-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathjunit.sorted
277 lines (277 loc) · 32.6 KB
/
junit.sorted
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
"[k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart exec hook properly [NodeConformance] [Conformance]"
"[k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute poststart http hook properly [NodeConformance] [Conformance]"
"[k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop exec hook properly [NodeConformance] [Conformance]"
"[k8s.io] Container Lifecycle Hook when create a pod with lifecycle hook should execute prestop http hook properly [NodeConformance] [Conformance]"
"[k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] as empty when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]"
"[k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] from file when pod succeeds and TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]"
"[k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] from log output if TerminationMessagePolicy FallbackToLogsOnError is set [NodeConformance] [Conformance]"
"[k8s.io] Container Runtime blackbox test on terminated container should report termination message [LinuxOnly] if TerminationMessagePath is set as non-root user and at a non-default path [NodeConformance] [Conformance]"
"[k8s.io] Container Runtime blackbox test when starting a container that exits should run with the expected status [NodeConformance] [Conformance]"
"[k8s.io] Docker Containers should be able to override the image's default arguments (docker cmd) [NodeConformance] [Conformance]"
"[k8s.io] Docker Containers should be able to override the image's default command (docker entrypoint) [NodeConformance] [Conformance]"
"[k8s.io] Docker Containers should be able to override the image's default command and arguments [NodeConformance] [Conformance]"
"[k8s.io] Docker Containers should use the image defaults if command and args are blank [NodeConformance] [Conformance]"
"[k8s.io] InitContainer [NodeConformance] should invoke init containers on a RestartAlways pod [Conformance]"
"[k8s.io] InitContainer [NodeConformance] should invoke init containers on a RestartNever pod [Conformance]"
"[k8s.io] InitContainer [NodeConformance] should not start app containers and fail the pod if init containers fail on a RestartNever pod [Conformance]"
"[k8s.io] InitContainer [NodeConformance] should not start app containers if init containers fail on a RestartAlways pod [Conformance]"
"[k8s.io] Kubelet when scheduling a busybox Pod with hostAliases should write entries to /etc/hosts [LinuxOnly] [NodeConformance] [Conformance]"
"[k8s.io] Kubelet when scheduling a busybox command in a pod should print the output to logs [NodeConformance] [Conformance]"
"[k8s.io] Kubelet when scheduling a busybox command that always fails in a pod should be possible to delete [NodeConformance] [Conformance]"
"[k8s.io] Kubelet when scheduling a busybox command that always fails in a pod should have an terminated reason [NodeConformance] [Conformance]"
"[k8s.io] Kubelet when scheduling a read only busybox container should not write to root filesystem [LinuxOnly] [NodeConformance] [Conformance]"
"[k8s.io] KubeletManagedEtcHosts should test kubelet managed /etc/hosts file [LinuxOnly] [NodeConformance] [Conformance]"
"[k8s.io] Lease lease API should be available [Conformance]"
"[k8s.io] Pods should allow activeDeadlineSeconds to be updated [NodeConformance] [Conformance]"
"[k8s.io] Pods should be submitted and removed [NodeConformance] [Conformance]"
"[k8s.io] Pods should be updated [NodeConformance] [Conformance]"
"[k8s.io] Pods should contain environment variables for services [NodeConformance] [Conformance]"
"[k8s.io] Pods should get a host IP [NodeConformance] [Conformance]"
"[k8s.io] Pods should support remote command execution over websockets [NodeConformance] [Conformance]"
"[k8s.io] Pods should support retrieving logs from the container over websockets [NodeConformance] [Conformance]"
"[k8s.io] Probing container should *not* be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]"
"[k8s.io] Probing container should *not* be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance] [Conformance]"
"[k8s.io] Probing container should *not* be restarted with a tcp:8080 liveness probe [NodeConformance] [Conformance]"
"[k8s.io] Probing container should be restarted with a /healthz http liveness probe [NodeConformance] [Conformance]"
"[k8s.io] Probing container should be restarted with a exec \"cat /tmp/health\" liveness probe [NodeConformance] [Conformance]"
"[k8s.io] Probing container should have monotonically increasing restart count [NodeConformance] [Conformance]"
"[k8s.io] Probing container with readiness probe should not be ready before initial delay and never restart [NodeConformance] [Conformance]"
"[k8s.io] Probing container with readiness probe that fails should never be ready and never restart [NodeConformance] [Conformance]"
"[k8s.io] Security Context When creating a container with runAsUser should run the container with uid 65534 [LinuxOnly] [NodeConformance] [Conformance]"
