diff --git a/test/e2e/common/configmap_volume.go b/test/e2e/common/configmap_volume.go index d0c09996df6..4a6e170c866 100644 --- a/test/e2e/common/configmap_volume.go +++ b/test/e2e/common/configmap_volume.go @@ -51,7 +51,7 @@ var _ = Describe("[sig-storage] ConfigMap", func() { doConfigMapE2EWithoutMappings(f, 0, 0, &defaultMode) }) - It("should be consumable from pods in volume as non-root with defaultMode and fsGroup set", func() { + It("should be consumable from pods in volume as non-root with defaultMode and fsGroup set [NodeFeature:FSGroup]", func() { defaultMode := int32(0440) /* setting fsGroup sets mode to at least 440 */ doConfigMapE2EWithoutMappings(f, 1000, 1001, &defaultMode) }) @@ -65,7 +65,7 @@ var _ = Describe("[sig-storage] ConfigMap", func() { doConfigMapE2EWithoutMappings(f, 1000, 0, nil) }) - It("should be consumable from pods in volume as non-root with FSGroup", func() { + It("should be consumable from pods in volume as non-root with FSGroup [NodeFeature:FSGroup]", func() { doConfigMapE2EWithoutMappings(f, 1000, 1001, nil) }) @@ -97,7 +97,7 @@ var _ = Describe("[sig-storage] ConfigMap", func() { doConfigMapE2EWithMappings(f, 1000, 0, nil) }) - It("should be consumable from pods in volume with mappings as non-root with FSGroup", func() { + It("should be consumable from pods in volume with mappings as non-root with FSGroup [NodeFeature:FSGroup]", func() { doConfigMapE2EWithMappings(f, 1000, 1001, nil) }) @@ -184,7 +184,7 @@ var _ = Describe("[sig-storage] ConfigMap", func() { Eventually(pollLogs, podLogTimeout, framework.Poll).Should(ContainSubstring("value-2")) }) - It("binary data should be reflected in volume ", func() { + It("binary data should be reflected in volume [NodeConformance]", func() { podLogTimeout := framework.GetPodSecretUpdateTimeout(f.ClientSet) containerTimeoutArg := fmt.Sprintf("--retry_time=%v", int(podLogTimeout.Seconds())) diff --git a/test/e2e/common/downward_api.go b/test/e2e/common/downward_api.go index 8c3d0618b32..0541dc394ce 100644 --- a/test/e2e/common/downward_api.go +++ b/test/e2e/common/downward_api.go @@ -240,7 +240,7 @@ var _ = Describe("[sig-api-machinery] Downward API", func() { }) }) -var _ = framework.KubeDescribe("Downward API [Serial] [Disruptive]", func() { +var _ = framework.KubeDescribe("Downward API [Serial] [Disruptive] [NodeFeature:EphemeralStorage]", func() { f := framework.NewDefaultFramework("downward-api") Context("Downward API tests for local ephemeral storage", func() { diff --git a/test/e2e/common/downwardapi_volume.go b/test/e2e/common/downwardapi_volume.go index a10eb941e74..7914a1970ba 100644 --- a/test/e2e/common/downwardapi_volume.go +++ b/test/e2e/common/downwardapi_volume.go @@ -83,7 +83,7 @@ var _ = Describe("[sig-storage] Downward API volume", func() { }) }) - It("should provide podname as non-root with fsgroup", func() { + It("should provide podname as non-root with fsgroup [NodeFeature:FSGroup]", func() { podName := "metadata-volume-" + string(uuid.NewUUID()) uid := int64(1001) gid := int64(1234) @@ -97,7 +97,7 @@ var _ = Describe("[sig-storage] Downward API volume", func() { }) }) - It("should provide podname as non-root with fsgroup and defaultMode", func() { + It("should provide podname as non-root with fsgroup and defaultMode [NodeFeature:FSGroup]", func() { podName := "metadata-volume-" + string(uuid.NewUUID()) uid := int64(1001) gid := int64(1234) diff --git a/test/e2e/common/empty_dir.go b/test/e2e/common/empty_dir.go index d428e9bbe0e..a587f35f43d 100644 --- a/test/e2e/common/empty_dir.go +++ b/test/e2e/common/empty_dir.go @@ -40,7 +40,7 @@ var ( var _ = Describe("[sig-storage] EmptyDir