From c11041ad992434de26fdb459616237ac61d0d3e4 Mon Sep 17 00:00:00 2001 From: Lee Verberne Date: Wed, 30 Jun 2021 18:12:30 +0200 Subject: [PATCH] Remove ShareProcessNamespace tags from e2e tests This feature became GA in 1.17 and feature gate removed in 1.19. It should run unconditionally. --- test/e2e_node/security_context_test.go | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/test/e2e_node/security_context_test.go b/test/e2e_node/security_context_test.go index 5e358f3e5b6..5bc0184e450 100644 --- a/test/e2e_node/security_context_test.go +++ b/test/e2e_node/security_context_test.go @@ -22,7 +22,7 @@ import ( "os/exec" "strings" - "k8s.io/api/core/v1" + v1 "k8s.io/api/core/v1" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/apimachinery/pkg/util/sets" "k8s.io/apimachinery/pkg/util/uuid" @@ -41,7 +41,7 @@ var _ = SIGDescribe("Security Context", func() { podClient = f.PodClient() }) - ginkgo.Context("when pod PID namespace is configurable [Feature:ShareProcessNamespace][NodeAlphaFeature:ShareProcessNamespace]", func() { + ginkgo.Context("Container PID namespace sharing", func() { ginkgo.It("containers in pods using isolated PID namespaces should all receive PID 1", func() { ginkgo.By("Create a pod with isolated PID namespaces.") f.PodClient().CreateSync(&v1.Pod{ @@ -71,7 +71,7 @@ var _ = SIGDescribe("Security Context", func() { } }) - ginkgo.It("processes in containers sharing a pod namespace should be able to see each other [Alpha]", func() { + ginkgo.It("processes in containers sharing a pod namespace should be able to see each other", func() { ginkgo.By("Check whether shared PID namespace is supported.") isEnabled, err := isSharedPIDNamespaceSupported() framework.ExpectNoError(err)