"[k8s.io] Security Context When creating a pod with privileged should run the container as unprivileged when false [LinuxOnly] [NodeConformance] [Conformance]"
"[k8s.io] Security Context When creating a pod with readOnlyRootFilesystem should run the container with writable rootfs when readOnlyRootFilesystem=false [NodeConformance] [Conformance]"
"[k8s.io] Security Context when creating containers with AllowPrivilegeEscalation should not allow privilege escalation when false [LinuxOnly] [NodeConformance] [Conformance]"
"[k8s.io] Variable Expansion should allow composing env vars into new env vars [NodeConformance] [Conformance]"
"[k8s.io] Variable Expansion should allow substituting values in a container's args [NodeConformance] [Conformance]"
"[k8s.io] Variable Expansion should allow substituting values in a container's command [NodeConformance] [Conformance]"
"[k8s.io] [sig-node] Events should be sent by kubelets and the scheduler about pods scheduling and running [Conformance]"
"[k8s.io] [sig-node] NoExecuteTaintManager Multiple Pods [Serial] evicts pods with minTolerationSeconds [Disruptive] [Conformance]"
"[k8s.io] [sig-node] NoExecuteTaintManager Single Pod [Serial] removing taint cancels eviction [Disruptive] [Conformance]"
"[k8s.io] [sig-node] Pods Extended [k8s.io] Pods Set QOS Class should be set on Pods with matching resource requests and limits for memory and cpu [Conformance]"
"[k8s.io] [sig-node] PreStop should call prestop when killing a pod [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing mutating webhooks should work [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] listing validating webhooks should work [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a mutating webhook should work [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] patching/updating a validating webhook should work [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny attaching pod [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny custom resource creation, update and deletion [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should be able to deny pod and configmap creation [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should deny crd creation [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should honor timeout [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should include webhook resources in discovery documents [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate configmap [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with different stored version [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate custom resource with pruning [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should mutate pod and apply defaults after mutation [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should not be able to mutate or prevent deletion of webhook configuration objects [Conformance]"
"[sig-api-machinery] AdmissionWebhook [Privileged:ClusterAdmin] should unconditionally reject operations on fail closed webhook [Conformance]"
"[sig-api-machinery] Aggregator Should be able to support the 1.17 Sample API Server using the current Aggregator [Conformance]"
"[sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert a non homogeneous list of CRs [Conformance]"
"[sig-api-machinery] CustomResourceConversionWebhook [Privileged:ClusterAdmin] should be able to convert from CR v1 to CR v2 [Conformance]"
"[sig-api-machinery] CustomResourceDefinition Watch [Privileged:ClusterAdmin] CustomResourceDefinition Watch watch on custom resource definition objects [Conformance]"
"[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition creating/deleting custom resource definition objects works [Conformance]"
"[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition getting/updating/patching custom resource definition status sub-resource works [Conformance]"
"[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] Simple CustomResourceDefinition listing custom resource definition objects works [Conformance]"
"[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] custom resource defaulting for requests and from storage works [Conformance]"
"[sig-api-machinery] CustomResourceDefinition resources [Privileged:ClusterAdmin] should include custom resource definition resources in discovery documents [Conformance]"
"[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] removes definition from spec when one version gets changed to not be served [Conformance]"
"[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] updates the published spec when one version gets renamed [Conformance]"
"[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields at the schema root [Conformance]"
"[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD preserving unknown fields in an embedded object [Conformance]"
"[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD with validation schema [Conformance]"
"[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for CRD without validation schema [Conformance]"
"[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of different groups [Conformance]"
