diff --git a/test/conformance/testdata/conformance.txt b/test/conformance/testdata/conformance.txt index bbcbae6e497..d8e87ce3d15 100755 --- a/test/conformance/testdata/conformance.txt +++ b/test/conformance/testdata/conformance.txt @@ -137,6 +137,7 @@ test/e2e/common/secrets_volume.go: "should be consumable from pods in volume wit test/e2e/common/secrets_volume.go: "should be consumable from pods in volume as non-root with defaultMode and fsGroup set" test/e2e/common/secrets_volume.go: "should be consumable from pods in volume with mappings" test/e2e/common/secrets_volume.go: "should be consumable from pods in volume with mappings and Item Mode set" +test/e2e/common/secrets_volume.go: "should be able to mount in a volume regardless of a different secret existing with same name in different namespace" test/e2e/common/secrets_volume.go: "should be consumable in multiple volumes in a pod" test/e2e/common/secrets_volume.go: "optional updates should be reflected in volume" test/e2e/kubectl/kubectl.go: "should create and stop a replication controller" diff --git a/test/e2e/common/secrets_volume.go b/test/e2e/common/secrets_volume.go index 4f4577b9d5c..f8b892e9fd9 100644 --- a/test/e2e/common/secrets_volume.go +++ b/test/e2e/common/secrets_volume.go @@ -83,7 +83,12 @@ var _ = Describe("[sig-storage] Secrets", func() { doSecretE2EWithMapping(f, &mode) }) - It("should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance]", func() { + /* + Release : v1.12 + Testname: Secrets Volume, volume mode default, secret with same name in different namespace + Description: Create a secret with same name in two namespaces. Create a Pod with secret volume source configured into the container. Pod MUST be able to read the secrets from the mounted volume from the container runtime and only secrets which are associated with namespace where pod is created. The file mode of the secret MUST be -rw-r--r-- by default. + */ + framework.ConformanceIt("should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance]", func() { var ( namespace2 *v1.Namespace err error