacyClusterRoleBindingEndpoint should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] RBAC proxy for openshift authz RunLegacyClusterRoleEndpoint should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] RBAC proxy for openshift authz RunLegacyEndpointConfirmNoEscalation should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] RBAC proxy for openshift authz RunLegacyLocalRoleBindingEndpoint should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] RBAC proxy for openshift authz RunLegacyLocalRoleEndpoint should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] The default cluster RBAC policy should have correct RBAC rules [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] authorization TestAuthorizationSubjectAccessReview should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] authorization TestAuthorizationSubjectAccessReviewAPIGroup should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] authorization TestBrowserSafeAuthorizer should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] scopes TestScopeEscalations should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] scopes TestScopedImpersonation should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] scopes TestScopedTokens should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] scopes TestTokensWithIllegalScopes should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] scopes TestUnknownScopes should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] self-SAR compatibility TestBootstrapPolicySelfSubjectAccessReviews should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftAuthorization] self-SAR compatibility TestSelfSubjectAccessReviewsNonExistingNamespace should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftControllerManager] TestAutomaticCreationOfPullSecrets [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftControllerManager] TestDeployScale [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftControllerManager] TestDeploymentConfigDefaults [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftControllerManager] TestTriggers_MultipleICTs [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftControllerManager] TestTriggers_configChange [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftControllerManager] TestTriggers_imageChange [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftControllerManager] TestTriggers_imageChange_nonAutomatic [Suite:openshift/conformance/parallel]
openshift-tests [Feature:OpenShiftControllerManager] TestTriggers_manual [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] ClusterOperators should define at least one namespace in their lists of related objects [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] ClusterOperators should define at least one related object that is not a namespace [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] Managed cluster should ensure control plane operators do not make themselves unevictable [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] Managed cluster should ensure control plane pods do not run in best-effort QoS [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] Managed cluster should ensure pods use downstream images from our release image with proper ImagePullPolicy [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] Managed cluster should have no crashlooping pods in core namespaces over two minutes [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] Managed cluster should have operators on the cluster version [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] Managed cluster should should expose cluster services outside the cluster [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] OLM should be installed with catalogsources at version v1alpha1 [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] OLM should be installed with clusterserviceversions at version v1alpha1 [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] OLM should be installed with installplans at version v1alpha1 [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] OLM should be installed with operatorgroups at version v1 [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] OLM should be installed with packagemanifests at version v1 [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] OLM should be installed with subscriptions at version v1alpha1 [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform] OLM should have imagePullPolicy:IfNotPresent on thier deployments [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Platform][Smoke] Managed cluster should start all core operators [Suite:openshift/conformance/parallel]
openshift-tests [Feature:ProjectAPI] TestInvalidRoleRefs should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:ProjectAPI] TestProjectIsNamespace should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:ProjectAPI] TestProjectWatch should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:ProjectAPI] TestProjectWatchWithSelectionPredicate should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:ProjectAPI] TestScopedProjectAccess should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:ProjectAPI] TestUnprivilegedNewProject [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Prometheus][Conformance] Prometheus when installed on the cluster should have a Watchdog alert in firing state [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Prometheus][Conformance] Prometheus when installed on the cluster should have non-Pod host cAdvisor metrics [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Prometheus][Conformance] Prometheus when installed on the cluster should provide ingress metrics [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Prometheus][Conformance] Prometheus when installed on the cluster should report telemetry if a cloud.openshift.com token is present [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Prometheus][Conformance] Prometheus when installed on the cluster should start and expose a secured proxy and unsecured metrics [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Prometheus][Conformance] Prometheus when installed on the cluster shouldn't have failing rules evaluation [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Prometheus][Conformance] Prometheus when installed on the cluster shouldn't report any alerts in firing state apart from Watchdog [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:Prometheus][Feature:Builds] Prometheus when installed on the cluster should start and expose a secured proxy and verify build metrics [Suite:openshift/conformance/parallel]
openshift-tests [Feature:SecurityContextConstraints] TestAllowedSCCViaRBAC [Suite:openshift/conformance/parallel]
openshift-tests [Feature:SecurityContextConstraints] TestPodUpdateSCCEnforcement [Suite:openshift/conformance/parallel]
openshift-tests [Feature:UserAPI] groups should work [Suite:openshift/conformance/parallel]
openshift-tests [Feature:UserAPI] users can manipulate groups [Suite:openshift/conformance/parallel]
openshift-tests [Suite:openshift/crdvalidation/apiserver] APIServer CR fields validation additionalCORSAllowedOrigins [Suite:openshift/conformance/parallel]
openshift-tests [Suite:openshift/oauth/htpasswd] HTPasswd IDP should successfully configure htpasswd and be responsive [Suite:openshift/conformance/parallel]
openshift-tests [Suite:openshift/oauth] LDAP IDP should authenticate against an ldap server [Suite:openshift/conformance/parallel]
openshift-tests [cli] oc adm must-gather runs successfully [Suite:openshift/conformance/parallel]
openshift-tests [cli] oc adm must-gather runs successfully with options [Suite:openshift/conformance/parallel]
openshift-tests [cli] oc explain should contain proper fields description for special types [Suite:openshift/conformance/parallel]
openshift-tests [cli] oc explain should contain proper spec+status for CRDs [Suite:openshift/conformance/parallel]
openshift-tests [cli] oc explain should contain spec+status for builtinTypes [Suite:openshift/conformance/parallel]
openshift-tests [cli]oc rsh[Conformance] rsh specific flags should work well when access to a remote shell [Suite:openshift/conformance/parallel/minimal]
openshift-tests [image_ecosystem][mongodb] openshift mongodb image creating from a template should instantiate the template [Suite:openshift/conformance/parallel]
openshift-tests [job][Conformance] openshift can execute jobs controller should create and run a job in user project [Suite:openshift/conformance/parallel/minimal]
openshift-tests [k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart http hook properly [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] as empty when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] from file when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] from log output if TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] if TerminationMessagePath is set [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] if TerminationMessagePath is set as non-root user and at a non-default path [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Container Runtime blackbox test when running a container with a new image should be able to pull from private registry with secret [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Container Runtime blackbox test when running a container with a new image should be able to pull image from docker hub [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Container Runtime blackbox test when running a container with a new image should be able to pull image from gcr.io [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Container Runtime blackbox test when running a container with a new image should not be able to pull from private registry without secret [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Container Runtime blackbox test when running a container with a new image should not be able to pull image from invalid registry [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Container Runtime blackbox test when running a container with a new image should not be able to pull non-existing image from gcr.io [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Container Runtime blackbox test when starting a container that exits should run with the expected status [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Docker Containers should be able to override the image's default arguments (docker cmd) [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Docker Containers should be able to override the image's default command (docker entrypoint) [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Docker Containers should be able to override the image's default command and arguments [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Docker Containers should use the image defaults if command and args are blank [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] InitContainer [NodeConformance] should invoke init containers on a RestartAlways pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] InitContainer [NodeConformance] should invoke init containers on a RestartNever pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] InitContainer [NodeConformance] should not start app containers and fail the pod if init containers fail on a RestartNever pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] InitContainer [NodeConformance] should not start app containers if init containers fail on a RestartAlways pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Kubelet when scheduling a busybox Pod with hostAliases should write entries to /etc/hosts [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Kubelet when scheduling a busybox command in a pod should print the output to logs [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Kubelet when scheduling a busybox command that always fails in a pod should be possible to delete [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Kubelet when scheduling a busybox command that always fails in a pod should have an terminated reason [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Kubelet when scheduling a read only busybox container should not write to root filesystem [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] KubeletManagedEtcHosts should test kubelet managed /etc/hosts file [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Lease API should be available [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Pods should allow activeDeadlineSeconds to be updated [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Pods should be submitted and removed [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Pods should be updated [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Pods should contain environment variables for services [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Pods should get a host IP [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Pods should support pod readiness gates [NodeFeature:PodReadinessGate] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Pods should support remote command execution over websockets [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Pods should support retrieving logs from the container over websockets [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] PrivilegedPod [NodeConformance] should enable privileged commands [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Probing container should *not* be restarted with a /healthz http liveness probe [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Probing container should *not* be restarted with a exec "cat /tmp/health" liveness probe [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Probing container should *not* be restarted with a non-local redirect http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Probing container should *not* be restarted with a tcp:8080 liveness probe [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Probing container should be restarted with a /healthz http liveness probe [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Probing container should be restarted with a exec "cat /tmp/health" liveness probe [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Probing container should be restarted with a local redirect http liveness probe [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Probing container should have monotonically increasing restart count [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Probing container with readiness probe should not be ready before initial delay and never restart [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Probing container with readiness probe that fails should never be ready and never restart [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Security Context When creating a container with runAsNonRoot should not run with an explicit root user ID [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Security Context When creating a container with runAsNonRoot should not run without a specified user ID [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Security Context When creating a container with runAsNonRoot should run with an explicit non-root user ID [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Security Context When creating a container with runAsNonRoot should run with an image specified user ID [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Security Context When creating a container with runAsUser should run the container with uid 0 [LinuxOnly] [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Security Context When creating a container with runAsUser should run the container with uid 65534 [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Security Context When creating a pod with privileged should run the container as unprivileged when false [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Security Context When creating a pod with readOnlyRootFilesystem should run the container with readonly rootfs when readOnlyRootFilesystem=true [LinuxOnly] [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Security Context When creating a pod with readOnlyRootFilesystem should run the container with writable rootfs when readOnlyRootFilesystem=false [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when not explicitly set and uid != 0 [LinuxOnly] [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Security Context when creating containers with AllowPrivilegeEscalation should allow privilege escalation when true [LinuxOnly] [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Security Context when creating containers with AllowPrivilegeEscalation should not allow privilege escalation when false [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Variable Expansion should allow composing env vars into new env vars [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Variable Expansion should allow substituting values in a container's args [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Variable Expansion should allow substituting values in a container's command [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] Variable Expansion should allow substituting values in a volume subpath [sig-storage][NodeFeature:VolumeSubpathEnvExpansion] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [Feature:Example] [k8s.io] Downward API should create a pod that prints his name and namespace [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [Feature:Example] [k8s.io] Liveness liveness pods should be automatically restarted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [Feature:Example] [k8s.io] Secret should create a pod that reads a secret [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] Events should be sent by kubelets and the scheduler about pods scheduling and running [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] Mount propagation should propagate mounts to the host [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] Pods Extended [k8s.io] Delete Grace Period should be submitted and removed [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] Pods Extended [k8s.io] Pods Set QOS Class should be set on Pods with matching resource requests and limits for memory and cpu [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] PreStop graceful pod terminated should wait until preStop hook completes the process [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] PreStop should call prestop when killing a pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] Security Context should support container.SecurityContext.RunAsUser And container.SecurityContext.RunAsGroup [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] Security Context should support container.SecurityContext.RunAsUser [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser And pod.Spec.SecurityContext.RunAsGroup [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] Security Context should support pod.Spec.SecurityContext.RunAsUser [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] Security Context should support pod.Spec.SecurityContext.SupplementalGroups [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] Security Context should support seccomp alpha runtime/default annotation [Feature:Seccomp] [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] Security Context should support seccomp alpha unconfined annotation on the container [Feature:Seccomp] [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] Security Context should support seccomp alpha unconfined annotation on the pod [Feature:Seccomp] [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] Security Context should support seccomp default which is unconfined [Feature:Seccomp] [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing mutating webhooks should work [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing validating webhooks should work [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a mutating webhook should work [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a validating webhook should work [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny attaching pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny custom resource creation, update and deletion [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny pod and configmap creation [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should deny crd creation [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should honor timeout [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should include webhook resources in discovery documents [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate configmap [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with different stored version [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with pruning [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate pod and apply defaults after mutation [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should not be able to mutate or prevent deletion of webhook configuration objects [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should unconditionally reject operations on fail closed webhook [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Aggregator Should be able to support the 1.10 Sample API Server using the current Aggregator [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert a non homogeneous list of CRs [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert from CR v1 to CR v2 [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourceDefinition Watch [Privileged:ClusterAdmin] CustomResourceDefinition Watch watch on custom resource definition objects [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition creating/deleting custom resource definition objects works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition getting/updating/patching custom resource definition status sub-resource works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition listing custom resource definition objects works [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] should include custom resource definition resources in discovery documents [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] removes definition from spec when one version gets changed to not be served [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] updates the published spec when one version gets renamed [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields at the schema root [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields in an embedded object [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD with validation schema [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD without validation schema [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of