volumes", func() { f := framework.NewDefaultFramework("emptydir") - Context("when FSGroup is specified", func() { + Context("when FSGroup is specified [NodeFeature:FSGroup]", func() { It("new files should be created with FSGroup ownership when container is root", func() { doTestSetgidFSGroup(f, testImageRootUid, v1.StorageMediumMemory) }) diff --git a/test/e2e/common/host_path.go b/test/e2e/common/host_path.go index 478b28c387a..dd21c953855 100644 --- a/test/e2e/common/host_path.go +++ b/test/e2e/common/host_path.go @@ -61,7 +61,7 @@ var _ = Describe("[sig-storage] HostPath", func() { }) // This test requires mounting a folder into a container with write privileges. - It("should support r/w", func() { + It("should support r/w [NodeConformance]", func() { filePath := path.Join(volumePath, "test-file") retryDuration := 180 source := &v1.HostPathVolumeSource{ @@ -85,7 +85,7 @@ var _ = Describe("[sig-storage] HostPath", func() { }) }) - It("should support subPath", func() { + It("should support subPath [NodeConformance]", func() { subPath := "sub-path" fileName := "test-file" retryDuration := 180 diff --git a/test/e2e/common/init_container.go b/test/e2e/common/init_container.go index 0e82dfea385..ad32cc8414a 100644 --- a/test/e2e/common/init_container.go +++ b/test/e2e/common/init_container.go @@ -35,7 +35,7 @@ import ( . "github.com/onsi/gomega" ) -var _ = framework.KubeDescribe("InitContainer", func() { +var _ = framework.KubeDescribe("InitContainer [NodeConformance]", func() { f := framework.NewDefaultFramework("init-container") var podClient *framework.PodClient BeforeEach(func() { diff --git a/test/e2e/common/pods.go b/test/e2e/common/pods.go index 72e24744820..2fa6fbc4204 100644 --- a/test/e2e/common/pods.go +++ b/test/e2e/common/pods.go @@ -467,7 +467,7 @@ var _ = framework.KubeDescribe("Pods", func() { }, maxRetries, "Container should have service environment variables set") }) - It("should support remote command execution over websockets", func() { + It("should support remote command execution over websockets [NodeConformance]", func() { config, err := framework.LoadConfig() Expect(err).NotTo(HaveOccurred(), "unable to get base config") @@ -543,7 +543,7 @@ var _ = framework.KubeDescribe("Pods", func() { }, time.Minute, 10*time.Second).Should(BeNil()) }) - It("should support retrieving logs from the container over websockets", func() { + It("should support retrieving logs from the container over websockets [NodeConformance]", func() { config, err := framework.LoadConfig() Expect(err).NotTo(HaveOccurred(), "unable to get base config") @@ -600,7 +600,7 @@ var _ = framework.KubeDescribe("Pods", func() { } }) - It("should have their auto-restart back-off timer reset on image update [Slow]", func() { + It("should have their auto-restart back-off timer reset on image update [Slow][NodeConformance]", func() { podName := "pod-back-off-image" containerName := "back-off" pod := &v1.Pod{ @@ -641,7 +641,7 @@ var _ = framework.KubeDescribe("Pods", func() { }) // Slow issue #19027 (20 mins) - It("should cap back-off at MaxContainerBackOff [Slow]", func() { + It("should cap back-off at MaxContainerBackOff [Slow][NodeConformance]", func() { podName := "back-off-cap" containerName := "back-off-cap" pod := &v1.Pod{ diff --git a/test/e2e/common/privileged.go b/test/e2e/common/privileged.go index a56b0627350..76757a90a97 100644 --- a/test/e2e/common/privileged.go +++ b/test/e2e/common/privileged.go @@ -36,7 +36,7 @@ type PrivilegedPodTestConfig struct { pod *v1.Pod } -var _ = framework.KubeDescribe("PrivilegedPod", func() { +var _ = framework.KubeDescribe("PrivilegedPod [NodeConformance]", func() { config := &PrivilegedPodTestConfig{ f: framework.NewDefaultFramework("e2e-privileged-pod"), privilegedPod: "privileged-pod", diff --git a/test/e2e/common/projected.go b/test/e2e/common/projected.go index 641132a15bf..6a3e735b5e8 100644 --- a/test/e2e/common/projected.go +++ b/test/e2e/common/projected.go @@ -84,7 +84,7 @@ var _ = Describe("[sig-storage] Projected", func() { doProjectedSecretE2EWithMapping(f, &mode) }) - It("should be able to mount in a volume regardless of a different secret existing with same name in different namespace", func() { + It("should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance]", func() { var ( namespace2 *v1.Namespace err error @@ -419,7 +419,7 @@ var _ = Describe("[sig-storage] Projected", func() { doProjectedConfigMapE2EWithoutMappings(f, 0, 0, &defaultMode) }) - It("should be consumable from pods in volume as non-root with defaultMode and fsGroup set", func() { + It("should be consumable from pods in volume as non-root with defaultMode and fsGroup set [NodeFeature:FSGroup]", func() { defaultMode := int32(0440) /* setting fsGroup sets mode to at least 440 */ doProjectedConfigMapE2EWithoutMappings(f, 1000, 1001, &defaultMode) }) @@ -433,7 +433,7 @@ var _ = Describe("[sig-storage] Projected", func() { doProjectedConfigMapE2EWithoutMappings(f, 1000, 0, nil) }) - It("should be consumable from pods in volume as non-root with FSGroup", func() { + It("should be consumable from pods in volume as non-root with FSGroup [NodeFeature:FSGroup]", func() { doProjectedConfigMapE2EWithoutMappings(f, 1000, 1001, nil) }) @@ -466,7 +466,7 @@ var _ = Describe("[sig-storage] Projected", func() { doProjectedConfigMapE2EWithMappings(f, 1000, 0, nil) }) - It("should be consumable from pods in volume with mappings as non-root with FSGroup", func() { + It("should be consumable from pods in volume with mappings as non-root with FSGroup [NodeFeature:FSGroup]", func() { doProjectedConfigMapE2EWithMappings(f, 1000, 1001, nil) }) @@ -904,7 +904,7 @@ var _ = Describe("[sig-storage] Projected", func() { }) }) - It("should provide podname as non-root with fsgroup", func() { + It("should provide podname as non-root with fsgroup [NodeFeature:FSGroup]", func() { podName := "metadata-volume-" + string(uuid.NewUUID()) uid := int64(1001) gid := int64(1234) @@ -918,7 +918,7 @@ var _ = Describe("[sig-storage] Projected", func() { }) }) - It("should provide podname as non-root with fsgroup and defaultMode", func() { + It("should provide podname as non-root with fsgroup and defaultMode [NodeFeature:FSGroup]", func() { podName := "metadata-volume-" + string(uuid.NewUUID()) uid := int64(1001) gid := int64(1234) diff --git a/test/e2e/common/secrets_volume.go b/test/e2e/common/secrets_volume.go index e9f7cfe59fd..a65c6e9dbc9 100644 --- a/test/e2e/common/secrets_volume.go +++ b/test/e2e/common/secrets_volume.go @@ -83,7 +83,7 @@ var _ = Describe("[sig-storage] Secrets", func() { doSecretE2EWithMapping(f, &mode) }) - It("should be able to mount in a volume regardless of a different secret existing with same name in different namespace", func() { + It("should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance]", func() { var ( namespace2 *v1.Namespace err error diff --git a/test/e2e/common/sysctl.go b/test/e2e/common/sysctl.go index aa05d109ad8..5f07371d02e 100644 --- a/test/e2e/common/sysctl.go +++ b/test/e2e/common/sysctl.go @@ -28,7 +28,7 @@ import ( . "github.com/onsi/gomega" ) -var _ = framework.KubeDescribe("Sysctls", func() { +var _ = framework.KubeDescribe("Sysctls [NodeFeature:Sysctls]", func() { f := framework.NewDefaultFramework("sysctl") var podClient *framework.PodClient