"[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group and version but different kinds [Conformance]"
"[sig-api-machinery] CustomResourcePublishOpenAPI [Privileged:ClusterAdmin] works for multiple CRDs of same group but different versions [Conformance]"
"[sig-api-machinery] Garbage collector should delete RS created by deployment when not orphaning [Conformance]"
"[sig-api-machinery] Garbage collector should delete pods created by rc when not orphaning [Conformance]"
"[sig-api-machinery] Garbage collector should keep the rc around until all its pods are deleted if the deleteOptions says so [Conformance]"
"[sig-api-machinery] Garbage collector should not be blocked by dependency circle [Conformance]"
"[sig-api-machinery] Garbage collector should not delete dependents that have both valid owner and owner that's waiting for dependents to be deleted [Conformance]"
"[sig-api-machinery] Garbage collector should orphan RS created by deployment when deleteOptions.PropagationPolicy is Orphan [Conformance]"
"[sig-api-machinery] Garbage collector should orphan pods created by rc if delete options say so [Conformance]"
"[sig-api-machinery] Namespaces [Serial] should ensure that all pods are removed when a namespace is deleted [Conformance]"
"[sig-api-machinery] Namespaces [Serial] should ensure that all services are removed when a namespace is deleted [Conformance]"
"[sig-api-machinery] Namespaces [Serial] should patch a Namespace [Conformance]"
"[sig-api-machinery] ResourceQuota should be able to update and delete ResourceQuota. [Conformance]"
"[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a configMap. [Conformance]"
"[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a pod. [Conformance]"
"[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replica set. [Conformance]"
"[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a replication controller. [Conformance]"
"[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a secret. [Conformance]"
"[sig-api-machinery] ResourceQuota should create a ResourceQuota and capture the life of a service. [Conformance]"
"[sig-api-machinery] ResourceQuota should create a ResourceQuota and ensure its status is promptly calculated. [Conformance]"
"[sig-api-machinery] ResourceQuota should verify ResourceQuota with best effort scope. [Conformance]"
"[sig-api-machinery] ResourceQuota should verify ResourceQuota with terminating scopes. [Conformance]"
"[sig-api-machinery] Secrets should be consumable from pods in env vars [NodeConformance] [Conformance]"
"[sig-api-machinery] Secrets should be consumable via the environment [NodeConformance] [Conformance]"
"[sig-api-machinery] Secrets should fail to create secret due to empty secret key [Conformance]"
"[sig-api-machinery] Secrets should patch a secret [Conformance]"
"[sig-api-machinery] Servers with support for Table transformation should return a 406 for a backend which does not implement metadata [Conformance]"
"[sig-api-machinery] Watchers should be able to restart watching from the last resource version observed by the previous watch [Conformance]"
"[sig-api-machinery] Watchers should be able to start watching from a specific resource version [Conformance]"
"[sig-api-machinery] Watchers should observe add, update, and delete watch notifications on configmaps [Conformance]"
"[sig-api-machinery] Watchers should observe an object deletion if it stops meeting the requirements of the selector [Conformance]"
"[sig-api-machinery] Watchers should receive events on concurrent watches in same order [Conformance]"
"[sig-apps] Daemon set [Serial] should retry creating failed daemon pods [Conformance]"
"[sig-apps] Daemon set [Serial] should rollback without unnecessary restarts [Conformance]"
"[sig-apps] Daemon set [Serial] should run and stop complex daemon [Conformance]"
"[sig-apps] Daemon set [Serial] should run and stop simple daemon [Conformance]"
"[sig-apps] Daemon set [Serial] should update pod when spec was updated and update strategy is RollingUpdate [Conformance]"
"[sig-apps] Deployment RecreateDeployment should delete old pods and create new ones [Conformance]"
"[sig-apps] Deployment RollingUpdateDeployment should delete old pods and create new ones [Conformance]"
"[sig-apps] Deployment deployment should delete old replica sets [Conformance]"
"[sig-apps] Deployment deployment should support proportional scaling [Conformance]"
"[sig-apps] Deployment deployment should support rollover [Conformance]"
"[sig-apps] Job should adopt matching orphans and release non-matching pods [Conformance]"
"[sig-apps] Job should delete a job [Conformance]"
"[sig-apps] Job should run a job to completion when tasks sometimes fail and are locally restarted [Conformance]"
"[sig-apps] ReplicaSet should adopt matching pods on creation and release no longer matching pods [Conformance]"
"[sig-apps] ReplicaSet should serve a basic image on each replica with a public image [Conformance]"
"[sig-apps] ReplicationController should adopt matching pods on creation [Conformance]"
"[sig-apps] ReplicationController should release no longer matching pods [Conformance]"