different groups [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group and version but different kinds [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group but different versions [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Discovery Custom resource should have storage version hash [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] Garbage collector should delete RS created by deployment when not orphaning [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Garbage collector should delete jobs and pods created by cronjob [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] Garbage collector should delete pods created by rc when not orphaning [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Garbage collector should keep the rc around until all its pods are deleted if the deleteOptions says so [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Garbage collector should not be blocked by dependency circle [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Garbage collector should not delete dependents that have both valid owner and owner that's waiting for dependents to be deleted [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Garbage collector should orphan RS created by deployment when deleteOptions.PropagationPolicy is Orphan [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Garbage collector should orphan pods created by rc if delete options say so [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Garbage collector should orphan pods created by rc if deleteOptions.OrphanDependents is nil [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] Garbage collector should support cascading deletion of custom resources [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] Garbage collector should support orphan deletion of custom resources [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] Generated clientset should create pods, set the deletionTimestamp and deletionGracePeriodSeconds of the pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] Generated clientset should create v1beta1 cronJobs, delete cronJobs, watch cronJobs [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's multiple priority class scope (quota set to pod count: 2) against 2 pods with same priority classes. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (cpu, memory quota set) against a pod with same priority class. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with different priority class. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against 2 pods with same priority class. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpExists). [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with different priority class (ScopeSelectorOpNotIn). [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota [Feature:PodPriority] should verify ResourceQuota's priority class scope (quota set to pod count: 1) against a pod with same priority class. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota [Feature:ScopeSelectors] should verify ResourceQuota with best effort scope using scope-selectors. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota [Feature:ScopeSelectors] should verify ResourceQuota with terminating scopes through scope selectors. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota should be able to update and delete ResourceQuota. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a configMap. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a custom resource. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim with a storage class. [sig-storage] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a persistent volume claim. [sig-storage] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a pod. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replica set. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replication controller. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a secret. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a service. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota should create a ResourceQuota and ensure its status is promptly calculated. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota should verify ResourceQuota with best effort scope. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] ResourceQuota should verify ResourceQuota with terminating scopes. [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Secrets should be consumable from pods in env vars [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Secrets should be consumable via the environment [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Secrets should fail to create secret due to empty secret key [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Servers with support for API chunking should return chunks of results for list calls [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] Servers with support for Table transformation should return a 406 for a backend which does not implement metadata [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Servers with support for Table transformation should return chunks of table results for list calls [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] Servers with support for Table transformation should return generic metadata details across all namespaces for nodes [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] Servers with support for Table transformation should return pod details [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-api-machinery] Watchers should be able to restart watching from the last resource version observed by the previous watch [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Watchers should be able to start watching from a specific resource version [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Watchers should observe add, update, and delete watch notifications on configmaps [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Watchers should observe an object deletion if it stops meeting the requirements of the selector [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-api-machinery] Watchers should receive events on concurrent watches in same order [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] CronJob should delete successful/failed finished jobs with limit of one job [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] CronJob should not emit unexpected warnings [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] CronJob should remove from active list jobs that have been deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] CronJob should replace jobs when ReplaceConcurrent [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] CronJob should schedule multiple jobs concurrently [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] Deployment RecreateDeployment should delete old pods and create new ones [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] Deployment RollingUpdateDeployment should delete old pods and create new ones [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] Deployment deployment reaping should cascade to its replica sets and pods [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] Deployment deployment should delete old replica sets [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] Deployment deployment should support proportional scaling [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] Deployment deployment should support rollover [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] Deployment iterative rollouts should eventually progress [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] Deployment test Deployment ReplicaSet orphaning and adoption regarding controllerRef [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] DisruptionController evictions: enough pods, absolute => should allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] DisruptionController evictions: enough pods, replicaSet, percentage => should allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] DisruptionController evictions: maxUnavailable allow single eviction, percentage => should allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] DisruptionController evictions: maxUnavailable deny evictions, integer => should not allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] DisruptionController evictions: no PDB => should allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] DisruptionController evictions: too few pods, absolute => should not allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] DisruptionController evictions: too few pods, replicaSet, percentage => should not allow an eviction [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] DisruptionController should block an eviction until the PDB is updated to allow it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] DisruptionController should create a PodDisruptionBudget [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] DisruptionController should update PodDisruptionBudget status [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] Job should adopt matching orphans and release non-matching pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] Job should delete a job [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] Job should fail to exceed backoffLimit [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] Job should fail when exceeds active deadline [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] Job should remove pods when job is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] Job should run a job to completion when tasks sometimes fail and are locally restarted [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] Job should run a job to completion when tasks succeed [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] ReplicaSet should adopt matching pods on creation and release no longer matching pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] ReplicaSet should serve a basic image on each replica with a public image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] ReplicaSet should surface a failure condition on a common issue like exceeded quota [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] ReplicationController should adopt matching pods on creation [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] ReplicationController should release no longer matching pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] ReplicationController should serve a basic image on each replica with a public image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] ReplicationController should surface a failure condition on a common issue like exceeded quota [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] Should recreate evicted statefulset [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should adopt matching orphans and release non-matching pods [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should have a working scale subresource [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should implement legacy replacement when the update strategy is OnDelete [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should not deadlock when a pod's predecessor fails [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform canary updates and phased rolling updates of template modifications [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications with PVCs [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should provide basic identity [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-auth] Certificates API should support building a client with a CSR [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-auth] ServiceAccounts should allow opting out of API token automount [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-auth] [Feature:NodeAuthenticator] The kubelet can delegate ServiceAccount tokens to the API server [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-auth] [Feature:NodeAuthenticator] The kubelet's main port 10250 should reject requests with no credentials [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to create another node [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-auth] [Feature:NodeAuthorizer] A node shouldn't be able to delete another node [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-auth] [Feature:NodeAuthorizer] Getting a non-existent configmap should exit with the Forbidden error, not a NotFound error [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-auth] [Feature:NodeAuthorizer] Getting a non-existent secret should exit with the Forbidden error, not a NotFound error [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-auth] [Feature:NodeAuthorizer] Getting a secret for a workload the node has access to should succeed [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-auth] [Feature:NodeAuthorizer] Getting an existing configmap should exit with the Forbidden error [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-auth] [Feature:NodeAuthorizer] Getting an existing secret should exit with the Forbidden error [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 should support forwarding over websockets [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects NO client request should support a client that connects, sends DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl Port forwarding With a server listening on 0.0.0.0 that expects a client request should support a client that connects, sends NO DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl Port forwarding With a server listening on localhost should support forwarding over websockets [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl Port forwarding With a server listening on localhost that expects NO client request should support a client that connects, sends DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl Port forwarding With a server listening on localhost that expects a client request should support a client that connects, sends NO DATA, and disconnects [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl api-versions should check if v1 is in available api versions [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl apply apply set/view last-applied [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl apply should apply a new configuration to an existing RC [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl apply should reuse port when apply to an existing SVC [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl client-side validation should create/apply a CR with unknown fields for CRD with no validation schema [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl client-side validation should create/apply a valid CR for CRD with validation schema [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl client-side validation should create/apply a valid CR with arbitrary-extra properties for CRD with partially-specified validation schema [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl cluster-info dump should check if cluster-info dump succeeds [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl copy should copy a file from a running Pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl create quota should create a quota with scopes [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl create quota should create a quota without scopes [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl create quota should reject quota with invalid scopes [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for rc and pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl expose should create services for rc [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl get componentstatuses should get componentstatuses [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl label should update the label on a resource [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl logs should be able to retrieve and filter logs [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl patch should add annotations for pods in rc [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl replace should update a single-container pod's image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl rolling-update should support rolling-update to same image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl run --rm job should create a job from an image, then delete the job [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl run CronJob should create a CronJob [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl run default should create an rc or deployment from an image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl run deployment should create a deployment from an image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl run job should create a job from an image when restart is OnFailure [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl run pod should create a pod from an image when restart is Never [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl run rc should create an rc from an image [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Kubectl version should check is all data is printed [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Proxy server should support --unix-socket=/path [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Proxy server should support proxy with --port 0 [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Simple pod should contain last line of the log [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Simple pod should return command exit codes [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Simple pod should support exec [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Simple pod should support exec through an HTTP proxy [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Simple pod should support exec through kubectl proxy [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Simple pod should support exec using resource/name [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Simple pod should support inline execution and attach [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Simple pod should support port-forward [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Update Demo should create and stop a replication controller [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Update Demo should do a rolling update of a replication controller [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-cli] Kubectl client Update Demo should scale a replication controller [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-instrumentation] Cadvisor should be healthy on every node. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-instrumentation] MetricsGrabber should grab all metrics from API server. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-instrumentation] MetricsGrabber should grab all metrics from a ControllerManager. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-instrumentation] MetricsGrabber should grab all metrics from a Kubelet. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-instrumentation] MetricsGrabber should grab all metrics from a Scheduler. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] DNS should provide /etc/hosts entries for the cluster [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] DNS should provide DNS for ExternalName services [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] DNS should provide DNS for pods for Hostname [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] DNS should provide DNS for pods for Subdomain [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] DNS should provide DNS for services [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] DNS should provide DNS for the cluster [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] DNS should resolve DNS of partial qualified names for services [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] DNS should resolve DNS of partial qualified names for the cluster [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] DNS should support configurable pod DNS nameservers [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] DNS should support configurable pod resolv.conf [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should allow ingress access from updated namespace [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple ingress policies with ingress allow-all policy taking precedence [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce multiple, stacked policies with overlapping podSelectors [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on NamespaceSelector with MatchExpressions[Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector or NamespaceSelector [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on PodSelector with MatchExpressions[Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy based on Ports [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic from pods within server namespace based on PodSelector [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic only from a different namespace, based on NamespaceSelector [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce policy to allow traffic only from a pod in a different namespace based on PodSelector and NamespaceSelector [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should enforce updated policy [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should stop enforcing policies after they are deleted [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should support a 'default-deny' policy [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] NetworkPolicy [LinuxOnly] NetworkPolicy between server and client should support allow-all policy [Feature:NetworkPolicy] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: http [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] Networking Granular Checks: Pods should function for intra-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] Networking Granular Checks: Pods should function for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] Networking Granular Checks: Pods should function for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] Proxy version v1 should proxy logs on node using proxy subresource [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] Proxy version v1 should proxy logs on node with explicit kubelet port using proxy subresource [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] Proxy version v1 should proxy through a service and a pod [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] Services should be able to change the type from ClusterIP to ExternalName [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] Services should be able to change the type from ExternalName to ClusterIP [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] Services should be able to change the type from ExternalName to NodePort [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] Services should be able to change the type from NodePort to ExternalName [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] Services should be able to update NodePorts with two same port numbers but different protocols [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] Services should check NodePort out-of-range [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] Services should create endpoints for unready pods [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] Services should preserve source pod IP for traffic thru service cluster IP [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:Network/OpenShiftSDN/Multitenant]
