Update formatting of conformance comment
This commit is contained in:
@@ -21,7 +21,7 @@ import (
|
||||
"fmt"
|
||||
"path"
|
||||
|
||||
"k8s.io/api/core/v1"
|
||||
v1 "k8s.io/api/core/v1"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/apimachinery/pkg/util/uuid"
|
||||
"k8s.io/kubernetes/test/e2e/framework"
|
||||
@@ -37,7 +37,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected configMap", func() {
|
||||
f := framework.NewDefaultFramework("projected")
|
||||
|
||||
/*
|
||||
Release : v1.9
|
||||
Release: v1.9
|
||||
Testname: Projected Volume, ConfigMap, volume mode default
|
||||
Description: A Pod is created with projected volume source 'ConfigMap' to store a configMap with default permission mode. Pod MUST be able to read the content of the ConfigMap successfully and the mode on the volume MUST be -rw-r--r--.
|
||||
*/
|
||||
@@ -46,7 +46,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected configMap", func() {
|
||||
})
|
||||
|
||||
/*
|
||||
Release : v1.9
|
||||
Release: v1.9
|
||||
Testname: Projected Volume, ConfigMap, volume mode 0400
|
||||
Description: A Pod is created with projected volume source 'ConfigMap' to store a configMap with permission mode set to 0400. Pod MUST be able to read the content of the ConfigMap successfully and the mode on the volume MUST be -r--------.
|
||||
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
||||
@@ -64,7 +64,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected configMap", func() {
|
||||
})
|
||||
|
||||
/*
|
||||
Release : v1.9
|
||||
Release: v1.9
|
||||
Testname: Projected Volume, ConfigMap, non-root user
|
||||
Description: A Pod is created with projected volume source 'ConfigMap' to store a configMap as non-root user with uid 1000. Pod MUST be able to read the content of the ConfigMap successfully and the mode on the volume MUST be -rw-r--r--.
|
||||
*/
|
||||
@@ -79,7 +79,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected configMap", func() {
|
||||
})
|
||||
|
||||
/*
|
||||
Release : v1.9
|
||||
Release: v1.9
|
||||
Testname: Projected Volume, ConfigMap, mapped
|
||||
Description: A Pod is created with projected volume source 'ConfigMap' to store a configMap with default permission mode. The ConfigMap is also mapped to a custom path. Pod MUST be able to read the content of the ConfigMap from the custom location successfully and the mode on the volume MUST be -rw-r--r--.
|
||||
*/
|
||||
@@ -88,7 +88,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected configMap", func() {
|
||||
})
|
||||
|
||||
/*
|
||||
Release : v1.9
|
||||
Release: v1.9
|
||||
Testname: Projected Volume, ConfigMap, mapped, volume mode 0400
|
||||
Description: A Pod is created with projected volume source 'ConfigMap' to store a configMap with permission mode set to 0400. The ConfigMap is also mapped to a custom path. Pod MUST be able to read the content of the ConfigMap from the custom location successfully and the mode on the volume MUST be -r--r--r--.
|
||||
This test is marked LinuxOnly since Windows does not support setting specific file permissions.
|
||||
@@ -99,7 +99,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected configMap", func() {
|
||||
})
|
||||
|
||||
/*
|
||||
Release : v1.9
|
||||
Release: v1.9
|
||||
Testname: Projected Volume, ConfigMap, mapped, non-root user
|
||||
Description: A Pod is created with projected volume source 'ConfigMap' to store a configMap as non-root user with uid 1000. The ConfigMap is also mapped to a custom path. Pod MUST be able to read the content of the ConfigMap from the custom location successfully and the mode on the volume MUST be -r--r--r--.
|
||||
*/
|
||||
@@ -114,7 +114,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected configMap", func() {
|
||||
})
|
||||
|
||||
/*
|
||||
Release : v1.9
|
||||
Release: v1.9
|
||||
Testname: Projected Volume, ConfigMap, update
|
||||
Description: A Pod is created with projected volume source 'ConfigMap' to store a configMap and performs a create and update to new value. Pod MUST be able to create the configMap with value-1. Pod MUST be able to update the value in the confgiMap to value-2.
|
||||
*/
|
||||
@@ -202,7 +202,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected configMap", func() {
|
||||
})
|
||||
|
||||
/*
|
||||
Release : v1.9
|
||||
Release: v1.9
|
||||
Testname: Projected Volume, ConfigMap, create, update and delete
|
||||
Description: Create a Pod with three containers with ConfigMaps namely a create, update and delete container. Create Container when started MUST not have configMap, update and delete containers MUST be created with a ConfigMap value as 'value-1'. Create a configMap in the create container, the Pod MUST be able to read the configMap from the create container. Update the configMap in the update container, Pod MUST be able to read the updated configMap value. Delete the configMap in the delete container. Pod MUST fail to read the configMap from the delete container.
|
||||
*/
|
||||
@@ -403,7 +403,7 @@ var _ = ginkgo.Describe("[sig-storage] Projected configMap", func() {
|
||||
})
|
||||
|
||||
/*
|
||||
Release : v1.9
|
||||
Release: v1.9
|
||||
Testname: Projected Volume, ConfigMap, multiple volume paths
|
||||
Description: A Pod is created with a projected volume source 'ConfigMap' to store a configMap. The configMap is mapped to two different volume mounts. Pod MUST be able to read the content of the configMap successfully from the two volume mounts.
|
||||
*/
|
||||
|
||||
Reference in New Issue
Block a user