"[sig-apps] ReplicationController should serve a basic image on each replica with a public image [Conformance]"
"[sig-apps] ReplicationController should surface a failure condition on a common issue like exceeded quota [Conformance]"
"[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] Burst scaling should run to completion even with unhealthy pods [Slow] [Conformance]"
"[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] Scaling should happen in predictable order and halt if any stateful pod is unhealthy [Slow] [Conformance]"
"[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] Should recreate evicted statefulset [Conformance]"
"[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should have a working scale subresource [Conformance]"
"[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform canary updates and phased rolling updates of template modifications [Conformance]"
"[sig-apps] StatefulSet [k8s.io] Basic StatefulSet functionality [StatefulSetBasic] should perform rolling updates and roll backs of template modifications [Conformance]"
"[sig-auth] ServiceAccounts should allow opting out of API token automount [Conformance]"
"[sig-auth] ServiceAccounts should mount an API token into pods [Conformance]"
"[sig-cli] Kubectl client Guestbook application should create and stop a working application [Conformance]"
"[sig-cli] Kubectl client Kubectl api-versions should check if v1 is in available api versions [Conformance]"
"[sig-cli] Kubectl client Kubectl cluster-info should check if Kubernetes master services is included in cluster-info [Conformance]"
"[sig-cli] Kubectl client Kubectl describe should check if kubectl describe prints relevant information for rc and pods [Conformance]"
"[sig-cli] Kubectl client Kubectl expose should create services for rc [Conformance]"
"[sig-cli] Kubectl client Kubectl label should update the label on a resource [Conformance]"
"[sig-cli] Kubectl client Kubectl logs should be able to retrieve and filter logs [Conformance]"
"[sig-cli] Kubectl client Kubectl patch should add annotations for pods in rc [Conformance]"
"[sig-cli] Kubectl client Kubectl replace should update a single-container pod's image [Conformance]"
"[sig-cli] Kubectl client Kubectl run pod should create a pod from an image when restart is Never [Conformance]"
"[sig-cli] Kubectl client Kubectl version should check is all data is printed [Conformance]"
"[sig-cli] Kubectl client Proxy server should support --unix-socket=/path [Conformance]"
"[sig-cli] Kubectl client Proxy server should support proxy with --port 0 [Conformance]"
"[sig-cli] Kubectl client Update Demo should create and stop a replication controller [Conformance]"
"[sig-cli] Kubectl client Update Demo should scale a replication controller [Conformance]"
"[sig-network] DNS should provide /etc/hosts entries for the cluster [LinuxOnly] [Conformance]"
"[sig-network] DNS should provide DNS for ExternalName services [Conformance]"
"[sig-network] DNS should provide DNS for pods for Hostname [LinuxOnly] [Conformance]"
"[sig-network] DNS should provide DNS for pods for Subdomain [Conformance]"
"[sig-network] DNS should provide DNS for services [Conformance]"
"[sig-network] DNS should provide DNS for the cluster [Conformance]"
"[sig-network] DNS should resolve DNS of partial qualified names for services [LinuxOnly] [Conformance]"
"[sig-network] DNS should support configurable pod DNS nameservers [Conformance]"
"[sig-network] Networking Granular Checks: Pods should function for intra-pod communication: http [NodeConformance] [Conformance]"
"[sig-network] Networking Granular Checks: Pods should function for intra-pod communication: udp [NodeConformance] [Conformance]"
"[sig-network] Networking Granular Checks: Pods should function for node-pod communication: http [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-network] Networking Granular Checks: Pods should function for node-pod communication: udp [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-network] Proxy version v1 should proxy logs on node using proxy subresource [Conformance]"
"[sig-network] Proxy version v1 should proxy logs on node with explicit kubelet port using proxy subresource [Conformance]"
"[sig-network] Proxy version v1 should proxy through a service and a pod [Conformance]"
"[sig-network] Service endpoints latency should not be very high [Conformance]"
"[sig-network] Services should be able to change the type from ClusterIP to ExternalName [Conformance]"
"[sig-network] Services should be able to change the type from ExternalName to ClusterIP [Conformance]"
"[sig-network] Services should be able to change the type from ExternalName to NodePort [Conformance]"
"[sig-network] Services should be able to change the type from NodePort to ExternalName [Conformance]"
"[sig-network] Services should be able to create a functioning NodePort service [Conformance]"
"[sig-network] Services should find a service from listing all namespaces [Conformance]"
"[sig-network] Services should provide secure master service [Conformance]"
"[sig-network] Services should serve a basic endpoint from pods [Conformance]"