openshift-tests [sig-network] Services should prevent NodePort collisions [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] Services should provide secure master service [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] Services should release NodePorts on delete [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] Services should serve a basic endpoint from pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] Services should serve multiport endpoints from pods [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-network] Services should use same NodePort with same port but different protocols [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-node] ConfigMap should be consumable via environment variable [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-node] ConfigMap should be consumable via the environment [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-node] ConfigMap should fail to create ConfigMap with empty key [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-node] ConfigMap should patch ConfigMap successfully [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-node] Downward API should provide container's limits.cpu/memory and requests.cpu/memory as env vars [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-node] Downward API should provide default limits.cpu/memory from node allocatable [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-node] Downward API should provide host IP and pod IP as an env var if pod uses host network [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-node] Downward API should provide host IP as an env var [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-node] Downward API should provide pod UID as env vars [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-node] Downward API should provide pod name, namespace and IP address as env vars [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-scheduling] LimitRange should create a LimitRange with defaults and ensure pod has those defaults applied. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] CSI mock volume CSI Volume expansion should expand volume by restarting pod if attach=off, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] CSI mock volume CSI Volume expansion should expand volume by restarting pod if attach=on, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] CSI mock volume CSI Volume expansion should expand volume without restarting pod if nodeExpansion=off [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] CSI mock volume CSI Volume expansion should not expand volume if resizingOnDriver=off, resizingOnSC=on [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] CSI mock volume CSI attach test using mock driver should not require VolumeAttach for drivers without attachment [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] CSI mock volume CSI attach test using mock driver should preserve attachment policy when no CSIDriver present [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] CSI mock volume CSI attach test using mock driver should require VolumeAttach for drivers with attachment [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] CSI mock volume CSI online volume expansion should expand volume without restarting pod if attach=off, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] CSI mock volume CSI online volume expansion should expand volume without restarting pod if attach=on, nodeExpansion=on [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] CSI mock volume CSI workload information using mock driver contain ephemeral=true when using inline volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] CSI mock volume CSI workload information using mock driver should be passed when podInfoOnMount=true [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when CSIDriver does not exist [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when podInfoOnMount=false [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] CSI mock volume CSI workload information using mock driver should not be passed when podInfoOnMount=nil [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] ConfigMap binary data should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] ConfigMap optional updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] ConfigMap should be consumable from pods in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] ConfigMap should be consumable from pods in volume as non-root [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] ConfigMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] ConfigMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] ConfigMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] ConfigMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] ConfigMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] ConfigMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] ConfigMap updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Downward API volume should provide container's cpu limit [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Downward API volume should provide container's cpu request [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Downward API volume should provide container's memory limit [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Downward API volume should provide container's memory request [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Downward API volume should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Downward API volume should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Downward API volume should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Downward API volume should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Downward API volume should provide podname only [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Downward API volume should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Downward API volume should set mode on item file [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Downward API volume should update annotations on modification [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Downward API volume should update labels on modification [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Dynamic Provisioning DynamicProvisioner allowedTopologies should create persistent volume in the zone specified in allowedTopologies of storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Dynamic Provisioning [k8s.io] GlusterDynamicProvisioner should create and delete persistent volumes [fast] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes pod should support shared volumes between containers [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes should support (non-root,0644,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes should support (non-root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes should support (non-root,0666,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes should support (non-root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes should support (non-root,0777,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes should support (non-root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes should support (root,0644,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes should support (root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes should support (root,0666,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes should support (root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes should support (root,0777,default) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes should support (root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes volume on default medium should have the correct mode [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes volume on tmpfs should have the correct mode [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] files with FSGroup ownership should support (root,0644,tmpfs) [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is non-root [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] new files should be created with FSGroup ownership when container is root [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] nonexistent volume subPath should have the correct mode and owner using FSGroup [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on default medium should have the correct mode using FSGroup [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir volumes when FSGroup is specified [LinuxOnly] [NodeFeature:FSGroup] volume on tmpfs should have the correct mode using FSGroup [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] EmptyDir wrapper volumes should not conflict [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : configmap [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : projected [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Ephemeralstorage When pod refers to non-existent ephemeral storage should allow deletion of pod with invalid volume : secret [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] GCP Volumes GlusterFS should be mountable [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] GCP Volumes NFSv3 should be mountable for NFSv3 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] GCP Volumes NFSv4 should be mountable for NFSv4 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] HostPath should give a volume the correct mode [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] HostPath should support r/w [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] HostPath should support subPath [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PV Protection Verify "immediate" deletion of a PV that is not bound to a PVC [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PV Protection Verify that PV bound to a PVC is not removed immediately [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PVC Protection Verify "immediate" deletion of a PVC that is not in active use by a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PVC Protection Verify that PVC in active use by a pod is not removed immediately [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PVC Protection Verify that scheduling of a pod that uses PVC that is being deleted fails and the pod becomes Unschedulable [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes NFS when invoking the Recycle reclaim policy should test that a PV becomes Available and is clean after the PVC is deleted. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PV and a pre-bound PVC: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and a pre-bound PV: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs create a PVC and non-pre-bound PV: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes NFS with Single PV - PVC pairs should create a non-pre-bound PV and PVC: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 2 PVs and 4 PVCs: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes NFS with multiple PVs and PVCs all in same ns should create 3 PVs and 3 PVCs: test write access [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeAffinity [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local Pod with node different from PV's NodeAffinity should fail scheduling due to different NodeSelector [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: block] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: block] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-link] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-link] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and read from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: tmpfs] One pod requesting one prebound PVC should be able to mount volume and write from pod1 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume at the same time should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Two pods mounting a local volume one after the other should be able to write from pod1 and read from pod2 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Projected combined should project all components that make up the projection API [Projection][NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected configMap optional updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected configMap should be consumable from pods in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected configMap should be consumable from pods in volume as non-root [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected configMap should be consumable from pods in volume as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Projected configMap should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Projected configMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected configMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected configMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root with FSGroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Projected configMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected configMap updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected downwardAPI should provide container's cpu limit [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected downwardAPI should provide container's cpu request [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected downwardAPI should provide container's memory limit [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected downwardAPI should provide container's memory request [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected downwardAPI should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected downwardAPI should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Projected downwardAPI should provide podname as non-root with fsgroup and defaultMode [LinuxOnly] [NodeFeature:FSGroup] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Projected downwardAPI should provide podname only [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected downwardAPI should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected downwardAPI should set mode on item file [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected downwardAPI should update annotations on modification [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected downwardAPI should update labels on modification [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected secret optional updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected secret should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Projected secret should be consumable from pods in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected secret should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected secret should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected secret should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected secret should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Projected secret should be consumable in multiple volumes in a pod [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Secrets optional updates should be reflected in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Secrets should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Secrets should be consumable from pods in volume [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Secrets should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Secrets should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Secrets should be consumable from pods in volume with mappings [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Secrets should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Secrets should be consumable in multiple volumes in a pod [NodeConformance] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod with mountPath of existing file [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Subpath Atomic writer volumes should support subpaths with downward pod [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Subpath Atomic writer volumes should support subpaths with projected pod [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Subpath Atomic writer volumes should support subpaths with secret pod [LinuxOnly] [Conformance] [Suite:openshift/conformance/parallel/minimal] [Suite:k8s]
openshift-tests [sig-storage] Volumes ConfigMap should be mountable [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests node client cert requests armoring: deny pod's access to /config/master API endpoint [Suite:openshift/conformance/parallel]
openshift-tests node client cert requests armoring: node-approver SA token compromised, don't approve random CSRs with client auth [Suite:openshift/conformance/parallel]
operator All images are built and tagged into stable
operator Create the release image containing all images built by this job
operator Find all of the input images from ocp/4.3:${component} and tag them into the output image stream
operator Run template e2e-azure - e2e-azure-ovn-kubernetes container lease
operator Run template e2e-azure - e2e-azure-ovn-kubernetes container setup
operator Run template e2e-azure - e2e-azure-ovn-kubernetes container teardown
operator Run template e2e-azure - e2e-azure-ovn-kubernetes container test
openshift-tests [Area:Networking] multicast when using one of the plugins 'redhat/openshift-ovs-multitenant, redhat/openshift-ovs-networkpolicy' should allow multicast traffic in namespaces where it is enabled [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] multicast when using one of the plugins 'redhat/openshift-ovs-multitenant, redhat/openshift-ovs-networkpolicy' should block multicast traffic in namespaces where it is disabled [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] multicast when using one of the plugins 'redhat/openshift-ovs-subnet' should block multicast traffic [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] network isolation when using a plugin that isolates namespaces by default should allow communication from default to non-default namespace on a different node [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] network isolation when using a plugin that isolates namespaces by default should allow communication from default to non-default namespace on the same node [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] network isolation when using a plugin that isolates namespaces by default should allow communication from non-default to default namespace on a different node [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] network isolation when using a plugin that isolates namespaces by default should allow communication from non-default to default namespace on the same node [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] network isolation when using a plugin that isolates namespaces by default should prevent communication between pods in different namespaces on different nodes [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] network isolation when using a plugin that isolates namespaces by default should prevent communication between pods in different namespaces on the same node [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] services when using a plugin that isolates namespaces by default should allow connections from pods in the default namespace to a service in another namespace on a different node [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] services when using a plugin that isolates namespaces by default should allow connections from pods in the default namespace to a service in another namespace on the same node [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] services when using a plugin that isolates namespaces by default should allow connections to services in the default namespace from a pod in another namespace on a different node [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] services when using a plugin that isolates namespaces by default should allow connections to services in the default namespace from a pod in another namespace on the same node [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] services when using a plugin that isolates namespaces by default should prevent connections to pods in different namespaces on different nodes via service IPs [Suite:openshift/conformance/parallel]
openshift-tests [Area:Networking] services when using a plugin that isolates namespaces by default should prevent connections to pods in different namespaces on the same node via service IPs [Suite:openshift/conformance/parallel]
openshift-tests [Conformance][Area:Networking][Feature:Router] The HAProxy router should serve the correct routes when running with the haproxy config manager [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][templates] template-api TestTemplate [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][templates] template-api TestTemplateTransformationFromConfig [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][templates] templateinstance creation with invalid object reports error should report a failure on creation [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][templates] templateinstance cross-namespace test should create and delete objects across namespaces [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][templates] templateinstance impersonation tests should pass impersonation creation tests [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][templates] templateinstance impersonation tests should pass impersonation deletion tests [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][templates] templateinstance impersonation tests should pass impersonation update tests [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][templates] templateinstance object kinds test should create and delete objects from varying API groups [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][templates] templateinstance readiness test should report failed soon after an annotated objects has failed [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][templates] templateinstance readiness test should report ready soon after all annotated objects are ready [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][templates] templateinstance security tests should pass security tests [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][templates] templateservicebroker bind test should pass bind tests [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][templates] templateservicebroker end-to-end test should pass an end-to-end test [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Conformance][templates] templateservicebroker security test should pass security tests [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:APIServer] TestTLSDefaults [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds] forcePull should affect pulling builder images ForcePull test case execution custom [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds] forcePull should affect pulling builder images ForcePull test case execution docker [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds] forcePull should affect pulling builder images ForcePull test case execution s2i [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Builds][Conformance] s2i build with a root user image should create a root build and fail without a privileged SCC [Suite:openshift/conformance/parallel/minimal]
openshift-tests [Feature:OpenShiftAuthorization] authorization TestClusterReaderCoverage should succeed [Suite:openshift/conformance/parallel]
openshift-tests [Feature:Prometheus][Conformance] Prometheus when installed on the cluster when using openshift-sdn should be able to get the sdn ovs flows [Suite:openshift/conformance/parallel/minimal]
openshift-tests [k8s.io] GKE local SSD [Feature:GKELocalSSD] should write and read from node local SSD [Feature:GKELocalSSD] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] GKE node pools [Feature:GKENodePool] should create a cluster with multiple node pools [Feature:GKENodePool] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] Probing container should be restarted with a docker exec liveness probe with timeout [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] AppArmor load AppArmor profiles can disable an AppArmor profile, using unconfined [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] AppArmor load AppArmor profiles should enforce an AppArmor profile [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [k8s.io] [sig-node] crictl should be able to run crictl on the node [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:gce]
openshift-tests [sig-apps] ReplicaSet should serve a basic image on each replica with a private image [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-apps] ReplicationController should serve a basic image on each replica with a private image [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-auth] Metadata Concealment should run a check-metadata-concealment job to completion [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:gce]
openshift-tests [sig-auth] PodSecurityPolicy should allow pods under the privileged policy.PodSecurityPolicy [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-auth] PodSecurityPolicy should enforce the restricted policy.PodSecurityPolicy [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-auth] PodSecurityPolicy should forbid pod creation when no PSP is available [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Object from Stackdriver [Feature:CustomMetricsAutoscaling] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:gce]
openshift-tests [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Pod from Stackdriver [Feature:CustomMetricsAutoscaling] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:gce]
openshift-tests [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with Custom Metric of type Pod from Stackdriver with Prometheus [Feature:CustomMetricsAutoscaling] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:gce]
openshift-tests [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with External Metric with target average value from Stackdriver [Feature:CustomMetricsAutoscaling] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:gce]
openshift-tests [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale down with External Metric with target value from Stackdriver [Feature:CustomMetricsAutoscaling] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:gce]
openshift-tests [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale up with two External metrics from Stackdriver [Feature:CustomMetricsAutoscaling] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:gce]
openshift-tests [sig-autoscaling] [HPA] Horizontal pod autoscaling (scale resource: Custom Metrics from Stackdriver) should scale up with two metrics of type Pod from Stackdriver [Feature:CustomMetricsAutoscaling] [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:gce]
openshift-tests [sig-cli] Kubectl alpha client Kubectl run CronJob should create a CronJob [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] DNS should provide DNS for the cluster [Provider:GCE] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] Networking Granular Checks: Services should function for node-Service: http [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] Networking Granular Checks: Services should function for node-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] Networking Granular Checks: Services should function for pod-Service: http [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] Networking Granular Checks: Services should function for pod-Service: udp [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] Networking Granular Checks: Services should update endpoints: http [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-network] Networking Granular Checks: Services should update endpoints: udp [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-scheduling] Multi-AZ Cluster Volumes [sig-storage] should only be allowed to provision PDs in zones where nodes exist [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:gce]
openshift-tests [sig-scheduling] Multi-AZ Cluster Volumes [sig-storage] should schedule pods in the same zones as statically provisioned PVs [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-scheduling] Multi-AZ Clusters should spread the pods of a replication controller across zones [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-scheduling] Multi-AZ Clusters should spread the pods of a service across zones [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-service-catalog] [Feature:PodPreset] PodPreset should create a pod preset [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-service-catalog] [Feature:PodPreset] PodPreset should not modify the pod on conflict [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Dynamic Provisioning Invalid AWS KMS key should report an error and create no PV [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Flexvolumes should be mountable when attachable [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:gce]
openshift-tests [sig-storage] Flexvolumes should be mountable when non-attachable [Suite:openshift/conformance/parallel] [Suite:k8s] [Skipped:gce]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: aws] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: azure] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: cinder] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: emptydir] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gcepd] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: gluster] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPathSymlink] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: hostPath] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: block] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: blockfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link-bindmounted] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir-link] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: dir] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: local][LocalVolumeType: tmpfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: nfs] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (block volmode)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (block volmode)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand Verify if offline PVC expansion works [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)(allowExpansion)] volume-expand should resize volume when PVC is edited while pod is using it [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)] volume-expand should not allow expansion of pvcs without AllowVolumeExpansion property [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with mount options [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with pvc data source [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] provisioning should provision storage with snapshot data source [Feature:VolumeSnapshotDataSource] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Dynamic PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Inline-volume (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (block volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (block volmode)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should be able to unmount after the subpath directory is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directories when readOnly specified in the volumeSource [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing directory [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support existing single file [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support file as subpath [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support non-existent path [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly directory specified in the volumeMount [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (default fs)] subPath should support readOnly file specified in the volumeMount [LinuxOnly] [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (default fs)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (default fs)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (ext3)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (ext3)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (ext4)] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (ext4)] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (filesystem volmode)] volumeMode should not mount / map unused volumes in a pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should allow exec of files on the volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] In-tree Volumes [Driver: vSphere] [Testpattern: Pre-provisioned PV (ntfs)][sig-windows] volumes should store data [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Mounted volume expand Should verify mounted devices can be resized [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes GCEPD should test that deleting a PVC before the pod does not cause pod deletion to fail on PD detach [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes GCEPD should test that deleting the Namespace of a PVC and Pod causes the successful detach of Persistent Disk [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes GCEPD should test that deleting the PV before the pod does not cause pod deletion to fail on PD detach [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes [Feature:LabelSelector] [sig-storage] Selector-Label Volume Binding:vsphere should bind volume with claim for given label [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes [Feature:ReclaimPolicy] [sig-storage] persistentvolumereclaim:vsphere should delete persistent volume when reclaimPolicy set to delete and associated claim is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes [Feature:ReclaimPolicy] [sig-storage] persistentvolumereclaim:vsphere should not detach and unmount PV when associated pvc with delete as reclaimPolicy is deleted when it is in use by the pod [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes [Feature:ReclaimPolicy] [sig-storage] persistentvolumereclaim:vsphere should retain persistent volume when reclaimPolicy set to retain when associated claim is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: block] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: blockfswithformat] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: blockfswithoutformat] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-bindmounted] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-link-bindmounted] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir-link] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: dir] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes-local [Volume type: tmpfs] Set fsGroup for local volume should set different fsGroup for second pod if first pod is deleted [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes:vsphere should test that deleting a PVC before the pod does not cause pod deletion to fail on vsphere volume detach [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes:vsphere should test that deleting the Namespace of a PVC and Pod causes the successful detach of vsphere volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] PersistentVolumes:vsphere should test that deleting the PV before the pod does not cause pod deletion to fail on vspehre volume detach [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Pod Disks should be able to delete a non-existent PD without error [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with invalid capability name objectSpaceReserve is not honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with invalid diskStripes value is not honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with invalid hostFailuresToTolerate value is not honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with non-vsan datastore is not honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid diskStripes and objectSpaceReservation values and a VSAN datastore is honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid diskStripes and objectSpaceReservation values is honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid hostFailuresToTolerate and cacheReservation values is honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify VSAN storage capability with valid objectSpaceReservation and iopsLimit values is honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify an existing and compatible SPBM policy is honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify an if a SPBM policy and VSAN capabilities cannot be honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify clean up of stale dummy VM for dynamically provisioned pvc using SPBM policy [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify if a SPBM policy is not honored on a non-compatible datastore for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Storage Policy Based Volume Provisioning [Feature:vsphere] verify if a non-existing SPBM policy is not honored for dynamically provisioned pvc using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume Disk Format [Feature:vsphere] verify disk format type - eagerzeroedthick is honored for dynamically provisioned pv using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume Disk Format [Feature:vsphere] verify disk format type - thin is honored for dynamically provisioned pv using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume Disk Format [Feature:vsphere] verify disk format type - zeroedthick is honored for dynamically provisioned pv using storageclass [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume Disk Size [Feature:vsphere] verify dynamically provisioned pv has size rounded up correctly [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume FStype [Feature:vsphere] verify fstype - default value should be ext4 [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume FStype [Feature:vsphere] verify fstype - ext3 formatted volume [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume FStype [Feature:vsphere] verify invalid fstype [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume Operations Storm [Feature:vsphere] should create pod with many volumes and verify no attach call fails [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume Placement should create and delete pod with multiple volumes from different datastore [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume Placement should create and delete pod with multiple volumes from same datastore [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume Placement should create and delete pod with the same volume source attach/detach to different worker nodes [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume Placement should create and delete pod with the same volume source on the same worker node [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume Placement test back to back pod creation and deletion with different volume sources on the same worker node [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume Provisioning On Clustered Datastore [Feature:vsphere] verify dynamic provision with default parameter on clustered datastore [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume Provisioning On Clustered Datastore [Feature:vsphere] verify dynamic provision with spbm policy on clustered datastore [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume Provisioning On Clustered Datastore [Feature:vsphere] verify static provisioning on clustered datastore [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume Provisioning on Datastore [Feature:vsphere] verify dynamically provisioned pv using storageclass fails on an invalid datastore [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Volume limits should verify that all nodes have volume limits [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify PVC creation fails if no zones are specified in the storage class (No shared datastores exist among all the nodes) [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify PVC creation fails if only datastore is specified in the storage class (No shared datastores exist among all the nodes) [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify PVC creation fails if only storage policy is specified in the storage class (No shared datastores exist among all the nodes) [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify PVC creation fails if the availability zone specified in the storage class have no shared datastores under it. [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify PVC creation with an invalid VSAN capability along with a compatible zone combination specified in storage class fails [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify PVC creation with compatible policy and datastore without any zones specified in the storage class fails (No shared datastores exist among all the nodes) [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify PVC creation with incompatible datastore and zone combination specified in storage class fails [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify PVC creation with incompatible storage policy along with compatible zone and datastore combination specified in storage class fails [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify PVC creation with incompatible storagePolicy and zone combination specified in storage class fails [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify PVC creation with incompatible zone along with compatible storagePolicy and datastore combination specified in storage class fails [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify PVC creation with invalid zone specified in storage class fails [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify a PVC creation fails when multiple zones are specified in the storage class without shared datastores among the zones in waitForFirstConsumer binding mode [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify a pod fails to get scheduled when conflicting volume topology (allowedTopologies) and pod scheduling constraints(nodeSelector) are specified [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV with storage policy specified in storage class in waitForFirstConsumer binding mode [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV with storage policy specified in storage class in waitForFirstConsumer binding mode with allowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV with storage policy specified in storage class in waitForFirstConsumer binding mode with multiple allowedTopologies [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on a VSAN capability, datastore and compatible zone specified in storage class [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on allowed zones specified in storage class [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on multiple zones specified in storage class [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on multiple zones specified in the storage class. (No shared datastores exist among both zones) [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on the allowed zones and datastore specified in storage class [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on the allowed zones and storage policy specified in storage class [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify a pod is created and attached to a dynamically created PV, based on the allowed zones, datastore and storage policy specified in storage class [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify a pod is created on a non-Workspace zone and attached to a dynamically created PV, based on the allowed zones and storage policy specified in storage class [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify dynamically created pv with allowed zones specified in storage class, shows the right zone information on its labels [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] Zone Support Verify dynamically created pv with multiple zones specified in the storage class, shows both the zones on its labels [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] vcp at scale [Feature:vsphere] vsphere scale tests [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] vcp-performance [Feature:vsphere] vcp performance tests [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] vsphere cloud provider stress [Feature:vsphere] vsphere stress tests [Suite:openshift/conformance/parallel] [Suite:k8s]
openshift-tests [sig-storage] vsphere statefulset vsphere statefulset testing [Suite:openshift/conformance/parallel] [Suite:k8s]