"[sig-network] Services should serve multiport endpoints from pods [Conformance]"
"[sig-node] ConfigMap should be consumable via environment variable [NodeConformance] [Conformance]"
"[sig-node] ConfigMap should be consumable via the environment [NodeConformance] [Conformance]"
"[sig-node] ConfigMap should fail to create ConfigMap with empty key [Conformance]"
"[sig-node] Downward API should provide container's limits.cpu/memory and requests.cpu/memory as env vars [NodeConformance] [Conformance]"
"[sig-node] Downward API should provide default limits.cpu/memory from node allocatable [NodeConformance] [Conformance]"
"[sig-node] Downward API should provide host IP as an env var [NodeConformance] [Conformance]"
"[sig-node] Downward API should provide pod UID as env vars [NodeConformance] [Conformance]"
"[sig-node] Downward API should provide pod name, namespace and IP address as env vars [NodeConformance] [Conformance]"
"[sig-scheduling] LimitRange should create a LimitRange with defaults and ensure pod has those defaults applied. [Conformance]"
"[sig-scheduling] SchedulerPredicates [Serial] validates resource limits of pods that are allowed to run [Conformance]"
"[sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if matching [Conformance]"
"[sig-scheduling] SchedulerPredicates [Serial] validates that NodeSelector is respected if not matching [Conformance]"
"[sig-scheduling] SchedulerPredicates [Serial] validates that there exists conflict between pods with same hostPort and protocol but one using 0.0.0.0 hostIP [Conformance]"
"[sig-scheduling] SchedulerPredicates [Serial] validates that there is no conflict between pods with same hostPort but different hostIP and protocol [Conformance]"
"[sig-storage] ConfigMap binary data should be reflected in volume [NodeConformance] [Conformance]"
"[sig-storage] ConfigMap optional updates should be reflected in volume [NodeConformance] [Conformance]"
"[sig-storage] ConfigMap should be consumable from pods in volume [NodeConformance] [Conformance]"
"[sig-storage] ConfigMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance]"
"[sig-storage] ConfigMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] ConfigMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance]"
"[sig-storage] ConfigMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] ConfigMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance]"
"[sig-storage] ConfigMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]"
"[sig-storage] ConfigMap updates should be reflected in volume [NodeConformance] [Conformance]"
"[sig-storage] Downward API volume should provide container's cpu limit [NodeConformance] [Conformance]"
"[sig-storage] Downward API volume should provide container's cpu request [NodeConformance] [Conformance]"
"[sig-storage] Downward API volume should provide container's memory limit [NodeConformance] [Conformance]"
"[sig-storage] Downward API volume should provide container's memory request [NodeConformance] [Conformance]"
"[sig-storage] Downward API volume should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]"
"[sig-storage] Downward API volume should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]"
"[sig-storage] Downward API volume should provide podname only [NodeConformance] [Conformance]"
"[sig-storage] Downward API volume should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] Downward API volume should set mode on item file [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] Downward API volume should update annotations on modification [NodeConformance] [Conformance]"
"[sig-storage] Downward API volume should update labels on modification [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir volumes pod should support shared volumes between containers [Conformance]"
"[sig-storage] EmptyDir volumes should support (non-root,0644,default) [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir volumes should support (non-root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir volumes should support (non-root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir volumes should support (non-root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir volumes should support (non-root,0777,default) [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir volumes should support (non-root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir volumes should support (root,0644,default) [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir volumes should support (root,0644,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir volumes should support (root,0666,default) [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir volumes should support (root,0666,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir volumes should support (root,0777,default) [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir volumes should support (root,0777,tmpfs) [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir volumes volume on default medium should have the correct mode [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir volumes volume on tmpfs should have the correct mode [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] EmptyDir wrapper volumes should not cause race condition when used for configmaps [Serial] [Conformance]"
"[sig-storage] EmptyDir wrapper volumes should not conflict [Conformance]"
"[sig-storage] HostPath should give a volume the correct mode [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] Projected combined should project all components that make up the projection API [Projection][NodeConformance] [Conformance]"
"[sig-storage] Projected configMap optional updates should be reflected in volume [NodeConformance] [Conformance]"
"[sig-storage] Projected configMap should be consumable from pods in volume [NodeConformance] [Conformance]"
"[sig-storage] Projected configMap should be consumable from pods in volume as non-root [NodeConformance] [Conformance]"
"[sig-storage] Projected configMap should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] Projected configMap should be consumable from pods in volume with mappings [NodeConformance] [Conformance]"
"[sig-storage] Projected configMap should be consumable from pods in volume with mappings and Item mode set [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] Projected configMap should be consumable from pods in volume with mappings as non-root [NodeConformance] [Conformance]"
"[sig-storage] Projected configMap should be consumable in multiple volumes in the same pod [NodeConformance] [Conformance]"
"[sig-storage] Projected configMap updates should be reflected in volume [NodeConformance] [Conformance]"
"[sig-storage] Projected downwardAPI should provide container's cpu limit [NodeConformance] [Conformance]"
"[sig-storage] Projected downwardAPI should provide container's cpu request [NodeConformance] [Conformance]"
"[sig-storage] Projected downwardAPI should provide container's memory limit [NodeConformance] [Conformance]"
"[sig-storage] Projected downwardAPI should provide container's memory request [NodeConformance] [Conformance]"
"[sig-storage] Projected downwardAPI should provide node allocatable (cpu) as default cpu limit if the limit is not set [NodeConformance] [Conformance]"
"[sig-storage] Projected downwardAPI should provide node allocatable (memory) as default memory limit if the limit is not set [NodeConformance] [Conformance]"
"[sig-storage] Projected downwardAPI should provide podname only [NodeConformance] [Conformance]"
"[sig-storage] Projected downwardAPI should set DefaultMode on files [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] Projected downwardAPI should set mode on item file [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] Projected downwardAPI should update annotations on modification [NodeConformance] [Conformance]"
"[sig-storage] Projected downwardAPI should update labels on modification [NodeConformance] [Conformance]"
"[sig-storage] Projected secret optional updates should be reflected in volume [NodeConformance] [Conformance]"
"[sig-storage] Projected secret should be consumable from pods in volume [NodeConformance] [Conformance]"
"[sig-storage] Projected secret should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] Projected secret should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] Projected secret should be consumable from pods in volume with mappings [NodeConformance] [Conformance]"
"[sig-storage] Projected secret should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] Projected secret should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]"
"[sig-storage] Secrets optional updates should be reflected in volume [NodeConformance] [Conformance]"
"[sig-storage] Secrets should be able to mount in a volume regardless of a different secret existing with same name in different namespace [NodeConformance] [Conformance]"
"[sig-storage] Secrets should be consumable from pods in volume [NodeConformance] [Conformance]"
"[sig-storage] Secrets should be consumable from pods in volume as non-root with defaultMode and fsGroup set [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] Secrets should be consumable from pods in volume with defaultMode set [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] Secrets should be consumable from pods in volume with mappings [NodeConformance] [Conformance]"
"[sig-storage] Secrets should be consumable from pods in volume with mappings and Item Mode set [LinuxOnly] [NodeConformance] [Conformance]"
"[sig-storage] Secrets should be consumable in multiple volumes in a pod [NodeConformance] [Conformance]"
"[sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod [LinuxOnly] [Conformance]"
"[sig-storage] Subpath Atomic writer volumes should support subpaths with configmap pod with mountPath of existing file [LinuxOnly] [Conformance]"
"[sig-storage] Subpath Atomic writer volumes should support subpaths with downward pod [LinuxOnly] [Conformance]"
"[sig-storage] Subpath Atomic writer volumes should support subpaths with projected pod [LinuxOnly] [Conformance]"
"[sig-storage] Subpath Atomic writer volumes should support subpaths with secret pod [LinuxOnly] [Conformance]"